Zum Hauptinhalt springen

Showing 1–25 of 25 results for author: Walsh, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18906  [pdf, other

    cs.CL

    Sonnet or Not, Bot? Poetry Evaluation for Large Models and Datasets

    Authors: Melanie Walsh, Anna Preus, Maria Antoniak

    Abstract: Large language models (LLMs) can now generate and recognize text in a wide range of styles and genres, including highly specialized, creative genres like poetry. But what do LLMs really know about poetry? What can they know about poetry? We develop a task to evaluate how well LLMs recognize a specific aspect of poetry, poetic form, for more than 20 forms and formal elements in the English language… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  2. arXiv:2406.12108  [pdf

    q-bio.OT cs.AI

    Computing in the Life Sciences: From Early Algorithms to Modern AI

    Authors: Samuel A. Donkor, Matthew E. Walsh, Alexander J. Titus

    Abstract: Computing in the life sciences has undergone a transformative evolution, from early computational models in the 1950s to the applications of artificial intelligence (AI) and machine learning (ML) seen today. This paper highlights key milestones and technological advancements through the historical development of computing in the life sciences. The discussion includes the inception of computational… ▽ More

    Submitted 18 June, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: 53 pages, 4 figures, 10 tables

  3. arXiv:2403.15336  [pdf, other

    eess.AS cs.MM

    Dialogue Understandability: Why are we streaming movies with subtitles?

    Authors: Helard Becerra Martinez, Alessandro Ragano, Diptasree Debnath, Asad Ullah, Crisron Rudolf Lucas, Martin Walsh, Andrew Hines

    Abstract: Watching movies and TV shows with subtitles enabled is not simply down to audibility or speech intelligibility. A variety of evolving factors related to technological advances, cinema production and social behaviour challenge our perception and understanding. This study seeks to formalise and give context to these influential factors under a wider and novel term referred to as Dialogue Understanda… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  4. arXiv:2401.12755  [pdf, other

    cs.CY

    Towards Risk Analysis of the Impact of AI on the Deliberate Biological Threat Landscape

    Authors: Matthew E. Walsh

    Abstract: The perception that the convergence of biological engineering and artificial intelligence (AI) could enable increased biorisk has recently drawn attention to the governance of biotechnology and artificial intelligence. The 2023 Executive Order, Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, requires an assessment of how artificial intelligence… ▽ More

    Submitted 11 June, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

    Comments: 15 pages, 1 figure, 3 tables

  5. arXiv:2401.07340  [pdf

    cs.CL

    The Afterlives of Shakespeare and Company in Online Social Readership

    Authors: Maria Antoniak, David Mimno, Rosamond Thalken, Melanie Walsh, Matthew Wilkens, Gregory Yauney

    Abstract: The growth of social reading platforms such as Goodreads and LibraryThing enables us to analyze reading activity at very large scale and in remarkable detail. But twenty-first century systems give us a perspective only on contemporary readers. Meanwhile, the digitization of the lending library records of Shakespeare and Company provides a window into the reading activity of an earlier, smaller com… ▽ More

    Submitted 14 January, 2024; originally announced January 2024.

  6. Riveter: Measuring Power and Social Dynamics Between Entities

    Authors: Maria Antoniak, Anjalie Field, Jimin Mun, Melanie Walsh, Lauren F. Klein, Maarten Sap

    Abstract: Riveter provides a complete easy-to-use pipeline for analyzing verb connotations associated with entities in text corpora. We prepopulate the package with connotation frames of sentiment, power, and agency, which have demonstrated usefulness for capturing social phenomena, such as gender bias, in a broad range of corpora. For decades, lexical frameworks have been foundational tools in computationa… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Journal ref: Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics, Volume 3: System Demonstrations, 2023, pages 377-388

  7. arXiv:2307.15816  [pdf

    cs.CV cs.LG

    Multi-growth stage plant recognition: a case study of Palmer amaranth (Amaranthus palmeri) in cotton (Gossypium hirsutum)

    Authors: Guy RY Coleman, Matthew Kutugata, Michael J Walsh, Muthukumar Bagavathiannan

    Abstract: Many advanced, image-based precision agricultural technologies for plant breeding, field crop research, and site-specific crop management hinge on the reliable detection and phenotyping of plants across highly variable morphological growth stages. Convolutional neural networks (CNNs) have shown promise for image-based plant phenotyping and weed recognition, but their ability to recognize growth st… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

    Comments: 27 pages, 10 figures, 5 tables

  8. arXiv:2307.11502  [pdf, other

    cs.SE cs.DC physics.comp-ph

    Software engineering to sustain a high-performance computing scientific application: QMCPACK

    Authors: William F. Godoy, Steven E. Hahn, Michael M. Walsh, Philip W. Fackler, Jaron T. Krogel, Peter W. Doak, Paul R. C. Kent, Alfredo A. Correa, Ye Luo, Mark Dewing

    Abstract: We provide an overview of the software engineering efforts and their impact in QMCPACK, a production-level ab-initio Quantum Monte Carlo open-source code targeting high-performance computing (HPC) systems. Aspects included are: (i) strategic expansion of continuous integration (CI) targeting CPUs, using GitHub Actions runners, and NVIDIA and AMD GPUs in pre-exascale systems, using self-hosted hard… ▽ More

    Submitted 21 July, 2023; originally announced July 2023.

    Comments: Accepted at the first US-RSE Conference, USRSE2023, https://us-rse.org/usrse23/, 8 pages, 3 figures, 4 tables

  9. arXiv:2305.10311  [pdf

    cs.CV

    Investigating image-based fallow weed detection performance on Raphanus sativus and Avena sativa at speeds up to 30 km h$^{-1}$

    Authors: Guy R. Y. Coleman, Angus Macintyre, Michael J. Walsh, William T. Salter

    Abstract: Site-specific weed control (SSWC) can provide considerable reductions in weed control costs and herbicide usage. Despite the promise of machine vision for SSWC systems and the importance of ground speed in weed control efficacy, there has been little investigation of the role of ground speed and camera characteristics on weed detection performance. Here, we compare the performance of four camera-s… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

    Comments: 15 pages, 9 figures, 3 tables

    ACM Class: C.3; I.4.8; J.3

  10. arXiv:2204.09042  [pdf, other

    q-bio.QM cs.LG q-bio.BM stat.ML

    Accelerating Inhibitor Discovery With A Deep Generative Foundation Model: Validation for SARS-CoV-2 Drug Targets

    Authors: Vijil Chenthamarakshan, Samuel C. Hoffman, C. David Owen, Petra Lukacik, Claire Strain-Damerell, Daren Fearon, Tika R. Malla, Anthony Tumber, Christopher J. Schofield, Helen M. E. Duyvesteyn, Wanwisa Dejnirattisai, Loic Carrique, Thomas S. Walter, Gavin R. Screaton, Tetiana Matviiuk, Aleksandra Mojsilovic, Jason Crain, Martin A. Walsh, David I. Stuart, Payel Das

    Abstract: The discovery of novel inhibitor molecules for emerging drug-target proteins is widely acknowledged as a challenging inverse design problem: Exhaustive exploration of the vast chemical search space is impractical, especially when the target structure or active molecules are unknown. Here we validate experimentally the broad utility of a deep generative framework trained at-scale on protein sequenc… ▽ More

    Submitted 14 October, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

    Comments: Revised title, abstract, and text; additional figures

  11. arXiv:2106.15353  [pdf, other

    eess.SP cs.LG

    Patient-independent Schizophrenia Relapse Prediction Using Mobile Sensor based Daily Behavioral Rhythm Changes

    Authors: Bishal Lamichhane, Dror Ben-Zeev, Andrew Campbell, Tanzeem Choudhury, Marta Hauser, John Kane, Mikio Obuchi, Emily Scherer, Megan Walsh, Rui Wang, Weichen Wang, Akane Sano

    Abstract: A schizophrenia relapse has severe consequences for a patient's health, work, and sometimes even life safety. If an oncoming relapse can be predicted on time, for example by detecting early behavioral changes in patients, then interventions could be provided to prevent the relapse. In this work, we investigated a machine learning based schizophrenia relapse prediction model using mobile sensing da… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: EAI MobiHealth 2020

  12. Deep Learning Techniques for In-Crop Weed Identification: A Review

    Authors: Kun Hu, Zhiyong Wang, Guy Coleman, Asher Bender, Tingting Yao, Shan Zeng, Dezhen Song, Arnold Schumann, Michael Walsh

    Abstract: Weeds are a significant threat to the agricultural productivity and the environment. The increasing demand for sustainable agriculture has driven innovations in accurate weed control technologies aimed at reducing the reliance on herbicides. With the great success of deep learning in various vision tasks, many promising image-based weed detection algorithms have been developed. This paper reviews… ▽ More

    Submitted 4 February, 2024; v1 submitted 27 March, 2021; originally announced March 2021.

  13. arXiv:2011.06455  [pdf

    cs.GT physics.soc-ph q-bio.PE

    Optimal governance and implementation of vaccination programmes to contain the COVID-19 pandemic

    Authors: Mahendra Piraveenan, Shailendra Sawleshwarkar, Michael Walsh, Iryna Zablotska, Samit Bhattacharyya, Habib Hassan Farooqui, Tarun Bhatnagar, Anup Karan, Manoj Murhekar, Sanjay Zodpey, K. S. Mallikarjuna Rao, Philippa Pattison, Albert Zomaya, Matjaz Perc

    Abstract: Since the recent introduction of several viable vaccines for SARS-CoV-2, vaccination uptake has become the key factor that will determine our success in containing the COVID-19 pandemic. We argue that game theory and social network models should be used to guide decisions pertaining to vaccination programmes for the best possible results. In the months following the introduction of vaccines, their… ▽ More

    Submitted 9 June, 2021; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: 15 pages, 1 figure; published in Royal Society Open Science

    Journal ref: R. Soc. Open Sci. 8, 210429 (2021)

  14. arXiv:1802.06515  [pdf, other

    cs.CV

    Image Forensics: Detecting duplication of scientific images with manipulation-invariant image similarity

    Authors: M. Cicconet, H. Elliott, D. L. Richmond, D. Wainstock, M. Walsh

    Abstract: Manipulation and re-use of images in scientific publications is a concerning problem that currently lacks a scalable solution. Current tools for detecting image duplication are mostly manual or semi-automated, despite the availability of an overwhelming target dataset for a learning-based approach. This paper addresses the problem of determining if, given two images, one is a manipulated version o… ▽ More

    Submitted 17 March, 2020; v1 submitted 18 February, 2018; originally announced February 2018.

    Comments: 12 pages; 6 figures; keywords: siamese network, similarity metric, image forensics, image manipulation

  15. arXiv:1704.08931  [pdf, other

    cs.IT eess.SY

    A Framework for Rate Efficient Control of Distributed Discrete Systems

    Authors: Jie Ren, Solmaz Torabi, John MacLaren Walsh

    Abstract: A key issue in the control of distributed discrete systems modeled as Markov decisions processes, is that often the state of the system is not directly observable at any single location in the system. The participants in the control scheme must share information with one another regarding the state of the system in order to collectively make informed control decisions, but this information sharing… ▽ More

    Submitted 28 April, 2017; originally announced April 2017.

  16. arXiv:1704.01891  [pdf, other

    cs.IT

    On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy

    Authors: Congduan Li, Steven Weber, John MacLaren Walsh

    Abstract: Recent algorithmic developments have enabled computers to automatically determine and prove the capacity regions of small hypergraph networks under network coding. A structural theory relating network coding problems of different sizes is developed to make best use of this newfound computational capability. A formal notion of network minimality is developed which removes components of a network co… ▽ More

    Submitted 6 April, 2017; originally announced April 2017.

    Comments: 20 pages with double column, revision of previous submission arXiv:1507.05728

  17. arXiv:1607.06833  [pdf, other

    cs.IT

    Explicit Polyhedral Bounds on Network Coding Rate Regions via Entropy Function Region: Algorithms, Symmetry, and Computation

    Authors: Jayant Apte, John MacLaren Walsh

    Abstract: Automating the solutions of multiple network information theory problems, stretching from fundamental concerns such as determining all information inequalities and the limitations of linear codes, to applied ones such as designing coded networks, distributed storage systems, and caching systems, can be posed as polyhedral projections. These problems are demonstrated to exhibit multiple types of po… ▽ More

    Submitted 6 July, 2017; v1 submitted 22 July, 2016; originally announced July 2016.

    Comments: 23 pages, 15 figures

  18. arXiv:1605.04598  [pdf, other

    cs.IT

    Constrained Linear Representability of Polymatroids and Algorithms for Computing Achievability Proofs in Network Coding

    Authors: Jayant Apte, John MacLaren Walsh

    Abstract: The constrained linear representability problem (CLRP) for polymatroids determines whether there exists a polymatroid that is linear over a specified field while satisfying a collection of constraints on the rank function. Using a computer to test whether a certain rate vector is achievable with vector linear network codes for a multi-source network coding instance and whether there exists a multi… ▽ More

    Submitted 1 February, 2017; v1 submitted 15 May, 2016; originally announced May 2016.

    Comments: submitted to IEEE Transactions on Information Theory, (this version: corrected figure 9)

  19. arXiv:1605.01744  [pdf, other

    cs.CL

    Improving Automated Patent Claim Parsing: Dataset, System, and Experiments

    Authors: Mengke Hu, David Cinciruk, John MacLaren Walsh

    Abstract: Off-the-shelf natural language processing software performs poorly when parsing patent claims owing to their use of irregular language relative to the corpora built from news articles and the web typically utilized to train this software. Stopping short of the extensive and expensive process of accumulating a large enough dataset to completely retrain parsers for patent claims, a method of adaptin… ▽ More

    Submitted 5 May, 2016; originally announced May 2016.

  20. arXiv:1512.03324  [pdf, other

    cs.IT

    Mapping the Region of Entropic Vectors with Support Enumeration & Information Geometry

    Authors: Yunshu Liu, John MacLaren Walsh

    Abstract: The region of entropic vectors is a convex cone that has been shown to be at the core of many fundamental limits for problems in multiterminal data compression, network coding, and multimedia transmission. This cone has been shown to be non-polyhedral for four or more random variables, however its boundary remains unknown for four or more discrete random variables. Methods for specifying probabili… ▽ More

    Submitted 10 December, 2015; originally announced December 2015.

  21. arXiv:1507.05728  [pdf, other

    cs.IT

    On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy

    Authors: Congduan Li, Steven Weber, John MacLaren Walsh

    Abstract: This paper investigates the enumeration, rate region computation, and hierarchy of general multi-source multi-sink hyperedge networks under network coding, which includes multiple network models, such as independent distributed storage systems and index coding problems, as special cases. A notion of minimal networks and a notion of network equivalence under group action are defined. An efficient a… ▽ More

    Submitted 21 July, 2015; originally announced July 2015.

    Comments: 63 pages, submitted to TransIT

  22. Interactive Scalar Quantization for Distributed Resource Allocation

    Authors: Bradford D. Boyle, Jie Ren, John MacLaren Walsh, Steven Weber

    Abstract: In many resource allocation problems, a centralized controller needs to award some resource to a user selected from a collection of distributed users with the goal of maximizing the utility the user would receive from the resource. This can be modeled as the controller computing an extremum of the distributed users' utilities. The overhead rate necessary to enable the controller to reproduce the u… ▽ More

    Submitted 6 September, 2015; v1 submitted 15 May, 2015; originally announced May 2015.

    Comments: 31 pages, 9 figures. Submitted on 2015-05-15 to IEEE Transactions on Signal Processing. Revised 2015-09-06

  23. arXiv:1408.3661  [pdf, other

    cs.IT

    Overhead Performance Tradeoffs - A Resource Allocation Perspective

    Authors: Jie Ren, Bradford D. Boyle, Gwanmo Ku, Steven Weber, John MacLaren Walsh

    Abstract: A key aspect of many resource allocation problems is the need for the resource controller to compute a function, such as the max or arg max, of the competing users metrics. Information must be exchanged between the competing users and the resource controller in order for this function to be computed. In many practical resource controllers the competing users' metrics are communicated to the resour… ▽ More

    Submitted 15 August, 2014; originally announced August 2014.

    Comments: 70 pages, 18 figures, Submitted to IEEE Transactions on Information Theory on 2014-08-14

  24. Properties of an Aloha-like stability region

    Authors: Nan Xie, John MacLaren Walsh, Steven Weber

    Abstract: A well-known inner bound on the stability region of the finite-user slotted Aloha protocol is the set of all arrival rates for which there exists some choice of the contention probabilities such that the associated worst-case service rate for each user exceeds the user's arrival rate, denoted $Λ$. Although testing membership in $Λ$ of a given arrival rate can be posed as a convex program, it is no… ▽ More

    Submitted 4 January, 2017; v1 submitted 15 August, 2014; originally announced August 2014.

    Comments: 28 pages, 9 figures. Submitted August 15, 2014, revised September 21, 2015 and August 31, 2016, and accepted November 06, 2016 for publication in IEEE Transactions on Information Theory. Preliminary results presented at ISIT 2010, ITA 2010, and ITA 2011. DOI: 10.1109/TIT.2016.2640302. Copyright transferred to IEEE. This is last version uploaded by the authors prior to IEEE proofing process

  25. arXiv:1407.5659  [pdf, other

    cs.IT

    Multilevel Diversity Coding Systems: Rate Regions, Codes, Computation, & Forbidden Minors

    Authors: Congduan Li, Steven Weber, John MacLaren Walsh

    Abstract: The rate regions of multilevel diversity coding systems (MDCS), a sub-class of the broader family of multi-source multi-sink networks with special structure, are investigated. After showing how to enumerate all non-isomorphic MDCS instances of a given size, the Shannon outer bound and several achievable inner bounds based on linear codes are given for the rate region of each non-isomorphic instanc… ▽ More

    Submitted 26 August, 2014; v1 submitted 21 July, 2014; originally announced July 2014.

    Comments: Submitted to IEEE Transactions on Information Theory, 52 pages