Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Chandel, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.14261  [pdf, other

    cs.SE cs.AI

    Copilot Evaluation Harness: Evaluating LLM-Guided Software Programming

    Authors: Anisha Agarwal, Aaron Chan, Shubham Chandel, Jinu Jang, Shaun Miller, Roshanak Zilouchian Moghaddam, Yevhen Mohylevskyy, Neel Sundaresan, Michele Tufano

    Abstract: The integration of Large Language Models (LLMs) into Development Environments (IDEs) has become a focal point in modern software development. LLMs such as OpenAI GPT-3.5/4 and Code Llama offer the potential to significantly augment developer productivity by serving as intelligent, chat-driven programming assistants. However, utilizing LLMs out of the box is unlikely to be optimal for any given sce… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  2. arXiv:2307.13383  [pdf, other

    cs.SE cs.AI

    Predicting Code Coverage without Execution

    Authors: Michele Tufano, Shubham Chandel, Anisha Agarwal, Neel Sundaresan, Colin Clement

    Abstract: Code coverage is a widely used metric for quantifying the extent to which program elements, such as statements or branches, are executed during testing. Calculating code coverage is resource-intensive, requiring code building and execution with additional overhead for the instrumentation. Furthermore, computing coverage of any snippet of code requires the whole program context. Using Machine Learn… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

  3. arXiv:2304.00913  [pdf, other

    cs.CL cs.AI

    LAHM : Large Annotated Dataset for Multi-Domain and Multilingual Hate Speech Identification

    Authors: Ankit Yadav, Shubham Chandel, Sushant Chatufale, Anil Bandhakavi

    Abstract: Current research on hate speech analysis is typically oriented towards monolingual and single classification tasks. In this paper, we present a new multilingual hate speech analysis dataset for English, Hindi, Arabic, French, German and Spanish languages for multiple domains across hate speech - Abuse, Racism, Sexism, Religious Hate and Extremism. To the best of our knowledge, this paper is the fi… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

  4. arXiv:2201.12901  [pdf, other

    cs.LG cs.SE

    Training and Evaluating a Jupyter Notebook Data Science Assistant

    Authors: Shubham Chandel, Colin B. Clement, Guillermo Serrato, Neel Sundaresan

    Abstract: We study the feasibility of a Data Science assistant powered by a sequence-to-sequence transformer by training a new model JuPyT5 on all publicly available Jupyter Notebook GitHub repositories and developing a new metric: Data Science Problems (DSP). DSP is a collection of 1119 problems curated from 306 pedagogical notebooks with 92 dataset dependencies, natural language and Markdown problem descr… ▽ More

    Submitted 30 January, 2022; originally announced January 2022.

  5. arXiv:1407.3987  [pdf

    cs.CR cs.NI

    Routing Attacks in Wireless Sensor Networks: A Survey

    Authors: Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani

    Abstract: Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range of applications such as battlefield surveillance, traffic surveillance, forest fire detection, flood detection etc. But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. The security of a wireless sensor network is compromised becaus… ▽ More

    Submitted 29 May, 2014; originally announced July 2014.

    Comments: IJCSIT April 2014

  6. arXiv:1401.2541  [pdf

    cs.NI

    Exponential Trust Based Mechanism to Detect Black Hole attack in Wireless Sensor Network

    Authors: Dr. Deepali Virmani, Manas Hemrajani, Shringarica Chandel

    Abstract: Security is a key feature in Wireless Sensor Networks but they are prone to many kinds of attacks and one of them is Black Hole Attack. In a black hole attack all the packets are consecutively dropped which leads to the decrease in the efficiency of the network and unnecessary wastage of battery life. In this paper, we propose an exponential trust based mechanism to detect the malicious node. In t… ▽ More

    Submitted 11 January, 2014; originally announced January 2014.

    Comments: 5 pages, 2 figures