Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–15 of 15 results for author: Jackson, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14548  [pdf, other

    cs.CE

    Rapid modelling of reactive transport in porous media using machine learning: limitations and solutions

    Authors: Vinicius L S Silva, Geraldine Regnier, Pablo Salinas, Claire E Heaney, Matthew D Jackson, Christopher C Pain

    Abstract: Reactive transport in porous media plays a pivotal role in subsurface reservoir processes, influencing fluid properties and geochemical characteristics. However, coupling fluid flow and transport with geochemical reactions is computationally intensive, requiring geochemical calculations at each grid cell and each time step within a discretized simulation domain. Although recent advancements have i… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2405.07518  [pdf, other

    cs.AR cs.AI

    SambaNova SN40L: Scaling the AI Memory Wall with Dataflow and Composition of Experts

    Authors: Raghu Prabhakar, Ram Sivaramakrishnan, Darshan Gandhi, Yun Du, Mingran Wang, Xiangyu Song, Kejie Zhang, Tianren Gao, Angela Wang, Karen Li, Yongning Sheng, Joshua Brot, Denis Sokolov, Apurv Vivek, Calvin Leung, Arjun Sabnis, Jiayu Bai, Tuowen Zhao, Mark Gottscho, David Jackson, Mark Luttrell, Manish K. Shah, Edison Chen, Kaizhao Liang, Swayambhoo Jain , et al. (5 additional authors not shown)

    Abstract: Monolithic large language models (LLMs) like GPT-4 have paved the way for modern generative AI applications. Training, serving, and maintaining monolithic LLMs at scale, however, remains prohibitively expensive and challenging. The disproportionate increase in compute-to-memory ratio of modern AI accelerators have created a memory wall, necessitating new methods to deploy AI. Composition of Expert… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  3. arXiv:2403.12945  [pdf, other

    cs.RO

    DROID: A Large-Scale In-The-Wild Robot Manipulation Dataset

    Authors: Alexander Khazatsky, Karl Pertsch, Suraj Nair, Ashwin Balakrishna, Sudeep Dasari, Siddharth Karamcheti, Soroush Nasiriany, Mohan Kumar Srirama, Lawrence Yunliang Chen, Kirsty Ellis, Peter David Fagan, Joey Hejna, Masha Itkina, Marion Lepert, Yecheng Jason Ma, Patrick Tree Miller, Jimmy Wu, Suneel Belkhale, Shivin Dass, Huy Ha, Arhan Jain, Abraham Lee, Youngwoon Lee, Marius Memmel, Sungjae Park , et al. (74 additional authors not shown)

    Abstract: The creation of large, diverse, high-quality robot manipulation datasets is an important stepping stone on the path toward more capable and robust robotic manipulation policies. However, creating such datasets is challenging: collecting robot manipulation data in diverse environments poses logistical and safety challenges and requires substantial investments in hardware and human labour. As a resu… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: Project website: https://droid-dataset.github.io/

  4. arXiv:2311.00903  [pdf

    cs.CR cs.AI cs.CY

    Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report

    Authors: Diane Jackson, Sorin Adam Matei, Elisa Bertino

    Abstract: The emergence of AI tools in cybersecurity creates many opportunities and uncertainties. A focus group with advanced graduate students in cybersecurity revealed the potential depth and breadth of the challenges and opportunities. The salient issues are access to open source or free tools, documentation, curricular diversity, and clear articulation of ethical principles for AI cybersecurity educati… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  5. Beyond Dark Patterns: A Concept-Based Framework for Ethical Software Design

    Authors: Evan Caragay, Katherine Xiong, Jonathan Zong, Daniel Jackson

    Abstract: Current dark pattern research tells designers what not to do, but how do they know what to do? In contrast to prior approaches that focus on patterns to avoid and their underlying principles, we present a framework grounded in positive expected behavior against which deviations can be judged. To articulate this expected behavior, we use concepts -- abstract units of functionality that compose appl… ▽ More

    Submitted 3 March, 2024; v1 submitted 3 October, 2023; originally announced October 2023.

    Comments: ACM CHI 2024

  6. arXiv:2307.00146  [pdf, other

    cs.GR cs.HC cs.PL

    Bluefish: Composing Diagrams with Declarative Relations

    Authors: Josh Pollock, Catherine Mei, Grace Huang, Elliot Evans, Daniel Jackson, Arvind Satyanarayan

    Abstract: Diagrams are essential tools for problem-solving and communication as they externalize conceptual structures using spatial relationships. But when picking a diagramming framework, users are faced with a dilemma. They can either use a highly expressive but low-level toolkit, whose API does not match their domain-specific concepts, or select a high-level typology, which offers a recognizable vocabul… ▽ More

    Submitted 25 July, 2024; v1 submitted 30 June, 2023; originally announced July 2023.

    Comments: 27 pages, 14 figures

  7. arXiv:2304.14975  [pdf, other

    cs.SE cs.HC

    Concept-centric Software Development

    Authors: Peter Wilczynski, Taylor Gregoire-Wright, Daniel Jackson

    Abstract: Developers have long recognized the importance of the concepts underlying the systems they build, and the primary role concepts play in shaping user experience. To date, however, concepts have tended to be only implicit in software design with development being organized instead around more concrete artifacts (such as wireframes and code modules). Palantir, a software company whose data analytic… ▽ More

    Submitted 19 October, 2023; v1 submitted 28 April, 2023; originally announced April 2023.

  8. arXiv:2210.00649  [pdf, other

    cs.CR

    Automated Security Analysis of Exposure Notification Systems

    Authors: Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann

    Abstract: We present the first formal analysis and comparison of the security of the two most widely deployed exposure notification systems, ROBERT and the Google and Apple Exposure Notification (GAEN) framework. ROBERT is the most popular instalment of the centralised approach to exposure notification, in which the risk score is computed by a central server. GAEN, in contrast, follows the decentralised app… ▽ More

    Submitted 2 October, 2022; originally announced October 2022.

    Comments: 23 pages, Full version of the corresponding USENIX Security '23 paper

  9. arXiv:2104.06178  [pdf, other

    cs.RO cs.LO cs.SE eess.SY

    Certified Control: An Architecture for Verifiable Safety of Autonomous Vehicles

    Authors: Daniel Jackson, Valerie Richmond, Mike Wang, Jeff Chow, Uriel Guajardo, Soonho Kong, Sergio Campos, Geoffrey Litt, Nikos Arechiga

    Abstract: Widespread adoption of autonomous cars will require greater confidence in their safety than is currently possible. Certified control is a new safety architecture whose goal is two-fold: to achieve a very high level of safety, and to provide a framework for justifiable confidence in that safety. The key idea is a runtime monitor that acts, along with sensor hardware and low-level control and actuat… ▽ More

    Submitted 28 March, 2021; originally announced April 2021.

    Comments: 18 pages + 15 page Appendix, 11 figures

  10. arXiv:2005.12273  [pdf

    cs.CR cs.CY

    Decentralized Privacy-Preserving Proximity Tracing

    Authors: Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Čapkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers , et al. (9 additional authors not shown)

    Abstract: This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chai… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 46 pages, 6 figures, first published 3 April 2020 on https://github.com/DP-3T/documents where companion documents and code can be found

  11. arXiv:2004.08602  [pdf, other

    cs.CR cs.CY cs.HC

    CryptoCam: Privacy Conscious Open Circuit Television

    Authors: Gerard Wilkinson, Dan Jackson, Andrew Garbett, Reuben Kirkham, Kyle Montague

    Abstract: The prevalence of Closed Circuit Television (CCTV) in today's society has given rise to an inherent asymmetry of control between the watchers and the watched. A sense of unease relating to the unobservable observer (operator) often leads to a lack of trust in the camera and its purpose, despite security cameras generally being present as a protective device. In this paper, we detail our concept of… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

  12. arXiv:1704.06549  [pdf, other

    cs.CY

    LiftUpp: Support to develop learner performance

    Authors: Frans A. Oliehoek, Rahul Savani, Elliot Adderton, Xia Cui, David Jackson, Phil Jimmieson, John Christopher Jones, Keith Kennedy, Ben Mason, Adam Plumbley, Luke Dawson

    Abstract: Various motivations exist to move away from the simple assessment of knowledge towards the more complex assessment and development of competence. However, to accommodate such a change, high demands are put on the supporting e-infrastructure in terms of intelligently collecting and analysing data. In this paper, we discuss these challenges and how they are being addressed by LiftUpp, a system that… ▽ More

    Submitted 21 April, 2017; originally announced April 2017.

    Comments: Short 4-page version to appear at AIED 2017

  13. Relational Approach to Knowledge Engineering for POMDP-based Assistance Systems as a Translation of a Psychological Model

    Authors: Marek Grzes, Jesse Hoey, Shehroz Khan, Alex Mihailidis, Stephen Czarnuch, Dan Jackson, Andrew Monk

    Abstract: Assistive systems for persons with cognitive disabilities (e.g. dementia) are difficult to build due to the wide range of different approaches people can take to accomplishing the same task, and the significant uncertainties that arise from both the unpredictability of client's behaviours and from noise in sensor readings. Partially observable Markov decision process (POMDP) models have been used… ▽ More

    Submitted 25 June, 2012; originally announced June 2012.

  14. arXiv:0910.3537  [pdf, ps, other

    stat.ME cs.DL physics.soc-ph

    Comment: Citation Statistics

    Authors: Sune Lehmann, Benny E. Lautrup, Andrew D. Jackson

    Abstract: We discuss the paper "Citation Statistics" by the Joint Committee on Quantitative Assessment of Research [arXiv:0910.3529]. In particular, we focus on a necessary feature of "good" measures for ranking scientific authors: that good measures must able to accurately distinguish between authors.

    Submitted 19 October, 2009; originally announced October 2009.

    Comments: Published in at http://dx.doi.org/10.1214/09-STS285B the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-STS-STS285B

    Journal ref: Statistical Science 2009, Vol. 24, No. 1, 17-20

  15. arXiv:cs/0605109  [pdf, ps, other

    cs.CR cs.SE

    Knowledge Flow Analysis for Security Protocols

    Authors: Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, Srinivas Devadas

    Abstract: Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely to informal descriptions of protocols, it allows a succinct and natural formalization; because it abstracts away message ordering, and handles… ▽ More

    Submitted 24 May, 2006; originally announced May 2006.

    Comments: 20 pages

    Report number: MIT-CSAIL-TR-2005-066