Zum Hauptinhalt springen

Showing 1–50 of 86 results for author: Hill, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.16099  [pdf, other

    cs.CY cs.HC

    Life Histories of Taboo Knowledge Artifacts

    Authors: Kaylea Champion, Benjamin Mako Hill

    Abstract: Communicating about some vital topics -- such as sexuality and health -- is treated as taboo and subjected to censorship. How can we construct knowledge about these topics? Wikipedia is home to numerous high-quality knowledge artifacts about taboo topics like sexual organs and human reproduction. How did these artifacts come into being? How is their existence sustained? This mixed-methods comparat… ▽ More

    Submitted 28 August, 2024; originally announced August 2024.

  2. arXiv:2405.18483  [pdf, other

    cs.CV

    Towards Open Domain Text-Driven Synthesis of Multi-Person Motions

    Authors: Mengyi Shan, Lu Dong, Yutao Han, Yuan Yao, Tao Liu, Ifeoma Nwogu, Guo-Jun Qi, Mitch Hill

    Abstract: This work aims to generate natural and diverse group motions of multiple humans from textual descriptions. While single-person text-to-motion generation is extensively studied, it remains challenging to synthesize motions for more than one or two subjects from in-the-wild prompts, mainly due to the lack of available datasets. In this work, we curate human pose and motion datasets by estimating pos… ▽ More

    Submitted 15 July, 2024; v1 submitted 28 May, 2024; originally announced May 2024.

    Comments: ECCV 2024. Project page: https://shanmy.github.io/Multi-Motion/

  3. arXiv:2402.17880  [pdf, other

    cs.HC

    Challenges in Restructuring Community-based Moderation

    Authors: Chau Tran, Kejsi Take, Kaylea Champion, Benjamin Mako Hill, Rachel Greenstadt

    Abstract: Content moderation practices and technologies need to change over time as requirements and community expectations shift. However, attempts to restructure existing moderation practices can be difficult, especially for platforms that rely on their communities to conduct moderation activities, because changes can transform the workflow and workload of moderators and contributors' reward systems. Thro… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

  4. arXiv:2401.11281  [pdf, other

    cs.SE cs.CY cs.HC

    Sources of Underproduction in Open Source Software

    Authors: Kaylea Champion, Benjamin Mako Hill

    Abstract: Because open source software relies on individuals who select their own tasks, it is often underproduced -- a term used by software engineering researchers to describe when a piece of software's relative quality is lower than its relative importance. We examine the social and technical factors associated with underproduction through a comparison of software packaged by the Debian GNU/Linux communi… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  5. arXiv:2311.18303  [pdf, other

    cs.CV

    OmniMotionGPT: Animal Motion Generation with Limited Data

    Authors: Zhangsihao Yang, Mingyuan Zhou, Mengyi Shan, Bingbing Wen, Ziwei Xuan, Mitch Hill, Junjie Bai, Guo-Jun Qi, Yalin Wang

    Abstract: Our paper aims to generate diverse and realistic animal motion sequences from textual descriptions, without a large-scale animal text-motion dataset. While the task of text-driven human motion synthesis is already extensively studied and benchmarked, it remains challenging to transfer this success to other skeleton structures with limited data. In this work, we design a model architecture that imi… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: The project page is at https://zshyang.github.io/omgpt-website/

  6. arXiv:2311.03616  [pdf, other

    cs.CY cs.HC

    Governance Capture in a Self-Governing Community: A Qualitative Comparison of the Serbo-Croatian Wikipedias

    Authors: Zarine Kharazian, Kate Starbird, Benjamin Mako Hill

    Abstract: What types of governance arrangements makes some self-governed online groups more vulnerable to disinformation campaigns? To answer this question, we present a qualitative comparative analysis of the Croatian and Serbian Wikipedia editions. We do so because between at least 2011 and 2020, the Croatian language version of Wikipedia was taken over by a small group of administrators who introduced fa… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: 26 pages, 2 figures. Accepted for publication in Proceedings of the ACM on Human-Computer Interaction (CSCW 2024)

    Journal ref: CSCW 2024, Volume 8, Article 61, 1-26

  7. arXiv:2310.19201  [pdf, ps, other

    cs.CY

    Open Problems in DAOs

    Authors: Joshua Tan, Tara Merk, Sarah Hubbard, Eliza R. Oak, Helena Rong, Joni Pirovich, Ellie Rennie, Rolf Hoefer, Michael Zargham, Jason Potts, Chris Berg, Reuben Youngblom, Primavera De Filippi, Seth Frey, Jeff Strnad, Morshed Mannan, Kelsie Nabben, Silke Noa Elrifai, Jake Hartnell, Benjamin Mako Hill, Tobin South, Ryan L. Thomas, Jonathan Dotan, Ariana Spring, Alexia Maddox , et al. (4 additional authors not shown)

    Abstract: Decentralized autonomous organizations (DAOs) are a new, rapidly-growing class of organizations governed by smart contracts. Here we describe how researchers can contribute to the emerging science of DAOs and other digitally-constituted organizations. From granular privacy primitives to mechanism designs to model laws, we identify high-impact problems in the DAO ecosystem where existing gaps might… ▽ More

    Submitted 12 June, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: includes major coordination problems

  8. arXiv:2308.06403  [pdf, other

    cs.CY cs.HC

    Taboo and Collaborative Knowledge Production: Evidence from Wikipedia

    Authors: Kaylea Champion, Benjamin Mako Hill

    Abstract: By definition, people are reticent or even unwilling to talk about taboo subjects. Because subjects like sexuality, health, and violence are taboo in most cultures, important information on each of these subjects can be difficult to obtain. Are peer produced knowledge bases like Wikipedia a promising approach for providing people with information on taboo subjects? With its reliance on volunteers… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

  9. arXiv:2305.19160  [pdf, other

    cs.CV

    Recognizing People by Body Shape Using Deep Networks of Images and Words

    Authors: Blake A. Myers, Lucas Jaggernauth, Thomas M. Metz, Matthew Q. Hill, Veda Nandan Gandi, Carlos D. Castillo, Alice J. O'Toole

    Abstract: Common and important applications of person identification occur at distances and viewpoints in which the face is not visible or is not sufficiently resolved to be useful. We examine body shape as a biometric across distance and viewpoint variation. We propose an approach that combines standard object classification networks with representations based on linguistic (word-based) descriptions of bod… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 9 pages, 5 figures, 4 tables

  10. arXiv:2303.13672  [pdf, other

    cs.CE

    Neural Level Set Topology Optimization Using Unfitted Finite Elements

    Authors: Connor N. Mallon, Aaron W. Thornton, Matthew R. Hill, Santiago Badia

    Abstract: To facilitate widespread adoption of automated engineering design techniques, existing methods must become more efficient and generalizable. In the field of topology optimization, this requires the coupling of modern optimization methods with solvers capable of handling arbitrary problems. In this work, a topology optimization method for general multiphysics problems is presented. We leverage a co… ▽ More

    Submitted 22 February, 2024; v1 submitted 23 March, 2023; originally announced March 2023.

    Comments: 16 pages + refs, 10 figs

  11. arXiv:2212.13933  [pdf, ps, other

    cs.PL

    Coding Guidelines and Undecidability

    Authors: Roberto Bagnara, Abramo Bagnara, Patricia M. Hill

    Abstract: The C and C++ programming languages are widely used for the implementation of software in critical systems. They are complex languages with subtle features and peculiarities that might baffle even the more expert programmers. Hence, the general prescription of language subsetting, which occurs in most functional safety standards and amounts to only using a "safer" subset of the language, is partic… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

    Comments: 12 pages, 5 figures, 1 table

    MSC Class: 68N15 ACM Class: F.3.1; D.3.0

  12. Many Destinations, Many Pathways: A Quantitative Analysis of Legitimate Peripheral Participation in Scratch

    Authors: Ruijia Cheng, Benjamin Mako Hill

    Abstract: Although informal online learning communities have proliferated over the last two decades, a fundamental question remains: What are the users of these communities expected to learn? Guided by the work of Etienne Wenger on communities of practice, we identify three distinct types of learning goals common to online informal learning communities: the development of domain skills, the development of i… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

    Journal ref: Proc. ACM Hum.-Comput. Interact. 6, CSCW2, Article 381 (November 2022), 26 pages

  13. arXiv:2210.16486  [pdf, other

    cs.CV cs.LG stat.ML

    Learning Probabilistic Models from Generator Latent Spaces with Hat EBM

    Authors: Mitch Hill, Erik Nijkamp, Jonathan Mitchell, Bo Pang, Song-Chun Zhu

    Abstract: This work proposes a method for using any generator network as the foundation of an Energy-Based Model (EBM). Our formulation posits that observed images are the sum of unobserved latent variables passed through the generator network and a residual random variable that spans the gap between the generator output and the image manifold. One can then define an EBM that includes the generator as part… ▽ More

    Submitted 12 January, 2023; v1 submitted 28 October, 2022; originally announced October 2022.

    Comments: NeurIPS 2022 camera ready

  14. arXiv:2205.12243  [pdf, other

    stat.ML cs.LG

    EBM Life Cycle: MCMC Strategies for Synthesis, Defense, and Density Modeling

    Authors: Mitch Hill, Jonathan Mitchell, Chu Chen, Yuan Du, Mubarak Shah, Song-Chun Zhu

    Abstract: This work presents strategies to learn an Energy-Based Model (EBM) according to the desired length of its MCMC sampling trajectories. MCMC trajectories of different lengths correspond to models with different purposes. Our experiments cover three different trajectory magnitudes and learning outcomes: 1) shortrun sampling for image generation; 2) midrun sampling for classifier-agnostic adversarial… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

  15. Federated Learning Enables Big Data for Rare Cancer Boundary Detection

    Authors: Sarthak Pati, Ujjwal Baid, Brandon Edwards, Micah Sheller, Shih-Han Wang, G Anthony Reina, Patrick Foley, Alexey Gruzdev, Deepthi Karkada, Christos Davatzikos, Chiharu Sako, Satyam Ghodasara, Michel Bilello, Suyash Mohan, Philipp Vollmuth, Gianluca Brugnara, Chandrakanth J Preetha, Felix Sahm, Klaus Maier-Hein, Maximilian Zenk, Martin Bendszus, Wolfgang Wick, Evan Calabrese, Jeffrey Rudie, Javier Villanueva-Meyer , et al. (254 additional authors not shown)

    Abstract: Although machine learning (ML) has shown promise in numerous domains, there are concerns about generalizability to out-of-sample data. This is currently addressed by centrally sharing ample, and importantly diverse, data from multiple sites. However, such centralization is challenging to scale (or even not feasible) due to various limitations. Federated ML (FL) provides an alternative to train acc… ▽ More

    Submitted 25 April, 2022; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: federated learning, deep learning, convolutional neural network, segmentation, brain tumor, glioma, glioblastoma, FeTS, BraTS

  16. How Interest-Driven Content Creation Shapes Opportunities for Informal Learning in Scratch: A Case Study on Novices' Use of Data Structures

    Authors: Ruijia Cheng, Sayamindu Dasgupta, Benjamin Mako Hill

    Abstract: Through a mixed-method analysis of data from Scratch, we examine how novices learn to program with simple data structures by using community-produced learning resources. First, we present a qualitative study that describes how community-produced learning resources create archetypes that shape exploration and may disadvantage some with less common interests. In a second quantitative study, we find… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

    Comments: Ruijia Cheng, Sayamindu Dasgupta, and Benjamin Mako Hill. 2022. How Interest-Driven Content Creation Shapes Opportunities for Informal Learning in Scratch: A Case Study on Novices' Use of Data Structures. In CHI Conference on Human Factors in Computing Systems (CHI '22), April 29-May 5, 2022, New Orleans, LA, USA. ACM, New York, NY, USA, 16 pages

  17. arXiv:2203.00241  [pdf, other

    cs.OS cs.PF

    Pond: CXL-Based Memory Pooling Systems for Cloud Platforms

    Authors: Huaicheng Li, Daniel S. Berger, Stanko Novakovic, Lisa Hsu, Dan Ernst, Pantea Zardoshti, Monish Shah, Samir Rajadnya, Scott Lee, Ishwar Agarwal, Mark D. Hill, Marcus Fontoura, Ricardo Bianchini

    Abstract: Public cloud providers seek to meet stringent performance requirements and low hardware cost. A key driver of performance and cost is main memory. Memory pooling promises to improve DRAM utilization and thereby reduce costs. However, pooling is challenging under cloud performance requirements. This paper proposes Pond, the first memory pooling system that both meets cloud performance goals and sig… ▽ More

    Submitted 21 October, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

    Comments: Update affiliations

  18. The Risks, Benefits, and Consequences of Prepublication Moderation: Evidence from 17 Wikipedia Language Editions

    Authors: Chau Tran, Kaylea Champion, Benjamin Mako Hill, Rachel Greenstadt

    Abstract: Many online communities rely on postpublication moderation where contributors, even those that are perceived as being risky, are allowed to publish material immediately and where moderation takes place after the fact. An alternative arrangement involves moderating content before publication. A range of communities have argued against prepublication moderation by suggesting that it makes contributi… ▽ More

    Submitted 26 August, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

    Comments: This paper was submitted to CSCW2 (November 2022)

  19. arXiv:2201.04271  [pdf, ps, other

    cs.SI cs.CY cs.HC

    No Community Can Do Everything: Why People Participate in Similar Online Communities

    Authors: Nathan TeBlunthuis, Charles Kiene, Isabella Brown, Laura Alia Levi, Nicole McGinnis, Benjamin Mako Hill

    Abstract: Large-scale quantitative analyses have shown that individuals frequently talk to each other about similar things in different online spaces. Why do these overlapping communities exist? We provide an answer grounded in the analysis of 20 interviews with active participants in clusters of highly related subreddits. Within a broad topical area, there are a diversity of benefits an online community ca… ▽ More

    Submitted 10 February, 2022; v1 submitted 11 January, 2022; originally announced January 2022.

    Comments: Accepted to CSCW 2022

    ACM Class: K.4.0

  20. arXiv:2112.12823  [pdf, other

    cs.PL cs.SE

    A Rationale-Based Classification of MISRA C Guidelines

    Authors: Roberto Bagnara, Abramo Bagnara, Patricia M. Hill

    Abstract: MISRA C is the most authoritative language subset for the C programming language that is a de facto standard in several industry sectors where safety and security are of paramount importance. While MISRA C is currently encoded in 175 guidelines (coding rules and directives), it does not coincide with them: proper adoption of MISRA C requires embracing its preventive approach (as opposed to the "bu… ▽ More

    Submitted 23 December, 2021; originally announced December 2021.

    Comments: 12 pages, 2 figures

    MSC Class: 68N15 ACM Class: F.3.1; D.3.0

  21. The Hidden Costs of Requiring Accounts: Quasi-Experimental Evidence From Peer Production

    Authors: Benjamin Mako Hill, Aaron Shaw

    Abstract: Online communities, like Wikipedia, produce valuable public information goods. Whereas some of these communities require would-be contributors to create accounts, many do not. Does this requirement catalyze cooperation or inhibit participation? Prior research provides divergent predictions but little causal evidence. We conduct an empirical test using longitudinal data from 136 natural experiments… ▽ More

    Submitted 20 November, 2021; originally announced November 2021.

    Journal ref: Communication Research 48(6): 771-95, 2021

  22. arXiv:2107.13687  [pdf, other

    cs.SE

    Qualities of Quality: A Tertiary Review of Software Quality Measurement Research

    Authors: Kaylea Champion, Sejal Khatri, Benjamin Mako Hill

    Abstract: This paper presents a tertiary review of software quality measurement research. To conduct this review, we examined an initial dataset of 7,811 articles and found 75 relevant and high-quality secondary analyses of software quality research. Synthesizing this body of work, we offer an overview of perspectives, measurement approaches, and trends. We identify five distinct perspectives that conceptua… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

  23. arXiv:2107.06970  [pdf, other

    cs.HC cs.SI

    Identifying Competition and Mutualism Between Online Groups

    Authors: Nathan TeBlunthuis, Benjamin Mako Hill

    Abstract: Platforms often host multiple online groups with overlapping topics and members. How can researchers and designers understand how related groups affect each other? Inspired by population ecology, prior research in social computing and human-computer interaction has studied related groups by correlating group size with degrees of overlap in content and membership, but has produced puzzling results:… ▽ More

    Submitted 18 January, 2022; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: 10 pages, 6 figures

  24. arXiv:2104.06953  [pdf

    cs.CY

    A National Discovery Cloud: Preparing the US for Global Competitiveness in the New Era of 21st Century Digital Transformation

    Authors: Ian Foster, Daniel Lopresti, Bill Gropp, Mark D. Hill, Katie Schuman

    Abstract: The nature of computation and its role in our lives have been transformed in the past two decades by three remarkable developments: the emergence of public cloud utilities as a new computing platform; the ability to extract information from enormous quantities of data via machine learning; and the emergence of computational simulation as a research method on par with experimental science. Each dev… ▽ More

    Submitted 19 April, 2021; v1 submitted 14 April, 2021; originally announced April 2021.

    Comments: A Computing Community Consortium (CCC) white paper, 6 pages

    Report number: ccc2021whitepaper_4

  25. arXiv:2103.00352  [pdf, other

    cs.SE cs.CY

    Underproduction: An Approach for Measuring Risk in Open Source Software

    Authors: Kaylea Champion, Benjamin Mako Hill

    Abstract: The widespread adoption of Free/Libre and Open Source Software (FLOSS) means that the ongoing maintenance of many widely used software components relies on the collaborative effort of volunteers who set their own priorities and choose their own tasks. We argue that this has created a new form of risk that we call 'underproduction' which occurs when the supply of software engineering labor becomes… ▽ More

    Submitted 27 February, 2021; originally announced March 2021.

    Comments: Preprint of archival paper accepted for SANER 2021

  26. arXiv:2101.05339  [pdf, other

    cond-mat.mtrl-sci cs.AI cs.LG

    Accelerating amorphous polymer electrolyte screening by learning to reduce errors in molecular dynamics simulated properties

    Authors: Tian Xie, Arthur France-Lanord, Yanming Wang, Jeffrey Lopez, Michael Austin Stolberg, Megan Hill, Graham Michael Leverick, Rafael Gomez-Bombarelli, Jeremiah A. Johnson, Yang Shao-Horn, Jeffrey C. Grossman

    Abstract: Polymer electrolytes are promising candidates for the next generation lithium-ion battery technology. Large scale screening of polymer electrolytes is hindered by the significant cost of molecular dynamics (MD) simulation in amorphous systems: the amorphous structure of polymers requires multiple, repeated sampling to reduce noise and the slow relaxation requires long simulation time for convergen… ▽ More

    Submitted 15 March, 2022; v1 submitted 13 January, 2021; originally announced January 2021.

    Comments: 29 pages, 6 figures + supplementary information

    Journal ref: Nature communications 13.1 (2022): 1-10

  27. arXiv:2101.01284  [pdf

    cs.CY cs.AR

    Advancing Computing's Foundation of US Industry & Society

    Authors: Thomas M. Conte, Ian T. Foster, William Gropp, Mark D. Hill

    Abstract: While past information technology (IT) advances have transformed society, future advances hold even greater promise. For example, we have only just begun to reap the changes from artificial intelligence (AI), especially machine learning (ML). Underlying IT's impact are the dramatic improvements in computer hardware, which deliver performance that unlock new capabilities. For example, recent succes… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: A Computing Community Consortium (CCC) white paper, 4 pages

    Report number: ccc2020whitepaper_17

  28. Designing for Critical Algorithmic Literacies

    Authors: Sayamindu Dasgupta, Benjamin Mako Hill

    Abstract: As pervasive data collection and powerful algorithms increasingly shape children's experience of the world and each other, their ability to interrogate computational algorithms has become crucially important. A growing body of work has attempted to articulate a set of "literacies" to describe the intellectual tools that children can use to understand, interrogate, and critique the algorithmic syst… ▽ More

    Submitted 4 August, 2020; originally announced August 2020.

    ACM Class: H.1.2; K.3.1; K.3.2

  29. arXiv:2008.00023  [pdf

    cs.CY cs.AR

    Opportunities and Challenges for Next Generation Computing

    Authors: Gregory D. Hager, Mark D. Hill, Katherine Yelick

    Abstract: Computing has dramatically changed nearly every aspect of our lives, from business and agriculture to communication and entertainment. As a nation, we rely on computing in the design of systems for energy, transportation and defense; and computing fuels scientific discoveries that will improve our fundamental understanding of the world and help develop solutions to major challenges in health and t… ▽ More

    Submitted 31 July, 2020; originally announced August 2020.

    Comments: A Computing Community Consortium (CCC) white paper, 7 pages

  30. arXiv:2006.03121  [pdf, other

    cs.CY cs.HC cs.LG cs.SI

    Effects of algorithmic flagging on fairness: quasi-experimental evidence from Wikipedia

    Authors: Nathan TeBlunthuis, Benjamin Mako Hill, Aaron Halfaker

    Abstract: Online community moderators often rely on social signals such as whether or not a user has an account or a profile page as clues that users may cause problems. Reliance on these clues can lead to overprofiling bias when moderators focus on these signals but overlook the misbehavior of others. We propose that algorithmic flagging systems deployed to improve the efficiency of moderation work can als… ▽ More

    Submitted 5 April, 2021; v1 submitted 4 June, 2020; originally announced June 2020.

    Comments: 27 pages, 11 figures, ACM CSCW

    ACM Class: K.4.3

    Journal ref: Proc. ACM Hum.-Comput. Interact. 5, CSCW1, Article 56 (April 2021), 27 pages

  31. arXiv:2006.03119  [pdf, other

    cs.CY cs.SI

    How individual behaviors drive inequality in online community sizes: an agent-based simulation

    Authors: Jeremy Foote, Nathan TeBlunthuis, Benjamin Mako Hill, Aaron Shaw

    Abstract: Why are online community sizes so extremely unequal? Most answers to this question have pointed to general mathematical processes drawn from physics like cumulative advantage. These explanations provide little insight into specific social dynamics or decisions that individuals make when joining and leaving communities. In addition, explanations in terms of cumulative advantage do not draw from the… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

    ACM Class: K.4.3

  32. arXiv:2005.13525  [pdf, other

    stat.ML cs.CR cs.LG

    Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models

    Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu

    Abstract: The vulnerability of deep networks to adversarial attacks is a central problem for deep learning from the perspective of both cognition and security. The current most successful defense method is to train a classifier using adversarial images created during learning. Another defense approach involves transformation or purification of the original input to remove adversarial signals before the imag… ▽ More

    Submitted 18 March, 2021; v1 submitted 27 May, 2020; originally announced May 2020.

    Comments: ICLR 2021

  33. arXiv:2005.02434  [pdf

    cs.CY cs.ET

    Nanotechnology-inspired Information Processing Systems of the Future

    Authors: Randy Bryant, Mark Hill, Tom Kazior, Daniel Lee, Jie Liu, Klara Nahrstedt, Vijay Narayanan, Jan Rabaey, Hava Siegelmann, Naresh Shanbhag, Naveen Verma, H. -S. Philip Wong

    Abstract: Nanoscale semiconductor technology has been a key enabler of the computing revolution. It has done so via advances in new materials and manufacturing processes that resulted in the size of the basic building block of computing systems - the logic switch and memory devices - being reduced into the nanoscale regime. Nanotechnology has provided increased computing functionality per unit volume, energ… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: A Computing Community Consortium (CCC) workshop report, 18 pages

    Report number: ccc2016report_3

  34. arXiv:2003.06893  [pdf, other

    cs.PL cs.SE

    BARR-C:2018 and MISRA C:2012: Synergy Between the Two Most Widely Used C Coding Standards

    Authors: Roberto Bagnara, Michael Barr, Patricia M. Hill

    Abstract: The Barr Group's Embedded C Coding Standard (BARR-C:2018, which originates from the 2009 Netrino's Embedded C Coding Standard) is, for coding standards used by the embedded system industry, second only in popularity to MISRA C. However, the choice between MISRA C:2012 and BARR-C:2018 needs not be a hard decision since they are complementary in two quite different ways. On the one hand, BARR-C:2018… ▽ More

    Submitted 15 March, 2020; originally announced March 2020.

    Comments: 14 pages, 1 figure

    MSC Class: 68N15 ACM Class: F.3.1; D.3.0

  35. arXiv:2002.06274  [pdf, other

    cs.CV cs.LG

    Single Unit Status in Deep Convolutional Neural Network Codes for Face Identification: Sparseness Redefined

    Authors: Connor J. Parde, Y. Ivette Colón, Matthew Q. Hill, Carlos D. Castillo, Prithviraj Dhar, Alice J. O'Toole

    Abstract: Deep convolutional neural networks (DCNNs) trained for face identification develop representations that generalize over variable images, while retaining subject (e.g., gender) and image (e.g., viewpoint) information. Identity, gender, and viewpoint codes were studied at the "neural unit" and ensemble levels of a face-identification network. At the unit level, identification, gender classification,… ▽ More

    Submitted 1 March, 2020; v1 submitted 14 February, 2020; originally announced February 2020.

  36. arXiv:1911.01968  [pdf

    cs.CY cs.ET

    Thermodynamic Computing

    Authors: Tom Conte, Erik DeBenedictis, Natesh Ganesh, Todd Hylton, John Paul Strachan, R. Stanley Williams, Alexander Alemi, Lee Altenberg, Gavin Crooks, James Crutchfield, Lidia del Rio, Josh Deutsch, Michael DeWeese, Khari Douglas, Massimiliano Esposito, Michael Frank, Robert Fry, Peter Harsha, Mark Hill, Christopher Kello, Jeff Krichmar, Suhas Kumar, Shih-Chii Liu, Seth Lloyd, Matteo Marsili , et al. (14 additional authors not shown)

    Abstract: The hardware and software foundations laid in the first half of the 20th Century enabled the computing technologies that have transformed the world, but these foundations are now under siege. The current computing paradigm, which is the foundation of much of the current standards of living that we now enjoy, faces fundamental limitations that are evident from several perspectives. In terms of hard… ▽ More

    Submitted 14 November, 2019; v1 submitted 5 November, 2019; originally announced November 2019.

    Comments: A Computing Community Consortium (CCC) workshop report, 36 pages

    Report number: ccc2019report_6

  37. A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users

    Authors: Kaylea Champion, Nora McDonald, Stephanie Bankes, Joseph Zhang, Rachel Greenstadt, Andrea Forte, Benjamin Mako Hill

    Abstract: By choice or by necessity, some contributors to commons-based peer production sites use privacy-protecting services to remain anonymous. As anonymity seekers, users of the Tor network have been cast both as ill-intentioned vandals and as vulnerable populations concerned with their privacy. In this study, we use a dataset drawn from a corpus of Tor edits to Wikipedia to uncover the character of Tor… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Journal ref: Proc. ACM Hum.-Comput. Interact. 3, CSCW, Article 53 (November 2019)

  38. arXiv:1908.11850  [pdf, other

    cs.DC cs.PL

    MOD: Minimally Ordered Durable Datastructures for Persistent Memory

    Authors: Swapnil Haria, Mark D. Hill, Michael M. Swift

    Abstract: Persistent Memory (PM) makes possible recoverable applications that can preserve application progress across system reboots and power failures. Actual recoverability requires careful ordering of cacheline flushes, currently done in two extreme ways. On one hand, expert programmers have reasoned deeply about consistency and durability to create applications centered on a single custom-crafted durab… ▽ More

    Submitted 21 August, 2019; originally announced August 2019.

    Comments: 13 pages

  39. arXiv:1908.07630  [pdf, other

    cs.LG cs.AI cs.CV

    P2L: Predicting Transfer Learning for Images and Semantic Relations

    Authors: Bishwaranjan Bhattacharjee, John R. Kender, Matthew Hill, Parijat Dube, Siyu Huo, Michael R. Glass, Brian Belgodere, Sharath Pankanti, Noel Codella, Patrick Watson

    Abstract: Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn" ("P2L"), in the two very different domains of images and semantic relations, w… ▽ More

    Submitted 15 October, 2020; v1 submitted 20 August, 2019; originally announced August 2019.

    Comments: 10 pages, 8 figures, 4 tables

  40. arXiv:1907.02064  [pdf

    cs.DC cs.OS cs.PF cs.PL

    Accelerator-level Parallelism

    Authors: Mark D. Hill, Vijay Janapa Reddi

    Abstract: Future applications demand more performance, but technology advances have been faltering. A promising approach to further improve computer system performance under energy constraints is to employ hardware accelerators. Already today, mobile systems concurrently employ multiple accelerators in what we call accelerator-level parallelism (ALP). To spread the benefits of ALP more broadly, we charge co… ▽ More

    Submitted 24 November, 2021; v1 submitted 2 July, 2019; originally announced July 2019.

    Comments: 6 pages, 3 figures, & 7 references

  41. arXiv:1905.13011  [pdf, other

    cs.DB cs.DS

    Don't Persist All : Efficient Persistent Data Structures

    Authors: Pratyush Mahapatra, Mark D. Hill, Michael M. Swift

    Abstract: Data structures used in software development have inbuilt redundancy to improve software reliability and to speed up performance. Examples include a Doubly Linked List which allows a faster deletion due to the presence of the previous pointer. With the introduction of Persistent Memory, storing the redundant data fields into persistent memory adds a significant write overhead, and reduces performa… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: 10 pages, 12 figures

  42. arXiv:1904.09770  [pdf, other

    stat.ML cs.LG

    Learning Non-Convergent Non-Persistent Short-Run MCMC Toward Energy-Based Model

    Authors: Erik Nijkamp, Mitch Hill, Song-Chun Zhu, Ying Nian Wu

    Abstract: This paper studies a curious phenomenon in learning energy-based model (EBM) using MCMC. In each learning iteration, we generate synthesized examples by running a non-convergent, non-mixing, and non-persistent short-run MCMC toward the current model, always starting from the same initial distribution such as uniform noise distribution, and always running a fixed number of MCMC steps. After generat… ▽ More

    Submitted 25 November, 2019; v1 submitted 22 April, 2019; originally announced April 2019.

  43. Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor

    Authors: Chau Tran, Kaylea Champion, Andrea Forte, Benjamin Mako Hill, Rachel Greenstadt

    Abstract: User-generated content sites routinely block contributions from users of privacy-enhancing proxies like Tor because of a perception that proxies are a source of vandalism, spam, and abuse. Although these blocks might be effective, collateral damage in the form of unrealized valuable contributions from anonymity seekers is invisible. One of the largest and most important user-generated content site… ▽ More

    Submitted 15 February, 2020; v1 submitted 8 April, 2019; originally announced April 2019.

    Comments: To appear in the IEEE Symposium on Security & Privacy, May 2020

  44. arXiv:1903.12370  [pdf, other

    stat.ML cs.CV cs.LG

    On the Anatomy of MCMC-Based Maximum Likelihood Learning of Energy-Based Models

    Authors: Erik Nijkamp, Mitch Hill, Tian Han, Song-Chun Zhu, Ying Nian Wu

    Abstract: This study investigates the effects of Markov chain Monte Carlo (MCMC) sampling in unsupervised Maximum Likelihood (ML) learning. Our attention is restricted to the family of unnormalized probability densities for which the negative log density (or energy function) is a ConvNet. We find that many of the techniques used to stabilize training in previous studies are not necessary. ML learning with a… ▽ More

    Submitted 27 November, 2019; v1 submitted 29 March, 2019; originally announced March 2019.

    Comments: Code available at: https://github.com/point0bar1/ebm-anatomy

    Journal ref: AAAI 2020

  45. arXiv:1901.02926  [pdf

    cs.PF

    Three Other Models of Computer System Performance

    Authors: Mark D. Hill

    Abstract: This note argues for more use of simple models beyond Amdahl's Law: Bottleneck Analysis, Little's Law, and a M/M/1 Queue.

    Submitted 9 January, 2019; originally announced January 2019.

    Comments: 4 pages + references; 4 figures

  46. arXiv:1812.10907  [pdf, other

    stat.ML cs.CV cs.LG

    Divergence Triangle for Joint Training of Generator Model, Energy-based Model, and Inference Model

    Authors: Tian Han, Erik Nijkamp, Xiaolin Fang, Mitch Hill, Song-Chun Zhu, Ying Nian Wu

    Abstract: This paper proposes the divergence triangle as a framework for joint training of generator model, energy-based model and inference model. The divergence triangle is a compact and symmetric (anti-symmetric) objective function that seamlessly integrates variational learning, adversarial learning, wake-sleep algorithm, and contrastive divergence in a unified probabilistic formulation. This unificatio… ▽ More

    Submitted 31 January, 2019; v1 submitted 28 December, 2018; originally announced December 2018.

  47. Deep Convolutional Neural Networks in the Face of Caricature: Identity and Image Revealed

    Authors: Matthew Q. Hill, Connor J. Parde, Carlos D. Castillo, Y. Ivette Colon, Rajeev Ranjan, Jun-Cheng Chen, Volker Blanz, Alice J. O'Toole

    Abstract: Real-world face recognition requires an ability to perceive the unique features of an individual face across multiple, variable images. The primate visual system solves the problem of image invariance using cascades of neurons that convert images of faces into categorical representations of facial identity. Deep convolutional neural networks (DCNNs) also create generalizable face representations,… ▽ More

    Submitted 28 December, 2018; originally announced December 2018.

    Comments: 8 pages, 5 figures

  48. arXiv:1809.00821  [pdf, ps, other

    cs.PL

    The MISRA C Coding Standard and its Role in the Development and Analysis of Safety- and Security-Critical Embedded Software

    Authors: Roberto Bagnara, Abramo Bagnara, Patricia M. Hill

    Abstract: The MISRA project started in 1990 with the mission of providing world-leading best practice guidelines for the safe and secure application of both embedded control systems and standalone software. MISRA C is a coding standard defining a subset of the C language, initially targeted at the automotive sector, but now adopted across all industry sectors that develop C software in safety- and/or securi… ▽ More

    Submitted 4 September, 2018; originally announced September 2018.

    Comments: 19 pages, 1 figure, 2 tables

    MSC Class: 68N15 ACM Class: F.3.1; D.3.0

  49. arXiv:1807.11459  [pdf, other

    cs.CV cs.LG stat.ML

    Improving Transferability of Deep Neural Networks

    Authors: Parijat Dube, Bishwaranjan Bhattacharjee, Elisabeth Petit-Bois, Matthew Hill

    Abstract: Learning from small amounts of labeled data is a challenge in the area of deep learning. This is currently addressed by Transfer Learning where one learns the small data set as a transfer task from a larger source dataset. Transfer Learning can deliver higher accuracy if the hyperparameters and source dataset are chosen well. One of the important parameters is the learning rate for the layers of t… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

    Comments: 15 pages, 11 figures, 2 tables, Workshop on Domain Adaptation for Visual Understanding (Joint IJCAI/ECAI/AAMAS/ICML 2018 Workshop) Keywords: deep learning, transfer learning, finetuning, deep neural network, experimental

  50. arXiv:1803.04792  [pdf, other

    cs.LG cs.CV cs.SE

    Testing Deep Neural Networks

    Authors: Youcheng Sun, Xiaowei Huang, Daniel Kroening, James Sharp, Matthew Hill, Rob Ashmore

    Abstract: Deep neural networks (DNNs) have a wide range of applications, and software employing them must be thoroughly tested, especially in safety-critical domains. However, traditional software test coverage metrics cannot be applied directly to DNNs. In this paper, inspired by the MC/DC coverage criterion, we propose a family of four novel test criteria that are tailored to structural features of DNNs a… ▽ More

    Submitted 15 April, 2019; v1 submitted 10 March, 2018; originally announced March 2018.