Skip to main content

Showing 1–4 of 4 results for author: Ambrose, A

.
  1. arXiv:2503.05039  [pdf, other

    cs.HC

    Bridging the AI Adoption Gap: Designing an Interactive Pedagogical Agent for Higher Education Instructors

    Authors: Si Chen, Reid Metoyer, Khiem Le, Adam Acunin, Izzy Molnar, Alex Ambrose, James Lang, Nitesh Chawla, Ronald Metoyer

    Abstract: Instructors play a pivotal role in integrating AI into education, yet their adoption of AI-powered tools remains inconsistent. Despite this, limited research explores how to design AI tools that support broader instructor adoption. This study applies a human-centered design approach, incorporating qualitative methods, to investigate the design of interactive pedagogical agents that provide instruc… ▽ More

    Submitted 6 March, 2025; originally announced March 2025.

  2. arXiv:2502.18654  [pdf, ps, other

    astro-ph.GA astro-ph.CO

    Radiative Transfer Simulations of Ly$α$ Intensity Mapping During Cosmic Reionization Including Sources from Galaxies and the Intergalactic Medium

    Authors: Abigail E. Ambrose, Eli Visbal, Mihir Kulkarni, Matthew McQuinn

    Abstract: We present new simulations of Lyman-$α$ (Ly$α$) intensity maps that include Ly$α$ radiative transfer in the intergalactic medium (IGM) and all significant sources of Ly$α$ photons. The sources considered include Ly$α$ directly from galaxies, cooling at the edges of ionized bubbles, recombinations within these bubbles, and reprocessing of galaxy continuum emission in the IGM. We also vary astrophys… ▽ More

    Submitted 16 June, 2025; v1 submitted 25 February, 2025; originally announced February 2025.

    Comments: 20 pages, 10 figures, Submitted to JCAP

  3. arXiv:1511.01946  [pdf, ps, other

    cs.AR

    SecureD: A Secure Dual Core Embedded Processor

    Authors: Roshan G. Ragel, Jude A. Ambrose, Sri Parameswaran

    Abstract: Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-injec… ▽ More

    Submitted 5 November, 2015; originally announced November 2015.

  4. Instruction-set Selection for Multi-application based ASIP Design: An Instruction-level Study

    Authors: R. G. Ragel, Swarnalatha Radhakrishnan, Angelo Ambrose

    Abstract: Efficiency in embedded systems is paramount to achieve high performance while consuming less area and power. Processors in embedded systems have to be designed carefully to achieve such design constraints. Application Specific Instruction set Processors (ASIPs) exploit the nature of applications to design an optimal instruction set. Despite being not general to execute any application, ASIPs are h… ▽ More

    Submitted 28 March, 2014; originally announced March 2014.

    Journal ref: Information and Automation for Sustainability (ICIAfS), 2012 IEEE 6th International Conference on, 27-29 Sept 2012, pp 141-146, Beijing