Skip to main content

Showing 1–7 of 7 results for author: Baldwin, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00541  [pdf

    cs.CL cs.AI cs.IR

    Answering real-world clinical questions using large language model based systems

    Authors: Yen Sia Low, Michael L. Jackson, Rebecca J. Hyde, Robert E. Brown, Neil M. Sanghavi, Julian D. Baldwin, C. William Pike, Jananee Muralidharan, Gavin Hui, Natasha Alexander, Hadeel Hassan, Rahul V. Nene, Morgan Pike, Courtney J. Pokrzywa, Shivam Vedak, Adam Paul Yan, Dong-han Yao, Amy R. Zipursky, Christina Dinh, Philip Ballentine, Dan C. Derieg, Vladimir Polony, Rehan N. Chawdry, Jordan Davies, Brigham B. Hyde , et al. (2 additional authors not shown)

    Abstract: Evidence to guide healthcare decisions is often limited by a lack of relevant and trustworthy literature as well as difficulty in contextualizing existing research for a specific patient. Large language models (LLMs) could potentially address both challenges by either summarizing published literature or generating new studies based on real-world data (RWD). We evaluated the ability of five LLM-bas… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: 28 pages (2 figures, 3 tables) inclusive of 8 pages of supplemental materials (4 supplemental figures and 4 supplemental tables)

  2. arXiv:2403.06955  [pdf, other

    cond-mat.mtrl-sci cs.LG

    Accurate Crystal Structure Prediction of New 2D Hybrid Organic Inorganic Perovskites

    Authors: Nima Karimitari, William J. Baldwin, Evan W. Muller, Zachary J. L. Bare, W. Joshua Kennedy, Gábor Csányi, Christopher Sutton

    Abstract: Low dimensional hybrid organic-inorganic perovskites (HOIPs) represent a promising class of electronically active materials for both light absorption and emission. The design space of HOIPs is extremely large, since a diverse space of organic cations can be combined with different inorganic frameworks. This immense design space allows for tunable electronic and mechanical properties, but also nece… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 14 pages and 9 figures in the main text. Supplementary included in pdf

  3. arXiv:1912.02736  [pdf, other

    cs.HC

    Insights from BB-MAS -- A Large Dataset for Ty**, Gait and Swipes of the Same Person on Desktop, Tablet and Phone

    Authors: Amith K. Belman, Li Wang, S. S. Iyengar, Pawel Sniatala, Robert Wright, Robert Dora, Jacob Baldwin, Zhanpeng **, Vir V. Phoha

    Abstract: Behavioral biometrics are key components in the landscape of research in continuous and active user authentication. However, there is a lack of large datasets with multiple activities, such as ty**, gait and swipe performed by the same person. Furthermore, large datasets with multiple activities performed on multiple devices by the same person are non-existent. The difficulties of procuring devi… ▽ More

    Submitted 19 December, 2019; v1 submitted 8 November, 2019; originally announced December 2019.

  4. Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware

    Authors: James Baldwin, Ali Dehghantanha

    Abstract: Ransomware is a significant global threat, with easy deployment due to the prevalent ransomware-as-a-service model. Machine learning algorithms incorporating the use of opcode characteristics and Support Vector Machine have been demonstrated to be a successful method for general malware detection. This research focuses on crypto-ransomware and uses static analysis of malicious and benign Portable… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

    Comments: 28 Pages

  5. Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection

    Authors: Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha

    Abstract: Ransomware has become a significant global threat with the ransomware-as-a-service model enabling easy availability and deployment, and the potential for high revenues creating a viable criminal business model. Individuals, private companies or public service providers e.g. healthcare or utilities companies can all become victims of ransomware attacks and consequently suffer severe disruption and… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

    Comments: 11 Pages

  6. Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies

    Authors: James Baldwin, Omar M. K. Alhawi, Simone Shaughnessy, Alex Akinbi, Ali Dehghantanha

    Abstract: The emergence of cloud computing technologies has changed the way we store, retrieve, and archive our data. With the promise of unlimited, reliable and always-available storage, a lot of private and confidential data are now stored on different cloud platforms. Being such a gold mine of data, cloud platforms are among the most valuable targets for attackers. Therefore, many forensics investigators… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

    Comments: 22 Pages

  7. arXiv:math/9801152  [pdf, ps, other

    math.LO cs.NE

    On the classifiability of cellular automata

    Authors: John T. Baldwin, Saharon Shelah

    Abstract: Based on computer simulations Wolfram presented in several papers conjectured classifications of cellular automata into 4 types. He distinguishes the 4 classes of cellular automata by the evolution of the pattern generated by applying a cellular automaton to a finite input. Wolfram's qualitative classification is based on the examination of a large number of simulations. In addition to this clas… ▽ More

    Submitted 14 January, 1998; originally announced January 1998.

    Report number: Shelah [BlSh:623]