Zum Hauptinhalt springen

Showing 1–36 of 36 results for author: Cooper, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.15066  [pdf, other

    cs.HC cs.CY

    Constraining Participation: Affordances of Feedback Features in Interfaces to Large Language Models

    Authors: Ned Cooper, Alexandra Zafiroglu

    Abstract: Large language models (LLMs) are now accessible to anyone with a computer, a web browser, and an internet connection via browser-based interfaces, shifting the dynamics of participation in AI development. This paper examines the affordances of interactive feedback features in ChatGPT's interface, analysing how they shape user input and participation in LLM iteration. Drawing on a survey of ChatGPT… ▽ More

    Submitted 27 August, 2024; originally announced August 2024.

  2. arXiv:2407.08610  [pdf, other

    cs.SE cs.LG

    Semantic GUI Scene Learning and Video Alignment for Detecting Duplicate Video-based Bug Reports

    Authors: Yanfu Yan, Nathan Cooper, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk

    Abstract: Video-based bug reports are increasingly being used to document bugs for programs centered around a graphical user interface (GUI). However, developing automated techniques to manage video-based reports is challenging as it requires identifying and understanding often nuanced visual patterns that capture key information about a reported bug. In this paper, we aim to overcome these challenges by ad… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 13 pages, accepted to 46th International Conference on Software Engineering (ICSE 2024)

  3. arXiv:2405.09656  [pdf, ps, other

    math.CO cs.DM

    Distance Critical Graphs

    Authors: Joshua Cooper, Gabrielle Tauscheck

    Abstract: In 1971, Graham and Pollak provided a formula for the determinant of the distance matrix of any tree on $n$ vertices. Yan and Yeh reproved this by exploiting the fact that pendant vertices can be deleted from trees without changing the remaining entries of the distance matrix. Considering failures of their argument to generalize invites the question: which graphs have the property that deleting an… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: 14 pages, 4 figures

    MSC Class: 05C12 (Primary) 05C35; 05C75 (Secondary) ACM Class: G.2.2

  4. arXiv:2404.18405  [pdf

    cs.HC

    Understanding and Shaping Human-Technology Assemblages in the Age of Generative AI

    Authors: Josh Andres, Chris Danta, Andrea Bianchi, Sungyeon Hong, Zhuying Li, Eduardo B. Sandoval, Charles Martin, Ned Cooper

    Abstract: Generative AI capabilities are rapidly transforming how we perceive, interact with, and relate to machines. This one-day workshop invites HCI researchers, designers, and practitioners to imaginatively inhabit and explore the possible futures that might emerge from humans combining generative AI capabilities into everyday technologies at massive scale. Workshop participants will craft stories, visu… ▽ More

    Submitted 4 May, 2024; v1 submitted 28 April, 2024; originally announced April 2024.

  5. arXiv:2404.06634  [pdf, other

    cs.SE

    Perplexed: Understanding When Large Language Models are Confused

    Authors: Nathan Cooper, Torsten Scholak

    Abstract: Large Language Models (LLMs) have become dominant in the Natural Language Processing (NLP) field causing a huge surge in progress in a short amount of time. However, their limitations are still a mystery and have primarily been explored through tailored datasets to analyze a specific human-level skill such as negation, name resolution, etc. In this paper, we introduce perplexed, a library for expl… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  6. arXiv:2404.01226  [pdf, other

    cs.CL

    Stable Code Technical Report

    Authors: Nikhil Pinnaparaju, Reshinth Adithyan, Duy Phung, Jonathan Tow, James Baicoianu, Ashish Datta, Maksym Zhuravinskyi, Dakota Mahan, Marco Bellagente, Carlos Riquelme, Nathan Cooper

    Abstract: We introduce Stable Code, the first in our new-generation of code language models series, which serves as a general-purpose base code language model targeting code completion, reasoning, math, and other software engineering-based tasks. Additionally, we introduce an instruction variant named Stable Code Instruct that allows conversing with the model in a natural chat interface for performing quest… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  7. From Fitting Participation to Forging Relationships: The Art of Participatory ML

    Authors: Ned Cooper, Alex Zafiroglu

    Abstract: Participatory machine learning (ML) encourages the inclusion of end users and people affected by ML systems in design and development processes. We interviewed 18 participation brokers -- individuals who facilitate such inclusion and transform the products of participants' labour into inputs for an ML artefact or system -- across a range of organisational settings and project locations. Our findin… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: To appear in Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (CHI '24)

    Journal ref: In Proceedings of the CHI Conference on Human Factors in Computing Systems (2024). ACM, New York, NY, USA, Art. 746, 1-9

  8. arXiv:2402.17834  [pdf, other

    cs.CL stat.ML

    Stable LM 2 1.6B Technical Report

    Authors: Marco Bellagente, Jonathan Tow, Dakota Mahan, Duy Phung, Maksym Zhuravinskyi, Reshinth Adithyan, James Baicoianu, Ben Brooks, Nathan Cooper, Ashish Datta, Meng Lee, Emad Mostaque, Michael Pieler, Nikhil Pinnaparju, Paulo Rocha, Harry Saini, Hannah Teufel, Niccolo Zanichelli, Carlos Riquelme

    Abstract: We introduce StableLM 2 1.6B, the first in a new generation of our language model series. In this technical report, we present in detail the data and training procedure leading to the base and instruction-tuned versions of StableLM 2 1.6B. The weights for both models are available via Hugging Face for anyone to download and use. The report contains thorough evaluations of these models, including z… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 23 pages, 6 figures

  9. arXiv:2402.02639  [pdf, other

    cs.CL

    "It's how you do things that matters": Attending to Process to Better Serve Indigenous Communities with Language Technologies

    Authors: Ned Cooper, Courtney Heldreth, Ben Hutchinson

    Abstract: Indigenous languages are historically under-served by Natural Language Processing (NLP) technologies, but this is changing for some languages with the recent scaling of large multilingual models and an increased focus by the NLP community on endangered languages. This position paper explores ethical considerations in building NLP technologies for Indigenous languages, based on the premise that suc… ▽ More

    Submitted 5 February, 2024; v1 submitted 4 February, 2024; originally announced February 2024.

    Journal ref: Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2024)

  10. arXiv:2310.10921  [pdf, other

    cs.SE cs.AI

    Intelligent Software Tooling for Improving Software Development

    Authors: Nathan Cooper

    Abstract: Software has eaten the world with many of the necessities and quality of life services people use requiring software. Therefore, tools that improve the software development experience can have a significant impact on the world such as generating code and test cases, detecting bugs, question and answering, etc., The success of Deep Learning (DL) over the past decade has shown huge advancements in a… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

    Comments: PhD thesis

  11. MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors

    Authors: Amit Seal Ami, Syed Yusuf Ahmed, Radowan Mahmud Redoy, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni

    Abstract: While software engineers are optimistically adopting crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied by a rigorous understanding of crypto-detectors' effectiveness at finding crypto-API misuses in practice. This demo paper presents the technical details and usage scenarios of our tool, namely Mutation Analysis for evaluating… ▽ More

    Submitted 13 August, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: To be published in Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering

  12. arXiv:2306.00243  [pdf, ps, other

    math.CO cs.DM

    A Generalization of the Graham-Pollak Tree Theorem to Steiner Distance

    Authors: Joshua Cooper, Gabrielle Tauscheck

    Abstract: Graham and Pollak showed that the determinant of the distance matrix of a tree $T$ depends only on the number of vertices of $T$. Graphical distance, a function of pairs of vertices, can be generalized to ``Steiner distance'' of sets $S$ of vertices of arbitrary size, by defining it to be the fewest edges in any connected subgraph containing all of $S$. Here, we show that the same is true for tree… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

    Comments: 7 pages

    MSC Class: 05C12 (Primary) 05C50; 15A69 (Secondary)

  13. arXiv:2306.00227  [pdf

    cs.CY

    From Human-Centered to Social-Centered Artificial Intelligence: Assessing ChatGPT's Impact through Disruptive Events

    Authors: Skyler Wang, Ned Cooper, Margaret Eby, Eun Seo Jo

    Abstract: Large language models (LLMs) and dialogue agents have existed for years, but the release of recent GPT models has been a watershed moment for artificial intelligence (AI) research and society at large. Immediately recognized for its generative capabilities and versatility, ChatGPT's impressive proficiency across technical and creative domains led to its widespread adoption. While society grapples… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  14. Would the Trees Dim the Lights? Adopting the Intentional Stance for More-Than-Human Participatory Design

    Authors: Ned Cooper

    Abstract: The 2019/20 Black Summer bushfires in Australia demonstrated the brutal and disastrous consequences of changing the technological world without considering linkages with the biophysical, ecological or human worlds. An emerging more-than-human design philosophy encourages designers to consider such interrelations between humans and non-human entities. Yet, the design research community has focused… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

    Comments: 6 pages

    Journal ref: In Proceedings of the Participatory Design Conference 2022: Volume 2 (PDC 2022 Vol. 2), ACM, New York, NY, USA

  15. arXiv:2303.10831  [pdf, ps, other

    cs.CY cs.HC

    Bridging Deliberative Democracy and Deployment of Societal-Scale Technology

    Authors: Ned Cooper

    Abstract: This position paper encourages the Human-Computer Interaction (HCI) community to focus on designing deliberative processes to inform and coordinate technology and policy design for large language models (LLMs) -- a `societal-scale technology'. First, I propose a definition for societal-scale technology and locate LLMs within this definition. Next, I argue that existing processes to ensure the safe… ▽ More

    Submitted 27 March, 2023; v1 submitted 19 March, 2023; originally announced March 2023.

    Comments: 3 pages

    ACM Class: H.1.2; K.4.1

    Journal ref: CHI 2023 Workshop on Designing Technology and Policy Simultaneously

  16. arXiv:2302.03788  [pdf, other

    cs.SE cs.AI cs.LG stat.ME

    Toward a Theory of Causation for Interpreting Neural Code Models

    Authors: David N. Palacio, Alejandro Velasco, Nathan Cooper, Alvaro Rodriguez, Kevin Moran, Denys Poshyvanyk

    Abstract: Neural Language Models of Code, or Neural Code Models (NCMs), are rapidly progressing from research prototypes to commercial developer tools. As such, understanding the capabilities and limitations of such models is becoming critical. However, the abilities of these models are typically measured using automated metrics that often only reveal a portion of their real-world performance. While, in gen… ▽ More

    Submitted 27 March, 2024; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: Accepted to appear in IEEE Transactions on Software Engineering

  17. arXiv:2301.01191  [pdf, other

    cs.SE

    Translating Video Recordings of Complex Mobile App UI Gestures into Replayable Scenarios

    Authors: Carlos Bernal-Cárdenas, Nathan Cooper, Madeleine Havranek, Kevin Moran, Oscar Chaparro, Denys Poshyvanyk, Andrian Marcus

    Abstract: Screen recordings of mobile applications are easy to obtain and capture a wealth of information pertinent to software developers (e.g., bugs or feature requests), making them a popular mechanism for crowdsourced app feedback. Thus, these videos are becoming a common artifact that developers must manage. In light of unique mobile development constraints, including swift release cycles and rapidly e… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

    Comments: Accepted to IEEE Transactions on Software Engineering. arXiv admin note: substantial text overlap with arXiv:2005.09057

  18. arXiv:2207.04171  [pdf, other

    cs.HC cs.AI cs.CY

    A Systematic Review and Thematic Analysis of Community-Collaborative Approaches to Computing Research

    Authors: Ned Cooper, Tiffanie Horne, Gillian Hayes, Courtney Heldreth, Michal Lahav, Jess Scon Holbrook, Lauren Wilcox

    Abstract: HCI researchers have been gradually shifting attention from individual users to communities when engaging in research, design, and system development. However, our field has yet to establish a cohesive, systematic understanding of the challenges, benefits, and commitments of community-collaborative approaches to research. We conducted a systematic review and thematic analysis of 47 computing resea… ▽ More

    Submitted 8 July, 2022; originally announced July 2022.

    Journal ref: In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (CHI '22). ACM, New York, NY, USA, Art. 73, 1-18

  19. arXiv:2206.08574  [pdf, other

    cs.SE

    Using Transfer Learning for Code-Related Tasks

    Authors: Antonio Mastropaolo, Nathan Cooper, David Nader Palacio, Simone Scalabrino, Denys Poshyvanyk, Rocco Oliveto, Gabriele Bavota

    Abstract: Deep learning (DL) techniques have been used to support several code-related tasks such as code summarization and bug-fixing. In particular, pre-trained transformer models are on the rise, also thanks to the excellent results they achieved in Natural Language Processing (NLP) tasks. The basic idea behind these models is to first pre-train them on a generic dataset using a self-supervised task (e.g… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2102.02017

  20. An Empirical Study on the Usage of Transformer Models for Code Completion

    Authors: Matteo Ciniselli, Nathan Cooper, Luca Pascarella, Antonio Mastropaolo, Emad Aghajani, Denys Poshyvanyk, Massimiliano Di Penta, Gabriele Bavota

    Abstract: Code completion aims at speeding up code writing by predicting the next code token(s) the developer is likely to write. Works in this field focused on improving the accuracy of the generated predictions, with substantial leaps forward made possible by deep learning (DL) models. However, code completion techniques are mostly evaluated in the scenario of predicting the next token to type, with few e… ▽ More

    Submitted 18 November, 2021; v1 submitted 3 August, 2021; originally announced August 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2103.07115

  21. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques

    Authors: Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni

    Abstract: The correct use of cryptography is central to ensuring data security in modern software systems. Hence, several academic and commercial static analysis tools have been developed for detecting and mitigating crypto-API misuse. While developers are optimistically adopting these crypto-API misuse detectors (or crypto-detectors) in their software development cycles, this momentum must be accompanied b… ▽ More

    Submitted 24 July, 2022; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: 18 pages, 2 figures, 2 tables; paper published at 2022 IEEE Symposium on Security and Privacy (S&P)

  22. arXiv:2107.01500  [pdf, ps, other

    math.CO cs.DM

    Geometric vs Algebraic Nullity for Hyperpaths

    Authors: Joshua Cooper, Grant Fickes

    Abstract: We consider the question of how the eigenvarieties of a hypergraph relate to the algebraic multiplicities of their corresponding eigenvalues. Specifically, we (1) fully describe the irreducible components of the zero-eigenvariety of a loose $3$-hyperpath (its "nullvariety"), (2) use recent results of Bao-Fan-Wang-Zhu to compute the corresponding algebraic multiplicity of zero (its "nullity"), and… ▽ More

    Submitted 4 March, 2022; v1 submitted 3 July, 2021; originally announced July 2021.

    Comments: 23 pages, 1 figure

    MSC Class: 05C65; 15A69 (Primary) 14N10; 05A15 (Secondary) ACM Class: G.2.2

  23. arXiv:2104.12199  [pdf, other

    stat.ML cs.LG math.CO

    Sampling Permutations for Shapley Value Estimation

    Authors: Rory Mitchell, Joshua Cooper, Eibe Frank, Geoffrey Holmes

    Abstract: Game-theoretic attribution techniques based on Shapley values are used to interpret black-box machine learning models, but their exact calculation is generally NP-hard, requiring approximation methods for non-trivial models. As the computation of Shapley values can be expressed as a summation over a set of permutations, a common approach is to sample a subset of these permutations for approximatio… ▽ More

    Submitted 3 February, 2022; v1 submitted 25 April, 2021; originally announced April 2021.

    Comments: 33 pages, 13 figures

    MSC Class: 05A05 (Primary) 65K10; 90C27 (Secondary) ACM Class: I.2.6; G.2.1

  24. arXiv:2103.07115  [pdf, other

    cs.SE

    An Empirical Study on the Usage of BERT Models for Code Completion

    Authors: Matteo Ciniselli, Nathan Cooper, Luca Pascarella, Denys Poshyvanyk, Massimiliano Di Penta, Gabriele Bavota

    Abstract: Code completion is one of the main features of modern Integrated Development Environments (IDEs). Its objective is to speed up code writing by predicting the next code token(s) the developer is likely to write. Research in this area has substantially bolstered the predictive performance of these techniques. However, the support to developers is still limited to the prediction of the next few token… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: Accepted to the 18th International Conference on Mining Software Repositories (MSR 2021)

  25. arXiv:2103.04531  [pdf, other

    cs.SE

    V2S: A Tool for Translating Video Recordings of Mobile App Usages into Replayable Scenarios

    Authors: Madeleine Havranek, Carlos Bernal-Cárdenas, Nathan Cooper, Oscar Chaparro, Denys Poshyvnayk, Kevin Moran

    Abstract: Screen recordings are becoming increasingly important as rich software artifacts that inform mobile application development processes. However, the amount of manual effort required to extract information from these graphical artifacts can hinder resource-constrained mobile developers. This paper presents Video2Scenario (V2S), an automated tool that processes video recordings of Android app usages,… ▽ More

    Submitted 7 March, 2021; originally announced March 2021.

  26. arXiv:2102.02017  [pdf, other

    cs.SE

    Studying the Usage of Text-To-Text Transfer Transformer to Support Code-Related Tasks

    Authors: Antonio Mastropaolo, Simone Scalabrino, Nathan Cooper, David Nader Palacio, Denys Poshyvanyk, Rocco Oliveto, Gabriele Bavota

    Abstract: Deep learning (DL) techniques are gaining more and more attention in the software engineering community. They have been used to support several code-related tasks, such as automatic bug fixing and code comments generation. Recent studies in the Natural Language Processing (NLP) field have shown that the Text-To-Text Transfer Transformer (T5) architecture can achieve state-of-the-art performance fo… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: Accepted to the 43rd International Conference on Software Engineering (ICSE 2021)

  27. arXiv:2101.09194  [pdf, other

    cs.SE cs.AI

    It Takes Two to Tango: Combining Visual and Textual Information for Detecting Duplicate Video-Based Bug Reports

    Authors: Nathan Cooper, Carlos Bernal-Cárdenas, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk

    Abstract: When a bug manifests in a user-facing application, it is likely to be exposed through the graphical user interface (GUI). Given the importance of visual information to the process of identifying and understanding such bugs, users are increasingly making use of screenshots and screen-recordings as a means to report issues to developers. However, when such information is reported en masse, such as d… ▽ More

    Submitted 5 February, 2021; v1 submitted 22 January, 2021; originally announced January 2021.

    Comments: 13 pages and 1 figure. Published at ICSE'21

  28. arXiv:2101.00302  [pdf, ps, other

    math.CO cs.DM

    Recurrence Ranks and Moment Sequences

    Authors: Joshua Cooper, Grant Fickes

    Abstract: We introduce the "moment rank" and "unitary rank" of numerical sequences, close relatives of linear-recursive order. We show that both parameters can be characterized by a broad set of criteria involving moments of measures, types of recurrence relations, Hankel matrix factorizations, Waring rank, analytic properties of generating functions, and algebraic properties of polynomial ideals. In the pr… ▽ More

    Submitted 1 January, 2021; originally announced January 2021.

    Comments: 21 pages, 0 figures

    MSC Class: 05A15 (Primary) 15B05; 44A60; 11B37 (Secondary) ACM Class: G.2.1

  29. arXiv:2009.06520  [pdf, other

    cs.SE cs.AI cs.LG cs.NE

    A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research

    Authors: Cody Watson, Nathan Cooper, David Nader Palacio, Kevin Moran, Denys Poshyvanyk

    Abstract: An increasingly popular set of techniques adopted by software engineering (SE) researchers to automate development tasks are those rooted in the concept of Deep Learning (DL). The popularity of such techniques largely stems from their automated feature engineering capabilities, which aid in modeling software artifacts. However, due to the rapid pace at which DL techniques have been adopted, it is… ▽ More

    Submitted 23 September, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

    Comments: 59 pages, Accepted to TOSEM 2021

  30. Translating Video Recordings of Mobile App Usages into Replayable Scenarios

    Authors: Carlos Bernal-Cárdenas, Nathan Cooper, Kevin Moran, Oscar Chaparro, Andrian Marcus, Denys Poshyvanyk

    Abstract: Screen recordings of mobile applications are easy to obtain and capture a wealth of information pertinent to software developers (e.g., bugs or feature requests), making them a popular mechanism for crowdsourced app feedback. Thus, these videos are becoming a common artifact that developers must manage. In light of unique mobile development constraints, including swift release cycles and rapidly e… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

    Comments: In proceedings of the 42nd International Conference on Software Engineering (ICSE'20), 13 pages

  31. arXiv:1906.05778  [pdf, ps, other

    math.CO cs.DM

    Characteristic Power Series of Graph Limits

    Authors: Joshua N. Cooper

    Abstract: In this note, we show how to obtain a "characteristic power series" of graphons -- infinite limits of dense graphs -- as the limit of normalized reciprocal characteristic polynomials. This leads to a new characterization of graph quasi-randomness and another perspective on spectral theory for graphons, a complete description of the function in terms of the spectrum of the graphon as a self-adjoint… ▽ More

    Submitted 18 September, 2022; v1 submitted 13 June, 2019; originally announced June 2019.

    Comments: 14 pages, 0 figures

    MSC Class: 05C50 (Primary) 05C31; 47B10 (Secondary)

  32. arXiv:1905.06406  [pdf, ps, other

    math.PR cs.IT math.ST

    A Development of Continuous-Time Transfer Entropy

    Authors: Joshua N. Cooper, Christopher D. Edgar

    Abstract: Transfer entropy (TE) was introduced by Schreiber in 2000 as a measurement of the predictive capacity of one stochastic process with respect to another. Originally stated for discrete time processes, we expand the theory in line with recent work of Spinney, Prokopenko, and Lizier to define TE for stochastic processes indexed over a compact interval taking values in a Polish state space. We provide… ▽ More

    Submitted 30 June, 2019; v1 submitted 15 May, 2019; originally announced May 2019.

    Comments: 37 pages, 0 figures

    MSC Class: 62B10 (Primary) 94A17 (Secondary) ACM Class: G.3; H.1.1

  33. arXiv:1505.02222  [pdf, other

    math.CO cs.DM cs.LO math.NT

    Coloring so that no Pythagorean Triple is Monochromatic

    Authors: Joshua Cooper, Ralph Overstreet

    Abstract: We address the question of the "partition regularity" of the Pythagorean equation a^2+b^2=c^2; in particular, can the natural numbers be assigned a 2-coloring, so that no Pythagorean triple (i.e., a solution to the equation) is monochromatic? We prove that the hypergraph of Pythagorean triples can contain no Steiner triple systems, a natural obstruction to 2-colorability. Then, after transforming… ▽ More

    Submitted 8 May, 2015; originally announced May 2015.

    Comments: 14 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:0809.3478

    MSC Class: 05C15 (Primary) 05B07; 05D10; 11B75; 05-04 (Secondary) ACM Class: G.2.1; F.4.1

  34. arXiv:1109.0522  [pdf, ps, other

    math.CO cs.DM

    Graham's Tree Reconstruction Conjecture and a Waring-Type Problem on Partitions

    Authors: Joshua Cooper, Bill Kay, Anton Swifton

    Abstract: Suppose $G$ is a tree. Graham's "Tree Reconstruction Conjecture" states that $G$ is uniquely determined by the integer sequence $|G|$, $|L(G)|$, $|L(L(G))|$, $|L(L(L(G)))|$, $\ldots$, where $L(H)$ denotes the line graph of the graph $H$. Little is known about this question apart from a few simple observations. We show that the number of trees on $n$ vertices which can be distinguished by their ass… ▽ More

    Submitted 23 August, 2017; v1 submitted 2 September, 2011; originally announced September 2011.

    Comments: 18 pages, 1 figure

    MSC Class: 05C76 (Primary) 05C05; 05C60; 11P05; 11P81 (Secondary) ACM Class: G.2.2

  35. arXiv:math/0310385  [pdf, ps, other

    math.CO cs.IT

    De Bruijn Cycles for Covering Codes

    Authors: Fan Chung, Joshua N. Cooper

    Abstract: A de Bruijn covering code is a q-ary string S so that every q-ary string is at most R symbol changes from some n-word appearing consecutively in S. We introduce these codes and prove that they can have length close to the smallest possible covering code. The proof employs tools from field theory, probability, and linear algebra. We also prove a number of ``spectral'' results on de Bruijn coverin… ▽ More

    Submitted 28 October, 2003; v1 submitted 23 October, 2003; originally announced October 2003.

    Comments: 18 pages, 0 figures, submitted to RSA

    MSC Class: 05B99

  36. arXiv:math/0309081  [pdf, ps, other

    math.CO cs.IT

    Asymmetric binary covering codes

    Authors: Joshua N. Cooper, Robert B. Ellis, Andrew B. Kahng

    Abstract: An asymmetric binary covering code of length n and radius R is a subset C of the n-cube Q_n such that every vector x in Q_n can be obtained from some vector c in C by changing at most R 1's of c to 0's, where R is as small as possible. K^+(n,R) is defined as the smallest size of such a code. We show K^+(n,R) is of order 2^n/n^R for constant R, using an asymmetric sphere-covering bound and probab… ▽ More

    Submitted 4 September, 2003; originally announced September 2003.

    Comments: 16 pages

    MSC Class: 94B75

    Journal ref: J. Combin. Theory Ser. A 100 (2002), no. 2, 232--249