Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Bliss, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.06431  [pdf

    cs.CY

    Addressing the Unforeseen Harms of Technology CCC Whitepaper

    Authors: Nadya Bliss, Kevin Butler, David Danks, Ufuk Topcu, Matthew Turk

    Abstract: Recent years have seen increased awareness of the potential significant impacts of computing technologies, both positive and negative. This whitepaper explores how to address possible harmful consequences of computing technologies that might be difficult to anticipate, and thereby mitigate or address. It starts from the assumption that very few harms due to technology are intentional or deliberate… ▽ More

    Submitted 12 August, 2024; originally announced August 2024.

  2. arXiv:2108.05926  [pdf

    cs.CY

    Computing Research for the Climate Crisis

    Authors: Nadya Bliss, Elizabeth Bradley, Claire Monteleoni

    Abstract: Climate change is an existential threat to the United States and the world. Inevitably, computing will play a key role in mitigation, adaptation, and resilience in response to this threat. The needs span all areas of computing, from devices and architectures (e.g., low-power sensor systems for wildfire monitoring) to algorithms (e.g., predicting impacts and evaluating mitigation), and robotics (e.… ▽ More

    Submitted 23 August, 2021; v1 submitted 12 August, 2021; originally announced August 2021.

    Comments: A Computing Community Consortium (CCC) white paper, 9 pages

    Report number: ccc2021whitepaper_5

  3. arXiv:2106.13186  [pdf

    cs.CY cs.AI

    CCC/Code 8.7: Applying AI in the Fight Against Modern Slavery

    Authors: Nadya Bliss, Mark Briers, Alice Eckstein, James Goulding, Daniel P. Lopresti, Anjali Mazumder, Gavin Smith

    Abstract: On any given day, tens of millions of people find themselves trapped in instances of modern slavery. The terms "human trafficking," "trafficking in persons," and "modern slavery" are sometimes used interchangeably to refer to both sex trafficking and forced labor. Human trafficking occurs when a trafficker compels someone to provide labor or services through the use of force, fraud, and/or coercio… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: A Computing Community Consortium (CCC) workshop report, 24 pages

    Report number: ccc2021report_1

  4. arXiv:2101.01264  [pdf

    cs.CY

    A Research Ecosystem for Secure Computing

    Authors: Nadya Bliss, Lawrence A. Gordon, Daniel Lopresti, Fred Schneider, Suresh Venkatasubramanian

    Abstract: Computing devices are vital to all areas of modern life and permeate every aspect of our society. The ubiquity of computing and our reliance on it has been accelerated and amplified by the COVID-19 pandemic. From education to work environments to healthcare to defense to entertainment - it is hard to imagine a segment of modern life that is not touched by computing. The security of computers, syst… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: A Computing Community Consortium (CCC) white paper, 5 pages

    Report number: ccc2020whitepaper_13

  5. arXiv:2012.08572  [pdf

    cs.CY cs.SI

    An Agenda for Disinformation Research

    Authors: Nadya Bliss, Elizabeth Bradley, Joshua Garland, Filippo Menczer, Scott W. Ruston, Kate Starbird, Chris Wiggins

    Abstract: In the 21st Century information environment, adversarial actors use disinformation to manipulate public opinion. The distribution of false, misleading, or inaccurate information with the intent to deceive is an existential threat to the United States--distortion of information erodes trust in the socio-political institutions that are the fundamental fabric of democracy: legitimate news sources, sc… ▽ More

    Submitted 15 December, 2020; originally announced December 2020.

    Comments: A Computing Community Consortium (CCC) white paper, 5 pages

    Report number: ccc2020whitepaper_8

  6. arXiv:2012.06057  [pdf

    cs.CY cs.AI

    Interdisciplinary Approaches to Understanding Artificial Intelligence's Impact on Society

    Authors: Suresh Venkatasubramanian, Nadya Bliss, Helen Nissenbaum, Melanie Moses

    Abstract: Innovations in AI have focused primarily on the questions of "what" and "how"-algorithms for finding patterns in web searches, for instance-without adequate attention to the possible harms (such as privacy, bias, or manipulation) and without adequate consideration of the societal context in which these systems operate. In part, this is driven by incentives and forces in the tech industry, where a… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: A Computing Community Consortium (CCC) white paper, 5 pages

    Report number: ccc2020whitepaper_5

  7. arXiv:2010.14443  [pdf

    cs.CY cs.AI cs.HC cs.MA

    Assured Autonomy: Path Toward Living With Autonomous Systems We Can Trust

    Authors: Ufuk Topcu, Nadya Bliss, Nancy Cooke, Missy Cummings, Ashley Llorens, Howard Shrobe, Lenore Zuck

    Abstract: The challenge of establishing assurance in autonomy is rapidly attracting increasing interest in the industry, government, and academia. Autonomy is a broad and expansive capability that enables systems to behave without direct control by a human operator. To that end, it is expected to be present in a wide variety of systems and applications. A vast range of industrial sectors, including (but by… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: A Computing Community Consortium (CCC) workshop report, 28 pages

    Report number: ccc2020report_5

  8. arXiv:1805.12212  [pdf, other

    cs.SC cs.DC math.AG

    Monodromy Solver: Sequential and Parallel

    Authors: Nathan Bliss, Timothy Duff, Anton Leykin, Jeff Sommars

    Abstract: We describe, study, and experiment with an algorithm for finding all solutions of systems of polynomial equations using homotopy continuation and monodromy. This algorithm follows a framework developed in previous work and can operate in the presence of a large number of failures of the homotopy continuation subroutine. We give special attention to parallelization and probabilistic analysis of a m… ▽ More

    Submitted 30 May, 2018; originally announced May 2018.

    Comments: 19 pages, accepted to ISSAC 2018

    MSC Class: 14Q99; 65H99; 68W20

  9. arXiv:1612.05313  [pdf, other

    math.NA cs.MS cs.SC math.AG

    The Method of Gauss-Newton to Compute Power Series Solutions of Polynomial Homotopies

    Authors: Nathan Bliss, Jan Verschelde

    Abstract: We consider the extension of the method of Gauss-Newton from complex floating-point arithmetic to the field of truncated power series with complex floating-point coefficients. With linearization we formulate a linear system where the coefficient matrix is a series with matrix coefficients, and provide a characterization for when the matrix series is regular based on the algebraic variety of an aug… ▽ More

    Submitted 25 October, 2017; v1 submitted 15 December, 2016; originally announced December 2016.

    Comments: 21 pages, 9 figures

  10. arXiv:1606.05563  [pdf, other

    cs.SC cs.MS math.AG math.NA

    Computing all Space Curve Solutions of Polynomial Systems by Polyhedral Methods

    Authors: Nathan Bliss, Jan Verschelde

    Abstract: A polyhedral method to solve a system of polynomial equations exploits its sparse structure via the Newton polytopes of the polynomials. We propose a hybrid symbolic-numeric method to compute a Puiseux series expansion for every space curve that is a solution of a polynomial system. The focus of this paper concerns the difficult case when the leading powers of the Puiseux series of the space curve… ▽ More

    Submitted 17 June, 2016; originally announced June 2016.

    Comments: 14 pages, 1 figure, accepted for presentation at Computer Algebra in Scientific Computing, CASC 2016

  11. arXiv:1506.02618  [pdf, ps, other

    cs.MS cs.SC math.AG math.NA

    Solving Polynomial Systems in the Cloud with Polynomial Homotopy Continuation

    Authors: Nathan Bliss, Jeff Sommars, Jan Verschelde, Xiangcheng Yu

    Abstract: Polynomial systems occur in many fields of science and engineering. Polynomial homotopy continuation methods apply symbolic-numeric algorithms to solve polynomial systems. We describe the design and implementation of our web interface and reflect on the application of polynomial homotopy continuation methods to solve polynomial systems in the cloud. Via the graph isomorphism problem we organize an… ▽ More

    Submitted 8 June, 2015; originally announced June 2015.

    Comments: Accepted for publication in the Proceedings of CASC 2015

  12. arXiv:1412.4411  [pdf, other

    cs.SI physics.soc-ph

    Spectral Anomaly Detection in Very Large Graphs: Models, Noise, and Computational Complexity

    Authors: Benjamin A. Miller, Nicholas Arcolano, Michael M. Wolf, Nadya T. Bliss

    Abstract: Anomaly detection in massive networks has numerous theoretical and computational challenges, especially as the behavior to be detected becomes small in comparison to the larger network. This presentation focuses on recent results in three key technical areas, specifically geared toward spectral methods for detection. We first discuss recent models for network behavior, and how their structure can… ▽ More

    Submitted 14 December, 2014; originally announced December 2014.

    Comments: Extended abstract of a presentation at Dagstuhl seminar 14461, "High-performance Graph Algorithms and Applications in Computational Science," held 9-14 November, 2014. 4 pages, 2 figures

  13. A Spectral Framework for Anomalous Subgraph Detection

    Authors: Benjamin A. Miller, Michelle S. Beard, Patrick J. Wolfe, Nadya T. Bliss

    Abstract: A wide variety of application domains are concerned with data consisting of entities and their relationships or connections, formally represented as graphs. Within these diverse application areas, a common problem of interest is the detection of a subset of entities whose connectivity is anomalous with respect to the rest of the data. While the detection of such anomalous subgraphs has received a… ▽ More

    Submitted 22 October, 2014; v1 submitted 29 January, 2014; originally announced January 2014.

    Comments: In submission to the IEEE, 16 pages, 8 figures

    Journal ref: IEEE Trans. Signal Process. 63 (2015) 4191-4206