Skip to main content

Showing 1–11 of 11 results for author: Krüger, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.10091  [pdf

    cs.HC cs.AI

    AI and the Future of Work in Africa White Paper

    Authors: Jacki O'Neill, Vukosi Marivate, Barbara Glover, Winnie Karanu, Girmaw Abebe Tadesse, Akua Gyekye, Anne Makena, Wesley Rosslyn-Smith, Matthew Grollnek, Charity Wayua, Rehema Baguma, Angel Maduke, Sarah Spencer, Daniel Kandie, Dennis Ndege Maari, Natasha Mutangana, Maxamed Axmed, Nyambura Kamau, Muhammad Adamu, Frank Swaniker, Brian Gatuguti, Jonathan Donner, Mark Graham, Janet Mumo, Caroline Mbindyo , et al. (50 additional authors not shown)

    Abstract: This white paper is the output of a multidisciplinary workshop in Nairobi (Nov 2023). Led by a cross-organisational team including Microsoft Research, NEPAD, Lelapa AI, and University of Oxford. The workshop brought together diverse thought-leaders from various sectors and backgrounds to discuss the implications of Generative AI for the future of work in Africa. Discussions centred around four key… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

  2. arXiv:2311.12786  [pdf, other

    cs.LG

    Mechanistically analyzing the effects of fine-tuning on procedurally defined tasks

    Authors: Samyak Jain, Robert Kirk, Ekdeep Singh Lubana, Robert P. Dick, Hidenori Tanaka, Edward Grefenstette, Tim Rocktäschel, David Scott Krueger

    Abstract: Fine-tuning large pre-trained models has become the de facto strategy for developing both task-specific and general-purpose machine learning systems, including developing models that are safe to deploy. Despite its clear importance, there has been minimal work that explains how fine-tuning alters the underlying capabilities learned by a model during pretraining: does fine-tuning yield entirely nov… ▽ More

    Submitted 21 August, 2024; v1 submitted 21 November, 2023; originally announced November 2023.

  3. arXiv:2307.05814  [pdf, other

    cs.CR cs.GT

    Time Moves Faster When There is Nothing You Anticipate: The Role of Time in MEV Rewards

    Authors: Burak Öz, Benjamin Kraner, Nicolò Vallarano, Bingle Stegmann Kruger, Florian Matthes, Claudio Juan Tessone

    Abstract: This study explores the intricacies of waiting games, a novel dynamic that emerged with Ethereum's transition to a Proof-of-Stake (PoS)-based block proposer selection protocol. Within this PoS framework, validators acquire a distinct monopoly position during their assigned slots, given that block proposal rights are set deterministically, contrasting with Proof-of-Work (PoW) protocols. Consequentl… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

    Comments: 23 pages, 13 figures, 3 appendices

  4. arXiv:2303.14604  [pdf, other

    cs.LG

    Green Federated Learning

    Authors: Ashkan Yousefpour, Shen Guo, Ashish Shenoy, Sayan Ghosh, Pierre Stock, Kiwan Maeng, Schalk-Willem Krüger, Michael Rabbat, Carole-Jean Wu, Ilya Mironov

    Abstract: The rapid progress of AI is fueled by increasingly large and computationally intensive machine learning models and datasets. As a consequence, the amount of compute used in training state-of-the-art models is exponentially increasing (doubling every 10 months between 2015 and 2022), resulting in a large carbon footprint. Federated Learning (FL) - a collaborative machine learning technique for trai… ▽ More

    Submitted 1 August, 2023; v1 submitted 25 March, 2023; originally announced March 2023.

  5. arXiv:2204.06447  [pdf, ps, other

    cs.SE

    CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite

    Authors: Michael Schlichtig, Anna-Katharina Wickert, Stefan Krüger, Eric Bodden, Mira Mezini

    Abstract: Context: Cryptographic APIs are often misused in real-world applications. Therefore, many cryptographic API misuse detection tools have been introduced. However, there exists no established reference benchmark for a fair and comprehensive comparison and evaluation of these tools. While there are benchmarks, they often only address a subset of the domain or were only used to evaluate a subset of ex… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

    Comments: 8 pages, accepted at the MSR 2022 Registered Reports Track as a In-Principal Acceptance (IPA)

  6. arXiv:2201.00967  [pdf, other

    cs.SE

    The PETSc Community Is the Infrastructure

    Authors: Mark Adams, Satish Balay, Oana Marin, Lois Curfman McInnes, Richard Tran Mills, Todd Munson, Hong Zhang, Junchao Zhang, Jed Brown, Victor Eijkhout, Jacob Faibussowitsch, Matthew Knepley, Fande Kong, Scott Kruger, Patrick Sanan, Barry F. Smith, Hong Zhang

    Abstract: The communities who develop and support open source scientific software packages are crucial to the utility and success of such packages. Moreover, these communities form an important part of the human infrastructure that enables scientific progress. This paper discusses aspects of the PETSc (Portable Extensible Toolkit for Scientific Computation) community, its organization, and technical approac… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

  7. arXiv:2105.04950  [pdf, other

    cs.CR cs.SE

    Dealing with Variability in API Misuse Specification

    Authors: Rodrigo Bonifacio, Stefan Krüger, Krishna Narasimhan, Eric Bodden, Mira Mezini

    Abstract: APIs are the primary mechanism for developers to gain access to externally defined services and tools. However, previous research has revealed API misuses that violate the contract of APIs to be prevalent. Such misuses can have harmful consequences, especially in the context of cryptographic libraries. Various API misuse detectors have been proposed to address this issue including CogniCrypt, one… ▽ More

    Submitted 17 May, 2021; v1 submitted 11 May, 2021; originally announced May 2021.

    Comments: 28 pages, 16 figures

    MSC Class: 68N19 ACM Class: D.2.1; D.3.3

  8. arXiv:2011.00715  [pdf, other

    cs.MS cs.DC

    Toward Performance-Portable PETSc for GPU-based Exascale Systems

    Authors: Richard Tran Mills, Mark F. Adams, Satish Balay, Jed Brown, Alp Dener, Matthew Knepley, Scott E. Kruger, Hannah Morgan, Todd Munson, Karl Rupp, Barry F. Smith, Stefano Zampini, Hong Zhang, Junchao Zhang

    Abstract: The Portable Extensible Toolkit for Scientific computation (PETSc) library delivers scalable solvers for nonlinear time-dependent differential and algebraic equations and for numerical optimization.The PETSc design for performance portability addresses fundamental GPU accelerator challenges and stresses flexibility and extensibility by separating the programming model used by the application from… ▽ More

    Submitted 29 September, 2021; v1 submitted 1 November, 2020; originally announced November 2020.

    Comments: 15 pages, 10 figures, 2 tables

    Report number: ANL/MCS-P9401-1020 MSC Class: 65F10; 65F50; 68N99; 68W10 ACM Class: G.4

  9. arXiv:1908.01489  [pdf, other

    cs.CR cs.SE

    The Impact of Developer Experience in Using Java Cryptography

    Authors: Mohammadreza Hazhirpasand, Mohammad Ghafari, Stefan Krüger, Eric Bodden, Oscar Nierstrasz

    Abstract: Previous research has shown that crypto APIs are hard for developers to understand and difficult for them to use. They consequently rely on unvalidated boilerplate code from online resources where security vulnerabilities are common. We analyzed 2,324 open-source Java projects that rely on Java Cryptography Architecture (JCA) to understand how crypto APIs are used in practice, and what factors a… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

    Comments: The ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)

  10. arXiv:1801.04894  [pdf, other

    cs.SE

    Debugging Static Analysis

    Authors: Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden

    Abstract: To detect and fix bugs and security vulnerabilities, software companies use static analysis as part of the development process. However, static analysis code itself is also prone to bugs. To ensure a consistent level of precision, as analyzed programs grow more complex, a static analysis has to handle more code constructs, frameworks, and libraries that the programs use. While more complex analyse… ▽ More

    Submitted 15 January, 2018; originally announced January 2018.

  11. arXiv:1710.00564  [pdf, ps, other

    cs.SE

    CrySL: Validating Correct Usage of Cryptographic APIs

    Authors: Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini

    Abstract: Various studies have empirically shown that the majority of Java and Android apps misuse cryptographic libraries, causing devastating breaches of data security. Therefore, it is crucial to detect such misuses early in the development process. The fact that insecure usages are not the exception but the norm precludes approaches based on property inference and anomaly detection. In this paper, we… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: 11 pages