Samarjit Chakraborty
YOU?
Author Swipe
View article: In-Vivo Training for Deep Brain Stimulation
In-Vivo Training for Deep Brain Stimulation Open
Deep Brain Stimulation (DBS) is a highly effective treatment for Parkinson's Disease (PD). Recent research uses reinforcement learning (RL) for DBS, with RL agents modulating the stimulation frequency and amplitude. But, these models rely …
View article: How reliable is smartphone-based electronic contact tracing for COVID-19?
How reliable is smartphone-based electronic contact tracing for COVID-19? Open
A look through the lens of neighbor discovery protocols reveals significant potential to improve electronic contact-tracing accuracy.
View article: Repairing Control Safety Violations via Scheduler Patch Synthesis
Repairing Control Safety Violations via Scheduler Patch Synthesis Open
View article: Performance Limits of Neighbor Discovery in Wireless Networks
Performance Limits of Neighbor Discovery in Wireless Networks Open
Neighbor Discovery (ND) is the procedure employed by wireless devices to establish a first contact. All ND protocols involve devices sending beacons, and also listening for them. Protocols differ in terms of how the beacon transmissions an…
View article: Introduction to the Special Issue on Automotive CPS Safety & Security: Part 2
Introduction to the Special Issue on Automotive CPS Safety & Security: Part 2 Open
This special issue on automotive Cyber-Physical Systems(CPS) safety and security is a continuation of the special issue that appeared in ACM Transactions on Cyber-Physical Systems, Vol. 7, No. 1, in January 2023. It features a second set o…
View article: A shallow dive into the depths of non-termination checking for C programs
A shallow dive into the depths of non-termination checking for C programs Open
Checking for Non-Termination (NT) of a given program P, i.e., determining if P has at least one non-terminating run, is an undecidable problem that continues to garner significant research attention. While unintended NT is common in real-w…
View article: Enhancing Split Computing and Early Exit Applications through Predefined Sparsity
Enhancing Split Computing and Early Exit Applications through Predefined Sparsity Open
In the past decade, Deep Neural Networks (DNNs) achieved state-of-the-art performance in a broad range of problems, spanning from object classification and action recognition to smart building and healthcare. The flexibility that makes DNN…
View article: MTL-Split: Multi-Task Learning for Edge Devices using Split Computing
MTL-Split: Multi-Task Learning for Edge Devices using Split Computing Open
Split Computing (SC), where a Deep Neural Network (DNN) is intelligently split with a part of it deployed on an edge device and the rest on a remote server is emerging as a promising approach. It allows the power of DNNs to be leveraged fo…
View article: MTL-Split: Multi-Task Learning for Edge Devices using Split Computing
MTL-Split: Multi-Task Learning for Edge Devices using Split Computing Open
View article: To Balance or to Not? Battery Aging-Aware Active Cell Balancing for Electric Vehicles
To Balance or to Not? Battery Aging-Aware Active Cell Balancing for Electric Vehicles Open
Due to manufacturing variabilities and temperature gradients within an electric vehicle's battery pack, the capacities of cells in it decrease differently over time. This reduces the usable capacity of the battery - the charge levels of on…
View article: A Dataset on CSI-based Activity Recognition in Real-World Environments
A Dataset on CSI-based Activity Recognition in Real-World Environments Open
Activity recognition, e.g., identifying individuals, recognizing their physical activities, or estimating their number in a room, based on WiFi's Channel State Information (CSI) has been studied intensively in the last decade. While most …
View article: A Dataset on CSI-based Activity Recognition in Real-World Environments
A Dataset on CSI-based Activity Recognition in Real-World Environments Open
Activity recognition, e.g., identifying individuals, recognizing their physical activities, or estimating their number in a room, based on WiFi's Channel State Information (CSI) has been studied intensively in the last decade. While most …
View article: EMSOFT 2022 Program Committee
EMSOFT 2022 Program Committee Open
View article: DeepAbstraction: 2-Level Prioritization for Unlabeled Test Inputs in Deep Neural Networks
DeepAbstraction: 2-Level Prioritization for Unlabeled Test Inputs in Deep Neural Networks Open
International audience
View article: WiFiEye -- Seeing over WiFi Made Accessible
WiFiEye -- Seeing over WiFi Made Accessible Open
While commonly used for communication purposes, an increasing number of recent studies consider WiFi for sensing. In particular, wireless signals are altered (e.g., reflected and attenuated) by the human body and objects in the environment…
View article: How reliable is smartphone-based electronic contact tracing for COVID-19?
How reliable is smartphone-based electronic contact tracing for COVID-19? Open
A look through the lens of neighbor discovery protocols reveals significant potential to improve electronic contact-tracing accuracy.
View article: Guest Editors’ Introduction: Cross-Layer Design of Cyber–Physical Systems
Guest Editors’ Introduction: Cross-Layer Design of Cyber–Physical Systems Open
Cyber–physical system (CPS) design is characterized by modeling a computer (or cyber) system together with the physical system that the computer controls. This approach differs from both classical control systems design and also embedd…
View article: Heterogeneous Communication Virtualization for Distributed Embedded Applications
Heterogeneous Communication Virtualization for Distributed Embedded Applications Open
Distributed embedded applications (DEAs) are typically implemented on diverse embedded nodes interconnected through communication network(s) to exchange data and control information to achieve the desired functionality. Conventional approa…
View article: Performance Limits of Neighbor Discovery in Wireless Networks
Performance Limits of Neighbor Discovery in Wireless Networks Open
Neighbor Discovery (ND) is the process employed by two wireless devices to discover each other. There are many different ND protocols, both in the scientific literature and also those employed in practice. All ND protocols involve devices …
View article: Monitoring Distributed Component-Based Systems
Monitoring Distributed Component-Based Systems Open
View article: Reliable CPS Design for Unreliable Hardware Platforms
Reliable CPS Design for Unreliable Hardware Platforms Open
Today, many battery-operated cyber-physical systems (CPS) ranging from domestic robots, to drones, and electric vehicles are highly software-intensive. The software in such systems involves multiple feedback control loops that implement di…
View article: Vehicle Position Estimation with Aerial Imagery from Unmanned Aerial Vehicles
Vehicle Position Estimation with Aerial Imagery from Unmanned Aerial Vehicles Open
The availability of real-world data is a key element for novel developments in the fields of automotive and traffic research. Aerial imagery has the major advantage of recording multiple objects simultaneously and overcomes limitations suc…
View article: Optimizing BLE-Like Neighbor Discovery
Optimizing BLE-Like Neighbor Discovery Open
Neighbor discovery (ND) protocols are used for establishing a first contact between multiple wireless devices. The energy consumption and discovery latency of this procedure are determined by the parametrization of the protocol. In most ex…
View article: Intelligent Chargers Will Make Mobile Devices Live Longer
Intelligent Chargers Will Make Mobile Devices Live Longer Open
Editor's notes: Editor's note: Battery aging is becoming a major concern in mobile devices such as laptops or smartphones and often results in premature device replacement. This perspective article gives an overview of recent advances made…
View article: Configuring loosely time-triggered wireless control software
Configuring loosely time-triggered wireless control software Open
In many wireless control networks, sensor data and controller data are exchanged periodically, which requires periodic packet transmissions between the physical plant and the controller. As an alternative, event-triggered control paradigms…
View article: Vehicle Position Estimation with Aerial Imagery from Unmanned Aerial\n Vehicles
Vehicle Position Estimation with Aerial Imagery from Unmanned Aerial\n Vehicles Open
The availability of real-world data is a key element for novel developments\nin the fields of automotive and traffic research. Aerial imagery has the major\nadvantage of recording multiple objects simultaneously and overcomes\nlimitations …
View article: Unsupervised and Supervised Learning with the Random Forest Algorithm for Traffic Scenario Clustering and Classification
Unsupervised and Supervised Learning with the Random Forest Algorithm for Traffic Scenario Clustering and Classification Open
The goal of this paper is to provide a method, which is able to find categories of traffic scenarios automatically. The architecture consists of three main components: A microscopic traffic simulation, a clustering technique and a classifi…
View article: The Time-Triggered Wireless Architecture
The Time-Triggered Wireless Architecture Open
Wirelessly interconnected sensors, actuators, and controllers promise greater flexibility, lower installation and maintenance costs, and higher robustness in harsh conditions than wired solutions. However, to facilitate the adoption of wir…
View article: The Time-Triggered Wireless Architecture (Artifact)
The Time-Triggered Wireless Architecture (Artifact) Open
This artifact contains a stable version of all the data and source code required to reproduce or replicate the results presented in The Time-Triggered Wireless Architecture. One GitHub repository serves as main hub for all information rela…
View article: The Time-Triggered Wireless Architecture
The Time-Triggered Wireless Architecture Open
Wirelessly interconnected sensors, actuators, and controllers promise greater flexibility, lower installation and maintenance costs, and higher robustness in harsh conditions than wired solutions. However, to facilitate the adoption of wir…