Skip to main content

Showing 1–49 of 49 results for author: Davis, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03230  [pdf, ps, other

    cs.CR cs.LG

    Defending Large Language Models Against Attacks With Residual Stream Activation Analysis

    Authors: Amelia Kawasaki, Andrew Davis, Houssam Abbas

    Abstract: The widespread adoption of Large Language Models (LLMs), exemplified by OpenAI's ChatGPT, brings to the forefront the imperative to defend against adversarial threats on these models. These attacks, which manipulate an LLM's output by introducing malicious inputs, undermine the model's integrity and the trust users place in its outputs. In response to this challenge, our paper presents an innovati… ▽ More

    Submitted 9 July, 2024; v1 submitted 5 June, 2024; originally announced June 2024.

  2. arXiv:2405.19595  [pdf

    cs.CV

    The RSNA Abdominal Traumatic Injury CT (RATIC) Dataset

    Authors: Jeffrey D. Rudie, Hui-Ming Lin, Robyn L. Ball, Sabeena Jalal, Luciano M. Prevedello, Savvas Nicolaou, Brett S. Marinelli, Adam E. Flanders, Kirti Magudia, George Shih, Melissa A. Davis, John Mongan, Peter D. Chang, Ferco H. Berger, Sebastiaan Hermans, Meng Law, Tyler Richards, Jan-Peter Grunz, Andreas Steven Kunz, Shobhit Mathur, Sandro Galea-Soler, Andrew D. Chung, Saif Afat, Chin-Chi Kuo, Layal Aweidah , et al. (15 additional authors not shown)

    Abstract: The RSNA Abdominal Traumatic Injury CT (RATIC) dataset is the largest publicly available collection of adult abdominal CT studies annotated for traumatic injuries. This dataset includes 4,274 studies from 23 institutions across 14 countries. The dataset is freely available for non-commercial use via Kaggle at https://www.kaggle.com/competitions/rsna-2023-abdominal-trauma-detection. Created for the… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 40 pages, 2 figures, 3 tables

  3. arXiv:2404.19631  [pdf, other

    cs.LG cs.CR cs.SE

    On Training a Neural Network to Explain Binaries

    Authors: Alexander Interrante-Grant, Andy Davis, Heather Preslier, Tim Leek

    Abstract: In this work, we begin to investigate the possibility of training a deep neural network on the task of binary code understanding. Specifically, the network would take, as input, features derived directly from binaries and output English descriptions of functionality to aid a reverse engineer in investigating the capabilities of a piece of closed-source software, be it malicious or benign. Given re… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  4. arXiv:2404.16632  [pdf

    cs.CR cs.SE

    Introducing Systems Thinking as a Framework for Teaching and Assessing Threat Modeling Competency

    Authors: Siddhant S. Joshi, Preeti Mukherjee, Kirsten A. Davis, James C. Davis

    Abstract: Computing systems face diverse and substantial cybersecurity threats. To mitigate these cybersecurity threats, software engineers need to be competent in the skill of threat modeling. In industry and academia, there are many frameworks for teaching threat modeling, but our analysis of these frameworks suggests that (1) these approaches tend to be focused on component-level analysis rather than edu… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: Presented at the Annual Conference of the American Society for Engineering Education (ASEE'24) 2024

  5. arXiv:2403.18679  [pdf

    cs.SE cs.HC

    An Exploratory Study on Upper-Level Computing Students' Use of Large Language Models as Tools in a Semester-Long Project

    Authors: Ben Arie Tanay, Lexy Arinze, Siddhant S. Joshi, Kirsten A. Davis, James C. Davis

    Abstract: Background: Large Language Models (LLMs) such as ChatGPT and CoPilot are influencing software engineering practice. Software engineering educators must teach future software engineers how to use such tools well. As of yet, there have been few studies that report on the use of LLMs in the classroom. It is, therefore, important to evaluate students' perception of LLMs and possible ways of adapting t… ▽ More

    Submitted 16 April, 2024; v1 submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted to the 2024 General Conference of the American Society for Engineering Education (ASEE)

  6. arXiv:2310.07888  [pdf, other

    cs.CY

    Viability of Mobile Forms for Population Health Surveys in Low Resource Areas

    Authors: Alexander Davis, Aidan Chen, Milton Chen, James Davis

    Abstract: Population health surveys are an important tool to effectively allocate limited resources in low resource communities. In such an environment, surveys are often done by local population with pen and paper. Data thus collected is difficult to tabulate and analyze. We conducted a series of interviews and experiments in the Philippines to assess if mobile forms can be a viable and more efficient surv… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: 2023 IEEE Global Humanitarian Technology Conference (GHTC)

  7. arXiv:2309.13213  [pdf, other

    hep-ex cs.LG physics.ins-det

    The LHCb ultra-fast simulation option, Lamarr: design and validation

    Authors: Lucio Anderlini, Matteo Barbetti, Simone Capelli, Gloria Corti, Adam Davis, Denis Derkach, Nikita Kazeev, Artem Maevskiy, Maurizio Martinelli, Sergei Mokonenko, Benedetto Gianluca Siddi, Zehua Xu

    Abstract: Detailed detector simulation is the major consumer of CPU resources at LHCb, having used more than 90% of the total computing budget during Run 2 of the Large Hadron Collider at CERN. As data is collected by the upgraded LHCb detector during Run 3 of the LHC, larger requests for simulated data samples are necessary, and will far exceed the pledged resources of the experiment, even with existing fa… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

    Comments: Under review in EPJ Web of Conferences (CHEP 2023)

  8. arXiv:2307.06294  [pdf, other

    cs.AR cs.ET cs.NI

    Corona: System Implications of Emerging Nanophotonic Technology

    Authors: Dana Vantrease, Robert Schreiber, Matteo Monchiero, Moray McLaren, Norman P. Jouppi, Marco Fiorentin, Al Davis, Nathan Binkert, Raymond G. Beausoleil, Jung Ho Ahn

    Abstract: We expect that many-core microprocessors will push performance per chip from the 10 gigaflop to the 10 teraflop range in the coming decade. To support this increased performance, memory and inter-core bandwidths will also have to scale by orders of magnitude. Pin limitations, the energy cost of electrical signaling, and the non-scalability of chip-length global wires are significant bandwidth impe… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: This edition is recompiled from proceedings of ISCA-35 (the 35th International Symposium on Computer Architecture, June 21 - 25, 2008, Beijing, China) and has minor formatting differences. 13 pages; 11 figures

  9. arXiv:2306.17141  [pdf, other

    cs.CV

    Filtered-Guided Diffusion: Fast Filter Guidance for Black-Box Diffusion Models

    Authors: Zeqi Gu, Abe Davis

    Abstract: Recent advances in diffusion-based generative models have shown incredible promise for Image-to-Image translation and editing. Most recent work in this space relies on additional training or architecture-specific adjustments to the diffusion process. In this work, we show that much of this low-level control can be achieved without additional training or any access to features of the diffusion mode… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

    Comments: Project page: https://github.com/jaclyngu/FilteredGuidedDiffusion

  10. arXiv:2306.15688  [pdf, ps, other

    cs.AR cs.NI

    RETROSPECTIVE: Corona: System Implications of Emerging Nanophotonic Technology

    Authors: Dana Vantrease, Robert Schreiber, Matteo Monchiero, Moray McLaren, Norman P. Jouppi, Marco Fiorentino, Al Davis, Nathan Binkert, Raymond G. Beausoleil, Jung Ho Ahn

    Abstract: The 2008 Corona effort was inspired by a pressing need for more of everything, as demanded by the salient problems of the day. Dennard scaling was no longer in effect. A lot of computer architecture research was in the doldrums. Papers often showed incremental subsystem performance improvements, but at incommensurate cost and complexity. The many-core era was moving rapidly, and the approach with… ▽ More

    Submitted 23 June, 2023; originally announced June 2023.

    Comments: 2 pages. Proceedings of ISCA-50: 50 years of the International Symposia on Computer Architecture (selected papers) June 17-21 Orlando, Florida

  11. arXiv:2304.13681  [pdf, other

    cs.CV

    Ray Conditioning: Trading Photo-consistency for Photo-realism in Multi-view Image Generation

    Authors: Eric Ming Chen, Sidhanth Holalkere, Ruyu Yan, Kai Zhang, Abe Davis

    Abstract: Multi-view image generation attracts particular attention these days due to its promising 3D-related applications, e.g., image viewpoint editing. Most existing methods follow a paradigm where a 3D representation is first synthesized, and then rendered into 2D images to ensure photo-consistency across viewpoints. However, such explicit bias for photo-consistency sacrifices photo-realism, causing ge… ▽ More

    Submitted 4 September, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

    Comments: ICCV 2023 paper. Project page at https://ray-cond.github.io/

  12. Demonstration of machine-learning-enhanced Bayesian quantum state estimation

    Authors: Sanjaya Lohani, Joseph M. Lukens, Atiyya A. Davis, Amirali Khannejad, Sangita Regmi, Daniel E. Jones, Ryan T. Glasser, Thomas A. Searles, Brian T. Kirby

    Abstract: Machine learning (ML) has found broad applicability in quantum information science in topics as diverse as experimental design, state classification, and even studies on quantum foundations. Here, we experimentally realize an approach for defining custom prior distributions that are automatically tuned using ML for use with Bayesian quantum state estimation methods. Previously, researchers have lo… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Comments: 9 pages, 4 figures

  13. arXiv:2211.13172  [pdf, other

    stat.ML cs.LG math.ST stat.ME

    Kernel PCA for multivariate extremes

    Authors: Marco Avella-Medina, Richard A. Davis, Gennady Samorodnitsky

    Abstract: We propose kernel PCA as a method for analyzing the dependence structure of multivariate extremes and demonstrate that it can be a powerful tool for clustering and dimension reduction. Our work provides some theoretical insight into the preimages obtained by kernel PCA, demonstrating that under certain conditions they can effectively identify clusters in the data. We build on these new insights to… ▽ More

    Submitted 23 November, 2022; v1 submitted 23 November, 2022; originally announced November 2022.

  14. arXiv:2211.02145  [pdf, other

    cs.CV

    FactorMatte: Redefining Video Matting for Re-Composition Tasks

    Authors: Zeqi Gu, Wenqi Xian, Noah Snavely, Abe Davis

    Abstract: We propose "factor matting", an alternative formulation of the video matting problem in terms of counterfactual video synthesis that is better suited for re-composition tasks. The goal of factor matting is to separate the contents of video into independent components, each visualizing a counterfactual version of the scene where contents of other components have been removed. We show that factor ma… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: Project webpage: https://factormatte.github.io

  15. arXiv:2206.14286  [pdf, ps, other

    cs.PF cs.LG

    TPU-KNN: K Nearest Neighbor Search at Peak FLOP/s

    Authors: Felix Chern, Blake Hechtman, Andy Davis, Ruiqi Guo, David Majnemer, Sanjiv Kumar

    Abstract: This paper presents a novel nearest neighbor search algorithm achieving TPU (Google Tensor Processing Unit) peak performance, outperforming state-of-the-art GPU algorithms with similar level of recall. The design of the proposed algorithm is motivated by an accurate accelerator performance model that takes into account both the memory and instruction bottlenecks. Our algorithm comes with an analyt… ▽ More

    Submitted 30 June, 2022; v1 submitted 28 June, 2022; originally announced June 2022.

  16. ParticLS: Object-oriented software for discrete element methods and peridynamics

    Authors: Andrew D. Davis, Brendan A. West, Nathanael J. Frisch, Devin T. O'Connor, Matthew D. Parno

    Abstract: ParticLS (\emph{Partic}le \emph{L}evel \emph{S}ets) is a software library that implements the discrete element method (DEM) and meshfree methods. ParticLS tracks the interaction between individual particles whose geometries are defined by level sets capable of capturing complex shapes. These particles either represent rigid bodies or material points within a continuum. Particle-particle interactio… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Journal ref: Computational Particle Mechanics (2021)

  17. arXiv:2204.09753  [pdf

    cs.RO

    Path Planning Algorithms for Robotic Aquaculture Monitoring

    Authors: Anthony Davis, Srijita Mukherjee, Paul S. Wills, Bing Ouyang

    Abstract: Aerial drones have great potential to monitor large areas quickly and efficiently. Aquaculture is an industry that requires continuous water quality data to successfully grow and harvest fish. The Hybrid Aerial Underwater Robotic System (HAUCS) is designed to collect water quality data of aquaculture ponds to reduce labor costs for farmers. The routing of drones to cover each fish pond on an aquac… ▽ More

    Submitted 20 April, 2022; originally announced April 2022.

  18. arXiv:2203.10637  [pdf, other

    eess.AS cs.SD

    Vocal effort modeling in neural TTS for improving the intelligibility of synthetic speech in noise

    Authors: Tuomo Raitio, Petko Petkov, Jiangchuan Li, Muhammed Shifas, Andrea Davis, Yannis Stylianou

    Abstract: We present a neural text-to-speech (TTS) method that models natural vocal effort variation to improve the intelligibility of synthetic speech in the presence of noise. The method consists of first measuring the spectral tilt of unlabeled conventional speech data, and then conditioning a neural TTS model with normalized spectral tilt among other prosodic factors. Changing the spectral tilt paramete… ▽ More

    Submitted 28 March, 2022; v1 submitted 20 March, 2022; originally announced March 2022.

    Comments: 5 pages, 5 figures. Submitted to Interspeech 2022, revision includes more data in results and improved text

  19. arXiv:2111.10459  [pdf, other

    cs.LG eess.SP

    Identifying Population Movements with Non-Negative Matrix Factorization from Wi-Fi User Counts in Smart and Connected Cities

    Authors: Michael Huffman, Armen Davis, Joshua Park, James Curry

    Abstract: Non-Negative Matrix Factorization (NMF) is a valuable matrix factorization technique which produces a "parts-based" decomposition of data sets. Wi-Fi user counts are a privacy-preserving indicator of population movements in smart and connected urban environments. In this paper, we apply NMF with a novel matrix embedding to Wi-Fi user count data from the University of Colorado at Boulder Campus for… ▽ More

    Submitted 19 November, 2021; originally announced November 2021.

  20. arXiv:2111.07799  [pdf, other

    stat.ML cs.LG math.ST

    Spectral learning of multivariate extremes

    Authors: Marco Avella Medina, Richard A. Davis, Gennady Samorodnitsky

    Abstract: We propose a spectral clustering algorithm for analyzing the dependence structure of multivariate extremes. More specifically, we focus on the asymptotic dependence of multivariate extremes characterized by the angular or spectral measure in extreme value theory. Our work studies the theoretical performance of spectral clustering based on a random $k$-nearest neighbor graph constructed from an ext… ▽ More

    Submitted 1 August, 2023; v1 submitted 15 November, 2021; originally announced November 2021.

  21. arXiv:2109.12143  [pdf, other

    cs.CY cs.NI

    Weather of the Dorm WIFI Ecosystem at the University of Colorado Boulder for Fall Semester 2019 to Spring Semester 2020 a Case Study of WIFI and a Campus Response to the COVID-19 Perturbation

    Authors: Jake Mcgrath, Armen Davis, James Curry, Orrie Gartner, Glenn Rodrigues, Seth Spielman, Daniel Massey

    Abstract: Growing use of network technology in Higher Education means that there has been increasing demand to adapt technology platforms and tools that transform student learning strategies, faculty teaching, research modalities, as well as general operations. Many of the new modalities are necessary for IHE business. In August 2019, we began collecting and analyzing data from the campus WIFI network. A go… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

    Comments: Contact E-mail: [email protected], Applied Mathematics, University of Colorado, Boulder 80309-0526

  22. arXiv:2104.01661  [pdf, ps, other

    cs.MS cs.DS

    LAGraph: Linear Algebra, Network Analysis Libraries, and the Study of Graph Algorithms

    Authors: Gábor Szárnyas, David A. Bader, Timothy A. Davis, James Kitchen, Timothy G. Mattson, Scott McMillan, Erik Welch

    Abstract: Graph algorithms can be expressed in terms of linear algebra. GraphBLAS is a library of low-level building blocks for such algorithms that targets algorithm developers. LAGraph builds on top of the GraphBLAS to target users of graph algorithms with high-level algorithms common in network analysis. In this paper, we describe the first release of the LAGraph library, the design decisions behind the… ▽ More

    Submitted 4 April, 2021; originally announced April 2021.

    Comments: Accepted to GrAPL 2021

  23. arXiv:2011.07565  [pdf, ps, other

    cs.PL

    User-Centered Programming Language Design: A Course-Based Case Study

    Authors: Michael Coblenz, Ariel Davis, Megan Hofmann, Vivian Huang, Siyue Jin, Max Krieger, Kyle Liang, Brian Wei, Mengchen Sam Yong, Jonathan Aldrich

    Abstract: Recently, user-centered methods have been proposed to improve the design of programming languages. In order to explore what benefits these methods might have for novice programming language designers, we taught a collection of user-centered programming language design methods to a group of eight students. We observed that natural programming and usability studies helped the students refine their l… ▽ More

    Submitted 15 November, 2020; originally announced November 2020.

    Comments: 7 pages. Presented at HATRA 2020 (https://2020.splashcon.org/home/hatra-2020)

    ACM Class: D.2; D.3

  24. arXiv:2010.07935  [pdf

    cs.RO cs.AI cs.LG

    Multi-Agent Motion Planning using Deep Learning for Space Applications

    Authors: Kyongsik Yun, Changrak Choi, Ryan Alimo, Anthony Davis, Linda Forster, Amir Rahmani, Muhammad Adil, Ramtin Madani

    Abstract: State-of-the-art motion planners cannot scale to a large number of systems. Motion planning for multiple agents is an NP (non-deterministic polynomial-time) hard problem, so the computation time increases exponentially with each addition of agents. This computational demand is a major stumbling block to the motion planner's application to future NASA missions involving the swarm of space vehicles.… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

    Comments: 2020 AIAA ASCEND

  25. arXiv:2008.02479  [pdf, ps, other

    stat.ML cs.LG math.ST stat.ME

    Modeling of time series using random forests: theoretical developments

    Authors: Richard A. Davis, Mikkel S. Nielsen

    Abstract: In this paper we study asymptotic properties of random forests within the framework of nonlinear time series modeling. While random forests have been successfully applied in various fields, the theoretical justification has not been considered for their use in a time series setting. Under mild conditions, we prove a uniform concentration inequality for regression trees built on nonlinear autoregre… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    MSC Class: 62G05; 62G08; 60G10; 60J05; 62M05; 62M10

  26. arXiv:2007.15194  [pdf, other

    cs.CV

    Crowdsampling the Plenoptic Function

    Authors: Zhengqi Li, Wenqi Xian, Abe Davis, Noah Snavely

    Abstract: Many popular tourist landmarks are captured in a multitude of online, public photos. These photos represent a sparse and unstructured sampling of the plenoptic function for a particular scene. In this paper,we present a new approach to novel view synthesis under time-varying illumination from such data. Our approach builds on the recent multi-plane image (MPI) format for representing local light f… ▽ More

    Submitted 29 July, 2020; originally announced July 2020.

    Comments: ECCV, 2020 (Oral)

  27. Visual Chirality

    Authors: Zhiqiu Lin, Jin Sun, Abe Davis, Noah Snavely

    Abstract: How can we tell whether an image has been mirrored? While we understand the geometry of mirror reflections very well, less has been said about how it affects distributions of imagery at scale, despite widespread use for data augmentation in computer vision. In this paper, we investigate how the statistics of visual data are changed by reflection. We refer to these changes as "visual chirality", af… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: Published at CVPR 2020, Best Paper Nomination, Oral Presentation. Project Page: https://linzhiqiu.github.io/papers/chirality/

    ACM Class: I.4

    Journal ref: CVPR (2020), 12292-12300

  28. arXiv:2006.03193  [pdf, other

    eess.SP cs.LG

    LSTM-based Anomaly Detection for Non-linear Dynamical System

    Authors: Yue Tan, Chunjing Hu, Kuan Zhang, Kan Zheng, Ethan A. Davis, Jae Sung Park

    Abstract: Anomaly detection for non-linear dynamical system plays an important role in ensuring the system stability. However, it is usually complex and has to be solved by large-scale simulation which requires extensive computing resources. In this paper, we propose a novel anomaly detection scheme in non-linear dynamical system based on Long Short-Term Memory (LSTM) to capture complex temporal changes of… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

    Comments: 8 pages, 6 figures

  29. eXtreme Modelling in Practice

    Authors: A. Jesse Jiryu Davis, Max Hirschhorn, Judah Schvimer

    Abstract: Formal modelling is a powerful tool for developing complex systems. At MongoDB, we use TLA+ to model and verify multiple aspects of several systems. Ensuring conformance between a specification and its implementation can add value to any specification; it can avoid transcription errors, prevent bugs as a large organization rapidly develops the specified code, and even keep multiple implementations… ▽ More

    Submitted 28 May, 2020; originally announced June 2020.

    Journal ref: PVLDB (Proceedings of the VLDB Endowment), Vol. 13, No. 9, pp. 1346-1358 (2020)

  30. arXiv:2005.11423  [pdf, other

    physics.comp-ph cs.CV

    Multi-view polarimetric scattering cloud tomography and retrieval of droplet size

    Authors: Aviad Levis, Yoav Y. Schechner, Anthony B. Davis, Jesse Loveridge

    Abstract: Tomography aims to recover a three-dimensional (3D) density map of a medium or an object. In medical imaging, it is extensively used for diagnostics via X-ray computed tomography (CT). Optical diffusion tomography is an alternative to X-ray CT that uses multiply scattered light to deliver coarse density maps for soft tissues. We define and derive tomography of cloud droplet distributions via passi… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

  31. arXiv:2004.14554  [pdf, other

    cs.CL cs.CY

    Indirect Identification of Psychosocial Risks from Natural Language

    Authors: Kristen C. Allen, Alex Davis, Tamar Krishnamurti

    Abstract: During the perinatal period, psychosocial health risks, including depression and intimate partner violence, are associated with serious adverse health outcomes for parents and children. To appropriately intervene, healthcare professionals must first identify those at risk, yet stigma often prevents people from directly disclosing the information needed to prompt an assessment. We examine indirect… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 12 pages, 4 figures

    ACM Class: J.3; J.4; H.5.2

  32. arXiv:2002.11054  [pdf, other

    cs.PL cs.LG

    MLIR: A Compiler Infrastructure for the End of Moore's Law

    Authors: Chris Lattner, Mehdi Amini, Uday Bondhugula, Albert Cohen, Andy Davis, Jacques Pienaar, River Riddle, Tatiana Shpeisman, Nicolas Vasilache, Oleksandr Zinenko

    Abstract: This work presents MLIR, a novel approach to building reusable and extensible compiler infrastructure. MLIR aims to address software fragmentation, improve compilation for heterogeneous hardware, significantly reduce the cost of building domain specific compilers, and aid in connecting existing compilers together. MLIR facilitates the design and implementation of code generators, translators and o… ▽ More

    Submitted 29 February, 2020; v1 submitted 25 February, 2020; originally announced February 2020.

  33. arXiv:1910.12444  [pdf

    cs.HC cs.CY

    Information Seeking and Information Processing Behaviors Among Type 2 Diabetics

    Authors: Sarah Masud Preum, Kate Clark, Ashley Davis, Konstantine Khutsishvilli, Rupa S Valdez

    Abstract: Effective patient education is critical for managing Type 2 Diabetes Mellitus (T2DM), one of the most common chronic diseases in the United States. While some studies focus on the information-seeking behavior of T2DM patients, other self-education behaviors including information processing and utilization are rarely explored in the context of T2DM. This study sought to assess two self-education be… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

  34. Arming the public with artificial intelligence to counter social bots

    Authors: Kai-Cheng Yang, Onur Varol, Clayton A. Davis, Emilio Ferrara, Alessandro Flammini, Filippo Menczer

    Abstract: The increased relevance of social media in our daily life has been accompanied by efforts to manipulate online conversations and opinions. Deceptive social bots -- automated or semi-automated accounts designed to impersonate humans -- have been successfully exploited for these kinds of abuse. Researchers have responded by developing AI tools to arm the public in the fight against social bots. Here… ▽ More

    Submitted 6 February, 2019; v1 submitted 3 January, 2019; originally announced January 2019.

    Comments: Published in Human Behavior and Emerging Technologies

    Journal ref: Hum Behav & Emerg Tech. 2019;e115

  35. Dynamic Control Flow in Large-Scale Machine Learning

    Authors: Yuan Yu, Martín Abadi, Paul Barham, Eugene Brevdo, Mike Burrows, Andy Davis, Jeff Dean, Sanjay Ghemawat, Tim Harley, Peter Hawkins, Michael Isard, Manjunath Kudlur, Rajat Monga, Derek Murray, Xiaoqiang Zheng

    Abstract: Many recent machine learning models rely on fine-grained dynamic control flow for training and inference. In particular, models based on recurrent neural networks and on reinforcement learning depend on recurrence relations, data-dependent conditional execution, and other features that call for dynamic control flow. These applications benefit from the ability to make rapid control-flow decisions a… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: Appeared in EuroSys 2018. 14 pages, 16 figures

    Journal ref: EuroSys 2018: Thirteenth EuroSys Conference, April 23-26, 2018, Porto, Portugal. ACM, New York, NY, USA

  36. arXiv:1707.06719  [pdf, other

    cs.CV stat.ML

    Generalized Convolutional Neural Networks for Point Cloud Data

    Authors: Aleksandr Savchenkov, Andrew Davis, Xuan Zhao

    Abstract: The introduction of cheap RGB-D cameras, stereo cameras, and LIDAR devices has given the computer vision community 3D information that conventional RGB cameras cannot provide. This data is often stored as a point cloud. In this paper, we present a novel method to apply the concept of convolutional neural networks to this type of data. By creating a mapping of nearest neighbors in a dataset, and in… ▽ More

    Submitted 18 October, 2018; v1 submitted 20 July, 2017; originally announced July 2017.

  37. arXiv:1703.03107  [pdf, other

    cs.SI

    Online Human-Bot Interactions: Detection, Estimation, and Characterization

    Authors: Onur Varol, Emilio Ferrara, Clayton A. Davis, Filippo Menczer, Alessandro Flammini

    Abstract: Increasing evidence suggests that a growing amount of social media content is generated by autonomous entities known as social bots. In this work we present a framework to detect such entities on Twitter. We leverage more than a thousand features extracted from public data and meta-data about users: friends, tweet content and sentiment, network patterns, and activity time series. We benchmark the… ▽ More

    Submitted 27 March, 2017; v1 submitted 8 March, 2017; originally announced March 2017.

    Comments: Accepted paper for ICWSM'17, 10 pages, 8 figures, 1 table

  38. arXiv:1701.06538  [pdf, other

    cs.LG cs.CL cs.NE stat.ML

    Outrageously Large Neural Networks: The Sparsely-Gated Mixture-of-Experts Layer

    Authors: Noam Shazeer, Azalia Mirhoseini, Krzysztof Maziarz, Andy Davis, Quoc Le, Geoffrey Hinton, Jeff Dean

    Abstract: The capacity of a neural network to absorb information is limited by its number of parameters. Conditional computation, where parts of the network are active on a per-example basis, has been proposed in theory as a way of dramatically increasing model capacity without a proportional increase in computation. In practice, however, there are significant algorithmic and performance challenges. In this… ▽ More

    Submitted 23 January, 2017; originally announced January 2017.

  39. On the influence of social bots in online protests. Preliminary findings of a Mexican case study

    Authors: Pablo Suárez-Serrato, Margaret E. Roberts, Clayton A. Davis, Filippo Menczer

    Abstract: Social bots can affect online communication among humans. We study this phenomenon by focusing on #YaMeCanse, the most active protest hashtag in the history of Twitter in Mexico. Accounts using the hashtag are classified using the BotOrNot bot detection tool. Our preliminary analysis suggests that bots played a critical role in disrupting online communication about the protest movement.

    Submitted 26 September, 2016; originally announced September 2016.

    Comments: 10 pages

    Journal ref: SocInfo 2016, Part II, LNCS 10047

  40. arXiv:1605.08695  [pdf, other

    cs.DC cs.AI

    TensorFlow: A system for large-scale machine learning

    Authors: Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, Xiaoqiang Zheng

    Abstract: TensorFlow is a machine learning system that operates at large scale and in heterogeneous environments. TensorFlow uses dataflow graphs to represent computation, shared state, and the operations that mutate that state. It maps the nodes of a dataflow graph across many machines in a cluster, and within a machine across multiple computational devices, including multicore CPUs, general-purpose GPUs,… ▽ More

    Submitted 31 May, 2016; v1 submitted 27 May, 2016; originally announced May 2016.

    Comments: 18 pages, 9 figures; v2 has a spelling correction in the metadata

  41. arXiv:1603.04467  [pdf, other

    cs.DC cs.LG

    TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems

    Authors: Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mane, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah , et al. (15 additional authors not shown)

    Abstract: TensorFlow is an interface for expressing machine learning algorithms, and an implementation for executing such algorithms. A computation expressed using TensorFlow can be executed with little or no change on a wide variety of heterogeneous systems, ranging from mobile devices such as phones and tablets up to large-scale distributed systems of hundreds of machines and thousands of computational de… ▽ More

    Submitted 16 March, 2016; v1 submitted 14 March, 2016; originally announced March 2016.

    Comments: Version 2 updates only the metadata, to correct the formatting of Martín Abadi's name

  42. arXiv:1602.04878  [pdf, other

    cs.CY

    Kinsey Reporter: Citizen Science for Sex Research

    Authors: Clayton A Davis, Julia Heiman, Erick Janssen, Stephanie Sanders, Justin Garcia, Filippo Menczer

    Abstract: Kinsey Reporter is a global mobile app to share, explore, and visualize anonymous data about sex. Reports are submitted via smartphone, then visualized on a website or downloaded for offline analysis. In this paper we present the major features of the Kinsey Reporter citizen science platform designed to preserve the anonymity of its contributors, and preliminary data analyses that suggest question… ▽ More

    Submitted 15 February, 2016; originally announced February 2016.

    Comments: Let's Talk About Sex (Apps) Workshop at CSCW 2015

  43. BotOrNot: A System to Evaluate Social Bots

    Authors: Clayton A. Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, Filippo Menczer

    Abstract: While most online social media accounts are controlled by humans, these platforms also host automated agents called social bots or sybil accounts. Recent literature reported on cases of social bots imitating humans to manipulate discussions, alter the popularity of users, pollute content and spread misinformation, and even perform terrorist propaganda and recruitment actions. Here we present BotOr… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

    Comments: 2 pages, 2 figures, WWW Developers Day

    Journal ref: Proceedings of the 25th International Conference Companion on World Wide Web (pp. 273-274). 2016

  44. arXiv:1510.04734  [pdf

    cs.CL

    A Method for Modeling Co-Occurrence Propensity of Clinical Codes with Application to ICD-10-PCS Auto-Coding

    Authors: Michael Subotin, Anthony R. Davis

    Abstract: Objective. Natural language processing methods for medical auto-coding, or automatic generation of medical billing codes from electronic health records, generally assign each code independently of the others. They may thus assign codes for closely related procedures or diagnoses to the same document, even when they do not tend to occur together in practice, simply because the right choice can be d… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: Submitted to Journal of the American Medical Informatics Association, 2015

  45. Development of a Translator from LLVM to ACL2

    Authors: David S. Hardin, Jennifer A. Davis, David A. Greve, Jedidiah R. McClurg

    Abstract: In our current work a library of formally verified software components is to be created, and assembled, using the Low-Level Virtual Machine (LLVM) intermediate form, into subsystems whose top-level assurance relies on the assurance of the individual components. We have thus undertaken a project to build a translator from LLVM to the applicative subset of Common Lisp accepted by the ACL2 theorem p… ▽ More

    Submitted 5 June, 2014; originally announced June 2014.

    Comments: In Proceedings ACL2 2014, arXiv:1406.1238

    ACM Class: F.3.1; F.4.1

    Journal ref: EPTCS 152, 2014, pp. 163-177

  46. arXiv:1312.4461  [pdf, ps, other

    cs.LG

    Low-Rank Approximations for Conditional Feedforward Computation in Deep Neural Networks

    Authors: Andrew Davis, Itamar Arel

    Abstract: Scalability properties of deep neural networks raise key research questions, particularly as the problems considered become larger and more challenging. This paper expands on the idea of conditional computation introduced by Bengio, et. al., where the nodes of a deep network are augmented by a set of gating units that determine when a node should be calculated. By factorizing the weight matrix int… ▽ More

    Submitted 28 January, 2014; v1 submitted 16 December, 2013; originally announced December 2013.

    Comments: 10 pages, 5 figures. Submitted to ICLR 2014

  47. arXiv:1301.2264  [pdf

    cs.AI stat.AP

    Using Bayesian Networks to Identify the Causal Effect of Speeding in Individual Vehicle/Pedestrian Collisions

    Authors: Gary A. Davis

    Abstract: On roads showing significant violations of posted speed limits, one measure of the safety effect of speeding is the difference between the road's actual accident count and the count that would have occurred if the posted speed limit had been strictly obeyed. An estimate of this accident reduction can be had by computing the probability that speeding was a necessary condition for each of set of acc… ▽ More

    Submitted 10 January, 2013; originally announced January 2013.

    Comments: Appears in Proceedings of the Seventeenth Conference on Uncertainty in Artificial Intelligence (UAI2001)

    Report number: UAI-P-2001-PG-105-111

  48. arXiv:0807.1253  [pdf, ps, other

    q-fin.TR cs.IT math.PR

    Informed Traders

    Authors: Dorje C. Brody, Mark H. A. Davis, Robyn L. Friedman, Lane P. Hughston

    Abstract: An asymmetric information model is introduced for the situation in which there is a small agent who is more susceptible to the flow of information in the market than the general market participant, and who tries to implement strategies based on the additional information. In this model market participants have access to a stream of noisy information concerning the future return of an asset, wher… ▽ More

    Submitted 17 November, 2008; v1 submitted 8 July, 2008; originally announced July 2008.

    Comments: 20 pages, 5 figures. Version to appear in the Proceedings of the Royal Society A

    Journal ref: Proceedings of the Royal Society London A465, 1103-1122 (2009)

  49. arXiv:cs/0409003  [pdf

    cs.AI cs.CV cs.HC

    ScheduleNanny: Using GPS to Learn the User's Significant Locations, Travel Times and Schedule

    Authors: Parth Bhawalkar, Victor Bigio, Adam Davis, Karthik Narayanaswami, Femi Olumoko

    Abstract: As computing technology becomes more pervasive, personal devices such as the PDA, cell-phone, and notebook should use context to determine how to act. Location is one form of context that can be used in many ways. We present a multiple-device system that collects and clusters GPS data into significant locations. These locations are then used to determine travel times and a probabilistic model of… ▽ More

    Submitted 2 September, 2004; originally announced September 2004.

    Comments: 7 pages, 10 figures. Adaptive & Ubiquitous Computing

    ACM Class: F.2.2; I.5.3; H.5.3; H.5.m