Skip to main content

Showing 1–24 of 24 results for author: Kapoor, R

.
  1. arXiv:2404.19065  [pdf, other

    cs.AI cs.CL cs.CV cs.LG

    HELPER-X: A Unified Instructable Embodied Agent to Tackle Four Interactive Vision-Language Domains with Memory-Augmented Language Models

    Authors: Gabriel Sarch, Sahil Somani, Raghav Kapoor, Michael J. Tarr, Katerina Fragkiadaki

    Abstract: Recent research on instructable agents has used memory-augmented Large Language Models (LLMs) as task planners, a technique that retrieves language-program examples relevant to the input instruction and uses them as in-context examples in the LLM prompt to improve the performance of the LLM in inferring the correct action and task plans. In this technical report, we extend the capabilities of HELP… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

    Comments: Videos and code https://helper-agent-llm.github.io/

  2. arXiv:2402.17553  [pdf, other

    cs.AI cs.CL cs.CV cs.HC

    OmniACT: A Dataset and Benchmark for Enabling Multimodal Generalist Autonomous Agents for Desktop and Web

    Authors: Raghav Kapoor, Yash Parag Butala, Melisa Russak, **g Yu Koh, Kiran Kamble, Waseem Alshikh, Ruslan Salakhutdinov

    Abstract: For decades, human-computer interaction has fundamentally been manual. Even today, almost all productive work done on the computer necessitates human input at every step. Autonomous virtual agents represent an exciting step in automating many of these menial tasks. Virtual agents would empower users with limited technical proficiency to harness the full possibilities of computer systems. They coul… ▽ More

    Submitted 28 February, 2024; v1 submitted 27 February, 2024; originally announced February 2024.

  3. MoEmo Vision Transformer: Integrating Cross-Attention and Movement Vectors in 3D Pose Estimation for HRI Emotion Detection

    Authors: David C. Jeong, Tianma Shen, Hongji Liu, Raghav Kapoor, Casey Nguyen, Song Liu, Christopher A. Kitts

    Abstract: Emotion detection presents challenges to intelligent human-robot interaction (HRI). Foundational deep learning techniques used in emotion detection are limited by information-constrained datasets or models that lack the necessary complexity to learn interactions between input data elements, such as the the variance of human emotions across different contexts. In the current effort, we introduce 1)… ▽ More

    Submitted 15 October, 2023; originally announced October 2023.

    Comments: IEEE/RSJ International Conference on Intelligent Robots (IROS), Detroit, Michigan

    Journal ref: Proceedings of the IEEE/RSJ International Conference on Intelligent Robots (IROS), 2023

  4. arXiv:2306.17384  [pdf, other

    cs.CL

    SummQA at MEDIQA-Chat 2023:In-Context Learning with GPT-4 for Medical Summarization

    Authors: Yash Mathur, Sanketh Rangreji, Raghav Kapoor, Medha Palavalli, Amanda Bertsch, Matthew R. Gormley

    Abstract: Medical dialogue summarization is challenging due to the unstructured nature of medical conversations, the use of medical terminology in gold summaries, and the need to identify key information across multiple symptom sets. We present a novel system for the Dialogue2Note Medical Summarization tasks in the MEDIQA 2023 Shared Task. Our approach for section-wise summarization (Task A) is a two-stage… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

    Comments: ClinicalNLP @ ACL 2023

  5. arXiv:2302.01374  [pdf, other

    cs.LG

    Neural Network Architecture for Database Augmentation Using Shared Features

    Authors: William C. Sleeman IV, Rishabh Kapoor, Preetam Ghosh

    Abstract: The popularity of learning from data with machine learning and neural networks has lead to the creation of many new datasets for almost every problem domain. However, even within a single domain, these datasets are often collected with disparate features, sampled from different sub-populations, and recorded at different time points. Even with the plethora of individual datasets, large data science… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

    Comments: 22 pages, 8 figures, 4 tables

    ACM Class: I.5.1; I.5.2

  6. arXiv:2210.01344  [pdf, other

    cs.AI

    Movement Analytics: Current Status, Application to Manufacturing, and Future Prospects from an AI Perspective

    Authors: Peter Baumgartner, Daniel Smith, Mashud Rana, Reena Kapoor, Elena Tartaglia, Andreas Schutt, Ashfaqur Rahman, John Taylor, Simon Dunstall

    Abstract: Data-driven decision making is becoming an integral part of manufacturing companies. Data is collected and commonly used to improve efficiency and produce high quality items for the customers. IoT-based and other forms of object tracking are an emerging tool for collecting movement data of objects/entities (e.g. human workers, moving vehicles, trolleys etc.) over space and time. Movement data can… ▽ More

    Submitted 3 October, 2022; originally announced October 2022.

  7. arXiv:2204.11356  [pdf

    cs.LG cs.CL cs.SI

    Hate Me Not: Detecting Hate Inducing Memes in Code Switched Languages

    Authors: Kshitij Rajput, Raghav Kapoor, Kaushal Rai, Preeti Kaur

    Abstract: The rise in the number of social media users has led to an increase in the hateful content posted online. In countries like India, where multiple languages are spoken, these abhorrent posts are from an unusual blend of code-switched languages. This hate speech is depicted with the help of images to form "Memes" which create a long-lasting impact on the human mind. In this paper, we take up the tas… ▽ More

    Submitted 24 April, 2022; originally announced April 2022.

    Comments: To be published in 2022 Americas Conference on Information Systems

  8. arXiv:2109.09020  [pdf, other

    cs.LG cs.AI

    Multimodal Classification: Current Landscape, Taxonomy and Future Directions

    Authors: William C. Sleeman IV, Rishabh Kapoor, Preetam Ghosh

    Abstract: Multimodal classification research has been gaining popularity in many domains that collect more data from multiple sources including satellite imagery, biometrics, and medicine. However, the lack of consistent terminology and architectural descriptions makes it difficult to compare different existing solutions. We address these challenges by proposing a new taxonomy for describing such systems ba… ▽ More

    Submitted 18 September, 2021; originally announced September 2021.

    Comments: 24 pages, 3 tables, 7 figures

    ACM Class: I.5.2

  9. arXiv:2009.07211  [pdf, ps, other

    hep-th gr-qc

    A review of Einstein Cartan Theory to describe superstrings with intrinsic torsion

    Authors: Richa Kapoor

    Abstract: This paper reviews the Einstein Cartan theory (ECT), the famous extension of general relativity (GR) in presence of spacetime torsion. The vacuum equations are derived step by step. Vielbein formulation is discussed for determining the field equations in presence of matter. This review would be easily comprehensible for any student familiar with general relativity. Further, ECT is used to describe… ▽ More

    Submitted 11 September, 2020; originally announced September 2020.

    Comments: 21 pages, 1 figure

  10. arXiv:1912.01045  [pdf, ps, other

    hep-th gr-qc

    Deformation of $D_p$-Brane Worldvolume in Weakly Curved Background

    Authors: Richa Kapoor

    Abstract: We study a $D_p$-brane in a parallelizable NS-NS background. The article starts with a brief review of the non-associative deformation of $D$-brane worldvolume in presence of torsion \cite{cornalba}. We suggest an alternative form and heuristic derivation of the open string metric for weakly curved backgrounds, by promoting the constant two-form in the flat space formula to a dynamical two-form an… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: 9 pages

  11. arXiv:1910.08930  [pdf, other

    cs.CV cs.LG eess.IV

    Sketch2Code: Transformation of Sketches to UI in Real-time Using Deep Neural Network

    Authors: Vanita Jain, Piyush Agrawal, Subham Banga, Rishabh Kapoor, Shashwat Gulyani

    Abstract: User Interface (UI) prototy** is a necessary step in the early stages of application development. Transforming sketches of a Graphical User Interface (UI) into a coded UI application is an uninspired but time-consuming task performed by a UI designer. An automated system that can replace human efforts for straightforward implementation of UI designs will greatly speed up this procedure. The work… ▽ More

    Submitted 20 October, 2019; originally announced October 2019.

  12. arXiv:1809.08652  [pdf, other

    cs.CL

    Mind Your Language: Abuse and Offense Detection for Code-Switched Languages

    Authors: Raghav Kapoor, Yaman Kumar, Kshitij Rajput, Rajiv Ratn Shah, Ponnurangam Kumaraguru, Roger Zimmermann

    Abstract: In multilingual societies like the Indian subcontinent, use of code-switched languages is much popular and convenient for the users. In this paper, we study offense and abuse detection in the code-switched pair of Hindi and English (i.e. Hinglish), the pair that is the most spoken. The task is made difficult due to non-fixed grammar, vocabulary, semantics and spellings of Hinglish language. We app… ▽ More

    Submitted 23 September, 2018; originally announced September 2018.

  13. arXiv:1804.07156  [pdf, other

    cs.DB

    Heuristic and Cost-based Optimization for Diverse Provenance Tasks

    Authors: Xing Niu, Raghav Kapoor, Boris Glavic, Dieter Gawlick, Zhen Hua Liu, Vasudha Krishnaswamy, Venkatesh Radhakrishnan

    Abstract: A well-established technique for capturing database provenance as annotations on data is to instrument queries to propagate such annotations. However, even sophisticated query optimizers often fail to produce efficient execution plans for instrumented queries. We develop provenance-aware optimization techniques to address this problem. Specifically, we study algebraic equivalences targeted at inst… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

    Comments: IEEE Transactions on Knowledge and Data Engineering (TKDE), 2018, long version, 31 pages. arXiv admin note: substantial text overlap with arXiv:1701.05513

    Journal ref: IEEE Transactions on Knowledge and Data Engineering (TKDE), 2018

  14. Using Contexts and Constraints for Improved Geotagging of Human Trafficking Webpages

    Authors: Rahul Kapoor, Mayank Kejriwal, Pedro Szekely

    Abstract: Extracting geographical tags from webpages is a well-motivated application in many domains. In illicit domains with unusual language models, like human trafficking, extracting geotags with both high precision and recall is a challenging problem. In this paper, we describe a geotag extraction framework in which context, constraints and the openly available Geonames knowledge base work in tandem in… ▽ More

    Submitted 18 April, 2017; originally announced April 2017.

    Comments: 6 pages, GeoRich 2017 workshop at ACM SIGMOD conference

  15. arXiv:1407.7756  [pdf, ps, other

    hep-th gr-qc hep-ph

    Quantum effects in topological and Schwarzschild de Sitter brane: Aspects of torsion on ${\mathbf{(D{\bar D})_4}}$-brane universe

    Authors: Richa Kapoor, Supriya Kar, Deobrat Singh

    Abstract: We investigate an effective torsion curvature in a second order formalism underlying a two form world-volume dynamics in a $D_5$-brane. In particular, we consider the two form in presence of a background (open string) metric in a $U(1)$ gauge theory. Interestingly the formalism may be viewed via a non-coincident pair of $(D{\bar D})_5$-brane with a global NS two form on an anti brane and a local t… ▽ More

    Submitted 18 October, 2014; v1 submitted 29 July, 2014; originally announced July 2014.

    Comments: 29 pages, 3 figures, minor revision, typos corrected

  16. arXiv:1407.1328  [pdf

    cs.SE

    Toward Software Measurement and Quality Analysis of MARF and GIPSY Case Studies, a Team 8 SOEN6611-S14 Project Report

    Authors: Chanpreet Singh, Kanwaldeep Singh, Parth Manrao, Rashi Kapoor, Sagar Shukla, Shivam Patel, Simar Preet, Suman Alungh

    Abstract: Measurement is an important criterion to improve the performance of a product. This paper presents a comparative study involving measurements between two frameworks MARF and GIPSY. Initially it establishes a thorough understanding of these frameworks and their applications. MARF comprises of a number of algorithms for voice and speech processing etc. GIPSY on the contrary provides a multi lingual… ▽ More

    Submitted 4 July, 2014; originally announced July 2014.

    Comments: 49 Pages, 48 Figures, 30 Tables

    ACM Class: D.2; K.6; H.5.2

  17. arXiv:1405.3931  [pdf, ps, other

    hep-th gr-qc hep-ph

    Quintessence and effective RN de Sitter brane geometries

    Authors: K. Priyabrat Pandey, Abhishek K. Singh, Sunita Singh, Richa Kapoor, Supriya Kar

    Abstract: We revisit an effective space-time torsion curvature in a second order formalism, underlying the non-linear $U(1)$ gauge dynamics, of a two form on a $D_4$-brane in type IIA superstring theory. The formalism incorporates the significance of a global NS two form into the theory via its perturbative coupling to a dynamical two form. In particular, we explore the non-linear gauge dynamics on a $D_4$-… ▽ More

    Submitted 15 May, 2014; originally announced May 2014.

    Comments: 29 pages

  18. A reclaimer scheduling problem arising in coal stockyard management

    Authors: Enrico Angelelli, Thomas Kalinowski, Reena Kapoor, Martin W. P. Savelsbergh

    Abstract: We study a number of variants of an abstract scheduling problem inspired by the scheduling of reclaimers in the stockyard of a coal export terminal. We analyze the complexity of each of the variants, providing complexity proofs for some and polynomial algorithms for others. For one, especially interesting variant, we also develop a constant factor approximation algorithm.

    Submitted 1 January, 2015; v1 submitted 17 February, 2014; originally announced February 2014.

    Comments: 26 pages

    Journal ref: Journal of Scheduling 19(5), 563-582, 2016

  19. arXiv:1307.7833  [pdf

    cs.CR cs.NI

    RISM -- Reputation Based Intrusion Detection System for Mobile Ad hoc Networks

    Authors: Animesh Kr Trivedi, Rishi Kapoor, Rajan Arora, Sudip Sanyal, Sugata Sanyal

    Abstract: This paper proposes a combination of an Intrusion Detection System with a routing protocol to strengthen the defense of a Mobile Ad hoc Network. Our system is Socially Inspired, since we use the new paradigm of Reputation inherited from human behavior. The proposed IDS also has a unique characteristic of being Semi-distributed, since it neither distributes its Observation results globally nor keep… ▽ More

    Submitted 30 July, 2013; originally announced July 2013.

    Comments: 4 pages, 3 figures, 1 table. arXiv admin note: substantial text overlap with arXiv:1006.1956; and with arXiv:1005.4023 by other authors

    Journal ref: 3rd International Conference on Computers and Devices for Communication (CODEC-06) Institute of Radio Physics and Electronics, University of Calcutta, December 18-20, 2006, pp. 234-237

  20. Scheduling unit processing time arc shutdown jobs to maximize network flow over time: complexity results

    Authors: Natashia Boland, Thomas Kalinowski, Reena Kapoor, Simranjit Kaur

    Abstract: We study the problem of scheduling maintenance on arcs of a capacitated network so as to maximize the total flow from a source node to a sink node over a set of time periods. Maintenance on an arc shuts down the arc for the duration of the period in which its maintenance is scheduled, making its capacity zero for that period. A set of arcs is designated to have maintenance during the planning peri… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    MSC Class: 90C10; 90B10; 68Q25

    Journal ref: Networks 63(2):196-202, 2014

  21. arXiv:1006.1956  [pdf, other

    cs.NI cs.MA

    A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks

    Authors: Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sudip Sanyal, Sugata Sanyal

    Abstract: A Mobile Adhoc Network (MANET) is a cooperative engagement of a collection of mobile nodes without any centralized access point or infrastructure to coordinate among the peers. The underlying concept of coordination among nodes in a cooperative MANET has induced in them a vulnerability to attacks due to issues like lack of fixed infrastructure, dynamically changing network topology, cooperative al… ▽ More

    Submitted 11 June, 2010; v1 submitted 10 June, 2010; originally announced June 2010.

    Comments: Adhoc Networking, Security, Promiscuous Mode, Reputation Based Intrusion Detection System

    Journal ref: Trivedi et al., "A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks". Journal of Information Assurance and Security (JIAS), Volume 1, Issue 4, December 2006, pp. 265-274

  22. arXiv:1003.2456  [pdf

    cs.HC

    Piecemeal Journey To 'HALCYON' World Of Pervasive Computing : From past progress to future challenges

    Authors: Rolly Seth, Rishi Kapoor, Hameed Al-Qaheri, Sugata Sanyal

    Abstract: Although 'Halcyon' means serene environment which pervasive computing aims at, we have tried to present a different interpretation of this word. Through our approach, we look at it in context of achieving future 'calm technology'. The paper gives a general overview of the state of pervasive computing today, proposes the 'HALCYON Model' and outlines the 'social' challenges faced by system designers… ▽ More

    Submitted 11 March, 2010; originally announced March 2010.

  23. arXiv:astro-ph/0205429  [pdf, ps, other

    astro-ph

    Phase offsets between core and conal components of radio pulsars and their emission altitudes

    Authors: R. C. Kapoor, C. S. Shukre

    Abstract: We present a new method for investigating emission altitudes of radio pulsar core and conal components by attributing them different altitudes and by providing a framework to understand the resulting longitude offsets between them which are frequently observed. By investigating the contributions to these offsets due to aberration and the magnetic field line sweepback, we show that they are alway… ▽ More

    Submitted 24 May, 2002; originally announced May 2002.

    Comments: Need epsfig. 4 figures

  24. Are Radio Pulsars Strange Stars ?

    Authors: R. C. Kapoor, C. S. Shukre

    Abstract: A remarkably precise observational relation for pulse core component widths of radio pulsars is used to derive stringent limits on pulsar radii, strongly indicating that pulsars are strange stars rather than neutron stars. This is achieved by inclusion of general relativistic effects due to the pulsar mass on the size of the emission region needed to explain the observed pulse widths, which cons… ▽ More

    Submitted 12 September, 2001; v1 submitted 21 November, 2000; originally announced November 2000.

    Comments: v.2 : 12 pages including 3 figures and 2 tables, LaTex, uses epsfig. This version has one extra figure, few lines of new text and typos fixed

    Journal ref: Astronomy and Astrophysics, 375, 405-410 (2001)