Skip to main content

Showing 1–3 of 3 results for author: Agadakos, N

.
  1. arXiv:2404.10268  [pdf, other

    cs.CL

    Modeling Low-Resource Health Coaching Dialogues via Neuro-Symbolic Goal Summarization and Text-Units-Text Generation

    Authors: Yue Zhou, Barbara Di Eugenio, Brian Ziebart, Lisa Sharp, Bing Liu, Nikolaos Agadakos

    Abstract: Health coaching helps patients achieve personalized and lifestyle-related goals, effectively managing chronic conditions and alleviating mental health issues. It is particularly beneficial, however cost-prohibitive, for low-socioeconomic status populations due to its highly personalized and labor-intensive nature. In this paper, we propose a neuro-symbolic goal summarizer to support health coaches… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Accepted to the main conference of LREC-COLING 2024

  2. arXiv:2404.08888  [pdf, other

    cs.CL cs.LG

    Towards Enhancing Health Coaching Dialogue in Low-Resource Settings

    Authors: Yue Zhou, Barbara Di Eugenio, Brian Ziebart, Lisa Sharp, Bing Liu, Ben Gerber, Nikolaos Agadakos, Shweta Yadav

    Abstract: Health coaching helps patients identify and accomplish lifestyle-related goals, effectively improving the control of chronic diseases and mitigating mental health conditions. However, health coaching is cost-prohibitive due to its highly personalized and labor-intensive nature. In this paper, we propose to build a dialogue system that converses with the patients, helps them create and accomplish s… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: Accepted to the main conference of COLING 2022

  3. arXiv:1909.08703  [pdf, other

    cs.CR eess.SP

    Deep Complex Networks for Protocol-Agnostic Radio Frequency Device Fingerprinting in the Wild

    Authors: Ioannis Agadakos, Nikolaos Agadakos, Jason Polakis, Mohamed R. Amer

    Abstract: Researchers have demonstrated various techniques for fingerprinting and identifying devices. Previous approaches have identified devices from their network traffic or transmitted signals while relying on software or operating system specific artifacts (e.g., predictability of protocol header fields) or characteristics of the underlying protocol (e.g.,frequency offset). As these constraints can be… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.