Kotagiri Ramamohanarao

Kotagiri Ramamohanarao
University of Melbourne | MSD · School of Computing and Information Systems

About

549
Publications
115,296
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
13,077
Citations
Introduction
Skills and Expertise

Publications

Publications (549)
Chapter
With the advances in monitoring techniques and storage capability in the cloud, a high volume of valuable monitoring data is available. The collected data can be used for profiling applications behavior and detecting anomalous events that identify unexpected problems in the normal functioning of the system. However, the fast-changing environment of...
Preprint
Full-text available
White matter lesion (WML) is one of the common cerebral abnormalities, it indicates changes in the white matter of human brain and have shown significant association with stroke, dementia and deaths. Magnetic resonance imaging (MRI) of the brain is frequently used to diagnose white matter lesion (WML) volume. Regular screening can detect WML in ear...
Article
Full-text available
Thermal management in the hyper-scale cloud data centers is a critical problem. Increased host temperature creates hotspots which significantly increases cooling cost and affects reliability. Accurate prediction of host temperature is crucial for managing the resources effectively. Temperature estimation is a non-trivial problem due to thermal vari...
Article
Motivation The high accuracy of recent haplotype phasing tools is enabling the integration of haplotype (or phase) information more widely in genetic investigations. One such possibility is phase-aware expression quantitative trait loci (eQTL) analysis, where haplotype-based analysis has the potential to detect associations that may otherwise be mi...
Article
The virtualization concept and elasticity feature of cloud computing enable users to request resources on-demand and in the pay-as-you-go model. However, the high flexibility of the model makes the on-time resource scaling problem more complex. A variety of techniques such as threshold-based rules, time series analysis, or control theory are utiliz...
Article
Anomaly detection is a significant but challenging data mining task in a wide range of applications. Different domains usually use different ways to measure the characteristics of data and to define the anomaly types. As a result, it is a big challenge to develop a versatile anomaly detection framework that can be universally applied with satisfact...
Article
Full-text available
A common cause of traffic congestions is the concentration of intersecting vehicle routes. It can be difficult to reduce the intersecting routes in existing traffic systems where the routes are decided independently from vehicle to vehicle. The development of connected autonomous vehicles provides the opportunity to address the intersecting route p...
Article
Haplotype phasing is a critical step for many genetic applications but incorrect estimates of phase can negatively impact downstream analyses. One proposed strategy to improve phasing accuracy is to combine multiple independent phasing estimates to overcome the limitations of any individual estimate. However, such a strategy is yet to be thoroughly...
Preprint
Full-text available
Thermal management in the hyper-scale cloud data centers is a critical problem. Increased host temperature creates hotspots which significantly increases cooling cost and affects reliability. Accurate prediction of host temperature is crucial for managing the resources effectively. Temperature estimation is a non-trivial problem due to thermal vari...
Chapter
Video inpainting aims to restore missing regions of a video and has many applications such as video editing and object removal. However, existing methods either suffer from inaccurate short-term context aggregation or rarely explore long-term frame information. In this work, we present a novel context aggregation network to effectively exploit both...
Preprint
Full-text available
Time series with large discontinuities are common in many scenarios. However, existing distance-based algorithms (e.g., DTW and its derivative algorithms) may perform poorly in measuring distances between these time series pairs. In this paper, we propose the segmented pairwise distance (SPD) algorithm to measure distances between time series with...
Preprint
Full-text available
Semantic segmentation is one of the key problems in the field of computer vision, as it enables computer image understanding. However, most research and applications of semantic segmentation focus on addressing unique segmentation problems, where there is only one gold standard segmentation result for every input image. This may not be true in some...
Preprint
Video inpainting aims to restore missing regions of a video and has many applications such as video editing and object removal. However, existing methods either suffer from inaccurate short-term context aggregation or rarely explore long-term frame information. In this work, we present a novel context aggregation network to effectively exploit both...
Preprint
Full-text available
The ubiquitous adoption of Internet-of-Things (IoT) based applications has resulted in the emergence of the Fog computing paradigm, which allows seamlessly harnessing both mobile-edge and cloud resources. Efficient scheduling of application tasks in such environments is challenging due to constrained resource capabilities, mobility factors in IoT,...
Article
Full-text available
The ubiquitous adoption of Internet-of-Things (IoT) based applications has resulted in the emergence of the Fog computing paradigm, which allows seamlessly harnessing both mobile-edge and cloud resources. Efficient scheduling of application tasks in such environments is challenging due to constrained resource capabilities, mobility factors in IoT,...
Preprint
Decision tree learning is a widely used approach in machine learning, favoured in applications that require concise and interpretable models. Heuristic methods are traditionally used to quickly produce models with reasonably high accuracy. A commonly criticised point, however, is that the resulting trees may not necessarily be the best representati...
Preprint
Full-text available
The Internet of Things (IoT) paradigm is being rapidly adopted for the creation of smart environments in various domains. The IoT-enabled Cyber-Physical Systems (CPSs) associated with smart city, healthcare, Industry 4.0 and Agtech handle a huge volume of data and require data processing services from different types of applications in real-time. T...
Article
Full-text available
The Internet of Things (IoT) paradigm is being rapidly adopted for the creation of smart environments in various domains. The IoT-enabled Cyber-Physical Systems (CPSs) associated with smart city, healthcare, Industry 4.0 and Agtech handle a huge volume of data and require data processing services from different types of applications in real-time. T...
Article
Full-text available
In a machine learning setting, this study aims to compare the prognostic utility of connectomic, brain structural, and clinical/demographic predictors of individual change in symptom severity in individuals with schizophrenia. Symptom severity at baseline and 1‐year follow‐up was assessed in 30 individuals with a schizophrenia‐spectrum disorder usi...
Article
We study the predict+optimise problem, where machine learning and combinatorial optimisation must interact to achieve a common goal. These problems are important when optimisation needs to be performed on input parameters that are not fully observed but must instead be estimated using machine learning. We provide a novel learning technique for pred...
Article
Full-text available
Users need to understand the predictions of a classifier, especially when decisions based on the predictions can have severe consequences. The explanation of a prediction reveals the reason why a classifier makes a certain prediction, and it helps users to accept or reject the prediction with greater confidence. This paper proposes an explanation m...
Article
Full-text available
A critical problem in time series analysis is change point detection, which identifies the times when the underlying distribution of a time series abruptly changes. However, several shortcomings limit the use of some existing techniques in real-world applications. First, several change point detection techniques are offline methods, where the whole...
Article
Modeling a utility function for cloud business customers is one of the critical challenges facing many cloud service providers (CSPs) for their pricing strategy. It concerns how to measure various subjective experiences of the business customers and how to translate their cloud service experiences into a quantifiable unit, which can be determined b...
Article
Full-text available
Hitchhiking is a travel mode characterised by unpredictable travel times involving several possible combinations of lifts on roads. In this paper, we formulate a hitchhiker’s problem and develop a time-dependent stochastic route planning algorithm for hitchhikers. Namely, we introduce a concept of the stochastic time-dependent hitchhiking graph to...
Conference Paper
Full-text available
Fog computing overcomes the limitations of executing Internet of Things (IoT) applications in remote Cloud datacentres by extending the computation facilities closer to data sources. Since most of the Fog nodes are resource constrained, accommodation of every IoT application within Fog environments is very challenging. Hence, we need to efficiently...
Article
Full-text available
The fourth industrial revolution, widely known as Industry 4.0, is realizable through widespread deployment of Internet of Things (IoT) devices across the industrial ambiance. Due to communication latency and geographical distribution, Cloud-centric IoT models often fail to satisfy the Quality of Service (QoS) requirements of different IoT applicat...
Conference Paper
We use traffic simulations to quantify the impact of autonomous vehicles in various traffic scenarios, where vehicles at higher automation levels behave more opportunistically in car-following and lane-changing and can react to road situations more quickly. Our experimental results show that an increased automation level can improve traffic efficie...
Conference Paper
In the coming era of connected autonomous vehicles, data-driven traffic optimization will reach its full potential. By collecting highly detailed real-time traffic data from sensors and vehicles, a traffic management system will have the full view of the entire road network, allowing it to plan traffic in a virtual world that replicates the real ro...
Article
This article provides a systematic review of cloud pricing in an interdisciplinary approach. It examines many historical cases of pricing in practice and tracks down multiple roots of pricing in research. The aim is to help both cloud service provider (CSP) and cloud customers to capture the essence of cloud pricing when they need to make a critica...
Article
Full-text available
The marketplace for Internet of Things (IoT)-enabled smart systems is rapidly expanding. The integration of Fog and Cloud paradigm aims at harnessing both edge device and remote datacentre-based computing resources to meet Quality of Service (QoS) requirements of these smart systems. Due to lack of instance pricing and revenue maximizing techniques...
Article
Full-text available
We describe a new generative algorithm called Trajectory Generative Mechanism (TGM) for publishing trajectory datasets with -differential privacy guarantee which achieves substantially higher computational efficiency and utility (practical) than the state-of-the-art algorithms. Our algorithm first encodes (models) the data as a graphical generative...
Article
The dynamic nature of the cloud environment has made the distributed resource management process a challenge for cloud service providers. The importance of maintaining quality of service in accordance with customer expectations and the highly dynamic nature of cloud-hosted applications add new levels of complexity to the process. Advances in big-da...
Preprint
Image inpainting aims at restoring missing region of corrupted images, which has many applications such as image restoration and object removal. However, current GAN-based inpainting models fail to explicitly consider the semantic consistency between restored images and original images. Forexample, given a male image with image region of one eye mi...
Conference Paper
Full-text available
This paper considers the privacy issues in the intelligent transportation system, in which the data is largely communicated based upon vehicle-to-infrastructure and vehicle-to-vehicle protocols. The sensory data communicated by the vehicles contain sensitive information, such as location and speed, which could violate the driver's privacy if they a...
Article
We have recently developed a flexible traffic simulator called Scalable Microscopic Adaptive Road Traffic Simulator (SMARTS) [13]. Among many important features of SMARTS in this article, we focus on traffic generation, which is key in analyzing and understanding traffic. SMARTS is a fully distributed simulator that can run on a computer cluster, e...
Conference Paper
Image inpainting aims at restoring missing regions of corrupted images, which has many applications such as image restoration and object removal. However, current GAN-based generative inpainting models do not explicitly exploit the structural or textural consistency between restored contents and their surrounding contexts. To address this limitatio...
Conference Paper
We study the predict+optimise problem, where machine learning and combinatorial optimisation must interact to achieve a common goal. These problems are important when optimisation needs to be performed on input parameters that are not fully observed but must instead be estimated using machine learning. Our contributions are two-fold: 1) we provide...
Preprint
Image inpainting aims at restoring missing regions of corrupted images, which has many applications such as image restoration and object removal. However, current GAN-based generative inpainting models do not explicitly exploit the structural or textural consistency between restored contents and their surrounding contexts.To address this limitation...
Conference Paper
Classifier explanations have been identified as a crucial component of knowledge discovery. Local explanations evaluate the behavior of a classifier in the vicinity of a given instance. A key step in this approach is to generate synthetic neighbors of the given instance. This neighbor generation process is challenging and it has considerable impact...
Preprint
We propose a novel algorithm to ensure $\epsilon$-differential privacy for answering range queries on trajectory data. In order to guarantee privacy, differential privacy mechanisms add noise to either data or query, thus introducing errors to queries made and potentially decreasing the utility of information. In contrast to the state-of-the-art, o...
Article
In its current form, ride-sharing is responsible for a small fraction of traffic load compared to other transportation modes, especially private vehicles. As its benefits became more evident, and obstacles, e.g., lack of liability legislation, that may hinder its larger scale adoption are being overcome, ride-sharing will be a more common mode of t...
Article
Cloud price modeling is the major challenge facing many cloud computing practitioners and researchers in the field of cloud economics, which is also known as “Cloudonomics.” Previous attempts mainly focused on a uniform market and used existing price models to explain the issue of revenue maximization for cloud service providers (CSPs) from a cost...
Article
In this paper, we present a novel parallel implementation for training Gradient Boosting Decision Trees (GBDTs) on Graphics Processing Units (GPUs). Thanks to the excellent results on classification/regression and the open sourced libraries such as XGBoost, GBDTs have become very popular in recent years and won many awards in machine learning and d...
Chapter
An important task in analysing high-dimensional time series data generated from sensors in the Internet of Things (IoT) platform is to detect changes in the statistical properties of the time series. Accurate, efficient and near real-time detection of change points in such data is challenging due to the streaming nature of it and the presence of ir...
Article
Full-text available
Data centers consume an enormous amount of energy to meet the ever‐increasing demand for cloud resources. Computing and Cooling are the two main subsystems that largely contribute to energy consumption in a data center. Dynamic Virtual Machine (VM) consolidation is a widely adopted technique to reduce the energy consumption of computing systems. Ho...
Article
Cloud computing is a model for on‐demand access to shared resources based on the pay‐per‐use policy. In order to efficiently manage the resources, a continuous analysis of the operational state of the system is required to be able to detect the performance degradations and malfunctioned resources as soon as possible. Every change in the workload, h...
Article
Big sensing data is commonly encountered from various surveillance or sensing systems. Sampling and transferring errors are commonly encountered during each stage of sensing data processing. How to recover from these errors with accuracy and efficiency is quite challenging because of high sensing data volume and unrepeatable wireless communication...
Article
Complex human behavior emerges from dynamic patterns of neural activity that transiently synchronize between distributed brain networks. This study aims to model the dynamics of neural activity in individuals with schizophrenia and to investigate whether the attributes of these dynamics associate with the disorder's behavioral and cognitive deficit...
Article
Full-text available
This paper proposes a novel approach to safeguarding location privacy for GNN (group nearest neighbor) queries. Given the locations of a group of dispersed users, the GNN query returns the location that minimizes the total or the maximal distance for all group users. The returned location is typically a meeting place such as a cinema or coffee shop...
Chapter
Sensors deployed in different parts of a city continuously record traffic data, such as vehicle flows and pedestrian counts. We define an unexpected change in the traffic counts as an anomalous local event. Reliable discovery of such events is very important in real-world applications such as real-time crash detection or traffic congestion detectio...
Chapter
Blockmodelling is an important technique for detecting underlying patterns in graphs. Existing blockmodelling algorithms are unsupervised and cannot take advantage of the existing information that might be available about objects that are known to be similar. This background information can help finding complex patterns, such as hierarchical or rin...
Article
Inliers (bridge points) between clusters degrade the ability of many algorithms to find clusters in numerical data. We present three new approaches to the detection and removal of inliers. Two approaches are based on Local Outlier Factor (LOF) scores. We also discuss using LOF scores for an isolation Nearest Neighbour Ensemble (iNNE) approach to in...
Conference Paper
Activity-Based ride-sharing is a new paradigm which enhances the current model based on fixed origins and destinations, namely trip-based ride-sharing. In this new model, a user issues a ride-sharing request with his origin and the activity he wants to perform at any convenient destination. Then, the system computes the travel plans and users will...
Conference Paper
Microscopic traffic simulators play a major role to carry research on transportation problems. Microscopic traffic simulation is powerful because it enables efficient analysis of complex traffic problems to the highest level of detail. We developed Scalable Microscopic Adaptive Road Traffic Simulator (SMARTS) [14] that can perform large-scale simul...
Article
In multi-view re-ranking, multiple heterogeneous visual features are usually projected onto a low-dimensional subspace, and thus the resulting latent representation can be used for the subsequent similarity-based ranking. Albeit effective, this standard mechanism underplays the intrinsic structure underlying the latent subspace and does not take in...