Skip to main content

Showing 1–16 of 16 results for author: Adams, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.02887  [pdf, ps, other

    q-bio.BM cs.AI cs.LG

    CreoPep: A Universal Deep Learning Framework for Target-Specific Peptide Design and Optimization

    Authors: Cheng Ge, Han-Shen Tae, Zhenqiang Zhang, Lu Lu, Zhijie Huang, Yilin Wang, Tao Jiang, Wenqing Cai, Shan Chang, David J. Adams, Rilei Yu

    Abstract: Target-specific peptides, such as conotoxins, exhibit exceptional binding affinity and selectivity toward ion channels and receptors. However, their therapeutic potential remains underutilized due to the limited diversity of natural variants and the labor-intensive nature of traditional optimization strategies. Here, we present CreoPep, a deep learning-based conditional generative framework that i… ▽ More

    Submitted 5 May, 2025; originally announced May 2025.

    Comments: 16 pages, 6 figures

  2. arXiv:2504.03869  [pdf

    cond-mat.soft cs.LG

    CREASE-2D Analysis of Small Angle X-ray Scattering Data from Supramolecular Dipeptide Systems

    Authors: Nitant Gupta, Sri V. V. R. Akepati, Simona Bianco, Jay Shah, Dave J. Adams, Arthi Jayaraman

    Abstract: In this paper, we extend a recently developed machine-learning (ML) based CREASE-2D method to analyze the entire two-dimensional (2D) scattering pattern obtained from small angle X-ray scattering measurements of supramolecular dipeptide micellar systems. Traditional analysis of such scattering data would involve use of approximate or incorrect analytical models to fit to azimuthally-averaged 1D sc… ▽ More

    Submitted 4 April, 2025; originally announced April 2025.

    Comments: 30 Pages, 9 figures

  3. arXiv:2503.01753  [pdf, other

    cs.CL

    Boolean-aware Attention for Dense Retrieval

    Authors: Quan Mai, Susan Gauch, Douglas Adams

    Abstract: We present Boolean-aware attention, a novel attention mechanism that dynamically adjusts token focus based on Boolean operators (e.g., and, or, not). Our model employs specialized Boolean experts, each tailored to amplify or suppress attention for operator-specific contexts. A predefined gating mechanism activates the corresponding experts based on the detected Boolean type. Experiments on Boolean… ▽ More

    Submitted 3 March, 2025; originally announced March 2025.

  4. arXiv:2502.12183  [pdf

    cs.CL cs.LG

    Leveraging large language models for structured information extraction from pathology reports

    Authors: Jeya Balaji Balasubramanian, Daniel Adams, Ioannis Roxanis, Amy Berrington de Gonzalez, Penny Coulson, Jonas S. Almeida, Montserrat García-Closas

    Abstract: Background: Structured information extraction from unstructured histopathology reports facilitates data accessibility for clinical research. Manual extraction by experts is time-consuming and expensive, limiting scalability. Large language models (LLMs) offer efficient automated extraction through zero-shot prompting, requiring only natural language instructions without labeled data or training. W… ▽ More

    Submitted 14 February, 2025; originally announced February 2025.

    Comments: 29 pages, 6 figures

  5. arXiv:2408.02961  [pdf, ps, other

    cs.NE cs.LG

    Synaptic Modulation using Interspike Intervals Increases Energy Efficiency of Spiking Neural Networks

    Authors: Dylan Adams, Magda Zajaczkowska, Ashiq Anjum, Andrea Soltoggio, Shirin Dora

    Abstract: Despite basic differences between Spiking Neural Networks (SNN) and Artificial Neural Networks (ANN), most research on SNNs involve adapting ANN-based methods for SNNs. Pruning (dropping connections) and quantization (reducing precision) are often used to improve energy efficiency of SNNs. These methods are very effective for ANNs whose energy needs are determined by signals transmitted on synapse… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: 9 pages, 3 figures

  6. arXiv:2406.18696  [pdf, other

    cs.CL

    Sequence Graph Network for Online Debate Analysis

    Authors: Quan Mai, Susan Gauch, Douglas Adams, Miaoqing Huang

    Abstract: Online debates involve a dynamic exchange of ideas over time, where participants need to actively consider their opponents' arguments, respond with counterarguments, reinforce their own points, and introduce more compelling arguments as the discussion unfolds. Modeling such a complex process is not a simple task, as it necessitates the incorporation of both sequential characteristics and the capab… ▽ More

    Submitted 27 February, 2025; v1 submitted 26 June, 2024; originally announced June 2024.

    Comments: 8 pages, 4 figures

  7. arXiv:2406.17282  [pdf, other

    cs.CL

    SetBERT: Enhancing Retrieval Performance for Boolean Logic and Set Operation Queries

    Authors: Quan Mai, Susan Gauch, Douglas Adams

    Abstract: We introduce SetBERT, a fine-tuned BERT-based model designed to enhance query embeddings for set operations and Boolean logic queries, such as Intersection (AND), Difference (NOT), and Union (OR). SetBERT significantly improves retrieval performance for logic-structured queries, an area where both traditional and neural retrieval methods typically underperform. We propose an innovative use of inve… ▽ More

    Submitted 26 June, 2024; v1 submitted 25 June, 2024; originally announced June 2024.

    Comments: 10 pages, 1 figure

  8. arXiv:2405.12040  [pdf, other

    cs.SI cs.HC

    Reputation Transfer in the Twitter Diaspora

    Authors: Kristina Radivojevic, DJ Adams, Griffin Laszlo, Felixander Kery, Tim Weninger

    Abstract: Social media platforms have witnessed a dynamic landscape of user migration in recent years, fueled by changes in ownership, policy, and user preferences. This paper explores the phenomenon of user migration from established platforms like X/Twitter to emerging alternatives such as Threads, Mastodon, and Truth Social. Leveraging a large dataset from X/Twitter, we investigate the extent of user dep… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Comments: 8 pages, 6 figures

  9. arXiv:2405.03092  [pdf, other

    cond-mat.mtrl-sci cs.LG math.OC

    Bayesian optimization for stable properties amid processing fluctuations in sputter deposition

    Authors: Ankit Shrivastava, Matias Kalaswad, Joyce O. Custer, David P. Adams, Habib N. Najm

    Abstract: We introduce a Bayesian optimization approach to guide the sputter deposition of molybdenum thin films, aiming to achieve desired residual stress and sheet resistance while minimizing susceptibility to stochastic fluctuations during deposition. Thin films are pivotal in numerous technologies, including semiconductors and optical devices, where their properties are critical. Sputter deposition para… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

    Journal ref: J. Vac. Sci. Technol. A 1 May 2024; 42 (3): 033408

  10. Exploring Gender and Racial/Ethnic Bias Against Video Game Streamers: Comparing Perceived Gameplay Skill and Viewer Engagement

    Authors: David V. Nguyen, Edward F. Melcer, Deanne Adams

    Abstract: Research suggests there is a perception that females and underrepresented racial/ethnic minorities have worse gameplay skills and produce less engaging video game streaming content. This bias might impact streamers' audience size, viewers' financial patronage of a streamer, streamers' sponsorship offers, etc. However, few studies on this topic use experimental methods. To fill this gap, we conduct… ▽ More

    Submitted 8 July, 2024; v1 submitted 1 December, 2023; originally announced December 2023.

    Journal ref: Proceedings of the Foundations of Digital Games Conference (2024)

  11. arXiv:2211.10808  [pdf, other

    cs.CL

    Combining State-of-the-Art Models with Maximal Marginal Relevance for Few-Shot and Zero-Shot Multi-Document Summarization

    Authors: David Adams, Gandharv Suri, Yllias Chali

    Abstract: In Natural Language Processing, multi-document summarization (MDS) poses many challenges to researchers above those posed by single-document summarization (SDS). These challenges include the increased search space and greater potential for the inclusion of redundant information. While advancements in deep learning approaches have led to the development of several advanced language models capable o… ▽ More

    Submitted 19 November, 2022; originally announced November 2022.

  12. arXiv:2102.10199  [pdf, other

    math.NA cs.LG

    Information-Theoretic Bounds for Integral Estimation

    Authors: Donald Q. Adams, Adarsh Barik, Jean Honorio

    Abstract: In this paper, we consider a zero-order stochastic oracle model of estimating definite integrals. In this model, integral estimation methods may query an oracle function for a fixed number of noisy values of the integrand function and use these values to produce an estimate of the integral. We first show that the information-theoretic error lower bound for estimating the integral of a $d$-dimensio… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

    Journal ref: IEEE International Symposium on Information Theory (ISIT), 2021

  13. arXiv:2101.06759  [pdf, other

    cs.PL

    Proceedings of the 2020 Scheme and Functional Programming Workshop

    Authors: Baptiste Saleil, Michael D. Adams

    Abstract: This report aggregates the papers presented at the twenty-first annual Scheme and Functional Programming Workshop, hosted on August 28th, 2020, online and co-located with the twenty-fifth International Conference on Functional Programming. The Scheme and Functional Programming Workshop is held every year to provide an opportunity for researchers and practitioners using Scheme and related functiona… ▽ More

    Submitted 17 January, 2021; originally announced January 2021.

    Comments: 85 pages; 30 figures; workshop website at https://icfp20.sigplan.org/home/scheme-2020

    Report number: CSE-TR-001-21 ACM Class: D.3.m

  14. On the Complexity and Performance of Parsing with Derivatives

    Authors: Michael D. Adams, Celeste Hollenbeck, Matthew Might

    Abstract: Current algorithms for context-free parsing inflict a trade-off between ease of understanding, ease of implementation, theoretical complexity, and practical performance. No algorithm achieves all of these properties simultaneously. Might et al. (2011) introduced parsing with derivatives, which handles arbitrary context-free grammars while being both easy to understand and simple to implement. De… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.

    Comments: 13 pages; 12 figures; implementation at http://bitbucket.org/ucombinator/parsing-with-derivatives/ ; published in PLDI '16, Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, June 13 - 17, 2016, Santa Barbara, CA, USA

    ACM Class: D.3.4

  15. Pushdown Control-Flow Analysis for Free

    Authors: Thomas Gilray, Steven Lyde, Michael D. Adams, Matthew Might, David Van Horn

    Abstract: Traditional control-flow analysis (CFA) for higher-order languages, whether implemented by constraint-solving or abstract interpretation, introduces spurious connections between callers and callees. Two distinct invocations of a function will necessarily pollute one another's return-flow. Recently, three distinct approaches have been published which provide perfect call-stack precision in a comput… ▽ More

    Submitted 21 March, 2016; v1 submitted 11 July, 2015; originally announced July 2015.

    Comments: in Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

    ACM Class: D.3.4

  16. arXiv:1311.0257  [pdf, other

    cs.CR

    Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity

    Authors: Michael D. Adams, Seth D. Hitefield, Bruce Hoy, Michael C. Fowler, T. Charles Clancy

    Abstract: A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous 'cyber cycle' of attackers scanning networks, developing exploits and attacking systems, with defenders detecting attacks, analyzing exploits and patching systems. This reactive nature leaves sensitive systems highly vulnerable to attack due to un-patched system… ▽ More

    Submitted 1 November, 2013; originally announced November 2013.

    Comments: 12 pages, 7 figures