Skip to main content

Showing 1–3 of 3 results for author: Downing, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.06093  [pdf, other

    cs.CE

    Coupling approaches with non-matching grids for classical linear elasticity and bond-based peridynamic models in 1D

    Authors: Patrick Diehl, Emily Downing, Autumn Edwards, Serge Prudhomme

    Abstract: Local-nonlocal coupling approaches provide a means to combine the computational efficiency of local models and the accuracy of nonlocal models. To facilitate the coupling of the two models, non-matching grids are often desirable as nonlocal grids usually require a finer resolution than local grids. In that case, it is often convenient to resort to interpolation operators so that models can exchang… ▽ More

    Submitted 8 April, 2025; originally announced April 2025.

  2. arXiv:2312.16052  [pdf, other

    math.CO cs.DM

    Pattern Avoidance for Fibonacci Sequences using $k$-Regular Words

    Authors: Emily Downing, Elizabeth Hartung, Cody Lucido, Aaron Williams

    Abstract: Two $k$-ary Fibonacci recurrences are $a_k(n) = a_k(n-1) + k \cdot a_k(n-2)$ and $b_k(n) = k \cdot b_k(n-1) + b_k(n-2)$. We provide a simple proof that $a_k(n)$ is the number of $k$-regular words over $[n] = \{1,2,\ldots,n\}$ that avoid patterns $\{121, 123, 132, 213\}$ when using base cases $a_k(0) = a_k(1) = 1$ for any $k \geq 1$. This was previously proven by Kuba and Panholzer in the context o… ▽ More

    Submitted 13 May, 2025; v1 submitted 26 December, 2023; originally announced December 2023.

    Comments: 20 pages, submitted to special journal issue for Permutation Patterns 2023 (PP23) in DMTCS

    MSC Class: 05 (Primary) 68 (Secondary) ACM Class: G.2.1; G.4

  3. arXiv:1905.00122  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    To believe or not to believe: Validating explanation fidelity for dynamic malware analysis

    Authors: Li Chen, Carter Yagemann, Evan Downing

    Abstract: Converting malware into images followed by vision-based deep learning algorithms has shown superior threat detection efficacy compared with classical machine learning algorithms. When malware are visualized as images, visual-based interpretation schemes can also be applied to extract insights of why individual samples are classified as malicious. In this work, via two case studies of dynamic malwa… ▽ More

    Submitted 30 April, 2019; originally announced May 2019.

    Comments: Accepted at the IEEE Computer Vision Pattern Recognition 2019 Explainable AI Workshop