Skip to main content

Showing 1–4 of 4 results for author: Manohar, N

.
  1. arXiv:2406.17642  [pdf, other

    cs.CL cs.AI

    Banishing LLM Hallucinations Requires Rethinking Generalization

    Authors: Johnny Li, Saksham Consul, Eda Zhou, James Wong, Naila Farooqui, Yuxin Ye, Nithyashree Manohar, Zhuxiaona Wei, Tian Wu, Ben Echols, Sharon Zhou, Gregory Diamos

    Abstract: Despite their powerful chat, coding, and reasoning abilities, Large Language Models (LLMs) frequently hallucinate. Conventional wisdom suggests that hallucinations are a consequence of a balance between creativity and factuality, which can be mitigated, but not eliminated, by grounding the LLM in external knowledge sources. Through extensive systematic experiments, we show that these traditional a… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2005.01858  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall cond-mat.soft

    Effect of Confinement on Solvent-driven Infiltration of Polymer (SIP) into Nanoparticle Packings

    Authors: Neha Manohar, Kathleen J. Stebe, Daeyeon Lee

    Abstract: Nanocomposite films containing a high volume fraction (> 50vol%) of nanoparticles (NPs) in a polymer matrix are promising for their functionality and use as structural coatings, and also provide a unique platform to understand polymer behavior under strong confinement. Previously, we developed a novel technique to fabricate such nanocomposites at room temperature using solvent-driven infiltration… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: 8 pages, 5 figures. Supporting Information: 4 pages, 3 figures

    Journal ref: Macromolecules 53(15) 2020 6740-6746

  3. arXiv:1708.08424  [pdf, other

    cs.CR

    T/Key: Second-Factor Authentication From Secure Hash Chains

    Authors: Dmitry Kogan, Nathan Manohar, Dan Boneh

    Abstract: Time-based one-time password (TOTP) systems in use today require storing secrets on both the client and the server. As a result, an attack on the server can expose all second factors for all users in the system. We present T/Key, a time-based one-time password system that requires no secrets on the server. Our work modernizes the classic S/Key system and addresses the challenges in making such a s… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Comments: Accepted to ACM CCS 2017

  4. Animal Classification System: A Block Based Approach

    Authors: Y H Sharath Kumar, Manohar N, H K Chethan

    Abstract: In this work, we propose a method for the classification of animal in images. Initially, a graph cut based method is used to perform segmentation in order to eliminate the background from the given image. The segmented animal images are partitioned in to number of blocks and then the color texture moments are extracted from different blocks. Probabilistic neural network and K-nearest neighbors are… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

    Comments: 8 pages, 2 figures, 3 tables

    ACM Class: I.4.6; I.4.8

    Journal ref: Procedia Computer Science, Volume 45, 2015, Pages 336-343