Zum Hauptinhalt springen

Showing 1–5 of 5 results for author: Fowler, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.06050  [pdf, other

    cs.HC cs.CY cs.SE

    Explaining Code with a Purpose: An Integrated Approach for Developing Code Comprehension and Prompting Skills

    Authors: Paul Denny, David H. Smith IV, Max Fowler, James Prather, Brett A. Becker, Juho Leinonen

    Abstract: Reading, understanding and explaining code have traditionally been important skills for novices learning programming. As large language models (LLMs) become prevalent, these foundational skills are more important than ever given the increasing need to understand and evaluate model-generated code. Brand new skills are also needed, such as the ability to formulate clear prompts that can elicit inten… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

    Comments: Accepted to ITiCSE 2024

  2. arXiv:2306.17473  [pdf

    astro-ph.EP cs.CY physics.soc-ph

    An Orbital Solution for WASP-12 b: Updated Ephemeris and Evidence for Decay Leveraging Citizen Science Data

    Authors: Avinash S. Nediyedath, Martin J. Fowler, A. Norris, Shivaraj R. Maidur, Kyle A. Pearson, S. Dixon, P. Lewin, Andre O. Kovacs, A. Odasso, K. Davis, M. Primm, P. Das, Bryan E. Martin, D. Lalla

    Abstract: NASA Citizen Scientists have used Exoplanet Transit Interpretation Code (EXOTIC) to reduce 40 sets of time-series images of WASP-12 taken by privately owned telescopes and a 6-inch telescope operated by the Center for Astrophysics | Harvard & Smithsonian MicroObservatory (MOBs). Of these sets, 24 result in clean transit light curves of WASP-12 b which are included in the NASA Exoplanet Watch websi… ▽ More

    Submitted 10 November, 2023; v1 submitted 30 June, 2023; originally announced June 2023.

    Comments: https://app.aavso.org/jaavso/article/3901/

    Journal ref: JAAVSO Volume 51 number 2 (2023)

  3. arXiv:1909.11800  [pdf, other

    cs.NI cs.LG eess.SP

    Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments

    Authors: Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu, William C. Headley, Michael Fowler, Gilbert Green

    Abstract: Dynamic spectrum access (DSA) benefits from detection and classification of interference sources including in-network users, out-network users, and jammers that may all coexist in a wireless network. We present a deep learning based signal (modulation) classification solution in a realistic wireless network setting, where 1) signal types may change over time; 2) some signal types may be unknown fo… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

    Comments: Accepted to IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN) 2019

  4. arXiv:1903.03086  [pdf, other

    cs.MA

    Intelligent Knowledge Distribution: Constrained-Action POMDPs for Resource-Aware Multi-Agent Communication

    Authors: Michael C. Fowler, T. Charles Clancy, Ryan K. Williams

    Abstract: This paper addresses a fundamental question of multi-agent knowledge distribution: what information should be sent to whom and when, with the limited resources available to each agent? Communication requirements for multi-agent systems can be rather high when an accurate picture of the environment and the state of other agents must be maintained. To reduce the impact of multi-agent coordination on… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

  5. arXiv:1311.0257  [pdf, other

    cs.CR

    Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity

    Authors: Michael D. Adams, Seth D. Hitefield, Bruce Hoy, Michael C. Fowler, T. Charles Clancy

    Abstract: A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous 'cyber cycle' of attackers scanning networks, developing exploits and attacking systems, with defenders detecting attacks, analyzing exploits and patching systems. This reactive nature leaves sensitive systems highly vulnerable to attack due to un-patched system… ▽ More

    Submitted 1 November, 2013; originally announced November 2013.

    Comments: 12 pages, 7 figures