Skip to main content

Showing 1–33 of 33 results for author: Perera, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.02881  [pdf, other

    cs.CL

    Better Bill GPT: Comparing Large Language Models against Legal Invoice Reviewers

    Authors: Nick Whitehouse, Nicole Lincoln, Stephanie Yiu, Lizzie Catterson, Rivindu Perera

    Abstract: Legal invoice review is a costly, inconsistent, and time-consuming process, traditionally performed by Legal Operations, Lawyers or Billing Specialists who scrutinise billing compliance line by line. This study presents the first empirical comparison of Large Language Models (LLMs) against human invoice reviewers - Early-Career Lawyers, Experienced Lawyers, and Legal Operations Professionals-asses… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

  2. arXiv:2403.04492  [pdf, other

    cs.CV

    Discriminative Sample-Guided and Parameter-Efficient Feature Space Adaptation for Cross-Domain Few-Shot Learning

    Authors: Rashindrie Perera, Saman Halgamuge

    Abstract: In this paper, we look at cross-domain few-shot classification which presents the challenging task of learning new classes in previously unseen domains with few labelled examples. Existing methods, though somewhat effective, encounter several limitations, which we alleviate through two significant improvements. First, we introduce a lightweight parameter-efficient adaptation strategy to address ov… ▽ More

    Submitted 3 April, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

    Comments: Code is available at this link: https://github.com/rashindrie/DIPA

  3. arXiv:2403.04403  [pdf, other

    cs.PL

    Cognacy Queries over Dependence Graphs for Transparent Visualisations

    Authors: Joseph Bond, Cristina David, Minh Nguyen, Dominic Orchard, Roly Perera

    Abstract: Charts, figures, and text derived from data play an important role in decision making, from data-driven policy development to day-to-day choices informed by online articles. Making sense of, or fact-checking, outputs means understanding how they relate to the underlying data. Even for domain experts with access to the source code and data sets, this poses a significant challenge. In this paper we… ▽ More

    Submitted 15 October, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

  4. arXiv:2402.08863  [pdf, other

    cs.CE

    Multiscale graph neural networks with adaptive mesh refinement for accelerating mesh-based simulations

    Authors: Roberto Perera, Vinamra Agrawal

    Abstract: Mesh-based Graph Neural Networks (GNNs) have recently shown capabilities to simulate complex multiphysics problems with accelerated performance times. However, mesh-based GNNs require a large number of message-passing (MP) steps and suffer from over-smoothing for problems involving very fine mesh. In this work, we develop a multiscale mesh-based GNN framework mimicking a conventional iterative mul… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  5. arXiv:2401.16212  [pdf, other

    cs.CY cs.CL

    Better Call GPT, Comparing Large Language Models Against Lawyers

    Authors: Lauren Martin, Nick Whitehouse, Stephanie Yiu, Lizzie Catterson, Rivindu Perera

    Abstract: This paper presents a groundbreaking comparison between Large Language Models and traditional legal contract reviewers, Junior Lawyers and Legal Process Outsourcers. We dissect whether LLMs can outperform humans in accuracy, speed, and cost efficiency during contract review. Our empirical analysis benchmarks LLMs against a ground truth set by Senior Lawyers, uncovering that advanced models match o… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

    Comments: 16 pages

  6. arXiv:2305.06564  [pdf, other

    cs.CV

    Undercover Deepfakes: Detecting Fake Segments in Videos

    Authors: Sanjay Saha, Rashindrie Perera, Sachith Seneviratne, Tamasha Malepathirana, Sanka Rasnayaka, Deshani Geethika, Terence Sim, Saman Halgamuge

    Abstract: The recent renaissance in generative models, driven primarily by the advent of diffusion models and iterative improvement in GAN methods, has enabled many creative applications. However, each advancement is also accompanied by a rise in the potential for misuse. In the arena of the deepfake generation, this is a key societal issue. In particular, the ability to modify segments of videos using such… ▽ More

    Submitted 24 August, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: ICCV 2023 Workshop and Challenge on DeepFake Analysis and Detection

  7. Effect Handlers for Programmable Inference

    Authors: Minh Nguyen, Roly Perera, Meng Wang, Steven Ramsay

    Abstract: Inference algorithms for probabilistic programming are complex imperative programs with many moving parts. Efficient inference often requires customising an algorithm to a particular probabilistic model or problem, sometimes called inference programming. Most inference frameworks are implemented in languages that lack a disciplined approach to side effects, which can result in monolithic implement… ▽ More

    Submitted 23 December, 2024; v1 submitted 2 March, 2023; originally announced March 2023.

  8. arXiv:2211.12459  [pdf, other

    cond-mat.mtrl-sci cs.LG

    A generalized machine learning framework for brittle crack problems using transfer learning and graph neural networks

    Authors: Roberto Perera, Vinamra Agrawal

    Abstract: Despite their recent success, machine learning (ML) models such as graph neural networks (GNNs), suffer from drawbacks such as the need for large training datasets and poor performance for unseen cases. In this work, we use transfer learning (TL) approaches to circumvent the need for retraining with large datasets. We apply TL to an existing ML framework, trained to predict multiple crack propagat… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  9. Modular Probabilistic Models via Algebraic Effects

    Authors: Minh Nguyen, Roly Perera, Meng Wang, Nicolas Wu

    Abstract: Probabilistic programming languages (PPLs) allow programmers to construct statistical models and then simulate data or perform inference over them. Many PPLs restrict models to a particular instance of simulation or inference, limiting their reusability. In other PPLs, models are not readily composable. Using Haskell as the host language, we present an embedded domain specific language based on al… ▽ More

    Submitted 23 December, 2024; v1 submitted 9 March, 2022; originally announced March 2022.

  10. arXiv:2202.08882  [pdf, other

    cs.CL cs.LG

    Improving English to Sinhala Neural Machine Translation using Part-of-Speech Tag

    Authors: Ravinga Perera, Thilakshi Fonseka, Rashmini Naranpanawa, Uthayasanker Thayasivam

    Abstract: The performance of Neural Machine Translation (NMT) depends significantly on the size of the available parallel corpus. Due to this fact, low resource language pairs demonstrate low translation performance compared to high resource language pairs. The translation quality further degrades when NMT is performed for morphologically rich languages. Even though the web contains a large amount of inform… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

    ACM Class: I.2.7

  11. arXiv:2109.00445  [pdf, other

    cs.PL

    Linked visualisations via Galois dependencies

    Authors: Roly Perera, Minh Nguyen, Tomas Petricek, Meng Wang

    Abstract: We present new language-based dynamic analysis techniques for linking visualisations and other structured outputs to data in a fine-grained way, allowing a user to interactively explore how data attributes map to visual or other output elements by selecting (focusing on) substructures of interest. This can help both programmers and end-users understand how data sources and complex outputs are rela… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: Extended paper with additional supporting material

  12. arXiv:2108.10130  [pdf, other

    cs.DB cs.LG

    No DBA? No regret! Multi-armed bandits for index tuning of analytical and HTAP workloads with provable guarantees

    Authors: R. Malinga Perera, Bastian Oetomo, Benjamin I. P. Rubinstein, Renata Borovica-Gajic

    Abstract: Automating physical database design has remained a long-term interest in database research due to substantial performance gains afforded by optimised structures. Despite significant progress, a majority of today's commercial solutions are highly manual, requiring offline invocation by database administrators (DBAs) who are expected to identify and supply representative training workloads. Even the… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: 25 pages, 20 figures, 5 tables. arXiv admin note: substantial text overlap with arXiv:2010.09208

  13. arXiv:2108.09556  [pdf, ps, other

    stat.AP cs.AI eess.SP

    A generalized forecasting solution to enable future insights of COVID-19 at sub-national level resolutions

    Authors: Umar Marikkar, Harshana Weligampola, Rumali Perera, Jameel Hassan, Suren Sritharan, Gihan Jayatilaka, Roshan Godaliyadda, Vijitha Herath, Parakrama Ekanayake, Janaka Ekanayake, Anuruddhika Rathnayake, Samath Dharmaratne

    Abstract: COVID-19 continues to cause a significant impact on public health. To minimize this impact, policy makers undertake containment measures that however, when carried out disproportionately to the actual threat, as a result if errorneous threat assessment, cause undesirable long-term socio-economic complications. In addition, macro-level or national level decision making fails to consider the localiz… ▽ More

    Submitted 21 August, 2021; originally announced August 2021.

  14. arXiv:2107.10429  [pdf, other

    cs.AI cs.LG cs.NE

    Shedding some light on Light Up with Artificial Intelligence

    Authors: Libo Sun, James Browning, Roberto Perera

    Abstract: The Light-Up puzzle, also known as the AKARI puzzle, has never been solved using modern artificial intelligence (AI) methods. Currently, the most widely used computational technique to autonomously develop solutions involve evolution theory algorithms. This project is an effort to apply new AI techniques for solving the Light-up puzzle faster and more computationally efficient. The algorithms expl… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 14 pages, 16 figures, for associated codes, see \<https://github.com/rperera12/AKARI-LightUp-GameSolver-with-DeepNeuralNetworks-and-HillClimb-or-SimulatedAnnealing>

  15. arXiv:2101.06474  [pdf, other

    eess.IV cond-mat.mtrl-sci cs.CV

    Optimized and autonomous machine learning framework for characterizing pores, particles, grains and grain boundaries in microstructural images

    Authors: Roberto Perera, Davide Guzzetti, Vinamra Agrawal

    Abstract: Additively manufactured metals exhibit heterogeneous microstructure which dictates their material and failure properties. Experimental microstructural characterization techniques generate a large amount of data that requires expensive computationally resources. In this work, an optimized machine learning (ML) framework is proposed to autonomously and efficiently characterize pores, particles, grai… ▽ More

    Submitted 5 April, 2021; v1 submitted 16 January, 2021; originally announced January 2021.

  16. arXiv:2010.09208  [pdf, other

    cs.DB cs.LG

    DBA bandits: Self-driving index tuning under ad-hoc, analytical workloads with safety guarantees

    Authors: R. Malinga Perera, Bastian Oetomo, Benjamin I. P. Rubinstein, Renata Borovica-Gajic

    Abstract: Automating physical database design has remained a long-term interest in database research due to substantial performance gains afforded by optimised structures. Despite significant progress, a majority of today's commercial solutions are highly manual, requiring offline invocation by database administrators (DBAs) who are expected to identify and supply representative training workloads. Unfortun… ▽ More

    Submitted 19 October, 2020; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: 12 pages, 8 figures

  17. arXiv:1908.00898  [pdf, other

    cs.PL

    The meaning of a program change is a change to the program's meaning

    Authors: Roly Perera

    Abstract: Programming is the activity of modifying a program in order to bring about specific changes in its behaviour. Yet programming language theory almost exclusively focuses on the meaning of programs. We motivate a "change-oriented" viewpoint from which the meaning of a program change is a change to the program's meaning.

    Submitted 2 August, 2019; originally announced August 2019.

  18. arXiv:1807.01948  [pdf, other

    cs.PL cs.DB

    Incremental Relational Lenses

    Authors: Rudi Horn, Roly Perera, James Cheney

    Abstract: Lenses are a popular approach to bidirectional transformations, a generalisation of the view update problem in databases, in which we wish to make changes to source tables to effect a desired change on a view. However, perhaps surprisingly, lenses have seldom actually been used to implement updatable views in databases. Bohannon, Pierce and Vaughan proposed an approach to updatable views called re… ▽ More

    Submitted 9 July, 2018; v1 submitted 5 July, 2018; originally announced July 2018.

    Comments: To appear, ICFP 2018

  19. arXiv:1711.01518  [pdf, other

    cs.AI

    Semantic Web Today: From Oil Rigs to Panama Papers

    Authors: Rivindu Perera, Parma Nand, Boris Bacic, Wen-Hsin Yang, Kazuhiro Seki, Radek Burget

    Abstract: The next leap on the internet has already started as Semantic Web. At its core, Semantic Web transforms the document oriented web to a data oriented web enriched with semantics embedded as metadata. This change in perspective towards the web offers numerous benefits for vast amount of data intensive industries that are bound to the web and its related applications. The industries are diverse as th… ▽ More

    Submitted 4 November, 2017; originally announced November 2017.

    Comments: 21 pages

  20. Imperative Functional Programs that Explain their Work

    Authors: Wilmer Ricciotti, Jan Stolarek, Roly Perera, James Cheney

    Abstract: Program slicing provides explanations that illustrate how program outputs were produced from inputs. We build on an approach introduced in prior work by Perera et al., where dynamic slicing was defined for pure higher-order functional programs as a Galois connection between lattices of partial inputs and partial outputs. We extend this approach to imperative functional programs that combine higher… ▽ More

    Submitted 22 May, 2017; originally announced May 2017.

    Comments: Full version of ICFP 2017 paper, with appendices

  21. arXiv:1610.02327  [pdf, other

    cs.PL cs.DC cs.LO

    Causally consistent dynamic slicing

    Authors: Roly Perera, Deepak Garg, James Cheney

    Abstract: We offer a lattice-theoretic account of dynamic slicing for π-calculus, building on prior work in the sequential setting. For any run of a concurrent program, we exhibit a Galois connection relating forward slices of the start configuration to backward slices of the end configuration. We prove that, up to lattice isomorphism, the same Galois connection arises for any causally equivalent execution,… ▽ More

    Submitted 7 October, 2016; originally announced October 2016.

    Comments: in Proceedings of 27th International Conference on Concurrency Theory (CONCUR 2016)

  22. arXiv:1609.04233  [pdf, other

    cs.PL

    Liveness for Verification

    Authors: Roly Perera, Simon J. Gay

    Abstract: We explore the use of liveness for interactive program verification for a simple concurrent object language. Our experimental IDE integrates two (formally dual) kinds of continuous testing into the development environment: compatibility-checking, which verifies an object's use of other objects, and compliance-checking, which verifies an object's claim to refine the behaviour of another object. Sou… ▽ More

    Submitted 14 September, 2016; originally announced September 2016.

    Comments: 2nd Workshop on Live Programming Systems, LIVE 2016

  23. arXiv:1609.01985  [pdf, other

    cs.PL

    Behavioural Prototypes

    Authors: Roly Perera, Simon J. Gay

    Abstract: We sketch a simple language of concurrent objects which explores the design space between type systems and continuous testing. In our language, programs are collections of communicating automata checked automatically for multiparty compatibility. This property, taken from the session types literature but here applied to terms rather than types, guarantees that no state-related errors arise during… ▽ More

    Submitted 3 September, 2016; originally announced September 2016.

    Comments: Extended abstract; presented at 0th Workshop on New Object-Oriented Languages (NOOL) 2015

  24. $μ$Puppet: A Declarative Subset of the Puppet Configuration Language

    Authors: Weili Fu, Roly Perera, Paul Anderson, James Cheney

    Abstract: Puppet is a popular declarative framework for specifying and managing complex system configurations. The Puppet framework includes a domain-specific language with several advanced features inspired by object-oriented programming, including user-defined resource types, 'classes' with a form of inheritance, and dependency management. Like most real-world languages, the language has evolved in an ad… ▽ More

    Submitted 26 May, 2017; v1 submitted 17 August, 2016; originally announced August 2016.

    Comments: Full version of ECOOP 2017 conference paper

  25. arXiv:1606.05943  [pdf, other

    cs.PL cs.DC cs.SE

    Multiparty Compatibility for Concurrent Objects

    Authors: Roly Perera, Julien Lange, Simon J. Gay

    Abstract: Objects and actors are communicating state machines, offering and consuming different services at different points in their lifecycle. Two complementary challenges arise when programming such systems. When objects interact, their state machines must be "compatible", so that services are requested only when they are available. Dually, when objects refine other objects, their state machines must be… ▽ More

    Submitted 19 June, 2016; originally announced June 2016.

    Comments: In Proceedings PLACES 2016, arXiv:1606.05403

    Journal ref: EPTCS 211, 2016, pp. 73-82

  26. arXiv:1604.04575  [pdf, ps, other

    cs.LO cs.DC

    Proof-relevant $π$-calculus: a constructive account of concurrency and causality

    Authors: Roly Perera, James Cheney

    Abstract: We present a formalisation in Agda of the theory of concurrent transitions, residuation, and causal equivalence of traces for the pi-calculus. Our formalisation employs de Bruijn indices and dependently-typed syntax, and aligns the "proved transitions" proposed by Boudol and Castellani in the context of CCS with the proof terms naturally present in Agda's representation of the labelled transition… ▽ More

    Submitted 5 February, 2017; v1 submitted 15 April, 2016; originally announced April 2016.

    Comments: Under consideration for publication in Mathematical Structures in Computer Science. arXiv admin note: text overlap with arXiv:1507.08054

  27. Proof-relevant pi-calculus

    Authors: Roly Perera, James Cheney

    Abstract: Formalising the pi-calculus is an illuminating test of the expressiveness of logical frameworks and mechanised metatheory systems, because of the presence of name binding, labelled transitions with name extrusion, bisimulation, and structural congruence. Formalisations have been undertaken in a variety of systems, primarily focusing on well-studied (and challenging) properties such as the theory o… ▽ More

    Submitted 29 July, 2015; originally announced July 2015.

    Comments: In Proceedings LFMTP 2015, arXiv:1507.07597

    Journal ref: EPTCS 185, 2015, pp. 46-70

  28. arXiv:1405.5777  [pdf, other

    cs.DB cs.CR

    An Analytical Survey of Provenance Sanitization

    Authors: James Cheney, Roly Perera

    Abstract: Security is likely becoming a critical factor in the future adoption of provenance technology, because of the risk of inadvertent disclosure of sensitive information. In this survey paper we review the state of the art in secure provenance, considering mechanisms for controlling access, and the extent to which these mechanisms preserve provenance integrity. We examine seven systems or approaches,… ▽ More

    Submitted 22 May, 2014; originally announced May 2014.

    Comments: To appear, IPAW 2014

    ACM Class: H.3.5; D.4.6

  29. A Core Calculus for Provenance

    Authors: Umut A. Acar, Amal Ahmed, James Cheney, Roly Perera

    Abstract: Provenance is an increasing concern due to the ongoing revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer systems will need to become provenance-aware in order to provide satisfactory accountability, reproducibility, and trust for scientific or other high-value data. To date, there is not a consensus concerning appropria… ▽ More

    Submitted 3 January, 2014; v1 submitted 23 October, 2013; originally announced October 2013.

    Journal ref: Journal of Computer Security 21 (2013) 919-969

  30. arXiv:1211.4226  [pdf

    cs.CY cs.HC

    Education for All: Remote testing system with gesture recognition and recording

    Authors: Rivindu Perera

    Abstract: Etymologically, in Latin expresses "educare", that means to bring out, or be engaged in the infinite process of learning to present to the society as a valuable citizen. However, unfortunately especially in third world countries, education cannot be achieved due to, lack of inorganic and organic resources. However, many third world countries have embraced the concepts such as One Laptop per Child,… ▽ More

    Submitted 18 November, 2012; originally announced November 2012.

    Comments: 5 pages, International Journal of Advances in Engineering, Science and Technology 2012

    ACM Class: I.2

  31. arXiv:1210.7253  [pdf, other

    math.CO cs.DM

    Bipartition of graphs based on the normalized cut and spectral methods

    Authors: K. K. K. R. Perera, Yoshihiro Mizoguchi

    Abstract: In the first part of this paper, we survey results that are associated with three types of Laplacian matrices:difference, normalized, and signless. We derive eigenvalue and eigenvector formulaes for paths and cycles using circulant matrices and present an alternative proof for finding eigenvalues of the adjacency matrix of paths and cycles using Chebyshev polynomials. Even though each results is s… ▽ More

    Submitted 4 November, 2012; v1 submitted 26 October, 2012; originally announced October 2012.

  32. arXiv:cs/0511029  [pdf, ps, other

    cs.IT

    Non-coherent Rayleigh fading MIMO channels: Capacity Supremum

    Authors: Rasika R Perera, Tony S Pollock, Thushara D Abhayapala

    Abstract: This paper investigates the limits of information transfer over a fast Rayleigh fading MIMO channel, where neither the transmitter nor the receiver has the knowledge of the channel state information (CSI) except the fading statistics. We develop a scalar channel model due to absence of the phase information in non-coherent Rayleigh fading and derive a capacity supremum with the number of receive… ▽ More

    Submitted 6 November, 2005; originally announced November 2005.

    Comments: 08 pages, 5 figures, IEEE Transactions on Information Theory

  33. arXiv:cs/0504080  [pdf, ps, other

    cs.IT

    Performance of Gaussian Signalling in Non Coherent Rayleigh Fading Channels

    Authors: Rasika Perera, Tony Pollock, Thushara Abhayapala

    Abstract: The mutual information of a discrete time memoryless Rayleigh fading channel is considered, where neither the transmitter nor the receiver has the knowledge of the channel state information except the fading statistics. We present the mutual information of this channel in closed form when the input distribution is complex Gaussian, and derive a lower bound in terms of the capacity of the corresp… ▽ More

    Submitted 17 April, 2005; originally announced April 2005.

    Comments: 06 pages, 04 figures, Correspondence

    Report number: CLN: 5-340