Skip to main content

Showing 1–50 of 82 results for author: More, S

Searching in archive cs. Search in all archives.
.
  1. Rod Bustall: In Memoriam

    Authors: J Strother Moore, Gordon Plotkin, David Rydeheard, Don Sannella

    Abstract: This is an obituary of Rod Burstall, written in his honour. Rod was a prominent computer scientist whose contributions span over forty years. Most of his career was spent at Edinburgh University. He lead the team programming Freddy, the first hand-eye assembly robot, with much of his effort being devoted to the development of the POP-2 programming language. He became interested in a mathematical a… ▽ More

    Submitted 9 May, 2025; originally announced May 2025.

    Comments: This is an obituary of a prominent computer scientist

  2. arXiv:2504.15472  [pdf, other

    cs.RO cs.LG eess.SY

    LAPP: Large Language Model Feedback for Preference-Driven Reinforcement Learning

    Authors: Pingcheng Jian, Xiao Wei, Yanbaihui Liu, Samuel A. Moore, Michael M. Zavlanos, Boyuan Chen

    Abstract: We introduce Large Language Model-Assisted Preference Prediction (LAPP), a novel framework for robot learning that enables efficient, customizable, and expressive behavior acquisition with minimum human effort. Unlike prior approaches that rely heavily on reward engineering, human demonstrations, motion capture, or expensive pairwise preference labels, LAPP leverages large language models (LLMs) t… ▽ More

    Submitted 21 April, 2025; originally announced April 2025.

  3. arXiv:2503.15448  [pdf, other

    cs.DC cs.LG

    Reducing Communication Overhead in Federated Learning for Network Anomaly Detection with Adaptive Client Selection

    Authors: William Marfo, Deepak Tosh, Shirley Moore, Joshua Suetterlein, Joseph Manzano

    Abstract: Communication overhead in federated learning (FL) poses a significant challenge for network anomaly detection systems, where diverse client configurations and network conditions impact efficiency and detection accuracy. Existing approaches attempt optimization individually but struggle to balance reduced overhead with performance. This paper presents an adaptive FL framework combining batch size o… ▽ More

    Submitted 19 March, 2025; originally announced March 2025.

  4. arXiv:2503.10533  [pdf, other

    cs.CL cs.AI cs.CY

    The Impact of Item-Writing Flaws on Difficulty and Discrimination in Item Response Theory

    Authors: Robin Schmucker, Steven Moore

    Abstract: High-quality test items are essential for educational assessments, particularly within Item Response Theory (IRT). Traditional validation methods rely on resource-intensive pilot testing to estimate item difficulty and discrimination. More recently, Item-Writing Flaw (IWF) rubrics emerged as a domain-general approach for evaluating test items based on textual features. However, their relationship… ▽ More

    Submitted 13 March, 2025; originally announced March 2025.

  5. arXiv:2503.05700  [pdf, other

    cs.DC cs.NI

    Network Anomaly Detection in Distributed Edge Computing Infrastructure

    Authors: William Marfo, Enrique A. Rico, Deepak K. Tosh, Shirley V. Moore

    Abstract: As networks continue to grow in complexity and scale, detecting anomalies has become increasingly challenging, particularly in diverse and geographically dispersed environments. Traditional approaches often struggle with managing the computational burden associated with analyzing large-scale network traffic to identify anomalies. This paper introduces a distributed edge computing framework that in… ▽ More

    Submitted 24 January, 2025; originally announced March 2025.

  6. arXiv:2502.00036  [pdf, other

    cs.LG cs.AI cs.DC

    Efficient Client Selection in Federated Learning

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Federated Learning (FL) enables decentralized machine learning while preserving data privacy. This paper proposes a novel client selection framework that integrates differential privacy and fault tolerance. The adaptive client selection adjusts the number of clients based on performance and system constraints, with noise added to protect privacy. Evaluated on the UNSW-NB15 and ROAD datasets for ne… ▽ More

    Submitted 24 January, 2025; originally announced February 2025.

  7. arXiv:2501.16666  [pdf, other

    cs.LG cs.AI

    Federated Learning for Efficient Condition Monitoring and Anomaly Detection in Industrial Cyber-Physical Systems

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Detecting and localizing anomalies in cyber-physical systems (CPS) has become increasingly challenging as systems grow in complexity, particularly due to varying sensor reliability and node failures in distributed environments. While federated learning (FL) provides a foundation for distributed model training, existing approaches often lack mechanisms to address these CPS-specific challenges. This… ▽ More

    Submitted 27 January, 2025; originally announced January 2025.

  8. arXiv:2501.15038  [pdf, other

    cs.LG cs.AI

    Adaptive Client Selection in Federated Learning: A Network Anomaly Detection Use Case

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Federated Learning (FL) has become a widely used approach for training machine learning models on decentralized data, addressing the significant privacy concerns associated with traditional centralized methods. However, the efficiency of FL relies on effective client selection and robust privacy preservation mechanisms. Ineffective client selection can result in suboptimal model performance, while… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

  9. arXiv:2501.10153  [pdf

    cs.LG cs.AI

    Region-wise stacking ensembles for estimating brain-age using MRI

    Authors: Georgios Antonopoulos, Shammi More, Simon B. Eickhoff, Federico Raimondo, Kaustubh R. Patil

    Abstract: Predictive modeling using structural magnetic resonance imaging (MRI) data is a prominent approach to study brain-aging. Machine learning algorithms and feature extraction methods have been employed to improve predictions and explore healthy and accelerated aging e.g. neurodegenerative and psychiatric disorders. The high-dimensional MRI data pose challenges to building generalizable and interpreta… ▽ More

    Submitted 17 January, 2025; originally announced January 2025.

    Comments: version1

  10. arXiv:2411.15640  [pdf, other

    cs.CL

    AfriMed-QA: A Pan-African, Multi-Specialty, Medical Question-Answering Benchmark Dataset

    Authors: Tobi Olatunji, Charles Nimo, Abraham Owodunni, Tassallah Abdullahi, Emmanuel Ayodele, Mardhiyah Sanni, Chinemelu Aka, Folafunmi Omofoye, Foutse Yuehgoh, Timothy Faniran, Bonaventure F. P. Dossou, Moshood Yekini, Jonas Kemp, Katherine Heller, Jude Chidubem Omeke, Chidi Asuzu MD, Naome A. Etori, Aimérou Ndiaye, Ifeoma Okoh, Evans Doe Ocansey, Wendy Kinara, Michael Best, Irfan Essa, Stephen Edward Moore, Chris Fourie , et al. (1 additional authors not shown)

    Abstract: Recent advancements in large language model(LLM) performance on medical multiple choice question (MCQ) benchmarks have stimulated interest from healthcare providers and patients globally. Particularly in low-and middle-income countries (LMICs) facing acute physician shortages and lack of specialists, LLMs offer a potentially scalable pathway to enhance healthcare access and reduce costs. However,… ▽ More

    Submitted 14 January, 2025; v1 submitted 23 November, 2024; originally announced November 2024.

  11. arXiv:2411.10532  [pdf, other

    cs.DC cond-mat.mtrl-sci physics.comp-ph

    Breaking the mold: overcoming the time constraints of molecular dynamics on general-purpose hardware

    Authors: Danny Perez, Aidan Thompson, Stan Moore, Tomas Oppelstrup, Ilya Sharapov, Kylee Santos, Amirali Sharifian, Delyan Z. Kalchev, Robert Schreiber, Scott Pakin, Edgar A. Leon, James H. Laros III, Michael James, Sivasankaran Rajamanickam

    Abstract: The evolution of molecular dynamics (MD) simulations has been intimately linked to that of computing hardware. For decades following the creation of MD, simulations have improved with computing power along the three principal dimensions of accuracy, atom count (spatial scale), and duration (temporal scale). Since the mid-2000s, computer platforms have however failed to provide strong scaling for M… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

    Journal ref: Journal of Chemical Physics 2025, 162(7), 072501

  12. arXiv:2411.00989  [pdf, other

    cs.LG math.DS physics.comp-ph

    Automated Global Analysis of Experimental Dynamics through Low-Dimensional Linear Embeddings

    Authors: Samuel A. Moore, Brian P. Mann, Boyuan Chen

    Abstract: Dynamical systems theory has long provided a foundation for understanding evolving phenomena across scientific domains. Yet, the application of this theory to complex real-world systems remains challenging due to issues in mathematical modeling, nonlinearity, and high dimensionality. In this work, we introduce a data-driven computational framework to derive low-dimensional linear models for nonlin… ▽ More

    Submitted 1 November, 2024; originally announced November 2024.

    Comments: http://generalroboticslab.com/AutomatedGlobalAnalysis

  13. arXiv:2409.20342  [pdf

    eess.IV cs.CV

    AI generated annotations for Breast, Brain, Liver, Lungs and Prostate cancer collections in National Cancer Institute Imaging Data Commons

    Authors: Gowtham Krishnan Murugesan, Diana McCrumb, Rahul Soni, Jithendra Kumar, Leonard Nuernberg, Linmin Pei, Ulrike Wagner, Sutton Granger, Andrey Y. Fedorov, Stephen Moore, Jeff Van Oss

    Abstract: AI in Medical Imaging project aims to enhance the National Cancer Institute's (NCI) Image Data Commons (IDC) by developing nnU-Net models and providing AI-assisted segmentations for cancer radiology images. We created high-quality, AI-annotated imaging datasets for 11 IDC collections. These datasets include images from various modalities, such as computed tomography (CT) and magnetic resonance ima… ▽ More

    Submitted 30 September, 2024; originally announced September 2024.

  14. arXiv:2409.02332  [pdf, other

    cs.LG econ.EM stat.AP stat.ME

    Double Machine Learning at Scale to Predict Causal Impact of Customer Actions

    Authors: Sushant More, Priya Kotwal, Sujith Chappidi, Dinesh Mandalapu, Chris Khawand

    Abstract: Causal Impact (CI) of customer actions are broadly used across the industry to inform both short- and long-term investment decisions of various types. In this paper, we apply the double machine learning (DML) methodology to estimate the CI values across 100s of customer actions of business interest and 100s of millions of customers. We operationalize DML through a causal ML library based on Spark… ▽ More

    Submitted 3 September, 2024; originally announced September 2024.

    Comments: 16 pages, 11 figures. Accepted at the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD) 2023, Turin, Italy

    Journal ref: Lecture Notes in Computer Science, vol 14174. (2023) Springer, Cham

  15. arXiv:2408.11967  [pdf, other

    cs.LG econ.EM stat.AP

    Valuing an Engagement Surface using a Large Scale Dynamic Causal Model

    Authors: Abhimanyu Mukerji, Sushant More, Ashwin Viswanathan Kannan, Lakshmi Ravi, Hua Chen, Naman Kohli, Chris Khawand, Dinesh Mandalapu

    Abstract: With recent rapid growth in online shopping, AI-powered Engagement Surfaces (ES) have become ubiquitous across retail services. These engagement surfaces perform an increasing range of functions, including recommending new products for purchase, reminding customers of their orders and providing delivery notifications. Understanding the causal effect of engagement surfaces on value driven for custo… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: 10 pages, 5 figures. Accepted at Applied Data Science track of KDD 2024, Barcelona, Spain

  16. arXiv:2408.05427  [pdf, other

    cs.CR cs.LG

    Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning

    Authors: William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore

    Abstract: Modern vehicles rely on a myriad of electronic control units (ECUs) interconnected via controller area networks (CANs) for critical operations. Despite their ubiquitous use and reliability, CANs are susceptible to sophisticated cyberattacks, particularly masquerade attacks, which inject false data that mimic legitimate messages at the expected frequency. These attacks pose severe risks such as uni… ▽ More

    Submitted 10 August, 2024; originally announced August 2024.

  17. arXiv:2408.03906  [pdf, other

    cs.RO

    Achieving Human Level Competitive Robot Table Tennis

    Authors: David B. D'Ambrosio, Saminda Abeyruwan, Laura Graesser, Atil Iscen, Heni Ben Amor, Alex Bewley, Barney J. Reed, Krista Reymann, Leila Takayama, Yuval Tassa, Krzysztof Choromanski, Erwin Coumans, Deepali Jain, Navdeep Jaitly, Natasha Jaques, Satoshi Kataoka, Yuheng Kuang, Nevena Lazic, Reza Mahjourian, Sherry Moore, Kenneth Oslund, Anish Shankar, Vikas Sindhwani, Vincent Vanhoucke, Grace Vesom , et al. (2 additional authors not shown)

    Abstract: Achieving human-level speed and performance on real world tasks is a north star for the robotics research community. This work takes a step towards that goal and presents the first learned robot agent that reaches amateur human-level performance in competitive table tennis. Table tennis is a physically demanding sport which requires human players to undergo years of training to achieve an advanced… ▽ More

    Submitted 1 May, 2025; v1 submitted 7 August, 2024; originally announced August 2024.

  18. arXiv:2407.16487  [pdf, other

    cs.DC

    DRAM Errors and Cosmic Rays: Space Invaders or Science Fiction?

    Authors: Isaac Boixaderas, Jorge Amaya, Sergi Moré, Javier Bartolome, David Vicente, Osman Unsal, Dimitris Gizopoulos, Paul M. Carpenter, Petar Radojković, Eduard Ayguadé

    Abstract: It is widely accepted that cosmic rays are a plausible cause of DRAM errors in high-performance computing (HPC) systems, and various studies suggest that they could explain some aspects of the observed DRAM error behavior. However, this phenomenon is insufficiently studied in production environments. We analyze the correlations between cosmic rays and DRAM errors on two HPC clusters: a production… ▽ More

    Submitted 1 November, 2024; v1 submitted 23 July, 2024; originally announced July 2024.

    Comments: Accepted for publication in SBAC-PAD'24

  19. Reinforcement Learning-based Adaptive Mitigation of Uncorrected DRAM Errors in the Field

    Authors: Isaac Boixaderas, Sergi Moré, Javier Bartolome, David Vicente, Petar Radojković, Paul M. Carpenter, Eduard Ayguadé

    Abstract: Scaling to larger systems, with current levels of reliability, requires cost-effective methods to mitigate hardware failures. One of the main causes of hardware failure is an uncorrected error in memory, which terminates the current job and wastes all computation since the last checkpoint. This paper presents the first adaptive method for triggering uncorrected error mitigation. It uses a predicti… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

    Comments: Published in HPDC'24

  20. arXiv:2406.01518  [pdf, other

    cs.CR

    BISON: Blind Identification with Stateless scOped pseudoNyms

    Authors: Jakob Heher, Stefan More, Lena Heimberger

    Abstract: Delegating authentication to identity providers like Google or Facebook, while convenient, compromises user privacy. These identity providers can record users' every move; the global identifiers they provide also enable internet-wide tracking. We show that neither is a necessary evil by presenting the BISON pseudonym derivation protocol, inspired by Oblivious Pseudorandom Functions. It hides the… ▽ More

    Submitted 17 July, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: Paper artifacts (Source code, Firefox extension, etc) available at https://github.com/iaik-jheher/BISON | Previous paper name: "BISON: Blind Identification through Stateless scOpe-specific derivatioN"

  21. arXiv:2405.20529  [pdf

    cs.AI cs.CL

    An Automatic Question Usability Evaluation Toolkit

    Authors: Steven Moore, Eamon Costello, Huy A. Nguyen, John Stamper

    Abstract: Evaluating multiple-choice questions (MCQs) involves either labor intensive human assessments or automated methods that prioritize readability, often overlooking deeper question design flaws. To address this issue, we introduce the Scalable Automatic Question Usability Evaluation Toolkit (SAQUET), an open-source tool that leverages the Item-Writing Flaws (IWF) rubric for a comprehensive and automa… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: Artificial Intelligence in Education 2024

  22. Automated Generation and Tagging of Knowledge Components from Multiple-Choice Questions

    Authors: Steven Moore, Robin Schmucker, Tom Mitchell, John Stamper

    Abstract: Knowledge Components (KCs) linked to assessments enhance the measurement of student learning, enrich analytics, and facilitate adaptivity. However, generating and linking KCs to assessment items requires significant effort and domain-specific knowledge. To streamline this process for higher-education courses, we employed GPT-4 to generate KCs for multiple-choice questions (MCQs) in Chemistry and E… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: Learning @ Scale 2024

  23. arXiv:2405.07898  [pdf, other

    physics.comp-ph cs.DC cs.ET

    Breaking the Molecular Dynamics Timescale Barrier Using a Wafer-Scale System

    Authors: Kylee Santos, Stan Moore, Tomas Oppelstrup, Amirali Sharifian, Ilya Sharapov, Aidan Thompson, Delyan Z Kalchev, Danny Perez, Robert Schreiber, Scott Pakin, Edgar A Leon, James H Laros III, Michael James, Sivasankaran Rajamanickam

    Abstract: Molecular dynamics (MD) simulations have transformed our understanding of the nanoscale, driving breakthroughs in materials science, computational chemistry, and several other fields, including biophysics and drug design. Even on exascale supercomputers, however, runtimes are excessive for systems and timescales of scientific interest. Here, we demonstrate strong scaling of MD simulations on the C… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 10 pages, 10 figures, 5 tables

    Journal ref: SC '24: Proceedings of the International Conference for High Performance Computing, Networking, Storage, and Analysis, 2024, Article No. 8

  24. arXiv:2402.01580  [pdf, other

    cs.CY cs.AI

    Generative AI for Education (GAIED): Advances, Opportunities, and Challenges

    Authors: Paul Denny, Sumit Gulwani, Neil T. Heffernan, Tanja Käser, Steven Moore, Anna N. Rafferty, Adish Singla

    Abstract: This survey article has grown out of the GAIED (pronounced "guide") workshop organized by the authors at the NeurIPS 2023 conference. We organized the GAIED workshop as part of a community-building effort to bring together researchers, educators, and practitioners to explore the potential of generative AI for enhancing education. This article aims to provide an overview of the workshop activities… ▽ More

    Submitted 6 February, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

  25. arXiv:2312.11283  [pdf, other

    stat.AP cs.CR econ.EM

    The 2010 Census Confidentiality Protections Failed, Here's How and Why

    Authors: John M. Abowd, Tamara Adams, Robert Ashmead, David Darais, Sourya Dey, Simson L. Garfinkel, Nathan Goldschlag, Daniel Kifer, Philip Leclerc, Ethan Lew, Scott Moore, Rolando A. Rodríguez, Ramy N. Tadros, Lars Vilhuber

    Abstract: Using only 34 published tables, we reconstruct five variables (census block, sex, age, race, and ethnicity) in the confidential 2010 Census person records. Using the 38-bin age variable tabulated at the census block level, at most 20.1% of reconstructed records can differ from their confidential source on even a single value for these five variables. Using only published data, an attacker can veri… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  26. arXiv:2311.16115  [pdf

    cs.CR cs.AI cs.CY cs.HC

    AI and Democracy's Digital Identity Crisis

    Authors: Shrey Jain, Connor Spelliscy, Samuel Vance-Law, Scott Moore

    Abstract: AI-enabled tools have become sophisticated enough to allow a small number of individuals to run disinformation campaigns of an unprecedented scale. Privacy-preserving identity attestations can drastically reduce instances of impersonation and make disinformation easy to identify and potentially hinder. By understanding how identity attestations are positioned across the spectrum of decentralizatio… ▽ More

    Submitted 25 September, 2023; originally announced November 2023.

  27. arXiv:2311.09828  [pdf, other

    cs.CL

    AfriMTE and AfriCOMET: Enhancing COMET to Embrace Under-resourced African Languages

    Authors: Jiayi Wang, David Ifeoluwa Adelani, Sweta Agrawal, Marek Masiak, Ricardo Rei, Eleftheria Briakou, Marine Carpuat, Xuanli He, Sofia Bourhim, Andiswa Bukula, Muhidin Mohamed, Temitayo Olatoye, Tosin Adewumi, Hamam Mokayed, Christine Mwase, Wangui Kimotho, Foutse Yuehgoh, Anuoluwapo Aremu, Jessica Ojo, Shamsuddeen Hassan Muhammad, Salomey Osei, Abdul-Hakeem Omotayo, Chiamaka Chukwuneke, Perez Ogayo, Oumaima Hourrane , et al. (33 additional authors not shown)

    Abstract: Despite the recent progress on scaling multilingual machine translation (MT) to several under-resourced African languages, accurately measuring this progress remains challenging, since evaluation is often performed on n-gram matching metrics such as BLEU, which typically show a weaker correlation with human judgments. Learned metrics such as COMET have higher correlation; however, the lack of eval… ▽ More

    Submitted 23 April, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: Accepted by NAACL 2024

  28. arXiv:2311.08856  [pdf, ps, other

    cs.AI cs.LO cs.SE

    Advances in ACL2 Proof Debugging Tools

    Authors: Matt Kaufmann, J Strother Moore

    Abstract: The experience of an ACL2 user generally includes many failed proof attempts. A key to successful use of the ACL2 prover is the effective use of tools to debug those failures. We focus on changes made after ACL2 Version 8.5: the improved break-rewrite utility and the new utility, with-brr-data.

    Submitted 15 November, 2023; originally announced November 2023.

    Comments: In Proceedings ACL2-2023, arXiv:2311.08373

    Journal ref: EPTCS 393, 2023, pp. 67-81

  29. arXiv:2311.01574  [pdf

    eess.IV cs.CV cs.LG

    Improving Lesion Segmentation in FDG-18 Whole-Body PET/CT scans using Multilabel approach: AutoPET II challenge

    Authors: Gowtham Krishnan Murugesan, Diana McCrumb, Eric Brunner, Jithendra Kumar, Rahul Soni, Vasily Grigorash, Stephen Moore, Jeff Van Oss

    Abstract: Automatic segmentation of lesions in FDG-18 Whole Body (WB) PET/CT scans using deep learning models is instrumental for determining treatment response, optimizing dosimetry, and advancing theranostic applications in oncology. However, the presence of organs with elevated radiotracer uptake, such as the liver, spleen, brain, and bladder, often leads to challenges, as these regions are often misiden… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: AutoPET II challenge paper

  30. arXiv:2310.14084  [pdf, other

    math.NA cs.CE cs.LG

    Graph Neural Networks and Applied Linear Algebra

    Authors: Nicholas S. Moore, Eric C. Cyr, Peter Ohm, Christopher M. Siefert, Raymond S. Tuminaro

    Abstract: Sparse matrix computations are ubiquitous in scientific computing. With the recent interest in scientific machine learning, it is natural to ask how sparse matrix computations can leverage neural networks (NN). Unfortunately, multi-layer perceptron (MLP) neural networks are typically not natural for either graph or sparse matrix computations. The issue lies with the fact that MLPs require fixed-si… ▽ More

    Submitted 21 October, 2023; originally announced October 2023.

    Report number: SAND2023-10755O

  31. arXiv:2310.12568  [pdf, other

    cs.LG q-bio.NC

    Julearn: an easy-to-use library for leakage-free evaluation and inspection of ML models

    Authors: Sami Hamdan, Shammi More, Leonard Sasse, Vera Komeyer, Kaustubh R. Patil, Federico Raimondo

    Abstract: The fast-paced development of machine learning (ML) methods coupled with its increasing adoption in research poses challenges for researchers without extensive training in ML. In neuroscience, for example, ML can help understand brain-behavior relationships, diagnose diseases, and develop biomarkers using various data sources like magnetic resonance imaging and electroencephalography. The primary… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: 13 pages, 5 figures

  32. arXiv:2310.08864  [pdf, other

    cs.RO

    Open X-Embodiment: Robotic Learning Datasets and RT-X Models

    Authors: Open X-Embodiment Collaboration, Abby O'Neill, Abdul Rehman, Abhinav Gupta, Abhiram Maddukuri, Abhishek Gupta, Abhishek Padalkar, Abraham Lee, Acorn Pooley, Agrim Gupta, Ajay Mandlekar, Ajinkya Jain, Albert Tung, Alex Bewley, Alex Herzog, Alex Irpan, Alexander Khazatsky, Anant Rai, Anchit Gupta, Andrew Wang, Andrey Kolobov, Anikait Singh, Animesh Garg, Aniruddha Kembhavi, Annie Xie , et al. (269 additional authors not shown)

    Abstract: Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning method… ▽ More

    Submitted 14 May, 2025; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Project website: https://robotics-transformer-x.github.io

  33. Robotic Table Tennis: A Case Study into a High Speed Learning System

    Authors: David B. D'Ambrosio, Jonathan Abelian, Saminda Abeyruwan, Michael Ahn, Alex Bewley, Justin Boyd, Krzysztof Choromanski, Omar Cortes, Erwin Coumans, Tianli Ding, Wenbo Gao, Laura Graesser, Atil Iscen, Navdeep Jaitly, Deepali Jain, Juhana Kangaspunta, Satoshi Kataoka, Gus Kouretas, Yuheng Kuang, Nevena Lazic, Corey Lynch, Reza Mahjourian, Sherry Q. Moore, Thinh Nguyen, Ken Oslund , et al. (10 additional authors not shown)

    Abstract: We present a deep-dive into a real-world robotic learning system that, in previous work, was shown to be capable of hundreds of table tennis rallies with a human and has the ability to precisely return the ball to desired targets. This system puts together a highly optimized perception subsystem, a high-speed low-latency robot controller, a simulation paradigm that can prevent damage in the real w… ▽ More

    Submitted 19 February, 2025; v1 submitted 6 September, 2023; originally announced September 2023.

    Comments: Published and presented at Robotics: Science and Systems (RSS2023)

  34. arXiv:2308.12882  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    LCANets++: Robust Audio Classification using Multi-layer Neural Networks with Lateral Competition

    Authors: Sayanton V. Dibbo, Juston S. Moore, Garrett T. Kenyon, Michael A. Teti

    Abstract: Audio classification aims at recognizing audio signals, including speech commands or sound events. However, current audio classifiers are susceptible to perturbations and adversarial attacks. In addition, real-world audio classification tasks often suffer from limited labeled data. To help bridge these gaps, previous work developed neuro-inspired convolutional neural networks (CNNs) with sparse co… ▽ More

    Submitted 27 March, 2024; v1 submitted 23 August, 2023; originally announced August 2023.

    Comments: Accepted at 2024 IEEE International Conference on Acoustics, Speech and Signal Processing Workshops (ICASSPW)

  35. arXiv:2307.08161  [pdf

    cs.CL cs.AI cs.HC

    Assessing the Quality of Multiple-Choice Questions Using GPT-4 and Rule-Based Methods

    Authors: Steven Moore, Huy A. Nguyen, Tianying Chen, John Stamper

    Abstract: Multiple-choice questions with item-writing flaws can negatively impact student learning and skew analytics. These flaws are often present in student-generated questions, making it difficult to assess their quality and suitability for classroom usage. Existing methods for evaluating multiple-choice questions often focus on machine readability metrics, without considering their intended use within… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

    Comments: Accepted as a Research Paper in 18th European Conference on Technology Enhanced Learning

  36. Learnersourcing in the Age of AI: Student, Educator and Machine Partnerships for Content Creation

    Authors: Hassan Khosravi, Paul Denny, Steven Moore, John Stamper

    Abstract: Engaging students in creating novel content, also referred to as learnersourcing, is increasingly recognised as an effective approach to promoting higher-order learning, deeply engaging students with course material and developing large repositories of content suitable for personalized learning. Despite these benefits, some common concerns and criticisms are associated with learnersourcing (e.g.,… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

  37. arXiv:2303.10473  [pdf

    cs.CR cs.CV eess.IV

    Report of the Medical Image De-Identification (MIDI) Task Group -- Best Practices and Recommendations

    Authors: David A. Clunie, Adam Flanders, Adam Taylor, Brad Erickson, Brian Bialecki, David Brundage, David Gutman, Fred Prior, J Anthony Seibert, John Perry, Judy Wawira Gichoya, Justin Kirby, Katherine Andriole, Luke Geneslaw, Steve Moore, TJ Fitzgerald, Wyatt Tellis, Ying Xiao, Keyvan Farahani

    Abstract: This report addresses the technical aspects of de-identification of medical images of human subjects and biospecimens, such that re-identification risk of ethical, moral, and legal concern is sufficiently reduced to allow unrestricted public sharing for any purpose, regardless of the jurisdiction of the source and distribution sites. All medical images, regardless of the mode of acquisition, are c… ▽ More

    Submitted 16 March, 2025; v1 submitted 18 March, 2023; originally announced March 2023.

    Comments: 138 pages

  38. arXiv:2303.07452  [pdf, other

    cs.LG cs.DC

    Network Anomaly Detection Using Federated Learning

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: Due to the veracity and heterogeneity in network traffic, detecting anomalous events is challenging. The computational load on global servers is a significant challenge in terms of efficiency, accuracy, and scalability. Our primary motivation is to introduce a robust and scalable framework that enables efficient network anomaly detection. We address the issue of scalability and efficiency for netw… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  39. arXiv:2302.11703  [pdf, other

    cs.LG cs.CV cs.HC

    fAIlureNotes: Supporting Designers in Understanding the Limits of AI Models for Computer Vision Tasks

    Authors: Steven Moore, Q. Vera Liao, Hariharan Subramonyam

    Abstract: To design with AI models, user experience (UX) designers must assess the fit between the model and user needs. Based on user research, they need to contextualize the model's behavior and potential failures within their product-specific data instances and user scenarios. However, our formative interviews with ten UX professionals revealed that such a proactive discovery of model limitations is chal… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

  40. arXiv:2301.09030  [pdf, other

    cs.LG

    Condition monitoring and anomaly detection in cyber-physical systems

    Authors: William Marfo, Deepak K. Tosh, Shirley V. Moore

    Abstract: The modern industrial environment is equipping myriads of smart manufacturing machines where the state of each device can be monitored continuously. Such monitoring can help identify possible future failures and develop a cost-effective maintenance plan. However, it is a daunting task to perform early detection with low false positives and negatives from the huge volume of collected data. This req… ▽ More

    Submitted 21 January, 2023; originally announced January 2023.

    Comments: 6 pages

  41. arXiv:2212.06303  [pdf, other

    stat.ME cs.LG stat.ML

    MAntRA: A framework for model agnostic reliability analysis

    Authors: Yogesh Chandrakant Mathpati, Kalpesh Sanjay More, Tapas Tripura, Rajdip Nayek, Souvik Chakraborty

    Abstract: We propose a novel model agnostic data-driven reliability analysis framework for time-dependent reliability analysis. The proposed approach -- referred to as MAntRA -- combines interpretable machine learning, Bayesian statistics, and identifying stochastic dynamic equation to evaluate reliability of stochastically-excited dynamical systems for which the governing physics is \textit{apriori} unknow… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  42. arXiv:2212.02454  [pdf, other

    cs.CR

    Extending Expressive Access Policies with Privacy Features

    Authors: Stefan More, Sebastian Ramacher, Lukas Alber, Marco Herzl

    Abstract: Authentication, authorization, and trust verification are central parts of an access control system. The conditions for granting access in such a system are collected in access policies. Since access conditions are often complex, dedicated languages -- policy languages -- for defining policies are in use. However, current policy languages are unable to express such conditions having privacy of u… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

    Comments: This is the full version of a paper which appears in 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)

  43. arXiv:2208.12264  [pdf, other

    cs.LG stat.AP

    Identifying and Overcoming Transformation Bias in Forecasting Models

    Authors: Sushant More

    Abstract: Log and square root transformations of target variable are routinely used in forecasting models to predict future sales. These transformations often lead to better performing models. However, they also introduce a systematic negative bias (under-forecasting). In this paper, we demonstrate the existence of this bias, dive deep into its root cause and introduce two methods to correct for the bias. W… ▽ More

    Submitted 24 August, 2022; originally announced August 2022.

    Comments: KDD 2022 Workshop on Mining and Learning from Time Series -- Deep Forecasting: Models, Interpretability, and Applications (accepted as a poster)

  44. Offline-verifiable Data from Distributed Ledger-based Registries

    Authors: Stefan More, Jakob Heher, Clemens Walluschek

    Abstract: Trust management systems often use registries to authenticate data, or form trust decisions. Examples are revocation registries and trust status lists. By introducing distributed ledgers (DLs), it is also possible to create decentralized registries. A verifier then queries a node of the respective ledger, e.g., to retrieve trust status information during the verification of a credential. While thi… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: This is the full version of a paper which was presented at the 19th International Conference on Security and Cryptography (SECRYPT '22)

  45. YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

    Authors: Stefan More, Lukas Alber

    Abstract: Personal data is an attractive source of insights for a diverse field of research and business. While our data is highly valuable, it is often privacy-sensitive. Thus, regulations like the GDPR restrict what data can be legally published, and what a buyer may do with this sensitive data. While personal data must be protected, we can still sell some insights gathered from our data that do not hurt… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

    Comments: This paper was published in the 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria, ACM

  46. arXiv:2206.02852  [pdf, other

    cs.CR

    CompartOS: CHERI Compartmentalization for Embedded Systems

    Authors: Hesham Almatary, Michael Dodson, Jessica Clarke, Peter Rugg, Ivan Gomes, Michal Podhradsky, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson

    Abstract: Existing high-end embedded systems face frequent security attacks. Software compartmentalization is one technique to limit the attacks' effects to the compromised compartment and not the entire system. Unfortunately, the existing state-of-the-art embedded hardware-software solutions do not work well to enforce software compartmentalization for high-end embedded systems. MPUs are not fine-grained a… ▽ More

    Submitted 11 June, 2022; v1 submitted 6 June, 2022; originally announced June 2022.

  47. arXiv:2205.11698  [pdf, other

    cs.LO cs.MS cs.SC

    VWSIM: A Circuit Simulator

    Authors: Warren A. Hunt Jr., Vivek Ramanathan, J Strother Moore

    Abstract: VWSIM is a circuit simulator for rapid, single-flux, quantum (RSFQ) circuits. The simulator is designed to model and simulate primitive-circuit devices such as capacitors, inductors, Josephson Junctions, and can be extended to simulate other circuit families, such as CMOS. Circuit models can be provided in the native VWSIM netlist format or as SPICE-compatible netlists, which are flattened and tra… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: In Proceedings ACL2 2022, arXiv:2205.11103

    ACM Class: B.1.2; B.7.2; D.1.1; D.2.4; F.3.1; F.4.1; G.1.3; I.1.3; I.2.3; I.6.4; J.2

    Journal ref: EPTCS 359, 2022, pp. 61-75

  48. arXiv:2205.10564  [pdf, other

    cs.RO

    Shared-Control Robotic Manipulation in Virtual Reality

    Authors: Shiyu Xu, Scott Moore, Akansel Cosgun

    Abstract: In this paper, we present the implementation details of a Virtual Reality (VR)-based teleoperation interface for moving a robotic manipulator. We propose an iterative human-in-the-loop design where the user sets the next task-space waypoint for the robot's end effector and executes the action on the physical robot before setting the next waypoints. Information from the robot's surroundings is prov… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

    Comments: 6 pages, 8 figures, submitted to HORA 2022

  49. arXiv:2201.11872  [pdf, other

    cs.LG stat.ML

    Local Latent Space Bayesian Optimization over Structured Inputs

    Authors: Natalie Maus, Haydn T. Jones, Juston S. Moore, Matt J. Kusner, John Bradshaw, Jacob R. Gardner

    Abstract: Bayesian optimization over the latent spaces of deep autoencoder models (DAEs) has recently emerged as a promising new approach for optimizing challenging black-box functions over structured, discrete, hard-to-enumerate search spaces (e.g., molecules). Here the DAE dramatically simplifies the search space by mapping inputs into a continuous latent space where familiar Bayesian optimization tools c… ▽ More

    Submitted 22 February, 2023; v1 submitted 27 January, 2022; originally announced January 2022.

  50. Enabling particle applications for exascale computing platforms

    Authors: Susan M Mniszewski, James Belak, Jean-Luc Fattebert, Christian FA Negre, Stuart R Slattery, Adetokunbo A Adedoyin, Robert F Bird, Choongseok Chang, Guangye Chen, Stephane Ethier, Shane Fogerty, Salman Habib, Christoph Junghans, Damien Lebrun-Grandie, Jamaludin Mohd-Yusof, Stan G Moore, Daniel Osei-Kuffuor, Steven J Plimpton, Adrian Pope, Samuel Temple Reeve, Lee Ricketson, Aaron Scheinberg, Amil Y Sharma, Michael E Wall

    Abstract: The Exascale Computing Project (ECP) is invested in co-design to assure that key applications are ready for exascale computing. Within ECP, the Co-design Center for Particle Applications (CoPA) is addressing challenges faced by particle-based applications across four sub-motifs: short-range particle-particle interactions (e.g., those which often dominate molecular dynamics (MD) and smoothed partic… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: 26 pages, 17 figures

    Report number: LA-UR-20-26599