Zum Hauptinhalt springen

Showing 1–18 of 18 results for author: Blum, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.18241  [pdf, other

    cs.LG cs.DB

    Numerical Literals in Link Prediction: A Critical Examination of Models and Datasets

    Authors: Moritz Blum, Basil Ell, Hannes Ill, Philipp Cimiano

    Abstract: Link Prediction(LP) is an essential task over Knowledge Graphs(KGs), traditionally focussed on using and predicting the relations between entities. Textual entity descriptions have already been shown to be valuable, but models that incorporate numerical literals have shown minor improvements on existing benchmark datasets. It is unclear whether a model is actually better in using numerical literal… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

  2. arXiv:2403.17101  [pdf

    cs.AI

    AI Consciousness is Inevitable: A Theoretical Computer Science Perspective

    Authors: Lenore Blum, Manuel Blum

    Abstract: We look at consciousness through the lens of Theoretical Computer Science, a branch of mathematics that studies computation under resource limitations. From this perspective, we develop a formal machine model for consciousness. The model is inspired by Alan Turing's simple yet powerful model of computation and Bernard Baars' theater model of consciousness. Though extremely simple, the model aligns… ▽ More

    Submitted 29 August, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

    MSC Class: 68T01 ACM Class: F.1; I.2

  3. arXiv:2402.19076  [pdf, other

    cs.CL

    Pointing out the Shortcomings of Relation Extraction Models with Semantically Motivated Adversarials

    Authors: Gennaro Nolano, Moritz Blum, Basil Ell, Philipp Cimiano

    Abstract: In recent years, large language models have achieved state-of-the-art performance across various NLP tasks. However, investigations have shown that these models tend to rely on shortcut features, leading to inaccurate predictions and causing the models to be unreliable at generalization to out-of-distribution (OOD) samples. For instance, in the context of relation extraction (RE), we would expect… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

  4. arXiv:2309.13130  [pdf, other

    cs.DB cs.AI

    Insights from an OTTR-centric Ontology Engineering Methodology

    Authors: Moritz Blum, Basil Ell, Philipp Cimiano

    Abstract: OTTR is a language for representing ontology modeling patterns, which enables to build ontologies or knowledge bases by instantiating templates. Thereby, particularities of the ontological representation language are hidden from the domain experts, and it enables ontology engineers to, to some extent, separate the processes of deciding about what information to model from deciding about how to mod… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

    Comments: Paper accepted at the 14th Workshop on Ontology Design and Patterns (WOP 2023)

  5. arXiv:2308.10410  [pdf, other

    cs.CL

    Large Language Models on Wikipedia-Style Survey Generation: an Evaluation in NLP Concepts

    Authors: Fan Gao, Hang Jiang, Rui Yang, Qingcheng Zeng, Jinghui Lu, Moritz Blum, Dairui Liu, Tianwei She, Yuang Jiang, Irene Li

    Abstract: Educational materials such as survey articles in specialized fields like computer science traditionally require tremendous expert inputs and are therefore expensive to create and update. Recently, Large Language Models (LLMs) have achieved significant success across various general tasks. However, their effectiveness and limitations in the education domain are yet to be fully explored. In this wor… ▽ More

    Submitted 23 May, 2024; v1 submitted 20 August, 2023; originally announced August 2023.

    Journal ref: ACL 2024 Findings

  6. arXiv:2304.11651  [pdf, other

    cs.DL

    Evaluating Digital Library Search Systems by using Formal Process Modelling

    Authors: Christin Katharina Kreutz, Martin Blum, Philipp Schaer, Ralf Schenkel, Benjamin Weyers

    Abstract: Evaluations of digital library information systems are typically centred on users correctly, efficiently, and quickly performing predefined tasks. Additionally, users generally enjoy working with the evaluated system, and completed questionnaires show an interface's excellent user experience. However, such evaluations do not explicitly consider comparing or connecting user-specific information-see… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: 10 pages + references, publication accepted at JCDL'23

  7. arXiv:2303.17075  [pdf

    cs.AI

    Viewpoint: A Theoretical Computer Science Perspective on Consciousness and Artificial General Intelligence

    Authors: Lenore Blum, Manuel Blum

    Abstract: We have defined the Conscious Turing Machine (CTM) for the purpose of investigating a Theoretical Computer Science (TCS) approach to consciousness. For this, we have hewn to the TCS demand for simplicity and understandability. The CTM is consequently and intentionally a simple machine. It is not a model of the brain, though its design has greatly benefited - and continues to benefit - from neurosc… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  8. arXiv:2206.13942  [pdf

    cs.CC cs.AI

    A Theoretical Computer Science Perspective on Free Will

    Authors: Manuel Blum, Lenore Blum

    Abstract: We consider the paradoxical concept of free will from the perspective of Theoretical Computer Science (TCS), a branch of mathematics concerned with understanding the underlying principles of computation and complexity, including the implications and surprising consequences of resource limitations.

    Submitted 15 May, 2024; v1 submitted 25 June, 2022; originally announced June 2022.

    Comments: arXiv admin note: text overlap with arXiv:2107.13704

    MSC Class: 68-02 ACM Class: I.2; F.0

  9. SchenQL: A query language for bibliographic data with aggregations and domain-specific functions

    Authors: Christin Katharina Kreutz, Martin Blum, Ralf Schenkel

    Abstract: Current search interfaces of digital libraries are not suitable to satisfy complex or convoluted information needs directly, when it comes to cases such as "Find authors who only recently started working on a topic". They might offer possibilities to obtain this information only by requiring vast user interaction. We present SchenQL, a web interface of a domain-specific query language on bibliogra… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: Accepted at JCDL'22 as a demo, 5 pages, 4 figures

  10. A Theory of Consciousness from a Theoretical Computer Science Perspective: Insights from the Conscious Turing Machine

    Authors: Lenore Blum, Manuel Blum

    Abstract: The quest to understand consciousness, once the purview of philosophers and theologians, is now actively pursued by scientists of many stripes. We examine consciousness from the perspective of theoretical computer science (TCS), a branch of mathematics concerned with understanding the underlying principles of computation and complexity, including the implications and surprising consequences of res… ▽ More

    Submitted 5 July, 2022; v1 submitted 28 July, 2021; originally announced July 2021.

    Comments: arXiv admin note: text overlap with arXiv:2011.09850

    MSC Class: 68-02 ACM Class: I.2; F.0

  11. arXiv:2011.09850  [pdf

    cs.AI

    A Theoretical Computer Science Perspective on Consciousness

    Authors: Manuel Blum, Lenore Blum

    Abstract: The quest to understand consciousness, once the purview of philosophers and theologians, is now actively pursued by scientists of many stripes. This paper studies consciousness from the perspective of theoretical computer science. It formalizes the Global Workspace Theory (GWT) originated by cognitive neuroscientist Bernard Baars and further developed by him, Stanislas Dehaene, and others. Our maj… ▽ More

    Submitted 23 August, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: 33 pages; 10 figures

    MSC Class: 68T01; 68T40; 68242; ACM Class: F.0; I.2

  12. arXiv:1906.00029  [pdf, other

    cs.CR cs.CC cs.CY

    Human-Usable Password Schemas: Beyond Information-Theoretic Security

    Authors: Elan Rosenfeld, Santosh Vempala, Manuel Blum

    Abstract: Password users frequently employ passwords that are too simple, or they just reuse passwords for multiple websites. A common complaint is that utilizing secure passwords is too difficult. One possible solution to this problem is to use a password schema. Password schemas are deterministic functions which map challenges (typically the website name) to responses (passwords). Previous work has been d… ▽ More

    Submitted 31 May, 2019; originally announced June 2019.

  13. arXiv:1806.04549  [pdf, other

    stat.ML cs.LG stat.AP

    Early Seizure Detection with an Energy-Efficient Convolutional Neural Network on an Implantable Microcontroller

    Authors: Maria Hügle, Simon Heller, Manuel Watter, Manuel Blum, Farrokh Manzouri, Matthias Dümpelmann, Andreas Schulze-Bonhage, Peter Woias, Joschka Boedecker

    Abstract: Implantable, closed-loop devices for automated early detection and stimulation of epileptic seizures are promising treatment options for patients with severe epilepsy that cannot be treated with traditional means. Most approaches for early seizure detection in the literature are, however, not optimized for implementation on ultra-low power microcontrollers required for long-term implantation. In t… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: Accepted at IJCNN 2018

  14. Probabilistic Warnings in National Security Crises: Pearl Harbor Revisited

    Authors: David M. Blum, M. Elisabeth Pate-Cornell

    Abstract: Imagine a situation where a group of adversaries is preparing an attack on the United States or U.S. interests. An intelligence analyst has observed some signals, but the situation is rapidly changing. The analyst faces the decision to alert a principal decision maker that an attack is imminent, or to wait until more is known about the situation. This warning decision is based on the analyst's obs… ▽ More

    Submitted 13 February, 2018; originally announced February 2018.

    Journal ref: Decision Analysis 13:1 (2015) 1-25

  15. arXiv:1707.01204  [pdf

    cs.HC cs.CC cs.CR

    The Complexity of Human Computation: A Concrete Model with an Application to Passwords

    Authors: Manuel Blum, Santosh Vempala

    Abstract: What can humans compute in their heads? We are thinking of a variety of Crypto Protocols, games like Sudoku, Crossword Puzzles, Speed Chess, and so on. The intent of this paper is to apply the ideas and methods of theoretical computer science to better understand what humans can compute in their heads. For example, can a person compute a function in their head so that an eavesdropper with a powerf… ▽ More

    Submitted 4 July, 2017; originally announced July 2017.

  16. arXiv:1404.0024  [pdf, other

    cs.CR

    Towards Human Computable Passwords

    Authors: Jeremiah Blocki, Manuel Blum, Anupam Datta, Santosh Vempala

    Abstract: An interesting challenge for the cryptography community is to design authentication protocols that are so simple that a human can execute them without relying on a fully trusted computer. We propose several candidate authentication protocols for a setting in which the human user can only receive assistance from a semi-trusted computer --- a computer that stores information and performs computation… ▽ More

    Submitted 9 September, 2016; v1 submitted 31 March, 2014; originally announced April 2014.

    Comments: Fixed bug in definition of Q^{f,j} and modified proofs accordingly

  17. GOTCHA Password Hackers!

    Authors: Jeremiah Blocki, Manuel Blum, Anupam Datta

    Abstract: We introduce GOTCHAs (Generating panOptic Turing Tests to Tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two key properties: (1) The puzzles are easy for the human to solve.… ▽ More

    Submitted 3 October, 2013; originally announced October 2013.

    Comments: 2013 ACM Workshop on Artificial Intelligence and Security (AISec)

  18. arXiv:1302.5122  [pdf, ps, other

    cs.CR

    Naturally Rehearsing Passwords

    Authors: Jeremiah Blocki, Manuel Blum, Anupam Datta

    Abstract: We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords. In the same way that security proofs in cryptography are based on complexity-theoretic assumptions (e.g., hardness of factoring and discrete logarithm), we quantify usability by introducing usability assumptions.… ▽ More

    Submitted 9 September, 2013; v1 submitted 20 February, 2013; originally announced February 2013.