Skip to main content

Showing 1–29 of 29 results for author: Joseph, A

Searching in archive cs. Search in all archives.
.
  1. CMDS: Cross-layer Dataflow Optimization for DNN Accelerators Exploiting Multi-bank Memories

    Authors: Man Shi, Steven Colleman, Charlotte VanDeMieroop, Antony Joseph, Maurice Meijer, Wim Dehaene, Marian Verhelst

    Abstract: Deep neural networks (DNN) use a wide range of network topologies to achieve high accuracy within diverse applications. This model diversity makes it impossible to identify a single "dataflow" (execution schedule) to perform optimally across all possible layers and network topologies. Several frameworks support the exploration of the best dataflow for a given DNN layer and hardware. However, switc… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Journal ref: 2023 24th International Symposium on Quality Electronic Design (ISQED)

  2. arXiv:2402.11456  [pdf, other

    cs.CL

    FactPICO: Factuality Evaluation for Plain Language Summarization of Medical Evidence

    Authors: Sebastian Antony Joseph, Lily Chen, Jan Trienes, Hannah Louisa Göke, Monika Coers, Wei Xu, Byron C Wallace, Junyi Jessy Li

    Abstract: Plain language summarization with LLMs can be useful for improving textual accessibility of technical content. But how factual are these summaries in a high-stakes domain like medicine? This paper presents FactPICO, a factuality benchmark for plain language summarization of medical texts describing randomized controlled trials (RCTs), which are the basis of evidence-based medicine and can directly… ▽ More

    Submitted 4 June, 2024; v1 submitted 17 February, 2024; originally announced February 2024.

    Comments: Preprint has been updated to match the final revision for ACL 2024

  3. arXiv:2305.01054  [pdf, other

    cs.DB cs.IR

    CHIC: Corporate Document for Visual question Answering

    Authors: Ibrahim Souleiman Mahamoud, Mickael Coustaty, Aurelie Joseph, Vincent Poulain d Andecy, Jean-Marc Ogier

    Abstract: The massive use of digital documents due to the substantial trend of paperless initiatives confronted some companies to find ways to process thousands of documents per day automatically. To achieve this, they use automatic information retrieval (IR) allowing them to extract useful information from large datasets quickly. In order to have effective IR methods, it is first necessary to have an adequ… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

  4. arXiv:2210.11703  [pdf, other

    cs.CR cs.DC

    SCL: A Secure Concurrency Layer For Paranoid Stateful Lambdas

    Authors: Kaiyuan Chen, Alexander Thomas, Hanming Lu, William Mullen, Jeffery Ichnowski, Rahul Arya, Nivedha Krishnakumar, Ryan Teoh, Willis Wang, Anthony Joseph, John Kubiatowicz

    Abstract: We propose a federated Function-as-a-Service (FaaS) execution model that provides secure and stateful execution in both Cloud and Edge environments. The FaaS workers, called Paranoid Stateful Lambdas (PSLs), collaborate with one another to perform large parallel computations. We exploit cryptographically hardened and mobile bundles of data, called DataCapsules, to provide persistent state for our… ▽ More

    Submitted 2 November, 2022; v1 submitted 20 October, 2022; originally announced October 2022.

    Comments: updated with acknowledgement; 14 pages, 11 figures, 2 tables

  5. arXiv:2205.07147  [pdf

    cs.DC

    The Sky Above The Clouds

    Authors: Sarah Chasins, Alvin Cheung, Natacha Crooks, Ali Ghodsi, Ken Goldberg, Joseph E. Gonzalez, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Michael W. Mahoney, Aditya Parameswaran, David Patterson, Raluca Ada Popa, Koushik Sen, Scott Shenker, Dawn Song, Ion Stoica

    Abstract: Technology ecosystems often undergo significant transformations as they mature. For example, telephony, the Internet, and PCs all started with a single provider, but in the United States each is now served by a competitive market that uses comprehensive and universal technology standards to provide compatibility. This white paper presents our view on how the cloud ecosystem, barely over fifteen ye… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

    Comments: 35 pages

  6. arXiv:2201.12535  [pdf, ps, other

    eess.IV cs.AI physics.med-ph

    Validation and Generalizability of Self-Supervised Image Reconstruction Methods for Undersampled MRI

    Authors: Thomas Yu, Tom Hilbert, Gian Franco Piredda, Arun Joseph, Gabriele Bonanno, Salim Zenkhri, Patrick Omoumi, Meritxell Bach Cuadra, Erick Jorge Canales-Rodríguez, Tobias Kober, Jean-Philippe Thiran

    Abstract: Deep learning methods have become the state of the art for undersampled MR reconstruction. Particularly for cases where it is infeasible or impossible for ground truth, fully sampled data to be acquired, self-supervised machine learning methods for reconstruction are becoming increasingly used. However potential issues in the validation of such methods, as well as their generalizability, remain un… ▽ More

    Submitted 12 September, 2022; v1 submitted 29 January, 2022; originally announced January 2022.

    Comments: Accepted for publication at the Journal of Machine Learning for Biomedical Imaging (MELBA) https://www.melba-journal.org/papers/2022:022.html

    Journal ref: Machine.Learning.for.Biomedical.Imaging. 1 (2022)

  7. arXiv:2103.02145  [pdf, other

    cs.DB

    Enhancing the Interactivity of Dataframe Queries by Leveraging Think Time

    Authors: Doris Xin, Devin Petersohn, Dixin Tang, Yifan Wu, Joseph E. Gonzalez, Joseph M. Hellerstein, Anthony D. Joseph, Aditya G. Parameswaran

    Abstract: We propose opportunistic evaluation, a framework for accelerating interactions with dataframes. Interactive latency is critical for iterative, human-in-the-loop dataframe workloads for supporting exploratory data analysis. Opportunistic evaluation significantly reduces interactive latency by 1) prioritizing computation directly relevant to the interactions and 2) leveraging think time for asynchro… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  8. arXiv:2101.00792  [pdf

    cs.HC

    Eye Tracking to Understand Impact of Aging on Mobile Phone Applications

    Authors: Antony William Joseph, Jeevitha Shree DV, Kamal Preet Singh Saluja, Abhishek Mukhopadhyay, Ramaswami Murugesh, Pradipta Biswas

    Abstract: Usage of smartphones and tablets have been increasing rapidly with multi-touch interaction and powerful configurations. Performing tasks on mobile phones become more complex as people age, thereby increasing their cognitive workload. In this context, we conducted an eye tracking study with 50 participants between the age of 20 to 60 years and above, living in Bangalore, India. This paper focuses o… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    ACM Class: D.2.2; H.1.2; I.3.6

  9. arXiv:2007.07547  [pdf, other

    cs.CV cs.LG

    Evaluation of Neural Network Classification Systems on Document Stream

    Authors: Joris Voerman, Aurelie Joseph, Mickael Coustaty, Vincent Poulain d Andecy, Jean-Marc Ogier

    Abstract: One major drawback of state of the art Neural Networks (NN)-based approaches for document classification purposes is the large number of training samples required to obtain an efficient classification. The minimum required number is around one thousand annotated documents for each class. In many cases it is very difficult, if not impossible, to gather this number of samples in real industrial proc… ▽ More

    Submitted 15 July, 2020; originally announced July 2020.

    Comments: 15 pages, 3 figures and submitted to DAS conferences 2020

    ACM Class: I.7.1; J.1

  10. Understanding the Use of Crisis Informatics Technology among Older Adults

    Authors: Yixuan Zhang, Nurul Suhaimi, Rana Azghandi, Mary Amulya Joseph, Miso Kim, Jacqueline Griffin, Andrea G. Parker

    Abstract: Mass emergencies increasingly pose significant threats to human life, with a disproportionate burden being incurred by older adults. Research has explored how mobile technology can mitigate the effects of mass emergencies. However, less work has examined how mobile technologies support older adults during emergencies, considering their unique needs. To address this research gap, we interviewed 16… ▽ More

    Submitted 21 January, 2020; v1 submitted 8 January, 2020; originally announced January 2020.

    Comments: 10 pages

  11. arXiv:2001.00888  [pdf, other

    cs.DB

    Towards Scalable Dataframe Systems

    Authors: Devin Petersohn, Stephen Macke, Doris Xin, William Ma, Doris Lee, Xiangxi Mo, Joseph E. Gonzalez, Joseph M. Hellerstein, Anthony D. Joseph, Aditya Parameswaran

    Abstract: Dataframes are a popular abstraction to represent, prepare, and analyze data. Despite the remarkable success of dataframe libraries in Rand Python, dataframes face performance issues even on moderately large datasets. Moreover, there is significant ambiguity regarding dataframe semantics. In this paper we lay out a vision and roadmap for scalable dataframe systems. To demonstrate the potential in… ▽ More

    Submitted 2 June, 2020; v1 submitted 3 January, 2020; originally announced January 2020.

  12. arXiv:1903.04209  [pdf, other

    stat.ML cs.LG econ.EM

    Parametric inference with universal function approximators

    Authors: Andreas Joseph

    Abstract: Universal function approximators, such as artificial neural networks, can learn a large variety of target functions arbitrarily well given sufficient training data. This flexibility comes at the cost of the ability to perform parametric inference. We address this gap by proposing a generic framework based on the Shapley-Taylor decomposition of a model. A surrogate parametric regression analysis is… ▽ More

    Submitted 4 October, 2020; v1 submitted 11 March, 2019; originally announced March 2019.

    Comments: 38 pages, 5 figures, 2 tables

    MSC Class: 62G10; 62G20; 62-07; 91-08; 91A12 ACM Class: G.1; G.2; G.3; I.2

  13. arXiv:1812.00497  [pdf, other

    cs.LG stat.ML

    Using Multitask Learning to Improve 12-Lead Electrocardiogram Classification

    Authors: J. Weston Hughes, Taylor Sittler, Anthony D. Joseph, Jeffrey E. Olgin, Joseph E. Gonzalez, Geoffrey H. Tison

    Abstract: We develop a multi-task convolutional neural network (CNN) to classify multiple diagnoses from 12-lead electrocardiograms (ECGs) using a dataset comprised of over 40,000 ECGs, with labels derived from cardiologist clinical interpretations. Since many clinically important classes can occur in low frequencies, approaches are needed to improve performance on rare classes. We compare the performance o… ▽ More

    Submitted 4 December, 2018; v1 submitted 2 December, 2018; originally announced December 2018.

    Comments: Machine Learning for Health (ML4H) Workshop at NeurIPS 2018 arXiv:1811.07216

    Report number: ML4H/2018/209

  14. arXiv:1810.09103  [pdf, other

    cs.LG cs.AI stat.ML

    Greedy Actor-Critic: A New Conditional Cross-Entropy Method for Policy Improvement

    Authors: Samuel Neumann, Sungsu Lim, A** Joseph, Yangchen Pan, Adam White, Martha White

    Abstract: Many policy gradient methods are variants of Actor-Critic (AC), where a value function (critic) is learned to facilitate updating the parameterized policy (actor). The update to the actor involves a log-likelihood update weighted by the action-values, with the addition of entropy regularization for soft variants. In this work, we explore an alternative update for the actor, based on an extension o… ▽ More

    Submitted 28 February, 2023; v1 submitted 22 October, 2018; originally announced October 2018.

    Comments: 27 pages, 8 figures

  15. arXiv:1806.06720  [pdf, other

    cs.LG stat.ML

    An Online Prediction Algorithm for Reinforcement Learning with Linear Function Approximation using Cross Entropy Method

    Authors: A** George Joseph, Shalabh Bhatnagar

    Abstract: In this paper, we provide two new stable online algorithms for the problem of prediction in reinforcement learning, \emph{i.e.}, estimating the value function of a model-free Markov reward process using the linear function approximation architecture and with memory and computation costs scaling quadratically in the size of the feature set. The algorithms employ the multi-timescale stochastic appro… ▽ More

    Submitted 15 June, 2018; originally announced June 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1609.09449

  16. arXiv:1801.10291  [pdf, other

    cs.AI math.OC

    A Cross Entropy based Optimization Algorithm with Global Convergence Guarantees

    Authors: A** George Joseph, Shalabh Bhatnagar

    Abstract: The cross entropy (CE) method is a model based search method to solve optimization problems where the objective function has minimal structure. The Monte-Carlo version of the CE method employs the naive sample averaging technique which is inefficient, both computationally and space wise. We provide a novel stochastic approximation version of the CE method, where the sample averaging is replaced wi… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

  17. arXiv:1801.10287  [pdf, other

    cs.AI

    An Incremental Off-policy Search in a Model-free Markov Decision Process Using a Single Sample Path

    Authors: A** George Joseph, Shalabh Bhatnagar

    Abstract: In this paper, we consider a modified version of the control problem in a model free Markov decision process (MDP) setting with large state and action spaces. The control problem most commonly addressed in the contemporary literature is to find an optimal policy which maximizes the value function, i.e., the long run discounted reward of the MDP. The current settings also assume access to a generat… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

  18. arXiv:1712.05855  [pdf, other

    cs.AI

    A Berkeley View of Systems Challenges for AI

    Authors: Ion Stoica, Dawn Song, Raluca Ada Popa, David Patterson, Michael W. Mahoney, Randy Katz, Anthony D. Joseph, Michael Jordan, Joseph M. Hellerstein, Joseph E. Gonzalez, Ken Goldberg, Ali Ghodsi, David Culler, Pieter Abbeel

    Abstract: With the increasing commoditization of computer vision, speech recognition and machine translation systems and the widespread deployment of learning-based back-end technologies such as digital advertising and intelligent infrastructures, AI (Artificial Intelligence) has moved from research labs to production. These changes have been made possible by unprecedented levels of data and computation, by… ▽ More

    Submitted 15 December, 2017; originally announced December 2017.

    Comments: Berkeley Technical Report

    Report number: EECS-2017-159

  19. arXiv:1510.07338  [pdf, other

    cs.CR

    Reviewer Integration and Performance Measurement for Malware Detection

    Authors: Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar

    Abstract: We present and evaluate a large-scale malware detection system integrating machine learning with expert reviewers, treating reviewers as a limited labeling resource. We demonstrate that even in small numbers, reviewers can vastly improve the system's ability to keep pace with evolving threats. We conduct our evaluation on a sample of VirusTotal submissions spanning 2.5 years and containing 1.1 mil… ▽ More

    Submitted 26 May, 2016; v1 submitted 25 October, 2015; originally announced October 2015.

    Comments: 20 papers, 11 figures, accepted at the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2016)

  20. arXiv:1509.07892  [pdf, other

    cs.LG cs.CR stat.ML

    Evasion and Hardening of Tree Ensemble Classifiers

    Authors: Alex Kantchelian, J. D. Tygar, Anthony D. Joseph

    Abstract: Classifier evasion consists in finding for a given instance $x$ the nearest instance $x'$ such that the classifier predictions of $x$ and $x'$ are different. We present two novel algorithms for systematically computing evasions for tree ensembles such as boosted trees and random forests. Our first algorithm uses a Mixed Integer Linear Program solver and finds the optimal evading instance under an… ▽ More

    Submitted 26 May, 2016; v1 submitted 25 September, 2015; originally announced September 2015.

    Comments: 11 pages, 7 figures, Appears in Proceedings of the 33rd International Conference on Machine Learning (ICML), New York, NY, USA, 2016. JMLR: W&CP volume 48

  21. arXiv:1403.0297  [pdf, other

    cs.CR

    I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis

    Authors: Brad Miller, Ling Huang, A. D. Joseph, J. D. Tygar

    Abstract: Revelations of large scale electronic surveillance and data mining by governments and corporations have fueled increased adoption of HTTPS. We present a traffic analysis attack against over 6000 webpages spanning the HTTPS deployments of 10 widely used, industry-leading websites in areas such as healthcare, finance, legal services and streaming video. Our attack identifies individual pages in the… ▽ More

    Submitted 2 March, 2014; originally announced March 2014.

  22. arXiv:1309.2423   

    cs.MM cs.CR

    Robust watermarking based on DWT SVD

    Authors: Anumol Joseph, K. Anusudha

    Abstract: Digital information revolution has brought about many advantages and new issues. The protection of ownership and the prevention of unauthorized manipulation of digital audio, image, and video materials has become an important concern due to the ease of editing and perfect reproduction. Watermarking is identified as a major means to achieve copyright protection. It is a branch of information hiding… ▽ More

    Submitted 26 September, 2013; v1 submitted 10 September, 2013; originally announced September 2013.

    Comments: paper has bee withdrawn by the author due to error in equation

  23. arXiv:1211.3951  [pdf, other

    stat.ME cs.SI physics.data-an physics.soc-ph

    Composite Centrality: A Natural Scale for Complex Evolving Networks

    Authors: Andreas Joseph, Guanrong Chen

    Abstract: We derive a composite centrality measure for general weighted and directed complex networks, based on measure standardisation and invariant statistical inheritance schemes. Different schemes generate different intermediate abstract measures providing additional information, while the composite centrality measure tends to the standard normal distribution. This offers a unified scale to measure node… ▽ More

    Submitted 19 January, 2014; v1 submitted 16 November, 2012; originally announced November 2012.

    Comments: 11 pages, 5 figures, 4 tables

    Journal ref: Physica D, vol. 267, p. 58-67, 2014

  24. arXiv:1207.2406  [pdf, other

    cs.IT math.ST

    Fast Sparse Superposition Codes have Exponentially Small Error Probability for R < C

    Authors: Antony Joseph, Andrew Barron

    Abstract: For the additive white Gaussian noise channel with average codeword power constraint, sparse superposition codes are developed. These codes are based on the statistical high-dimensional regression framework. The paper [IEEE Trans. Inform. Theory 55 (2012), 2541 - 2557] investigated decoding using the optimal maximum-likelihood decoding scheme. Here a fast decoding algorithm, called adaptive succes… ▽ More

    Submitted 10 July, 2012; originally announced July 2012.

    Comments: 23 pages, 7 figures

  25. Lossy Compression via Sparse Linear Regression: Performance under Minimum-distance Encoding

    Authors: Ramji Venkataramanan, Antony Joseph, Sekhar Tatikonda

    Abstract: We study a new class of codes for lossy compression with the squared-error distortion criterion, designed using the statistical framework of high-dimensional linear regression. Codewords are linear combinations of subsets of columns of a design matrix. Called a Sparse Superposition or Sparse Regression codebook, this structure is motivated by an analogous construction proposed recently by Barron a… ▽ More

    Submitted 18 December, 2015; v1 submitted 3 February, 2012; originally announced February 2012.

    Comments: This version corrects a typo in the statement of Theorem 2 of the published paper

    Journal ref: IEEE Transactions on Information Theory, vol. 60, no. 6, pp. 3254-3264, June 2014

  26. arXiv:1007.0484  [pdf, ps, other

    cs.LG cs.CR cs.GT

    Query Strategies for Evading Convex-Inducing Classifiers

    Authors: Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar

    Abstract: Classifiers are often used to detect miscreant activities. We study how an adversary can systematically query a classifier to elicit information that allows the adversary to evade detection while incurring a near-minimal cost of modifying their intended malfeasance. We generalize the theory of Lowd and Meek (2005) to the family of convex-inducing classifiers that partition input space into two set… ▽ More

    Submitted 3 July, 2010; originally announced July 2010.

  27. arXiv:1006.3870  [pdf, other

    cs.IT cs.LG math.ST

    Toward Fast Reliable Communication at Rates Near Capacity with Gaussian Noise

    Authors: Andrew R Barron, Antony Joseph

    Abstract: For the additive Gaussian noise channel with average codeword power constraint, sparse superposition codes and adaptive successive decoding is developed. Codewords are linear combinations of subsets of vectors, with the message indexed by the choice of subset. A feasible decoding algorithm is presented. Communication is reliable with error probability exponentially small for all rates below the Sh… ▽ More

    Submitted 19 June, 2010; originally announced June 2010.

    Comments: 5 pages, 4 figures, conference submission

  28. arXiv:1006.3780  [pdf, other

    cs.IT cs.LG math.ST

    Least Squares Superposition Codes of Moderate Dictionary Size, Reliable at Rates up to Capacity

    Authors: Andrew R. Barron, Antony Joseph

    Abstract: For the additive white Gaussian noise channel with average codeword power constraint, new coding methods are devised in which the codewords are sparse superpositions, that is, linear combinations of subsets of vectors from a given design, with the possible messages indexed by the choice of subset. Decoding is by least squares, tailored to the assumed form of linear combination. Communication is sh… ▽ More

    Submitted 18 June, 2010; originally announced June 2010.

    Comments: 17 pages, 4 figures, journal submission

  29. arXiv:1003.2751  [pdf, other

    cs.LG cs.CR

    Near-Optimal Evasion of Convex-Inducing Classifiers

    Authors: Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar

    Abstract: Classifiers are often used to detect miscreant activities. We study how an adversary can efficiently query a classifier to elicit information that allows the adversary to evade detection at near-minimal cost. We generalize results of Lowd and Meek (2005) to convex-inducing classifiers. We present algorithms that construct undetected instances of near-minimal cost using only polynomially many queri… ▽ More

    Submitted 13 March, 2010; originally announced March 2010.

    Comments: 8 pages; to appear at AISTATS'2010