Skip to main content

Showing 1–9 of 9 results for author: James, C D

.
  1. arXiv:2006.14652  [pdf, other

    cs.DS cs.DC cs.NE

    Constant-Depth and Subcubic-Size Threshold Circuits for Matrix Multiplication

    Authors: Ojas Parekh, Cynthia A. Phillips, Conrad D. James, James B. Aimone

    Abstract: Boolean circuits of McCulloch-Pitts threshold gates are a classic model of neural computation studied heavily in the late 20th century as a model of general computation. Recent advances in large-scale neural computing hardware has made their practical implementation a near-term possibility. We describe a theoretical approach for multiplying two $N$ by $N$ matrices that integrates threshold gate lo… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Comments: Appears in the proceedings of the ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2018

  2. arXiv:1809.09261  [pdf, other

    cs.AI cs.LG eess.SY

    Resilient Computing with Reinforcement Learning on a Dynamical System: Case Study in Sorting

    Authors: Aleksandra Faust, James B. Aimone, Conrad D. James, Lydia Tapia

    Abstract: Robots and autonomous agents often complete goal-based tasks with limited resources, relying on imperfect models and sensor measurements. In particular, reinforcement learning (RL) and feedback control can be used to help a robot achieve a goal. Taking advantage of this body of work, this paper formulates general computation as a feedback-control problem, which allows the agent to autonomously ove… ▽ More

    Submitted 24 September, 2018; originally announced September 2018.

    Comments: 11 pages, accepted to CDC 2018. Here with additional evaluations

  3. arXiv:1712.07671  [pdf, other

    cs.CR

    Tracking Cyber Adversaries with Adaptive Indicators of Compromise

    Authors: Justin E. Doak, Joe B. Ingram, Sam A. Mulder, John H. Naegle, Jonathan A. Cox, James B. Aimone, Kevin R. Dixon, Conrad D. James, David R. Follett

    Abstract: A forensics investigation after a breach often uncovers network and host indicators of compromise (IOCs) that can be deployed to sensors to allow early detection of the adversary in the future. Over time, the adversary will change tactics, techniques, and procedures (TTPs), which will also change the data generated. If the IOCs are not kept up-to-date with the adversary's new TTPs, the adversary w… ▽ More

    Submitted 20 December, 2017; originally announced December 2017.

    Comments: This was presented at the 4th Annual Conf. on Computational Science & Computational Intelligence (CSCI'17) held Dec 14-16, 2017 in Las Vegas, Nevada, USA

    Report number: SAND2017-12402 C

    Journal ref: This will be in the proceedings of the 4th Annual Conf. on Computational Science & Computational Intelligence (CSCI'17) held Dec 14-16, 2017 in Las Vegas, Nevada, USA

  4. arXiv:1711.03947  [pdf, other

    cs.CR stat.ML

    Dynamic Analysis of Executables to Detect and Characterize Malware

    Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James

    Abstract: It is needed to ensure the integrity of systems that process sensitive information and control many aspects of everyday life. We examine the use of machine learning algorithms to detect malware using the system calls generated by executables-alleviating attempts at obfuscation as the behavior is monitored rather than the bytes of an executable. We examine several machine learning techniques for de… ▽ More

    Submitted 28 September, 2018; v1 submitted 10 November, 2017; originally announced November 2017.

    Comments: 9 pages, 6 Tables, 4 Figures

    Report number: SAND2018-11011 C

  5. arXiv:1710.09934  [pdf, other

    cs.NE cs.CV

    Data-driven Feature Sampling for Deep Hyperspectral Classification and Segmentation

    Authors: William M. Severa, Jerilyn A. Timlin, Suraj Kholwadwala, Conrad D. James, James B. Aimone

    Abstract: The high dimensionality of hyperspectral imaging forces unique challenges in scope, size and processing requirements. Motivated by the potential for an in-the-field cell sorting detector, we examine a $\textit{Synechocystis sp.}$ PCC 6803 dataset wherein cells are grown alternatively in nitrogen rich or deplete cultures. We use deep learning techniques to both successfully classify cells and gener… ▽ More

    Submitted 26 October, 2017; originally announced October 2017.

    MSC Class: 68T01 ACM Class: I.2.1; I.4.6; J.3

  6. Multiscale Co-Design Analysis of Energy, Latency, Area, and Accuracy of a ReRAM Analog Neural Training Accelerator

    Authors: Matthew J. Marinella, Sapan Agarwal, Alexander Hsia, Isaac Richter, Robin Jacobs-Gedrim, John Niroula, Steven J. Plimpton, Engin Ipek, Conrad D. James

    Abstract: Neural networks are an increasingly attractive algorithm for natural language processing and pattern recognition. Deep networks with >50M parameters are made possible by modern GPU clusters operating at <50 pJ per op and more recently, production accelerators capable of <5pJ per operation at the board level. However, with the slowing of CMOS scaling, new paradigms will be required to achieve the n… ▽ More

    Submitted 16 February, 2018; v1 submitted 31 July, 2017; originally announced July 2017.

  7. arXiv:1704.08306  [pdf, other

    q-bio.NC cs.NE stat.ML

    A Digital Neuromorphic Architecture Efficiently Facilitating Complex Synaptic Response Functions Applied to Liquid State Machines

    Authors: Michael R. Smith, Aaron J. Hill, Kristofor D. Carlson, Craig M. Vineyard, Jonathon Donaldson, David R. Follett, Pamela L. Follett, John H. Naegle, Conrad D. James, James B. Aimone

    Abstract: Information in neural networks is represented as weighted connections, or synapses, between neurons. This poses a problem as the primary computational bottleneck for neural networks is the vector-matrix multiply when inputs are multiplied by the neural network weights. Conventional processing architectures are not well suited for simulating neural networks, often requiring large amounts of energy… ▽ More

    Submitted 21 March, 2017; originally announced April 2017.

    Comments: 8 pages, 4 Figures, Preprint of 2017 IJCNN

  8. arXiv:1612.03770  [pdf, other

    cs.NE cs.LG stat.ML

    Neurogenesis Deep Learning

    Authors: Timothy J. Draelos, Nadine E. Miner, Christopher C. Lamb, Jonathan A. Cox, Craig M. Vineyard, Kristofor D. Carlson, William M. Severa, Conrad D. James, James B. Aimone

    Abstract: Neural machine learning methods, such as deep neural networks (DNN), have achieved remarkable success in a number of complex data processing tasks. These methods have arguably had their strongest impact on tasks such as image and audio processing - data processing domains in which humans have long held clear advantages over conventional algorithms. In contrast to biological neural systems, which a… ▽ More

    Submitted 28 March, 2017; v1 submitted 12 December, 2016; originally announced December 2016.

    Comments: 8 pages, 8 figures, Accepted to 2017 International Joint Conference on Neural Networks (IJCNN 2017)

    Report number: SAND2017-2174 C

  9. arXiv:1406.4033  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall cs.ET cs.IT

    Degenerate Resistive Switching and Ultrahigh Density Storage in Resistive Memory

    Authors: Andrew J. Lohn, Patrick R. Mickel, Conrad D. James, Matthew J. Marinella

    Abstract: We show that, in tantalum oxide resistive memories, activation power provides a multi-level variable for information storage that can be set and read separately from the resistance. These two state variables (resistance and activation power) can be precisely controlled in two steps: (1) the possible activation power states are selected by partially reducing resistance, then (2) a subsequent partia… ▽ More

    Submitted 16 June, 2014; originally announced June 2014.