Skip to main content

Showing 1–23 of 23 results for author: Cook, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.17500  [pdf, ps, other

    cond-mat.soft cs.AI

    The Discovery Engine: A Framework for AI-Driven Synthesis and Navigation of Scientific Knowledge Landscapes

    Authors: Vladimir Baulin, Austin Cook, Daniel Friedman, Janna Lumiruusu, Andrew Pashea, Shagor Rahman, Benedikt Waldeck

    Abstract: The prevailing model for disseminating scientific knowledge relies on individual publications dispersed across numerous journals and archives. This legacy system is ill suited to the recent exponential proliferation of publications, contributing to insurmountable information overload, issues surrounding reproducibility and retractions. We introduce the Discovery Engine, a framework to address thes… ▽ More

    Submitted 23 May, 2025; originally announced May 2025.

  2. arXiv:2405.10243  [pdf, other

    cs.SE cs.LG

    DocuMint: Docstring Generation for Python using Small Language Models

    Authors: Bibek Poudel, Adam Cook, Sekou Traore, Shelah Ameli

    Abstract: Effective communication, specifically through documentation, is the beating heart of collaboration among contributors in software development. Recent advancements in language models (LMs) have enabled the introduction of a new type of actor in that ecosystem: LM-powered assistants capable of code generation, optimization, and maintenance. Our study investigates the efficacy of small language model… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: 12 pages, 4 figures

  3. arXiv:2311.00812  [pdf, other

    cs.CR

    InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users

    Authors: Tarun Yadav, Austin Cook, Justin Hales, Kent Seamons

    Abstract: Billions of secure messaging users have adopted end-to-end encryption (E2EE). Nevertheless, challenges remain. Most communication applications do not provide E2EE, and application silos prevent interoperability. Our qualitative analysis of privacy-conscious users' discussions of E2EE on Reddit reveals concerns about trusting client applications with plaintext, lack of clear indicators about how en… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  4. arXiv:2308.03404  [pdf, other

    cs.LG

    Applied metamodelling for ATM performance simulations

    Authors: Christoffer Riis, Francisco N. Antunes, Tatjana Bolić, Gérald Gurtner, Andrew Cook, Carlos Lima Azevedo, Francisco Câmara Pereira

    Abstract: The use of Air traffic management (ATM) simulators for planing and operations can be challenging due to their modelling complexity. This paper presents XALM (eXplainable Active Learning Metamodel), a three-step framework integrating active learning and SHAP (SHapley Additive exPlanations) values into simulation metamodels for supporting ATM decision-making. XALM efficiently uncovers hidden relatio… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  5. arXiv:2303.18060  [pdf

    cs.LG cs.AI eess.SY

    NOSTROMO: Lessons learned, conclusions and way forward

    Authors: Mayte Cano, Andrés Perillo, Juan Antonio López, Faustino Tello, Javier Poveda, Francisco Câmara, Francisco Antunes, Christoffer Riis, Ian Crook, Abderrazak Tibichte, Sandrine Molton, David Mocholí, Ricardo Herranz, Gérald Gurtner, Tatjana Bolić, Andrew Cook, Jovana Kuljanin, Xavier Prats

    Abstract: This White Paper sets out to explain the value that metamodelling can bring to air traffic management (ATM) research. It will define metamodelling and explore what it can, and cannot, do. The reader is assumed to have basic knowledge of SESAR: the Single European Sky ATM Research project. An important element of SESAR, as the technological pillar of the Single European Sky initiative, is to bring… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

    Comments: White Paper of the NOSTROMO, an exploratory research project funded by the SESAR Joint Undertaking (SJU) under the European Union's Horizon 2020 research and innovation programme

  6. arXiv:2303.12814  [pdf, other

    stat.ML cs.LG math.DS

    Nowhere coexpanding functions

    Authors: Andrew Cook, Andy Hammerlindl, Warwick Tucker

    Abstract: We define a family of $C^1$ functions which we call "nowhere coexpanding functions" that is closed under composition and includes all $C^3$ functions with non-positive Schwarzian derivative. We establish results on the number and nature of the fixed points of these functions, including a generalisation of a classic result of Singer.

    Submitted 13 September, 2023; v1 submitted 22 March, 2023; originally announced March 2023.

    Comments: 9 pages, 3 figures

    MSC Class: 37E99 (Primary) 37N99 (Secondary)

  7. arXiv:2107.07975  [pdf, other

    eess.IV cs.CV

    Joint Semi-supervised 3D Super-Resolution and Segmentation with Mixed Adversarial Gaussian Domain Adaptation

    Authors: Nicolo Savioli, Antonio de Marvao, Wenjia Bai, Shuo Wang, Stuart A. Cook, Calvin W. L. Chin, Daniel Rueckert, Declan P. O'Regan

    Abstract: Optimising the analysis of cardiac structure and function requires accurate 3D representations of shape and motion. However, techniques such as cardiac magnetic resonance imaging are conventionally limited to acquiring contiguous cross-sectional slices with low through-plane resolution and potential inter-slice spatial misalignment. Super-resolution in medical imaging aims to increase the resoluti… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

  8. arXiv:2004.10411  [pdf, other

    cs.CR

    A NIS Directive compliant Cybersecurity Maturity Assessment Framework

    Authors: George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke

    Abstract: The NIS Directive introduces obligations for the security of the network and information systems of operators of essential services and of digital service providers and require from the national competent authorities to assess their compliance to these obligations. This paper describes a novel cybersecurity maturity assessment framework (CMAF) that is tailored to the NIS Directive requirements and… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

    Comments: 6 pages, 2 figures

  9. arXiv:1907.12537   

    cs.CV

    Towards Automatic Screening of Typical and Atypical Behaviors in Children With Autism

    Authors: Andrew Cook, Bappaditya Mandal, Donna Berry, Matthew Johnson

    Abstract: This paper has been withdrawn by the authors due to insufficient or definition error(s) in the ethics approval protocol. Autism spectrum disorders (ASD) impact the cognitive, social, communicative and behavioral abilities of an individual. The development of new clinical decision support systems is of importance in reducing the delay between presentation of symptoms and an accurate diagnosis. In… ▽ More

    Submitted 17 September, 2019; v1 submitted 29 July, 2019; originally announced July 2019.

    Comments: This paper has been withdrawn by the authors due to insufficient or definition error(s) in the ethics approval protocol

  10. arXiv:1907.00058  [pdf, other

    eess.IV cs.CV cs.LG

    Explainable Anatomical Shape Analysis through Deep Hierarchical Generative Models

    Authors: Carlo Biffi, Juan J. Cerrolaza, Giacomo Tarroni, Wenjia Bai, Antonio de Marvao, Ozan Oktay, Christian Ledig, Loic Le Folgoc, Konstantinos Kamnitsas, Georgia Doumou, Jinming Duan, Sanjay K. Prasad, Stuart A. Cook, Declan P. O'Regan, Daniel Rueckert

    Abstract: Quantification of anatomical shape changes currently relies on scalar global indexes which are largely insensitive to regional or asymmetric modifications. Accurate assessment of pathology-driven anatomical remodeling is a crucial step for the diagnosis and treatment of many conditions. Deep learning approaches have recently achieved wide success in the analysis of medical images, but they lack in… ▽ More

    Submitted 4 January, 2020; v1 submitted 28 June, 2019; originally announced July 2019.

    Comments: Accepted for publication in IEEE Transactions on Medical Imaging (TMI)

  11. arXiv:1906.10495  [pdf, ps, other

    cs.CC quant-ph

    Approximating Unitary Preparations of Orthogonal Black Box States

    Authors: Joshua Alan Cook

    Abstract: In this paper, I take a step toward answering the following question: for m different small circuits that compute m orthogonal n qubit states, is there a small circuit that will map m computational basis states to these m states without any input leaving any auxiliary bits changed. While this may seem simple, the constraint that auxiliary bits always be returned to 0 on any input (even ones beside… ▽ More

    Submitted 22 June, 2019; originally announced June 2019.

    Comments: A Class project Paper for CS395T Quantum Complexity Theory at UT Austin in Spring 2019 under Scott Aaronson

  12. arXiv:1904.01551  [pdf

    cs.CR cs.NI eess.SY

    A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape

    Authors: Uchenna D Ani, Jeremy D McK. Watson, Jason R. C. Nurse, Al Cook, Carsten Maple

    Abstract: As new technologies such as the Internet of Things (IoT) are integrated into Critical National Infrastructures (CNI), new cybersecurity threats emerge that require specific security solutions. Approaches used for analysis include the modelling and simulation of critical infrastructure systems using attributes, functionalities, operations, and behaviours to support various security analysis viewpoi… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

    Comments: PETRAS/IET Conference Living in the Internet of Things: Cybersecurity of the IoT 2019

  13. arXiv:1902.11000  [pdf, other

    cs.CV

    3D High-Resolution Cardiac Segmentation Reconstruction from 2D Views using Conditional Variational Autoencoders

    Authors: Carlo Biffi, Juan J. Cerrolaza, Giacomo Tarroni, Antonio de Marvao, Stuart A. Cook, Declan P. O'Regan, Daniel Rueckert

    Abstract: Accurate segmentation of heart structures imaged by cardiac MR is key for the quantitative analysis of pathology. High-resolution 3D MR sequences enable whole-heart structural imaging but are time-consuming, expensive to acquire and they often require long breath holds that are not suitable for patients. Consequently, multiplanar breath-hold 2D cine sequences are standard practice but are disadvan… ▽ More

    Submitted 28 February, 2019; originally announced February 2019.

    Comments: Accepted in IEEE International Symposium on Biomedical Imaging (ISBI 2019)

  14. arXiv:1811.04313  [pdf, ps, other

    cs.CC cs.LO math.LO

    Uniform, Integral and Feasible Proofs for the Determinant Identities

    Authors: Iddo Tzameret, Stephen A. Cook

    Abstract: Aiming to provide weak as possible axiomatic assumptions in which one can develop basic linear algebra, we give a uniform and integral version of the short propositional proofs for the determinant identities demonstrated over $GF(2)$ in Hrubes-Tzameret [SICOMP'15]. Specifically, we show that the multiplicativity of the determinant function and the Cayley-Hamilton theorem over the integers are prov… ▽ More

    Submitted 10 November, 2018; originally announced November 2018.

    Comments: 76 pages

    MSC Class: 03F20; 68Q17; 68Q15; 03F30 ACM Class: F.2.2; F.4.1

  15. arXiv:1810.03382  [pdf, other

    cs.LG cs.CV stat.ML

    Deep learning cardiac motion analysis for human survival prediction

    Authors: Ghalib A. Bello, Timothy J. W. Dawes, Jinming Duan, Carlo Biffi, Antonio de Marvao, Luke S. G. E. Howard, J. Simon R. Gibbs, Martin R. Wilkins, Stuart A. Cook, Daniel Rueckert, Declan P. O'Regan

    Abstract: Motion analysis is used in computer vision to understand the behaviour of moving objects in sequences of images. Optimising the interpretation of dynamic biological systems requires accurate and precise motion tracking as well as efficient representations of high-dimensional motion trajectories so that these can be used for prediction tasks. Here we use image sequences of the heart, acquired using… ▽ More

    Submitted 8 October, 2018; originally announced October 2018.

    Journal ref: Nature Machine Intelligence, 1, 95-104 (2019)

  16. arXiv:1711.00525  [pdf, other

    cs.CR

    Internet of Cloud: Security and Privacy issues

    Authors: Allan Cook, Michael Robinson, Mohamed Amine Ferrag, Leandros A. Maglaras, Ying He, Kevin Jones, Helge Janicke

    Abstract: The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that the… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: 27 pages, 4 figures

  17. arXiv:1701.05141  [pdf, other

    cs.CG cs.DS

    The Medial Axis of a Multi-Layered Environment and its Application as a Navigation Mesh

    Authors: Wouter van Toll, Atlas F. Cook IV, Marc J. van Kreveld, Roland Geraerts

    Abstract: Path planning for walking characters in complicated virtual environments is a fundamental task in simulations and games. A navigation mesh is a data structure that allows efficient path planning. The Explicit Corridor Map (ECM) is a navigation mesh based on the medial axis. It enables path planning for disk-shaped characters of any radius. In this paper, we formally extend the medial axis (and t… ▽ More

    Submitted 26 July, 2017; v1 submitted 18 January, 2017; originally announced January 2017.

    Comments: 34 pages

  18. arXiv:1208.2721  [pdf, ps, other

    cs.CC

    The Complexity of the Comparator Circuit Value Problem

    Authors: Stephen A. Cook, Yuval Filmus, Dai Tri Man Le

    Abstract: In 1990 Subramanian defined the complexity class CC as the set of problems log-space reducible to the comparator circuit value problem (CCV). He and Mayr showed that NL \subseteq CC \subseteq P, and proved that in addition to CCV several other problems are complete for CC, including the stable marriage problem, and finding the lexicographically first maximal matching in a bipartite graph. We are i… ▽ More

    Submitted 25 July, 2013; v1 submitted 13 August, 2012; originally announced August 2012.

    Comments: continues the previous work of Cook, Le and Ye [arXiv:1106.4142]

  19. arXiv:1106.4142  [pdf, ps, other

    cs.CC cs.LO

    Complexity Classes and Theories for the Comparator Circuit Value Problem

    Authors: Stephen A. Cook, Dai Tri Man Le, Yuli Ye

    Abstract: Subramanian defined the complexity class CC as the set of problems log-space reducible to the comparator circuit value problem. He proved that several other problems are complete for CC, including the stable marriage problem, and finding the lexicographical first maximal matching in a bipartite graph. We suggest alternative definitions of CC based on different reducibilities and introduce a two-so… ▽ More

    Submitted 4 October, 2011; v1 submitted 21 June, 2011; originally announced June 2011.

    Comments: This version was substantially rewritten, where several proofs were rewritten and many typos and mistakes were fixed. A shorter version of this paper appeared in CSL 2011

  20. arXiv:1103.5215  [pdf, ps, other

    cs.LO cs.CC math.LO

    Formalizing Randomized Matching Algorithms

    Authors: Dai Tri Man Le, Stephen A. Cook

    Abstract: Using Jeřábek 's framework for probabilistic reasoning, we formalize the correctness of two fundamental RNC^2 algorithms for bipartite perfect matching within the theory VPV for polytime reasoning. The first algorithm is for testing if a bipartite graph has a perfect matching, and is based on the Schwartz-Zippel Lemma for polynomial identity testing applied to the Edmonds polynomial of the graph.… ▽ More

    Submitted 9 August, 2012; v1 submitted 27 March, 2011; originally announced March 2011.

    ACM Class: F.2.2, F.4.1

    Journal ref: Logical Methods in Computer Science, Volume 8, Issue 3 (August 10, 2012) lmcs:973

  21. arXiv:1103.2865  [pdf, ps, other

    cs.CG

    Computing the Fréchet Distance Between Folded Polygons

    Authors: Atlas F. Cook IV, Anne Driemel, Sariel Har-Peled, Jessica Sherette, Carola Wenk

    Abstract: Computing the Fréchet distance for surfaces is a surprisingly hard problem and the only known algorithm is limited to computing it between flat surfaces. We adapt this algorithm to create one for computing the Fréchet distance for a class of non-flat surfaces which we call folded polygons. Unfortunately, the original algorithm cannot be extended directly. We present three different methods to adap… ▽ More

    Submitted 15 March, 2011; originally announced March 2011.

    Comments: 19 pages, 10 figures. Submitted to WADS 2011

  22. Formal Theories for Linear Algebra

    Authors: Stephen A Cook, Lila A Fontes

    Abstract: We introduce two-sorted theories in the style of [CN10] for the complexity classes \oplusL and DET, whose complete problems include determinants over Z2 and Z, respectively. We then describe interpretations of Soltys' linear algebra theory LAp over arbitrary integral domains, into each of our new theories. The result shows equivalences of standard theorems of linear algebra over Z2 and Z can be p… ▽ More

    Submitted 16 March, 2012; v1 submitted 7 January, 2011; originally announced January 2011.

    Comments: This is a revised journal version of the paper "Formal Theories for Linear Algebra" (Computer Science Logic) for the journal Logical Methods in Computer Science

    ACM Class: F.4.0

    Journal ref: Logical Methods in Computer Science, Volume 8, Issue 1 (March 16, 2012) lmcs:716

  23. arXiv:0802.2846  [pdf, ps, other

    cs.DS cs.CG

    Geodesic Fréchet Distance Inside a Simple Polygon

    Authors: Atlas F. Cook IV, Carola Wenk

    Abstract: We unveil an alluring alternative to parametric search that applies to both the non-geodesic and geodesic Fréchet optimization problems. This randomized approach is based on a variant of red-blue intersections and is appealing due to its elegance and practical efficiency when compared to parametric search. We present the first algorithm for the geodesic Fréchet distance between two polygonal cur… ▽ More

    Submitted 20 February, 2008; originally announced February 2008.

    Journal ref: Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)