Skip to main content

Showing 1–35 of 35 results for author: Chin, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10411  [pdf, other

    cs.MA cs.AI

    Tree Search for Simultaneous Move Games via Equilibrium Approximation

    Authors: Ryan Yu, Alex Olshevsky, Peter Chin

    Abstract: Neural network supported tree-search has shown strong results in a variety of perfect information multi-agent tasks. However, the performance of these methods on partial information games has generally been below competing approaches. Here we study the class of simultaneous-move games, which are a subclass of partial information games which are most similar to perfect information games: both agent… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: 9 pages, 5 tables, 1 figure

  2. arXiv:2404.15198  [pdf, other

    cs.LG cs.IT

    Lossless and Near-Lossless Compression for Foundation Models

    Authors: Moshik Hershcovitch, Leshem Choshen, Andrew Wood, Ilias Enmouri, Peter Chin, Swaminathan Sundararaman, Danny Harnik

    Abstract: With the growth of model sizes and scale of their deployment, their sheer size burdens the infrastructure requiring more network and more storage to accommodate these. While there is a vast literature about reducing model sizes, we investigate a more traditional type of compression -- one that compresses the model to a smaller form and is coupled with a decompression algorithm that returns it to i… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

  3. arXiv:2402.02441  [pdf, other

    cs.LG cs.AI cs.MS stat.CO

    TopoX: A Suite of Python Packages for Machine Learning on Topological Domains

    Authors: Mustafa Hajij, Mathilde Papillon, Florian Frantzen, Jens Agerberg, Ibrahem AlJabea, Ruben Ballester, Claudio Battiloro, Guillermo Bernárdez, Tolga Birdal, Aiden Brent, Peter Chin, Sergio Escalera, Simone Fiorellino, Odin Hoff Gardaa, Gurusankar Gopalakrishnan, Devendra Govil, Josef Hoppe, Maneel Reddy Karri, Jude Khouja, Manuel Lecha, Neal Livesay, Jan Meißner, Soham Mukherjee, Alexander Nikitin, Theodore Papamarkou , et al. (18 additional authors not shown)

    Abstract: We introduce TopoX, a Python software suite that provides reliable and user-friendly building blocks for computing and machine learning on topological domains that extend graphs: hypergraphs, simplicial, cellular, path and combinatorial complexes. TopoX consists of three packages: TopoNetX facilitates constructing and computing on these domains, including working with nodes, edges and higher-order… ▽ More

    Submitted 17 February, 2024; v1 submitted 4 February, 2024; originally announced February 2024.

  4. Weisfeiler and Lehman Go Paths: Learning Topological Features via Path Complexes

    Authors: Quang Truong, Peter Chin

    Abstract: Graph Neural Networks (GNNs), despite achieving remarkable performance across different tasks, are theoretically bounded by the 1-Weisfeiler-Lehman test, resulting in limitations in terms of graph expressivity. Even though prior works on topological higher-order GNNs overcome that boundary, these models often depend on assumptions about sub-structures of graphs. Specifically, topological GNNs leve… ▽ More

    Submitted 31 March, 2024; v1 submitted 13 August, 2023; originally announced August 2023.

    Comments: AAAI'24. Contains 17 pages, 4 figures

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence 38 (14), 15382-15391, 2024

  5. arXiv:2308.02000  [pdf, other

    cs.AI cs.CV cs.LG

    On the Transition from Neural Representation to Symbolic Knowledge

    Authors: Junyan Cheng, Peter Chin

    Abstract: Bridging the huge disparity between neural and symbolic representation can potentially enable the incorporation of symbolic thinking into neural networks from essence. Motivated by how human gradually builds complex symbolic representation from the prototype symbols that are learned through perception and environmental interactions. We propose a Neural-Symbolic Transitional Dictionary Learning (TD… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

  6. arXiv:2302.05406  [pdf, other

    cs.CL

    Adversarial Transformer Language Models for Contextual Commonsense Inference

    Authors: Pedro Colon-Hernandez, Henry Lieberman, Yida Xin, Claire Yin, Cynthia Breazeal, Peter Chin

    Abstract: Contextualized or discourse aware commonsense inference is the task of generating coherent commonsense assertions (i.e., facts) from a given story, and a particular sentence from that story. Some problems with the task are: lack of controllability for topics of the inferred facts; lack of commonsense knowledge during training; and, possibly, hallucinated or false facts. In this work, we utilize a… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

    Comments: Submitted to Semantic Web Journal special edition. https://semantic-web-journal.org/content/adversarial-transformer-language-models-contextual-commonsense-inference-1

  7. arXiv:2212.02567  [pdf, ps, other

    cs.LG eess.SP

    cs-net: structural approach to time-series forecasting for high-dimensional feature space data with limited observations

    Authors: Weiyu Zong, Mingqian Feng, Griffin Heyrich, Peter Chin

    Abstract: In recent years, deep-learning-based approaches have been introduced to solving time-series forecasting-related problems. These novel methods have demonstrated impressive performance in univariate and low-dimensional multivariate time-series forecasting tasks. However, when these novel methods are used to handle high-dimensional multivariate forecasting problems, their performance is highly restri… ▽ More

    Submitted 5 December, 2022; originally announced December 2022.

  8. arXiv:2209.14264  [pdf, other

    cs.LG

    A Multi-scale Graph Signature for Persistence Diagrams based on Return Probabilities of Random Walks

    Authors: Chau Pham, Trung Dang, Peter Chin

    Abstract: Persistence diagrams (PDs), often characterized as sets of death and birth of homology class, have been known for providing a topological representation of a graph structure, which is often useful in machine learning tasks. Prior works rely on a single graph signature to construct PDs. In this paper, we explore the use of a family of multi-scale graph signatures to enhance the robustness of topolo… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

  9. arXiv:2207.04186  [pdf, other

    cs.CV

    A Study on Self-Supervised Object Detection Pretraining

    Authors: Trung Dang, Simon Kornblith, Huy Thong Nguyen, Peter Chin, Maryam Khademi

    Abstract: In this work, we study different approaches to self-supervised pretraining of object detection models. We first design a general framework to learn a spatially consistent dense representation from an image, by randomly sampling and projecting boxes to each augmented view and maximizing the similarity between corresponding box features. We study existing design choices in the literature, such as bo… ▽ More

    Submitted 10 August, 2022; v1 submitted 8 July, 2022; originally announced July 2022.

  10. arXiv:2203.05121  [pdf, other

    cs.LG cs.GT

    Collusion Detection in Team-Based Multiplayer Games

    Authors: Laura Greige, Fernando De Mesentier Silva, Meredith Trotter, Chris Lawrence, Peter Chin, Dilip Varadarajan

    Abstract: In the context of competitive multiplayer games, collusion happens when two or more teams decide to collaborate towards a common goal, with the intention of gaining an unfair advantage from this cooperation. The task of identifying colluders from the player population is however infeasible to game designers due to the sheer size of the player population. In this paper, we propose a system that det… ▽ More

    Submitted 9 March, 2022; originally announced March 2022.

    Comments: 14 pages, 4 figures

  11. arXiv:2202.11518  [pdf, other

    cs.LG cs.AR

    Non-Volatile Memory Accelerated Geometric Multi-Scale Resolution Analysis

    Authors: Andrew Wood, Moshik Hershcovitch, Daniel Waddington, Sarel Cohen, Meredith Wolf, Hongjun Suh, Weiyu Zong, Peter Chin

    Abstract: Dimensionality reduction algorithms are standard tools in a researcher's toolbox. Dimensionality reduction algorithms are frequently used to augment downstream tasks such as machine learning, data science, and also are exploratory methods for understanding complex phenomena. For instance, dimensionality reduction is commonly used in Biology as well as Neuroscience to understand data collected from… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: 2021 IEEE High Performance Extreme Computing Conference (HPEC)

  12. arXiv:2202.10522  [pdf, other

    cs.LG cs.AR

    Non-Volatile Memory Accelerated Posterior Estimation

    Authors: Andrew Wood, Moshik Hershcovitch, Daniel Waddington, Sarel Cohen, Peter Chin

    Abstract: Bayesian inference allows machine learning models to express uncertainty. Current machine learning models use only a single learnable parameter combination when making predictions, and as a result are highly overconfident when their predictions are wrong. To use more learnable parameter combinations efficiently, these samples must be drawn from the posterior distribution. Unfortunately computing t… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

  13. arXiv:2201.01399  [pdf, other

    cs.CV cs.LG

    Corrupting Data to Remove Deceptive Perturbation: Using Preprocessing Method to Improve System Robustness

    Authors: Hieu Le, Hans Walker, Dung Tran, Peter Chin

    Abstract: Although deep neural networks have achieved great performance on classification tasks, recent studies showed that well trained networks can be fooled by adding subtle noises. This paper introduces a new approach to improve neural network robustness by applying the recovery process on top of the naturally trained classifier. In this approach, images will be intentionally corrupted by some significa… ▽ More

    Submitted 4 January, 2022; originally announced January 2022.

    Comments: CSCI 2021

  14. arXiv:2112.04424  [pdf, other

    cs.SD cs.LG eess.AS

    Training Robust Zero-Shot Voice Conversion Models with Self-supervised Features

    Authors: Trung Dang, Dung Tran, Peter Chin, Kazuhito Koishida

    Abstract: Unsupervised Zero-Shot Voice Conversion (VC) aims to modify the speaker characteristic of an utterance to match an unseen target speaker without relying on parallel training data. Recently, self-supervised learning of speech representation has been shown to produce useful linguistic units without using transcripts, which can be directly passed to a VC model. In this paper, we showed that high-qual… ▽ More

    Submitted 10 February, 2022; v1 submitted 8 December, 2021; originally announced December 2021.

  15. arXiv:2111.00556  [pdf, other

    cs.LG cs.CL cs.CR

    Revealing and Protecting Labels in Distributed Training

    Authors: Trung Dang, Om Thakkar, Swaroop Ramaswamy, Rajiv Mathews, Peter Chin, Françoise Beaufays

    Abstract: Distributed learning paradigms such as federated learning often involve transmission of model updates, or gradients, over a network, thereby avoiding transmission of private data. However, it is possible for sensitive information about the training data to be revealed from such gradients. Prior works have demonstrated that labels can be revealed analytically from the last layer of certain models (… ▽ More

    Submitted 31 October, 2021; originally announced November 2021.

  16. arXiv:2110.11536  [pdf, other

    cs.AI cs.LG

    Neural-guided, Bidirectional Program Search for Abstraction and Reasoning

    Authors: Simon Alford, Anshula Gandhi, Akshay Rangamani, Andrzej Banburski, Tony Wang, Sylee Dandekar, John Chin, Tomaso Poggio, Peter Chin

    Abstract: One of the challenges facing artificial intelligence research today is designing systems capable of utilizing systematic reasoning to generalize to new tasks. The Abstraction and Reasoning Corpus (ARC) measures such a capability through a set of visual reasoning tasks. In this paper we report incremental progress on ARC and lay the foundations for two approaches to abstraction and reasoning not ba… ▽ More

    Submitted 26 October, 2021; v1 submitted 21 October, 2021; originally announced October 2021.

    Comments: Published as a conference paper at Complex Networks 2021

  17. arXiv:2110.09978  [pdf, other

    cs.AI

    What is Learned in Knowledge Graph Embeddings?

    Authors: Michael R. Douglas, Michael Simkin, Omri Ben-Eliezer, Tianqi Wu, Peter Chin, Trung V. Dang, Andrew Wood

    Abstract: A knowledge graph (KG) is a data structure which represents entities and relations as the vertices and edges of a directed graph with edge types. KGs are an important primitive in modern machine learning and artificial intelligence. Embedding-based models, such as the seminal TransE [Bordes et al., 2013] and the recent PairRE [Chao et al., 2020] are among the most popular and successful approaches… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

    Comments: 16 pages

    ACM Class: I.2.4

  18. RetroGAN: A Cyclic Post-Specialization System for Improving Out-of-Knowledge and Rare Word Representations

    Authors: Pedro Colon-Hernandez, Yida Xin, Henry Lieberman, Catherine Havasi, Cynthia Breazeal, Peter Chin

    Abstract: Retrofitting is a technique used to move word vectors closer together or further apart in their space to reflect their relationships in a Knowledge Base (KB). However, retrofitting only works on concepts that are present in that KB. RetroGAN uses a pair of Generative Adversarial Networks (GANs) to learn a one-to-one map** between concepts and their retrofitted counterparts. It applies that mappi… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  19. arXiv:2105.07512  [pdf, other

    cs.CV cs.LG eess.IV

    Substitutional Neural Image Compression

    Authors: Xiao Wang, Wei Jiang, Wei Wang, Shan Liu, Brian Kulis, Peter Chin

    Abstract: We describe Substitutional Neural Image Compression (SNIC), a general approach for enhancing any neural image compression model, that requires no data or additional tuning of the trained model. It boosts compression performance toward a flexible distortion metric and enables bit-rate control using a single model instance. The key idea is to replace the image to be compressed with a substitutional… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

  20. arXiv:2104.07815  [pdf, other

    cs.CL cs.CR cs.LG

    A Method to Reveal Speaker Identity in Distributed ASR Training, and How to Counter It

    Authors: Trung Dang, Om Thakkar, Swaroop Ramaswamy, Rajiv Mathews, Peter Chin, Françoise Beaufays

    Abstract: End-to-end Automatic Speech Recognition (ASR) models are commonly trained over spoken utterances using optimization methods like Stochastic Gradient Descent (SGD). In distributed settings like Federated Learning, model training requires transmission of gradients over a network. In this work, we design the first method for revealing the identity of the speaker of a training utterance with access on… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

  21. arXiv:2102.00924  [pdf, other

    cs.CL cs.AI

    Revisiting the Prepositional-Phrase Attachment Problem Using Explicit Commonsense Knowledge

    Authors: Yida Xin, Henry Lieberman, Peter Chin

    Abstract: We revisit the challenging problem of resolving prepositional-phrase (PP) attachment ambiguity. To date, proposed solutions are either rule-based, where explicit grammar rules direct how to resolve ambiguities; or statistical, where the decision is learned from a corpus of labeled examples. We argue that explicit commonsense knowledge bases can provide an essential ingredient for making good attac… ▽ More

    Submitted 5 February, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

  22. arXiv:2004.12481  [pdf, other

    cs.AI cs.MA cs.RO

    GymFG: A Framework with a Gym Interface for FlightGear

    Authors: Andrew Wood, Ali Sydney, Peter Chin, Bishal Thapa, Ryan Ross

    Abstract: Over the past decades, progress in deployable autonomous flight systems has slowly stagnated. This is reflected in today's production air-crafts, where pilots only enable simple physics-based systems such as autopilot for takeoff, landing, navigation, and terrain/traffic avoidance. Evidently, autonomy has not gained the trust of the community where higher problem complexity and cognitive workload… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

    ACM Class: I.2.1; I.6.5

  23. arXiv:2002.12909  [pdf, other

    cs.LG cs.AI cs.GT

    Deep Reinforcement Learning for FlipIt Security Game

    Authors: Laura Greige, Peter Chin

    Abstract: Reinforcement learning has shown much success in games such as chess, backgammon and Go. However, in most of these games, agents have full knowledge of the environment at all times. In this paper, we describe a deep learning model in which agents successfully adapt to different classes of opponents and learn the optimal counter-strategy using reinforcement learning in a game under partial observab… ▽ More

    Submitted 1 April, 2022; v1 submitted 28 February, 2020; originally announced February 2020.

    Comments: 13 pages, 5 figures

    MSC Class: 91A06; 91A20 ACM Class: I.2.6

  24. arXiv:2002.08439  [pdf, other

    cs.LG cs.CR cs.CV

    AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks

    Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Xue Lin, Peter Chin

    Abstract: Designing effective defense against adversarial attacks is a crucial topic as deep neural networks have been proliferated rapidly in many security-critical domains such as malware detection and self-driving cars. Conventional defense methods, although shown to be promising, are largely limited by their single-source single-cost nature: The robustness promotion tends to plateau when the defenses ar… ▽ More

    Submitted 19 February, 2020; originally announced February 2020.

    Comments: Accepted by 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2020)

  25. Block Switching: A Stochastic Approach for Deep Learning Security

    Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Xue Lin, Peter Chin

    Abstract: Recent study of adversarial attacks has revealed the vulnerability of modern deep learning models. That is, subtly crafted perturbations of the input can make a trained network with high accuracy produce arbitrary incorrect predictions, while maintain imperceptible to human vision system. In this paper, we introduce Block Switching (BS), a defense strategy against adversarial attacks based on stoc… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: Accepted by AdvML19: Workshop on Adversarial Learning Methods for Machine Learning and Data Mining at KDD, Anchorage, Alaska, USA, August 5th, 2019, 5 pages

    Journal ref: Journal of Computational and Cognitive Engineering. Volume 1, Issue 4, 2022

  26. arXiv:1908.07116  [pdf, other

    cs.LG cs.CV stat.ML

    Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses

    Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Yanzhi Wang, Brian Kulis, Xue Lin, Peter Chin

    Abstract: Despite achieving remarkable success in various domains, recent studies have uncovered the vulnerability of deep neural networks to adversarial perturbations, creating concerns on model generalizability and new threats such as prediction-evasive misclassification or stealthy reprogramming. Among different defense proposals, stochastic network defenses such as random neuron activation pruning or ra… ▽ More

    Submitted 19 August, 2019; originally announced August 2019.

    Comments: Published as Conference Paper @ IJCAI 2019

  27. arXiv:1908.00449  [pdf, other

    cs.LG cs.CL stat.ML

    Tree-Transformer: A Transformer-Based Method for Correction of Tree-Structured Data

    Authors: Jacob Harer, Chris Reale, Peter Chin

    Abstract: Many common sequential data sources, such as source code and natural language, have a natural tree-structured representation. These trees can be generated by fitting a sequence to a grammar, yielding a hierarchical ordering of the tokens in the sequence. This structure encodes a high degree of syntactic information, making it ideal for problems such as grammar correction. However, little work has… ▽ More

    Submitted 1 August, 2019; originally announced August 2019.

  28. arXiv:1812.08808  [pdf, other

    stat.ML cs.LG

    Reducing Sampling Ratios Improves Bagging in Sparse Regression

    Authors: Luoluo Liu, Sang Peter Chin, Trac D. Tran

    Abstract: Bagging, a powerful ensemble method from machine learning, improves the performance of unstable predictors. Although the power of Bagging has been shown mostly in classification problems, we demonstrate the success of employing Bagging in sparse regression over the baseline method (L1 minimization). The framework employs the generalized version of the original Bagging with various bootstrap ratios… ▽ More

    Submitted 1 May, 2019; v1 submitted 20 December, 2018; originally announced December 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1810.03743

  29. arXiv:1810.03743  [pdf, other

    stat.ML cs.LG eess.SP

    JOBS: Joint-Sparse Optimization from Bootstrap Samples

    Authors: Luoluo Liu, Sang Peter Chin, Trac D. Tran

    Abstract: Classical signal recovery based on $\ell_1$ minimization solves the least squares problem with all available measurements via sparsity-promoting regularization. In practice, it is often the case that not all measurements are available or required for recovery. Measurements might be corrupted/missing or they arrive sequentially in streaming fashion. In this paper, we propose a global sparse recover… ▽ More

    Submitted 10 December, 2018; v1 submitted 8 October, 2018; originally announced October 2018.

  30. arXiv:1809.05165  [pdf, other

    cs.CR cs.CV cs.LG stat.ML

    Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks

    Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin

    Abstract: Deep neural networks (DNNs) are known vulnerable to adversarial attacks. That is, adversarial examples, obtained by adding delicately crafted distortions onto original legal inputs, can mislead a DNN to classify them as any target labels. This work provides a solution to hardening DNNs under adversarial attacks through defensive dropout. Besides using dropout during training for the best test accu… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

    Comments: Accepted as conference paper on ICCAD 2018

  31. arXiv:1805.07475  [pdf, other

    cs.CL cs.LG cs.NE stat.ML

    Learning to Repair Software Vulnerabilities with Generative Adversarial Networks

    Authors: Jacob Harer, Onur Ozdemir, Tomo Lazovich, Christopher P. Reale, Rebecca L. Russell, Louis Y. Kim, Peter Chin

    Abstract: Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections. We demonstrate that the proposed adversarial learning approach is an effective technique for repairing software vulnerabilitie… ▽ More

    Submitted 28 October, 2018; v1 submitted 18 May, 2018; originally announced May 2018.

    Comments: Presented at 32nd Conference on Neural Information Processing Systems (nips 2018), Montreal Canada

  32. arXiv:1803.04497  [pdf, other

    cs.SE cs.LG stat.ML

    Automated software vulnerability detection with machine learning

    Authors: Jacob A. Harer, Louis Y. Kim, Rebecca L. Russell, Onur Ozdemir, Leonard R. Kosta, Akshay Rangamani, Lei H. Hamilton, Gabriel I. Centeno, Jonathan R. Key, Paul M. Ellingwood, Erik Antelman, Alan Mackay, Marc W. McConley, Jeffrey M. Opper, Peter Chin, Tomo Lazovich

    Abstract: Thousands of security vulnerabilities are discovered in production software each year, either reported publicly to the Common Vulnerabilities and Exposures database or discovered internally in proprietary code. Vulnerabilities often manifest themselves in subtle ways that are not obvious to code reviewers or the developers themselves. With the wealth of open source code available for analysis, the… ▽ More

    Submitted 2 August, 2018; v1 submitted 14 February, 2018; originally announced March 2018.

  33. arXiv:1705.05998  [pdf, other

    cs.CV

    Automatic Vertebra Labeling in Large-Scale 3D CT using Deep Image-to-Image Network with Message Passing and Sparsity Regularization

    Authors: Dong Yang, Tao Xiong, Daguang Xu, Qiangui Huang, David Liu, S. Kevin Zhou, Zhoubing Xu, **Hyeong Park, Mingqing Chen, Trac D. Tran, Sang Peter Chin, Dimitris Metaxas, Dorin Comaniciu

    Abstract: Automatic localization and labeling of vertebra in 3D medical images plays an important role in many clinical tasks, including pathological diagnosis, surgical planning and postoperative assessment. However, the unusual conditions of pathological cases, such as the abnormal spine curvature, bright visual imaging artifacts caused by metal implants, and the limited field of view, increase the diffic… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

  34. arXiv:1501.05021  [pdf, other

    cs.DS

    Stochastic Block Model and Community Detection in the Sparse Graphs: A spectral algorithm with optimal rate of recovery

    Authors: Peter Chin, Anup Rao, Van Vu

    Abstract: In this paper, we present and analyze a simple and robust spectral algorithm for the stochastic block model with $k$ blocks, for any $k$ fixed. Our algorithm works with graphs having constant edge density, under an optimal condition on the gap between the density inside a block and the density between the blocks. As a co-product, we settle an open question posed by Abbe et. al. concerning censor b… ▽ More

    Submitted 24 June, 2015; v1 submitted 20 January, 2015; originally announced January 2015.

  35. arXiv:cs/0405015  [pdf, ps, other

    cs.AR

    A High-Level Reconfigurable Computing Platform Software Frameworks

    Authors: Darran Nathan, Kelvin Lim Mun Kit, Kelly Choo Hon Min, Philip Wong Jit Chin, Andreas Weisensee

    Abstract: Reconfigurable computing refers to the use of processors, such as Field Programmable Gate Arrays (FPGAs), that can be modified at the hardware level to take on different processing tasks. A reconfigurable computing platform describes the hardware and software base on top of which modular extensions can be created, depending on the desired application. Such reconfigurable computing platforms can… ▽ More

    Submitted 4 May, 2004; originally announced May 2004.

    Comments: 4 pages, 8 figures

    ACM Class: D.2.11