Zum Hauptinhalt springen

Showing 1–10 of 10 results for author: Ghassemi, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.00562  [pdf, other

    cs.CL

    SPAGHETTI: Open-Domain Question Answering from Heterogeneous Data Sources with Retrieval and Semantic Parsing

    Authors: Heidi C. Zhang, Sina J. Semnani, Farhad Ghassemi, Jialiang Xu, Shicheng Liu, Monica S. Lam

    Abstract: We introduce SPAGHETTI: Semantic Parsing Augmented Generation for Hybrid English information from Text Tables and Infoboxes, a hybrid question-answering (QA) pipeline that utilizes information from heterogeneous knowledge sources, including knowledge base, text, tables, and infoboxes. Our LLM-augmented approach achieves state-of-the-art performance on the Compmix dataset, the most comprehensive he… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

    Comments: ACL Findings 2024

  2. arXiv:2312.07517  [pdf, other

    cs.IR cs.DB

    Search Optimization with Query Likelihood Boosting and Two-Level Approximate Search for Edge Devices

    Authors: Jianwei Zhang, Helian Feng, Xin He, Grant P. Strimel, Farhad Ghassemi, Ali Kebarighotbi

    Abstract: We present a novel search optimization solution for approximate nearest neighbor (ANN) search on resource-constrained edge devices. Traditional ANN approaches fall short in meeting the specific demands of real-world scenarios, e.g., skewed query likelihood distribution and search on large-scale indices with a low latency and small footprint. To address these limitations, we introduce two key compo… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: 4 pages, 3 figures, accepted at ECI workshop @ CIKM 2023

  3. arXiv:2202.07955  [pdf, other

    stat.ML cs.LG

    Robust Nonparametric Distribution Forecast with Backtest-based Bootstrap and Adaptive Residual Selection

    Authors: Longshaokan Wang, Lingda Wang, Mina Georgieva, Paulo Machado, Abinaya Ulagappa, Safwan Ahmed, Yan Lu, Arjun Bakshi, Farhad Ghassemi

    Abstract: Distribution forecast can quantify forecast uncertainty and provide various forecast scenarios with their corresponding estimated probabilities. Accurate distribution forecast is crucial for planning - for example when making production capacity or inventory allocation decisions. We propose a practical and robust distribution forecast framework that relies on backtest-based bootstrap and adaptive… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: ICASSP 2022 - "Copyright 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising/promotional purposes, creating new collective works, for resale/redistribution to servers/lists, or reuse of any copyrighted component of this work in other works."

  4. Specification and Verification of Timing Properties in Interoperable Medical Systems

    Authors: Mahsa Zarneshan, Fatemeh Ghassemi, Ehsan Khamespanah, Marjan Sirjani, John Hatcliff

    Abstract: To support the dynamic composition of various devices/apps into a medical system at point-of-care, a set of communication patterns to describe the communication needs of devices has been proposed. To address timing requirements, each pattern breaks common timing properties into finer ones that can be enforced locally by the components. Common timing requirements for the underlying communication su… ▽ More

    Submitted 31 May, 2022; v1 submitted 7 December, 2020; originally announced December 2020.

    Journal ref: Logical Methods in Computer Science, Volume 18, Issue 2 (June 1, 2022) lmcs:6964

  5. arXiv:1811.10448  [pdf, other

    cs.SE cs.CR

    ConsiDroid: A Concolic-based Tool for Detecting SQL Injection Vulnerability in Android Apps

    Authors: Ehsan Edalat, Babak Sadeghiyan, Fatemeh Ghassemi

    Abstract: In this paper, we present a concolic execution technique for detecting SQL injection vulnerabilities in Android apps, with a new tool we called ConsiDroid. We extend the source code of apps with mocking technique, such that the execution of original source code is not affected. The extended source code can be treated as Java applications and may be executed by SPF with concolic execution. We autom… ▽ More

    Submitted 8 August, 2019; v1 submitted 26 November, 2018; originally announced November 2018.

  6. arXiv:1709.03245  [pdf, other

    cs.FL cs.LO cs.PL

    Verification of Asynchronous Systems with an Unspecified Component

    Authors: Rosa Abbasi, Fatemeh Ghassemi, Ramtin Khosravi

    Abstract: Component-based systems evolve as a new component is added or an existing one is replaced by a newer version. Hence, it is appealing to assure the new system still preserves its safety properties. However, instead of inspecting the new system as a whole, which may result in a large state space, it is beneficial to reuse the verification results by inspecting the newly added component in isolation.… ▽ More

    Submitted 11 September, 2017; originally announced September 2017.

  7. arXiv:1709.01786  [pdf, ps, other

    cs.NI

    An Efficient Loop-free Version of AODVv2

    Authors: Behnaz Yousefi, Fatemeh Ghassemi

    Abstract: Ad hoc On Demand distance Vector (AODV) routing protocol is one of the most prominent routing protocol used in Mobile Ad-hoc Networks (MANETs). Due to the mobility of nodes, there exists many revisions as scenarios leading to the loop formation were found. We demonstrate the loop freedom property violation of AODVv2-11, AODVv2-13, and AODVv2-16 through counterexamples. We present our proposed vers… ▽ More

    Submitted 14 October, 2017; v1 submitted 6 September, 2017; originally announced September 2017.

  8. arXiv:1705.02600  [pdf, ps, other

    cs.LO

    Reliable Restricted Process Theory

    Authors: Fatemeh Ghassemi, Wan Fokkink

    Abstract: Malfunctions of a mobile ad hoc network (MANET) protocol caused by a conceptual mistake in the protocol design, rather than unreliable communication, can often be detected only by considering communication among the nodes in the network to be reliable. In Restricted Broadcast Process Theory, which was developed for the specification and verification of MANET protocols, the communication operator i… ▽ More

    Submitted 7 May, 2017; originally announced May 2017.

  9. Combinatorial Entropy Power Inequalities: A Preliminary Study of the Stam region

    Authors: Mokshay Madiman, Farhad Ghassemi

    Abstract: We initiate the study of the Stam region, defined as the subset of the positive orthant in $\mathbb{R}^{2^n-1}$ that arises from considering entropy powers of subset sums of $n$ independent random vectors in a Euclidean space of finite dimension. We show that the class of fractionally superadditive set functions provides an outer bound to the Stam region, resolving a conjecture of A. R. Barron and… ▽ More

    Submitted 29 June, 2018; v1 submitted 4 April, 2017; originally announced April 2017.

    Comments: 16 pages

    Journal ref: IEEE Transactions on Information Theory, vol. 65, no. 3, pp. 1375-1386, March 2019

  10. arXiv:1604.07179  [pdf, ps, other

    cs.NI cs.LO

    Modeling and Efficient Verification of Wireless Ad hoc Networks

    Authors: Behnaz Yousefi, Fatemeh Ghassemi, Ramtin Khosravi

    Abstract: Wireless ad hoc networks, in particular mobile ad hoc networks (MANETs), are growing very fast as they make communication easier and more available. However, their protocols tend to be difficult to design due to topology dependent behavior of wireless communication, and their distributed and adaptive operations to topology dynamism. Therefore, it is desirable to have them modeled and verified usin… ▽ More

    Submitted 17 April, 2017; v1 submitted 25 April, 2016; originally announced April 2016.