scispace - formally typeset
Search or ask a question
Author

Santonu Sarkar

Bio: Santonu Sarkar is an academic researcher from Birla Institute of Technology and Science. The author has contributed to research in topics: Software as a service & Software system. The author has an hindex of 22, co-authored 125 publications receiving 2048 citations. Previous affiliations of Santonu Sarkar include Jadavpur University & Accenture.


Papers
More filters
Proceedings ArticleDOI
01 Jan 2017
TL;DR: An end-to-end fully automated equivalence checker for validating optimizing and parallelizing transformations of PRES+ models from high-level language programs to validate the transformations using a state-of-the-art FSMD equivalenceChecker.
Abstract: Among the various models of computation (MoCs) which have been used to model parallel programs, Petri net has been one of the mostly adopted MoC. The traditional Petri net model is extended into the PRES+ model which is specially equipped to precisely represent parallel programs running on heterogeneous and embedded systems. With the inclusion of multicore and multiprocessor systems in the domain of embedded systems, it has become important to validate the optimizing and parallelizing transformations which system specifications go through before deployment. Although PRES+ model based equivalence checkers for validating such transformations already exist, construction of the PRES+ models from the original and the translated programs was carried out manually in these equivalence checkers, thereby leaving scope for inaccurate representation of the programs due to human intervention. Furthermore, PRES+ model tends to grow more rapidly with the program size when compared to other MoCs, such as FSMD. To alleviate these drawbacks, we propose a method for automated construction of PRES+ models from high-level language programs and use an existing translation scheme to convert PRES+ models to FSMD models to validate the transformations using a state-of-the-art FSMD equivalence checker. Thus, we have composed an end-to-end fully automated equivalence checker for validating optimizing and parallelizing transformations as demonstrated by our experimental results.

1 citations

Proceedings ArticleDOI
Santonu Sarkar1, A. Panayappan1
01 Nov 2008
TL;DR: A type system to model the architecture of a complex enterprise IT system using Acme architecture description language is proposed and a modeling approach to capture various architectural design decisions architects perform as a part of the architecture review is reported.
Abstract: Maintenance of complex business applications is challenging for software services industry. The maintenance team inherits the software with little design and implementation knowledge. The client-facing team gathers an ad-hoc architectural description of some sort and communicates the same to the geographically distributed maintenance team through informal box and line diagrams. This information is poorly understood, and the underlying architectural constraints are never enforced. This paper proposes a type system to model the architecture of a complex enterprise IT system using Acme architecture description language and reports a modeling approach to capture various architectural design decisions architects perform as a part of the architecture review. An initial field-study to evaluate the usefulness of such modeling has been encouraging.

1 citations

Book ChapterDOI
26 Jul 2021
TL;DR: In this paper, the authors proposed a clustering-based recursive anomaly detection algorithm; dynamic-Binary Tree Anomaly Identifier (d-BTAI), which is applied on industrial devices since anomalies in large industrial devices can incur massive losses.
Abstract: Many of the existing approaches to anomaly detection are based upon supervised learning and heavily dependent on training datasets. However, anomalies rarely occur in most industrial systems. Hence it is challenging to retrieve a training dataset labeled with true anomalies. Therefore, this motivates us to investigate such scenarios where it is arduous to get labeled data for anomalies. This paper has proposed a clustering-based recursive anomaly detection algorithm; dynamic-Binary Tree Anomaly Identifier (d-BTAI). d-BTAI has been applied on industrial devices since anomalies in large industrial devices can incur massive losses. The algorithm has experimented on various publicly available industrial datasets such as Cloudwatch, Yahoo, and Backblaze. d-BTAI has attained a higher Area under the ROC curve (AUC) in comparison with Isolation Forest (iForest), One Class Support Vector Machine (OCSVM), and Elliptic Envelope. The higher Negative Predictive Value (NPV) and specificity value demonstrate the algorithm’s efficacy on multiple datasets.

1 citations

Journal Article
TL;DR: An object oriented approach for reusing presynthesized components in VLSI design is proposed and the utilization of the interface graph of an object, during its reuse in subsequent synthesis of a new circuit is described and illustrated.
Abstract: In this paper we propose an object oriented approach for reusing presynthesized components in VLSI design. Each component object has an interface which hides its internal implementation details and yet allows the operations, performed by the component, to be invoked by sending an appropriate message. A graph based representation scheme has been adopted for capturing necessary interface information. The proposed interface graph can deal with circuits of various complexities. Moreover, the utilization of the interface graph of an object, during its reuse in subsequent synthesis of a new circuit, has been described and illustrated with the help of examples. Lastly, a scheme for extmcting the interface graph during synthesis of an object has been proposed.

1 citations


Cited by
More filters
01 Jan 2016
TL;DR: The using multivariate statistics is universally compatible with any devices to read, allowing you to get the most less latency time to download any of the authors' books like this one.
Abstract: Thank you for downloading using multivariate statistics. As you may know, people have look hundreds times for their favorite novels like this using multivariate statistics, but end up in infectious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some harmful bugs inside their laptop. using multivariate statistics is available in our digital library an online access to it is set as public so you can download it instantly. Our books collection saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the using multivariate statistics is universally compatible with any devices to read.

14,604 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

Book
Michael R. Lyu1
30 Apr 1996
TL;DR: Technical foundations introduction software reliability and system reliability the operational profile software reliability modelling survey model evaluation and recalibration techniques practices and experiences and best current practice of SRE software reliability measurement experience.
Abstract: Technical foundations introduction software reliability and system reliability the operational profile software reliability modelling survey model evaluation and recalibration techniques practices and experiences best current practice of SRE software reliability measurement experience measurement-based analysis of software reliability software fault and failure classification techniques trend analysis in validation and maintenance software reliability and field data analysis software reliability process assessment emerging techniques software reliability prediction metrics software reliability and testing fault-tolerant SRE software reliability using fault trees software reliability process simulation neural networks and software reliability. Appendices: software reliability tools software failure data set repository.

1,068 citations