Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Allen, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.14048  [pdf, ps, other

    cs.SD cs.CL eess.AS

    The NeurIPS 2023 Machine Learning for Audio Workshop: Affective Audio Benchmarks and Novel Data

    Authors: Alice Baird, Rachel Manzelli, Panagiotis Tzirakis, Chris Gagne, Haoqi Li, Sadie Allen, Sander Dieleman, Brian Kulis, Shrikanth S. Narayanan, Alan Cowen

    Abstract: The NeurIPS 2023 Machine Learning for Audio Workshop brings together machine learning (ML) experts from various audio domains. There are several valuable audio-driven ML tasks, from speech emotion recognition to audio event detection, but the community is sparse compared to other ML areas, e.g., computer vision or natural language processing. A major limitation with audio is the available data; wi… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

  2. arXiv:2401.08064  [pdf

    econ.GN cs.HC q-bio.NC

    A new model of trust based on neural information processing

    Authors: Scott E. Allen, René F. Kizilcec, A. David Redish

    Abstract: More than 30 years of research has firmly established the vital role of trust in human organizations and relationships, but the underlying mechanisms by which people build, lose, and rebuild trust remains incompletely understood. We propose a mechanistic model of trust that is grounded in the modern neuroscience of decision making. Since trust requires anticipating the future actions of others, an… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  3. arXiv:2311.03530  [pdf, ps, other

    cs.CR

    DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs

    Authors: James Austgen, Andrés Fábrega, Sarah Allen, Kushal Babel, Mahimna Kelkar, Ari Juels

    Abstract: Decentralized Autonomous Organizations (DAOs) use smart contracts to foster communities working toward common goals. Existing definitions of decentralization, however-the 'D' in DAO-fall short of capturing key properties characteristic of diverse and equitable participation. We propose a new metric called Voting-Bloc Entropy (VBE, pronounced ''vibe'') that formalizes a broad notion of decentraliza… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

  4. arXiv:2302.03976  [pdf, other

    cs.CR cs.NI cs.OS

    Parma: Confidential Containers via Attested Execution Policies

    Authors: Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa

    Abstract: Container-based technologies empower cloud tenants to develop highly portable software and deploy services in the cloud at a rapid pace. Cloud privacy, meanwhile, is important as a large number of container deployments operate on privacy-sensitive data, but challenging due to the increasing frequency and sophistication of attacks. State-of-the-art confidential container-based designs leverage proc… ▽ More

    Submitted 7 March, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: 12 pages, 6 figures, 2 tables

  5. arXiv:2207.13791  [pdf, other

    cs.RO cs.CV cs.HC cs.LG

    Learning to Assess Danger from Movies for Cooperative Escape Planning in Hazardous Environments

    Authors: Vikram Shree, Sarah Allen, Beatriz Asfora, Jacopo Banfi, Mark Campbell

    Abstract: There has been a plethora of work towards improving robot perception and navigation, yet their application in hazardous environments, like during a fire or an earthquake, is still at a nascent stage. We hypothesize two key challenges here: first, it is difficult to replicate such scenarios in the real world, which is necessary for training and testing purposes. Second, current systems are not full… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

    Comments: 8 pages, 8 figures Accepted for publication at 2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

  6. arXiv:2109.14946  [pdf

    cs.NI cs.AI cs.HC

    Crowdsourcing through Cognitive Opportunistic Networks

    Authors: M. Mordacchini, A. Passarella, M. Conti, S. M. Allen, M. J. Chorley, G. B. Colombo, V. Tanasescu, R. M. Whitaker

    Abstract: Untile recently crowdsourcing has been primarily conceived as an online activity to harness resources for problem solving. However the emergence of opportunistic networking (ON) has opened up crowdsourcing to the spatial domain. In this paper we bring the ON model for potential crowdsourcing in the smart city environment. We introduce cognitive features to the ON that allow users' mobile devices t… ▽ More

    Submitted 30 September, 2021; originally announced September 2021.

    ACM Class: I.6.1

    Journal ref: Trans. Auton. Adapt. Syst. 10:2 (2015) 13:1-29

  7. arXiv:2105.04380  [pdf, other

    cs.CR

    Forsage: Anatomy of a Smart-Contract Pyramid Scheme

    Authors: Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels

    Abstract: Pyramid schemes are investment scams in which top-level participants in a hierarchical network recruit and profit from an expanding base of defrauded newer participants. Pyramid schemes have existed for over a century, but there have been no in-depth studies of their dynamics and communities because of the opacity of participants' transactions. In this paper, we present an empirical study of For… ▽ More

    Submitted 24 August, 2021; v1 submitted 10 May, 2021; originally announced May 2021.

    Comments: 17 pages, 13 figures

  8. arXiv:2102.12415  [pdf, other

    math.OC cs.AI

    Using Inverse Optimization to Learn Cost Functions in Generalized Nash Games

    Authors: Stephanie Allen, John P. Dickerson, Steven A. Gabriel

    Abstract: As demonstrated by Ratliff et al. (2014), inverse optimization can be used to recover the objective function parameters of players in multi-player Nash games. These games involve the optimization problems of multiple players in which the players can affect each other in their objective functions. In generalized Nash equilibrium problems (GNEPs), a player's set of feasible actions is also impacted… ▽ More

    Submitted 24 February, 2021; originally announced February 2021.

  9. arXiv:2101.00441  [pdf, other

    math.OC cs.AI cs.DM

    A space-indexed formulation of packing boxes into a larger box

    Authors: Sam D. Allen, Edmund K. Burke, Jakub Marecek

    Abstract: Current integer programming solvers fail to decide whether 12 unit cubes can be packed into a 1x1x11 box within an hour using the natural relaxation of Chen/Padberg. We present an alternative relaxation of the problem of packing boxes into a larger box, which makes it possible to solve much larger instances.

    Submitted 2 January, 2021; originally announced January 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1412.2526

    Journal ref: Operations Research Letters, Volume 40, Issue 1, January 2012, Pages 20-24

  10. Modernizing the HPC System Software Stack

    Authors: Benjamin S. Allen, Matthew A. Ezell, Paul Peltz, Doug Jacobsen, Eric Roman, Cory Lueninghoener, J. Lowell Wofford

    Abstract: Through the 1990s, HPC centers at national laboratories, universities, and other large sites designed distributed system architectures and software stacks that enabled extreme-scale computing. By the 2010s, these centers were eclipsed by the scale of web-scale and cloud computing architectures, and today even upcoming exascale HPC systems are magnitudes of scale smaller than those of datacenters e… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: Presented at the SC (SC20), Atlanta, GA: Zenodo (2020)

  11. arXiv:1902.10171  [pdf, other

    quant-ph cs.ET

    Ground-state energy estimation of the water molecule on a trapped ion quantum computer

    Authors: Yunseong Nam, Jwo-Sy Chen, Neal C. Pisenti, Kenneth Wright, Conor Delaney, Dmitri Maslov, Kenneth R. Brown, Stewart Allen, Jason M. Amini, Joel Apisdorf, Kristin M. Beck, Aleksey Blinov, Vandiver Chaplin, Mika Chmielewski, Coleman Collins, Shantanu Debnath, Andrew M. Ducore, Kai M. Hudek, Matthew Keesan, Sarah M. Kreikemeier, Jonathan Mizrahi, Phil Solomon, Mike Williams, Jaime David Wong-Campos, Christopher Monroe , et al. (1 additional authors not shown)

    Abstract: Quantum computing leverages the quantum resources of superposition and entanglement to efficiently solve computational problems considered intractable for classical computers. Examples include calculating molecular and nuclear structure, simulating strongly-interacting electron systems, and modeling aspects of material function. While substantial theoretical advances have been made in mapping thes… ▽ More

    Submitted 7 March, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 14 pages, 7 figures

  12. arXiv:1610.06453  [pdf, other

    cs.CV cs.LG stat.ML

    Change-point Detection Methods for Body-Worn Video

    Authors: Stephanie Allen, David Madras, Ye Ye, Greg Zanotti

    Abstract: Body-worn video (BWV) cameras are increasingly utilized by police departments to provide a record of police-public interactions. However, large-scale BWV deployment produces terabytes of data per week, necessitating the development of effective computational methods to identify salient changes in video. In work carried out at the 2016 RIPS program at IPAM, UCLA, we present a novel two-stage framew… ▽ More

    Submitted 20 October, 2016; originally announced October 2016.

  13. arXiv:1603.08485  [pdf, other

    cs.CG cs.DS

    Incremental Voronoi Diagrams

    Authors: Sarah R. Allen, Luis Barba, John Iacono, Stefan Langerman

    Abstract: We study the amortized number of combinatorial changes (edge insertions and removals) needed to update the graph structure of the Voronoi diagram $\mathcal{V}(S)$ (and several variants thereof) of a set $S$ of $n$ sites in the plane as sites are added. We define a general update operation for planar graphs modeling the incremental construction of several variants of Voronoi diagrams as well as t… ▽ More

    Submitted 28 March, 2016; originally announced March 2016.

    Comments: 19 pages, SoCG 2016

  14. arXiv:1505.04383  [pdf, ps, other

    cs.CC cs.DS

    How to refute a random CSP

    Authors: Sarah R. Allen, Ryan O'Donnell, David Witmer

    Abstract: Let $P$ be a $k$-ary predicate over a finite alphabet. Consider a random CSP$(P)$ instance $I$ over $n$ variables with $m$ constraints. When $m \gg n$ the instance $I$ will be unsatisfiable with high probability, and we want to find a refutation - i.e., a certificate of unsatisfiability. When $P$ is the $3$-ary OR predicate, this is the well studied problem of refuting random $3$-SAT formulas, and… ▽ More

    Submitted 27 July, 2015; v1 submitted 17 May, 2015; originally announced May 2015.

  15. arXiv:1407.4423  [pdf, ps, other

    cs.IT cs.CC cs.DS math.PR

    Conditioning and covariance on caterpillars

    Authors: Sarah R. Allen, Ryan O'Donnell

    Abstract: Let $X_1, \dots, X_n$ be joint $\{ \pm 1\}$-valued random variables. It is known that conditioning on a random subset of $O(1/ε^2)$ of them reduces their average pairwise covariance to below $ε$ (in expectation). We conjecture that $O(1/ε^2)$ can be improved to $O(1/ε)$. The motivation for the problem and our conjectured improvement comes from the theory of global correlation rounding for convex r… ▽ More

    Submitted 16 July, 2014; originally announced July 2014.

  16. arXiv:1401.7821  [pdf

    cs.HC

    Spatial Modelling Techniques in Microsoft Excel

    Authors: Stephen Allen

    Abstract: We begin by considering the expectations of the creators of VisiCalc, the first spreadsheet. The emphasis is on the nature of the spreadsheet grid. The grid is taken as a presentational method for showing a solution to a Sudoku puzzle. We consider methods or approaches for the solution. We look at the relationship between this model and academic papers on the methods for describing and categorisin… ▽ More

    Submitted 30 January, 2014; originally announced January 2014.

    Comments: 9 pages, 5 colour figures, 1 table, Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2013, ISBN: 978-1-9054045-1-3

  17. arXiv:1310.3673  [pdf, ps, other

    cs.CC cs.DS

    Evaluation of DNF Formulas

    Authors: Sarah R. Allen, Lisa Hellerstein, Devorah Kletenik, Tonguç Ünlüyurt

    Abstract: Stochastic Boolean Function Evaluation (SBFE) is the problem of determining the value of a given Boolean function $f$ on an unknown input $x$, when each bit of $x_i$ of $x$ can only be determined by paying a given associated cost $c_i$. Further, $x$ is drawn from a given product distribution: for each $x_i$, $Prob[x_i=1] = p_i$, and the bits are independent. The goal is to minimize the expected co… ▽ More

    Submitted 8 October, 2014; v1 submitted 14 October, 2013; originally announced October 2013.

  18. arXiv:1209.5307  [pdf, other

    cs.CG

    Packing identical simple polygons is NP-hard

    Authors: Sarah R. Allen, John Iacono

    Abstract: Given a small polygon S, a big simple polygon B and a positive integer k, it is shown to be NP-hard to determine whether k copies of the small polygon (allowing translation and rotation) can be placed in the big polygon without overlap. Previous NP-hardness results were only known in the case where the big polygon is allowed to be non-simple. A novel reduction from Planar-Circuit-SAT is presented… ▽ More

    Submitted 24 September, 2012; originally announced September 2012.

  19. arXiv:1209.3518  [pdf

    cs.SE

    On the Interpretation of Spreadsheets within their Environment

    Authors: Stephen Allen

    Abstract: A demonstration in MS Excel to show how users can connect their spreadsheet models to the external environment that the model represents. We employ indexes to generate a list of relevant evidence that is hyperlinked to the context in which the evidence is discussed. The hyperlinks between the index and the contextual discussion have their own specific presentational identity. We contend that these… ▽ More

    Submitted 16 September, 2012; originally announced September 2012.

    Comments: 10 Pages, 1 Table, 6 Figures, ISBN: 978-0-9569258-6-2

    Journal ref: Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2012 pp97-104