Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 810–824https://doi.org/10.1145/3658644.3690223Achieving malicious security with high efficiency in dishonest-majority secure multiparty computation is a formidable challenge. The milestone works SPDZ and TinyOT have spawn a large family of protocols in this direction. For boolean circuits, state-of-...
- short-paperOctober 2024
CXSimulator: A User Behavior Simulation using LLM Embeddings for Web-Marketing Campaign Assessment
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 3817–3821https://doi.org/10.1145/3627673.3679894This paper presents the Customer Experience (CX) Simulator, a novel framework designed to assess the effects of untested web-marketing campaigns through user behavior simulations. The proposed framework leverages large language models (LLMs) to represent ...
- short-paperOctober 2024
Accurate Embedding-based Log Determinant Optimization
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 3747–3751https://doi.org/10.1145/3627673.3679871Many tangible and intangible objects are represented as itemsets; i.e., composition of individual items. In this paper, we address the problem of finding the embedding of such items so as to use those embeddings in tasks like missing item prediction. We ...
- short-paperOctober 2024
CourtsightTV: An Interactive Visualization Software for Labeling Key Basketball Moments
- Alexander Russakoff,
- Kenny Miller,
- Vahid Mahzoon,
- Parsa Esmaeilkhani,
- Christine Cho,
- Jaffar Alzeidi,
- Sandro Hauri,
- Slobodan Vucetic
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 5270–5274https://doi.org/10.1145/3627673.3679230Advancements in sensor technology are leading to massive collection of tracking data in sports. There is an increasing interest in analyzing the tracking data to gain competitive advantage. Analyzing and labeling key game moments can provide deep ...
- short-paperJuly 2024
Embedding Based Deduplication in E-commerce AutoComplete
SIGIR '24: Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information RetrievalPages 2955–2959https://doi.org/10.1145/3626772.3661373Query AutoComplete (QAC) is an important feature in e-commerce search engines, aimed at enhancing user experience by offering relevant query suggestions. However, these suggestions often include semantically duplicate entries derived from user logs. ...
-
- short-paperAugust 2024
Lessons from the NLBSE 2024 Competition: Towards Building Efficient Models for GitHub Issue Classification
- Daniel Fernando Gómez-Barrera,
- Luccas Rojas Becerra,
- Juan Pinzón Roncancio,
- David Ortiz Almanza,
- Juan Arboleda,
- Mario Linares-Vásquez,
- Rubén Francisco Manrique
NLBSE '24: Proceedings of the Third ACM/IEEE International Workshop on NL-based Software EngineeringPages 45–48https://doi.org/10.1145/3643787.3648040This paper presents the findings of our team's efforts during the "NLBSE 2024" competition, which centered on the multi-class classification of GitHub Issues. The challenge required models with strong few-shot learning capabilities to distinguish between ...
- research-articleApril 2024
Raisin: Identifying Rare Sensitive Functions for Bug Detection
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 175, Pages 1–12https://doi.org/10.1145/3597503.3639165Mastering the knowledge about the bug-prone functions (i.e., sensitive functions) is important to detect bugs. Some automated techniques have been proposed to identify the sensitive functions in large software systems, based on machine learning or ...
- research-articleMay 2024
Cooperative Embedding - A Novel Approach to Tackle the Out-Of-Vocabulary Dilemma in Bot Classification
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 1479–1486https://doi.org/10.1145/3605098.3636038Out-of-vocabulary (OOV) words is a big challenge in all Natural Language Processing task. The examination of out-of-vocabulary (OOV) words holds significance within the field of social network analysis as it facilitates a deeper comprehension of the ...
- research-articleMay 2024
A Formal Framework of Model and Logical Embeddings for Verification of Stochastic Systems
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 1712–1721https://doi.org/10.1145/3605098.3636032This paper proposes a formal framework for minimizing, analyzing and verifying stochastic process algebraic models using tools and techniques developed for the state-labeled domain, and vice versa. First, we modify the model embeddings proposed in the ...
- research-articleMarch 2024
CAFE: Towards Compact, Adaptive, and Fast Embedding for Large-scale Recommendation Models
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 1Article No.: 51, Pages 1–28https://doi.org/10.1145/3639306Recently, the growing memory demands of embedding tables in Deep Learning Recommendation Models (DLRMs) pose great challenges for model training and deployment. Existing embedding compression solutions cannot simultaneously meet three key design ...
- research-articleMarch 2024
Measurement of Embedding Choices on Cryptographic API Completion Tasks
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 3Article No.: 56, Pages 1–30https://doi.org/10.1145/3625291In this article, we conduct a measurement study to comprehensively compare the accuracy impacts of multiple embedding options in cryptographic API completion tasks. Embedding is the process of automatically learning vector representations of program ...
- research-articleMarch 2024
SCT: Summary Caption Technique for Retrieving Relevant Images in Alignment with Multimodal Abstractive Summary
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), Volume 23, Issue 3Article No.: 43, Pages 1–22https://doi.org/10.1145/3645029This work proposes an efficient Summary Caption Technique that considers the multimodal summary and image captions as input to retrieve the correspondence images from the captions that are highly influential to the multimodal summary. Matching a ...
- abstractMarch 2024
WSDM 2024 Workshop on Representation Learning & Clustering
WSDM '24: Proceedings of the 17th ACM International Conference on Web Search and Data MiningPages 1214–1215https://doi.org/10.1145/3616855.3635723Data clustering and representation learning play an indispensable role in data science. They are very useful to explore massive data in many fields, including information retrieval, natural language processing, bioinformatics, recommender systems, and ...
- research-articleJanuary 2024
MathUSE: Mathematical information retrieval system using universal sentence encoder model
Journal of Information Science (JIPP), Volume 50, Issue 1Pages 66–84https://doi.org/10.1177/01655515221077335In the scientific field, mathematical formulae are a significant factor in communicating the ideas and the fundamental principles of any scientific knowledge. Nowadays, the scientific research community generates a huge number of documents that comprise ...
- research-articleSeptember 2024
Structural link prediction model with multi-view text semantic feature extraction
Intelligent Decision Technologies (INTDTEC), Volume 18, Issue 3Pages 2421–2437https://doi.org/10.3233/IDT-240022The exponential expansion of information has made text feature extraction based on simple semantic information insufficient for the multidimensional recognition of textual data. In this study, we construct a text semantic structure graph based on various ...
- research-articleMarch 2024
Improving Time Efficiency of a Hierarchical Metaheuristic for the Euclidean TSP using Crossed Cubes Interconnection Networks
EBIMCS '23: Proceedings of the 2023 6th International Conference on E-Business, Information Management and Computer SciencePages 50–56https://doi.org/10.1145/3644479.3644488This paper proposes a hierarchical metaheuristic framework for optimally solving large-scale Euclidean Traveling Salesman Problems (TSP) that strategically embeds the clustered structure of input instances within crossed cubes interconnection networks to ...
- ArticleFebruary 2024
A Novel Steganography Scheme Using Logistic Map, BRISK Descriptor, and K-Means Clustering
AbstractThis paper introduces a novel steganography method for embedding and extracting a secret message from an image file using three stages. In the first stage, Binary Robust Invariant Scalable Keypoints (BRISK) and Good Features to Track are utilized ...
- ArticleNovember 2023
Extending DenseHMM with Continuous Emission
AbstractTraditional Hidden Markov Models (HMM) allow us to discover the latent structure of the observed data (both discrete and continuous). Recently proposed DenseHMM provides hidden states embedding and uses the co-occurrence-based learning schema. ...
- research-articleNovember 2023
GeoVeX: Geospatial Vectors with Hexagonal Convolutional Autoencoders
GeoAI '23: Proceedings of the 6th ACM SIGSPATIAL International Workshop on AI for Geographic Knowledge DiscoveryPages 3–13https://doi.org/10.1145/3615886.3627750We introduce a new geospatial representation model called GeoVeX to learn global vectors for all geographical locations on Earth land cover. GeoVeX is built on a novel model architecture named Hexagonal Convolutional Autoencoders (HCAE) combined with a ...
- research-articleOctober 2023
UGACHE: A Unified GPU Cache for Embedding-based Deep Learning
SOSP '23: Proceedings of the 29th Symposium on Operating Systems PrinciplesPages 627–641https://doi.org/10.1145/3600006.3613169This paper presents UGache, a unified multi-GPU cache system for embedding-based deep learning (EmbDL). UGache is primarily motivated by the unique characteristics of EmbDL applications, namely read-only, batched, skewed, and predictable embedding ...