Skip to main content

Showing 1–8 of 8 results for author: Slater, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10179  [pdf, other

    cs.RO cs.AI cs.HC cs.LG

    Scaling Instructable Agents Across Many Simulated Worlds

    Authors: SIMA Team, Maria Abi Raad, Arun Ahuja, Catarina Barros, Frederic Besse, Andrew Bolt, Adrian Bolton, Bethanie Brownfield, Gavin Buttimore, Max Cant, Sarah Chakera, Stephanie C. Y. Chan, Jeff Clune, Adrian Collister, Vikki Copeman, Alex Cullum, Ishita Dasgupta, Dario de Cesare, Julia Di Trapani, Yani Donchev, Emma Dunleavy, Martin Engelcke, Ryan Faulkner, Frankie Garcia, Charles Gbadamosi , et al. (69 additional authors not shown)

    Abstract: Building embodied AI systems that can follow arbitrary language instructions in any 3D environment is a key challenge for creating general AI. Accomplishing this goal requires learning to ground language in perception and embodied actions, in order to accomplish complex tasks. The Scalable, Instructable, Multiworld Agent (SIMA) project tackles this by training agents to follow free-form instructio… ▽ More

    Submitted 11 October, 2024; v1 submitted 13 March, 2024; originally announced April 2024.

  2. arXiv:2403.19107  [pdf

    cs.CV cs.LG

    Synthetic Medical Imaging Generation with Generative Adversarial Networks For Plain Radiographs

    Authors: John R. McNulty, Lee Kho, Alexandria L. Case, Charlie Fornaca, Drew Johnston, David Slater, Joshua M. Abzug, Sybil A. Russell

    Abstract: In medical imaging, access to data is commonly limited due to patient privacy restrictions and the issue that it can be difficult to acquire enough data in the case of rare diseases.[1] The purpose of this investigation was to develop a reusable open-source synthetic image generation pipeline, the GAN Image Synthesis Tool (GIST), that is easy to use as well as easy to deploy. The pipeline helps to… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Report number: Public Release Case Number 22-3965

  3. arXiv:2202.05089   

    cs.LG

    Backpropagation Clipping for Deep Learning with Differential Privacy

    Authors: Timothy Stevens, Ivoline C. Ngong, David Darais, Calvin Hirsch, David Slater, Joseph P. Near

    Abstract: We present backpropagation clipping, a novel variant of differentially private stochastic gradient descent (DP-SGD) for privacy-preserving deep learning. Our approach clips each trainable layer's inputs (during the forward pass) and its upstream gradients (during the backward pass) to ensure bounded global sensitivity for the layer's gradient; this combination replaces the gradient clipping step i… ▽ More

    Submitted 17 February, 2022; v1 submitted 10 February, 2022; originally announced February 2022.

    Comments: We found a bug in our implementation code that invalidates our experimental results

  4. arXiv:2006.05003  [pdf, other

    cs.CL

    Universal Vector Neural Machine Translation With Effective Attention

    Authors: Satish Mylapore, Ryan Quincy Paul, Joshua Yi, Robert D. Slater

    Abstract: Neural Machine Translation (NMT) leverages one or more trained neural networks for the translation of phrases. Sutskever introduced a sequence to sequence based encoder-decoder model which became the standard for NMT based systems. Attention mechanisms were later introduced to address the issues with the translation of long sentences and improving overall accuracy. In this paper, we propose a sing… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

    Comments: 15pages, 3 figures

    Journal ref: SMU Data Science Review: Vol. 3 : No. 1 , Article 10. Available at: https://scholar.smu.edu/datasciencereview/vol3/iss1/10 Year March 2020

  5. arXiv:1907.08615  [pdf, other

    cs.SE cs.LG stat.ML

    Logical Segmentation of Source Code

    Authors: Jacob Dormuth, Ben Gelman, Jessica Moore, David Slater

    Abstract: Many software analysis methods have come to rely on machine learning approaches. Code segmentation - the process of decomposing source code into meaningful blocks - can augment these methods by featurizing code, reducing noise, and limiting the problem space. Traditionally, code segmentation has been done using syntactic cues; current approaches do not intentionally capture logical content. We dev… ▽ More

    Submitted 18 July, 2019; originally announced July 2019.

    Comments: SEKE2019 Conference Full Paper

  6. arXiv:1906.01032  [pdf, other

    cs.LG cs.CL cs.SE stat.ML

    A Language-Agnostic Model for Semantic Source Code Labeling

    Authors: Ben Gelman, Bryan Hoyle, Jessica Moore, Joshua Saxe, David Slater

    Abstract: Code search and comprehension have become more difficult in recent years due to the rapid expansion of available source code. Current tools lack a way to label arbitrary code at scale while maintaining up-to-date representations of new programming languages, libraries, and functionalities. Comprehensive labeling of source code enables users to search for documents of interest and obtain a high-lev… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

    Comments: MASES 2018 Publication

  7. arXiv:1904.00805  [pdf, other

    cs.CL cs.LG stat.ML

    A Convolutional Neural Network for Language-Agnostic Source Code Summarization

    Authors: Jessica Moore, Ben Gelman, David Slater

    Abstract: Descriptive comments play a crucial role in the software engineering process. They decrease development time, enable better bug detection, and facilitate the reuse of previously written code. However, comments are commonly the last of a software developer's priorities and are thus either insufficient or missing entirely. Automatic source code summarization may therefore have the ability to signifi… ▽ More

    Submitted 29 March, 2019; originally announced April 2019.

    Comments: ENASE 2019

  8. arXiv:1506.04200  [pdf, ps, other

    cs.CR

    Malicious Behavior Detection using Windows Audit Logs

    Authors: Konstantin Berlin, David Slater, Joshua Saxe

    Abstract: As antivirus and network intrusion detection systems have increasingly proven insufficient to detect advanced threats, large security operations centers have moved to deploy endpoint-based sensors that provide deeper visibility into low-level events across their enterprises. Unfortunately, for many organizations in government and industry, the installation, maintenance, and resource requirements o… ▽ More

    Submitted 25 August, 2015; v1 submitted 12 June, 2015; originally announced June 2015.