Skip to main content

Showing 1–15 of 15 results for author: Ellis, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.00249  [pdf, other

    physics.comp-ph cs.LG

    Plane-Wave Decomposition and Randomised Training; a Novel Path to Generalised PINNs for SHM

    Authors: Rory Clements, James Ellis, Geoff Hassall, Simon Horsley, Gavin Tabor

    Abstract: In this paper, we introduce a formulation of Physics-Informed Neural Networks (PINNs), based on learning the form of the Fourier decomposition, and a training methodology based on a spread of randomly chosen boundary conditions. By training in this way we produce a PINN that generalises; after training it can be used to correctly predict the solution for an arbitrary set of boundary conditions and… ▽ More

    Submitted 23 April, 2025; v1 submitted 31 March, 2025; originally announced April 2025.

    Comments: 17 pages, 16 figures; corrected author listing metadata, added references for section II, typos corrected, corrected conventional PINN architecture and regenerated relevant results, improved styling of figures, added further references

  2. arXiv:2503.16861  [pdf, other

    cs.AI

    In-House Evaluation Is Not Enough: Towards Robust Third-Party Flaw Disclosure for General-Purpose AI

    Authors: Shayne Longpre, Kevin Klyman, Ruth E. Appel, Sayash Kapoor, Rishi Bommasani, Michelle Sahar, Sean McGregor, Avijit Ghosh, Borhane Blili-Hamelin, Nathan Butters, Alondra Nelson, Amit Elazari, Andrew Sellars, Casey John Ellis, Dane Sherrets, Dawn Song, Harley Geiger, Ilona Cohen, Lauren McIlvenny, Madhulika Srikumar, Mark M. Jaycox, Markus Anderljung, Nadine Farid Johnson, Nicholas Carlini, Nicolas Miailhe , et al. (9 additional authors not shown)

    Abstract: The widespread deployment of general-purpose AI (GPAI) systems introduces significant new risks. Yet the infrastructure, practices, and norms for reporting flaws in GPAI systems remain seriously underdeveloped, lagging far behind more established fields like software security. Based on a collaboration between experts from the fields of software security, machine learning, law, social science, and… ▽ More

    Submitted 25 March, 2025; v1 submitted 21 March, 2025; originally announced March 2025.

  3. arXiv:2410.09116  [pdf, other

    cs.GT cs.AI cs.LG

    Optimizing Hard-to-Place Kidney Allocation: A Machine Learning Approach to Center Ranking

    Authors: Sean Berry, Berk Gorgulu, Sait Tunc, Mucahit Cevik, Matthew J Ellis

    Abstract: Kidney transplantation is the preferred treatment for end-stage renal disease, yet the scarcity of donors and inefficiencies in allocation systems create major bottlenecks, resulting in prolonged wait times and alarming mortality rates. Despite their severe scarcity, timely and effective interventions to prevent non-utilization of life-saving organs remain inadequate. Expedited out-of-sequence pla… ▽ More

    Submitted 10 October, 2024; originally announced October 2024.

  4. arXiv:2303.16307  [pdf, other

    cs.CR math.DS

    Quantitative Measurement of Cyber Resilience: Modeling and Experimentation

    Authors: Michael J. Weisman, Alexander Kott, Jason E. Ellis, Brian J. Murphy, Travis W. Parker, Sidney Smith, Joachim Vandekerckhove

    Abstract: Cyber resilience is the ability of a system to resist and recover from a cyber attack, thereby restoring the system's functionality. Effective design and development of a cyber resilient system requires experimental methods and tools for quantitative measuring of cyber resilience. This paper describes an experimental method and test bed for obtaining resilience-relevant data as a system (in our ca… ▽ More

    Submitted 29 December, 2024; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.04413, arXiv:2302.07941

  5. An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience

    Authors: Jason E. Ellis, Travis W. Parker, Joachim Vandekerckhove, Brian J. Murphy, Sidney Smith, Alexander Kott, Michael J. Weisman

    Abstract: The vulnerability of cyber-physical systems to cyber attack is well known, and the requirement to build cyber resilience into these systems has been firmly established. The key challenge this paper addresses is that maturing this discipline requires the development of techniques, tools, and processes for objectively, rigorously, and quantitatively measuring the attributes of cyber resilience. Rese… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

    Comments: 6 pages, 2022 IEEE Military Communications Conference, pp. 855-860

  6. arXiv:2010.04905  [pdf, other

    cond-mat.mtrl-sci cs.LG physics.comp-ph

    Accelerating Finite-temperature Kohn-Sham Density Functional Theory with Deep Neural Networks

    Authors: J. Austin Ellis, Lenz Fiedler, Gabriel A. Popoola, Normand A. Modine, J. Adam Stephens, Aidan P. Thompson, Attila Cangi, Sivasankaran Rajamanickam

    Abstract: We present a numerical modeling workflow based on machine learning (ML) which reproduces the the total energies produced by Kohn-Sham density functional theory (DFT) at finite electronic temperature to within chemical accuracy at negligible computational cost. Based on deep neural networks, our workflow yields the local density of states (LDOS) for a given atomic configuration. From the LDOS, spat… ▽ More

    Submitted 9 July, 2021; v1 submitted 10 October, 2020; originally announced October 2020.

    Journal ref: Phys. Rev. B 104, 035120 (2021)

  7. arXiv:2004.02035  [pdf, ps, other

    cs.DS

    Correction to: A Practical, Provably Linear Time, In-place and Stable Merge Algorithm via the Perfect Shuffle

    Authors: John Ellis, Ulrike Stege

    Abstract: We correct a paper previously submitted to CoRR. That paper claimed that the algorithm there described was provably of linear time complexity in the average case. The alleged proof of that statement contained an error, being based on an invalid assumption, and is invalid. In this paper we present both experimental and analytical evidence that the time complexity is of order $N^2$ in the average ca… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

    Comments: 13 pages, 5 figures

  8. arXiv:1809.09846  [pdf, other

    cs.HC

    Co-sleep: Designing a workplace-based wellness program for sleep deprivation

    Authors: Bing Zhai, Stuart Nicholson, Kyle Montague, Yu Guan, Patrick Olivier, Jason Ellis

    Abstract: Sleep deprivation is a public health issue. Awareness of sleep deprivation has not been widely investigated in workplace-based wellness programmes. This study adopted a three-stage design process with nine participants from a local manufacturing company to help raise awareness of sleep deprivation. The common causes of sleep deprivation were identified through the deployment of technology probes a… ▽ More

    Submitted 16 March, 2020; v1 submitted 26 September, 2018; originally announced September 2018.

    Comments: 11 pages, 3 figures

  9. arXiv:1808.06969  [pdf, other

    cs.ET

    Robust Chemical Circuits

    Authors: Samuel J. Ellis, Titus H. Klinge, James I. Lathrop

    Abstract: We introduce a new motif for constructing robust digital logic circuits using input/output chemical reaction networks. These chemical circuits robustly handle perturbations in input signals, initial concentrations, rate constants, and measurements. In particular, we show that all combinatorial circuits and several sequential circuits enjoy this robustness. Our results complement existing literatur… ▽ More

    Submitted 21 August, 2018; originally announced August 2018.

  10. arXiv:1710.09494  [pdf, other

    cs.ET

    Runtime Fault Detection in Programmed Molecular Systems

    Authors: Samuel J. Ellis, Titus H. Klinge, James I. Lathrop, Jack H. Lutz, Robyn R. Lutz, Andrew S. Miner, Hugh D. Potter

    Abstract: Watchdog timers are devices that are commonly used to monitor the health of safety-critical hardware and software systems. Their primary function is to raise an alarm if the monitored systems fail to emit periodic "heartbeats" that signal their well-being. In this paper we design and verify a molecular watchdog timer for monitoring the health of programmed molecular nanosystems. This raises new ch… ▽ More

    Submitted 23 July, 2018; v1 submitted 25 October, 2017; originally announced October 2017.

  11. arXiv:1703.06339  [pdf, other

    cs.CV

    PatternNet: Visual Pattern Mining with Deep Neural Network

    Authors: Hongzhi Li, Joseph G. Ellis, Lei Zhang, Shih-Fu Chang

    Abstract: Visual patterns represent the discernible regularity in the visual world. They capture the essential nature of visual objects or scenes. Understanding and modeling visual patterns is a fundamental problem in visual recognition that has wide ranging applications. In this paper, we study the problem of visual pattern mining and propose a novel deep neural network architecture called PatternNet for d… ▽ More

    Submitted 13 June, 2018; v1 submitted 18 March, 2017; originally announced March 2017.

  12. arXiv:1601.00022  [pdf, other

    cs.CV

    Event Specific Multimodal Pattern Mining with Image-Caption Pairs

    Authors: Hongzhi Li, Joseph G. Ellis, Shih-Fu Chang

    Abstract: In this paper we describe a novel framework and algorithms for discovering image patch patterns from a large corpus of weakly supervised image-caption pairs generated from news events. Current pattern mining techniques attempt to find patterns that are representative and discriminative, we stipulate that our discovered patterns must also be recognizable by humans and preferably with meaningful nam… ▽ More

    Submitted 4 January, 2016; v1 submitted 31 December, 2015; originally announced January 2016.

  13. arXiv:1508.00292  [pdf, ps, other

    cs.DS

    A Provably, Linear Time, In-place and Stable Merge Algorithm via the Perfect Shuffle

    Authors: John Ellis, Ulrike Stege

    Abstract: We reconsider a recently published algorithm (Dalkilic et al.) for merging lists by way of the perfect shuffle. The original publication gave only experimental results which, although consistent with linear execution time on the samples tested, provided no analysis. Here we prove that the time complexity, in the average case, is indeed linear, although there is an Omega(n^2) worst case. This is th… ▽ More

    Submitted 2 August, 2015; originally announced August 2015.

    Comments: 12 pages, 2 figures

  14. arXiv:1506.07504  [pdf, ps, other

    stat.ML cs.AI cs.GT cs.LG stat.AP

    Objective Variables for Probabilistic Revenue Maximization in Second-Price Auctions with Reserve

    Authors: Maja R. Rudolph, Joseph G. Ellis, David M. Blei

    Abstract: Many online companies sell advertisement space in second-price auctions with reserve. In this paper, we develop a probabilistic method to learn a profitable strategy to set the reserve price. We use historical auction data with features to fit a predictor of the best reserve price. This problem is delicate - the structure of the auction is such that a reserve price set too high is much worse than… ▽ More

    Submitted 24 June, 2015; originally announced June 2015.

  15. arXiv:1204.1958  [pdf, ps, other

    cs.DS

    Parallel and sequential in-place permuting and perfect shuffling using involutions

    Authors: Qingxuan Yang, John Ellis, Khalegh Mamakani, Frank Ruskey

    Abstract: We show that any permutation of ${1,2,...,N}$ can be written as the product of two involutions. As a consequence, any permutation of the elements of an array can be performed in-place in parallel in time O(1). In the case where the permutation is the $k$-way perfect shuffle we develop two methods for efficiently computing such a pair of involutions. The first method works whenever $N$ is a power… ▽ More

    Submitted 14 January, 2013; v1 submitted 9 April, 2012; originally announced April 2012.