Skip to main content

Showing 1–4 of 4 results for author: Abelson, H

.
  1. arXiv:2405.00229  [pdf, other

    cs.HC cs.AI cs.PL

    Aptly: Making Mobile Apps from Natural Language

    Authors: Evan W. Patton, David Y. J. Kim, Ashley Granquist, Robin Liu, Arianna Scott, Jennet Zamanova, Harold Abelson

    Abstract: We present Aptly, an extension of the MIT App Inventor platform enabling mobile app development via natural language powered by code-generating large language models (LLMs). Aptly complements App Inventor's block language with a text language designed to allow visual code generation via text-based LLMs. We detail the technical aspects of how the Aptly server integrates LLMs with a realtime collabo… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

    Comments: 11 pages, 7 figures, 2 tables

  2. arXiv:2312.04839  [pdf

    cs.HC cs.AI cs.CY

    Understanding Teacher Perspectives and Experiences after Deployment of AI Literacy Curriculum in Middle-school Classrooms

    Authors: Prerna Ravi, Annalisa Broski, Glenda Stump, Hal Abelson, Eric Klopfer, Cynthia Breazeal

    Abstract: Artificial Intelligence (AI) and its associated applications are ubiquitous in today's world, making it imperative that students and their teachers understand how it works and the ramifications arising from its usage. In this study, we investigate the experiences of seven teachers following their implementation of modules from the MIT RAICA (Responsible AI for Computational Action) curriculum. Thr… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

    Comments: Published at 16th annual International Conference of Education, Research and Innovation (ICERI) 2023

    Journal ref: ICERI2023 Proceedings, pp. 6875-6884

  3. arXiv:2212.04629  [pdf, other

    cs.LG

    Post hoc Explanations may be Ineffective for Detecting Unknown Spurious Correlation

    Authors: Julius Adebayo, Michael Muelly, Hal Abelson, Been Kim

    Abstract: We investigate whether three types of post hoc model explanations--feature attribution, concept activation, and training point ranking--are effective for detecting a model's reliance on spurious signals in the training data. Specifically, we consider the scenario where the spurious signal to be detected is unknown, at test-time, to the user of the explanation method. We design an empirical methodo… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

    Journal ref: ICLR 2022 conference paper

  4. Bugs in our Pockets: The Risks of Client-Side Scanning

    Authors: Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso

    Abstract: Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hinde… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: 46 pages, 3 figures

    Journal ref: Journal of Cybersecurity, 10(1), 2024