Skip to main content

Showing 1–4 of 4 results for author: Solko-Breslin, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.24123  [pdf, other

    cs.LG

    CTSketch: Compositional Tensor Sketching for Scalable Neurosymbolic Learning

    Authors: Seewon Choi, Alaia Solko-Breslin, Rajeev Alur, Eric Wong

    Abstract: Many computational tasks benefit from being formulated as the composition of neural networks followed by a discrete symbolic program. The goal of neurosymbolic learning is to train the neural networks using only end-to-end input-output labels of the composite. We introduce CTSketch, a novel, scalable neurosymbolic learning algorithm. CTSketch uses two techniques to improve the scalability of neuro… ▽ More

    Submitted 31 March, 2025; originally announced March 2025.

    Comments: 15 pages, 6 figures

  2. arXiv:2406.06246  [pdf, other

    cs.LG

    Data-Efficient Learning with Neural Programs

    Authors: Alaia Solko-Breslin, Seewon Choi, Ziyang Li, Neelay Velingker, Rajeev Alur, Mayur Naik, Eric Wong

    Abstract: Many computational tasks can be naturally expressed as a composition of a DNN followed by a program written in a traditional programming language or an API call to an LLM. We call such composites "neural programs" and focus on the problem of learning the DNN parameters when the training data consist of end-to-end input-output labels for the composite. When the program is written in a differentiabl… ▽ More

    Submitted 31 October, 2024; v1 submitted 10 June, 2024; originally announced June 2024.

  3. arXiv:2311.16169  [pdf, other

    cs.CR cs.PL cs.SE

    Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities

    Authors: Avishree Khare, Saikat Dutta, Ziyang Li, Alaia Solko-Breslin, Rajeev Alur, Mayur Naik

    Abstract: While automated vulnerability detection techniques have made promising progress in detecting security vulnerabilities, their scalability and applicability remain challenging. The remarkable performance of Large Language Models (LLMs), such as GPT-4 and CodeLlama, on code-related tasks has prompted recent works to explore if LLMs can be used to detect vulnerabilities. In this paper, we perform a mo… ▽ More

    Submitted 23 October, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

  4. arXiv:2011.05948  [pdf, other

    cs.PL cs.NI

    Petr4: Formal Foundations for P4 Data Planes

    Authors: Ryan Doenges, Mina Tahmasbi Arashloo, Santiago Bautista, Alexander Chang, Newton Ni, Samwise Parkinson, Rudy Peterson, Alaia Solko-Breslin, Amanda Xu, Nate Foster

    Abstract: P4 is a domain-specific language for programming and specifying packet-processing systems. It is based on an elegant design with high-level abstractions like parsers and match-action pipelines that can be compiled to efficient implementations in software or hardware. Unfortunately, like many industrial languages, P4 has developed without a formal foundation. The P4 Language Specification is a 160-… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 54 pages. Extended version of POPL 2021 paper