Vwani Roychowdhury

ORCID: 0000-0003-0832-6489
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Complex Network Analysis Techniques
  • Neural Networks and Applications
  • Peer-to-Peer Network Technologies
  • Quantum Mechanics and Applications
  • Quantum and electron transport phenomena
  • Opinion Dynamics and Social Influence
  • Quantum-Dot Cellular Automata
  • Blind Source Separation Techniques
  • Advanced Memory and Neural Computing
  • Misinformation and Its Impacts
  • Caching and Content Delivery
  • Advanced Text Analysis Techniques
  • Interconnection Networks and Systems
  • Auction Theory and Applications
  • Neural dynamics and brain function
  • EEG and Brain-Computer Interfaces
  • Consumer Market Behavior and Pricing
  • Machine Learning and Algorithms
  • Functional Brain Connectivity Studies
  • Spam and Phishing Detection
  • Game Theory and Applications
  • Parallel Computing and Optimization Techniques
  • scientometrics and bibliometrics research

University of California, Los Angeles
2015-2025

Samueli Institute
2022-2023

National University of Singapore
2023

Université Paris-Saclay
2023

Thales (France)
2023

Centre National de la Recherche Scientifique
2023

The University of Texas at Dallas
2023

University of Messina
2023

The University of Texas at Austin
2023

University of Illinois Chicago
2023

We apply the full power of modern electronic band-structure engineering and epitaxial heterostructures to design a transistor that can sense control single-donor electron spin. Spin-resonance transistors may form technological basis for quantum information processing. One- two-qubit operations are performed by applying gate bias. The bias electric field pulls wave function away from dopant ion into layers different alloy composition. Owing variation g factor...

10.1103/physreva.62.012306 article EN Physical Review A 2000-06-13

High-dimensional data sets generated by high-throughput technologies, such as DNA microarray, are often the outputs of complex networked systems driven hidden regulatory signals. Traditional statistical methods for computing low-dimensional or representations these sets, principal component analysis and independent analysis, ignore underlying network structures provide decompositions based purely on a priori constraints computed The resulting decomposition thus provides phenomenological...

10.1073/pnas.2136632100 article EN Proceedings of the National Academy of Sciences 2003-12-12

Rumors and conspiracy theories thrive in environments of low confidence trust. Consequently, it is not surprising that ones related to the COVID-19 pandemic are proliferating given lack scientific consensus on virus's spread containment, or long-term social economic ramifications pandemic. Among stories currently circulating US-focused media forums suggesting 5G telecommunication network activates virus, a hoax perpetrated by global cabal, virus bio-weapon released deliberately Chinese, Bill...

10.1007/s42001-020-00086-5 article EN other-oa Journal of Computational Social Science 2020-10-28

Abstract In the ‘Beyond Moore’s Law’ era, with increasing edge intelligence, domain-specific computing embracing unconventional approaches will become increasingly prevalent. At same time, adopting a variety of nanotechnologies offer benefits in energy cost, computational speed, reduced footprint, cyber resilience, and processing power. The time is ripe for roadmap to guide future research, this collection aims fill that need. authors provide comprehensive neuromorphic using electron spins,...

10.1088/2399-1984/ad299a article EN cc-by Nano Futures 2024-02-15

We show that $2n$ random classical bits are both necessary and sufficient for encrypting any unknown state of n quantum in an informationally secure manner. also characterize the complete set optimal protocols terms a unitary operations comprise orthonormal basis canonical inner product space. Moreover, connection is made between encryption teleportation allows different proof optimality teleportation.

10.1103/physreva.67.042317 article EN Physical Review A 2003-04-22

Recent studies showed that conventional approaches being used to solve problems imposed by hard-wired metal interconnects will eventually encounter fundamental limits and may impede the advance of future ultralarge-scale integrated circuits (ULSls). To surpass these limits, we introduce a novel RF/wireless interconnect concept for inter- intra-ULSI communications. Unlike traditional "passive" interconnect, "active" is based on low loss dispersion-free microwave signal transmission,...

10.1109/5.920578 article EN Proceedings of the IEEE 2001-04-01

Social networks are useful for judging the trustworthiness of outsiders. An automated antispam tool exploits properties social to distinguish between unsolicited commercial e-mail - spam and messages associated with people user knows.

10.1109/mc.2005.132 article EN Computer 2005-04-01

In this paper, we introduce a novel independent component analysis (ICA) algorithm, which is truly blind to the particular underlying distribution of mixed signals. Using nonparametric kernel density estimation technique, algorithm performs simultaneously unknown probability functions source signals and unmixing matrix. Following proposed approach, signal separation framework can be posed as nonlinear optimization problem, where closed form expression cost function available, only elements...

10.1109/tnn.2003.820667 article EN IEEE Transactions on Neural Networks 2004-01-01

Although a great deal of attention has been paid to how conspiracy theories circulate on social media and their factual counterpart conspiracies, there little computational work done describing narrative structures. We present an automated pipeline for the discovery description generative frameworks media, actual conspiracies reported in news media. base this two separate repositories posts articles well-known theory Pizzagate from 2016, New Jersey Bridgegate 2013. formulate graphical...

10.1371/journal.pone.0233879 article EN cc-by PLoS ONE 2020-06-16

Social media offer an unprecedented opportunity to explore how people talk about health care at a very large scale. Numerous studies have shown the importance of websites with user forums for seeking information related health. Parents turn some these sites, colloquially referred as "mommy blogs," share concerns children's care, including vaccination. Although substantial work has considered role social media, particularly Twitter, in discussions vaccination and other care-related issues,...

10.2196/publichealth.6586 article EN cc-by JMIR Public Health and Surveillance 2016-11-22

Abstract Rumors and conspiracy theories thrive in environments of low confi- dence trust. Consequently, it is not surprising that ones related to the Covid-19 pandemic are proliferating given lack scientific consensus on virus’s spread containment, or long term social economic ramifications pandemic. Among stories currently circulating suggesting 5G telecommunication network activates virus, a hoax perpetrated by global cabal, virus bio-weapon released deliberately Chinese, Bill Gates using...

10.21203/rs.3.rs-52079/v1 preprint EN cc-by Research Square (Research Square) 2020-08-04

We present here algorithmic cooling (via polarization heat bath)-a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, cleans dirty bits beyond the Shannon's bound on data compression, by using set rapidly thermal-relaxing bits. Such auxiliary could be implemented get into thermal equilibrium with environment, e.g., electron spins. Interestingly, interaction usually...

10.1073/pnas.241641898 article EN Proceedings of the National Academy of Sciences 2002-03-19

Due to the ubiquity of time series with long-range correlation in many areas science and engineering, analysis modeling such data is an important problem. While field seems be mature, three major issues have not been satisfactorily resolved. (i) Many methods proposed assess series. Under what circumstances do they yield consistent results? (ii) The mathematical theory concerns behavior for very large times. A measured finite, however. How can we relate fractal scaling break at a specific...

10.1103/physreve.73.016117 article EN Physical Review E 2006-01-13

Cells adjust gene expression profiles in response to environmental and physiological changes through a series of signal transduction pathways. Upon activation or deactivation, the terminal regulators bind dissociate from DNA, respectively, modulate transcriptional activities on particular promoters. Traditionally, individual reporter genes have been used detect activity transcription factors. This approach works well for simple, non-overlapping For complex networks, more sophisticated tools...

10.1073/pnas.0305287101 article EN Proceedings of the National Academy of Sciences 2003-12-23

We introduce a scalable searching protocol for locating and retrieving content in random networks with power-law (PL) heavy-tailed degree distributions. The proposed algorithm is capable of finding any the network probability one time O(logN), total traffic that provably scales sub-linearly size, N. Unlike other solutions, there no need to assume has multiple copies contents; finds all contents reliably, even if every node starts unique content. scaling behavior size giant connected...

10.1109/p2p.2004.39 article EN International Conference on Peer-to-Peer Computing 2004-08-25

We study entanglement in a valence-bond solid state, which describes the ground state of an Affleck-Kennedy-Lieb-Tasaki quantum spin chain, consisting bulk spin-1's and two spin-$1/2$'s at ends. characterize between various subsystems by mostly calculating entropy one subsystems; when appropriate, we evaluate concurrences as well. show that reduced density matrix continuous block spins is independent size chain location relative to Moreover, with rest sites approaches constant value...

10.1103/physrevlett.93.227203 article EN Physical Review Letters 2004-11-22

We describe algorithms for maximum likelihood estimation of Gaussian graphical models with conditional independence constraints. This problem is also known as covariance selection, and it can be expressed an unconstrained convex optimization a closed-form solution if the underlying graph chordal. The focus paper on iterative selection nonchordal graphs. first derive efficient methods evaluating gradient Hessian log-likelihood function when are formulated simple recursions clique tree...

10.1080/10556780802102693 article EN Optimization methods & software 2008-07-11

In this paper, we propose a distributed parallel support vector machine (DPSVM) training mechanism in configurable network environment for data mining. The basic idea is to exchange vectors among strongly connected (SCN) so that multiple servers may work concurrently on set with limited communication cost and fast speed. percentage of can the overhead be adjusted through configuration. proposed algorithm further speeds up online implementation synchronization. We prove global optimal...

10.1109/tnn.2007.2000061 article EN IEEE Transactions on Neural Networks 2008-07-01

Twitter has undoubtedly caught the attention of both general public, and academia as a microblogging service worthy study attention. several features that sets it apart from other social media/networking sites, including its 140 character limit on each user's message (tweet), unique combination avenues via which information is shared: directed network friends followers, where messages posted by user broadcast to all public timeline, provides real time access posts or tweets specific topics...

10.1145/1964858.1964875 article EN 2010-07-25
Coming Soon ...