Skip to main content

Showing 1–13 of 13 results for author: McLeod, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.03254  [pdf, other

    cs.SI physics.soc-ph

    Non-coresident family as a driver of migration change in a crisis: The case of the COVID-19 pandemic

    Authors: Unchitta Kan, Jericho McLeod, Eduardo López

    Abstract: Changes in U.S. migration during the COVID-19 pandemic show that many moved to less populated cities from larger cities, deviating from previous trends. In this study, building on prior work in the literature showing that the abundance of family ties is inversely related to population size, we analyze these migration changes with a focus on the crucial, yet overlooked factor of extended family. Em… ▽ More

    Submitted 2 April, 2024; v1 submitted 4 October, 2023; originally announced October 2023.

    Comments: 19 pages, 3 figures

  2. arXiv:2307.10455  [pdf, other

    cs.CV cs.AI cs.LG

    A Step Towards Worldwide Biodiversity Assessment: The BIOSCAN-1M Insect Dataset

    Authors: Zahra Gharaee, ZeMing Gong, Nicholas Pellegrino, Iuliia Zarubiieva, Joakim Bruslund Haurum, Scott C. Lowe, Jaclyn T. A. McKeown, Chris C. Y. Ho, Joschka McLeod, Yi-Yun C Wei, Jireh Agda, Sujeevan Ratnasingham, Dirk Steinke, Angel X. Chang, Graham W. Taylor, Paul Fieguth

    Abstract: In an effort to catalog insect biodiversity, we propose a new large dataset of hand-labelled insect images, the BIOSCAN-Insect Dataset. Each record is taxonomically classified by an expert, and also has associated genetic information including raw nucleotide barcode sequences and assigned barcode index numbers, which are genetically-based proxies for species classification. This paper presents a c… ▽ More

    Submitted 13 November, 2023; v1 submitted 19 July, 2023; originally announced July 2023.

  3. arXiv:2305.09261  [pdf

    cs.CR cs.CY

    Challenges with the Application of Cyber Security for Airworthiness (CSA) in Real-World Contexts

    Authors: Beckett LeClair, James McLeod, Lee Ramsay, Mick Warren

    Abstract: The ever increasing push towards reliance upon computerised technology in commercial, general, and military aerospace brings with it an increasing amount of potential cyber hazards and attacks. Consequently, the variety of attack vectors is greater than ever. Recognized Good Practice standards such as DO 326A and ED 202A attempt to address this by providing guidelines for cyber security on in-serv… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: Preprint for CTIC 2023

  4. arXiv:2305.07944  [pdf, other

    cs.SI physics.soc-ph

    Origins of Face-to-face Interaction with Kin in US Cities

    Authors: Jericho McLeod, Unchitta Kan, Eduardo López

    Abstract: People interact face-to-face on a frequent basis if (i) they live nearby and (ii) make the choice to meet. The first constitutes an availability of social ties; the second a propensity to interact with those ties. Despite being distinct social processes, most large-scale human interaction studies overlook these separate influences. Here, we study trends of interaction, availability, and propensity… ▽ More

    Submitted 13 May, 2023; originally announced May 2023.

    Comments: 29 pages, 3 figures

  5. arXiv:2110.15049  [pdf, ps, other

    cs.LG

    Validating Gaussian Process Models with Simulation-Based Calibration

    Authors: John Mcleod, Fergus Simpson

    Abstract: Gaussian process priors are a popular choice for Bayesian analysis of regression problems. However, the implementation of these models can be complex, and ensuring that the implementation is correct can be challenging. In this paper we introduce Gaussian process simulation-based calibration, a procedure for validating the implementation of Gaussian process models and demonstrate the efficacy of th… ▽ More

    Submitted 27 October, 2021; originally announced October 2021.

    Comments: 2 pages, 1 figure

    Journal ref: 2021 IEEE International Conference On Artificial Intelligence Testing (AITest), Oxford, United Kingdom, 2021 pp. 101-102

  6. arXiv:2104.05674  [pdf, ps, other

    stat.ML cs.LG

    GPflux: A Library for Deep Gaussian Processes

    Authors: Vincent Dutordoir, Hugh Salimbeni, Eric Hambro, John McLeod, Felix Leibfried, Artem Artemev, Mark van der Wilk, James Hensman, Marc P. Deisenroth, ST John

    Abstract: We introduce GPflux, a Python library for Bayesian deep learning with a strong emphasis on deep Gaussian processes (DGPs). Implementing DGPs is a challenging endeavour due to the various mathematical subtleties that arise when dealing with multivariate Gaussian distributions and the complex bookkee** of indices. To date, there are no actively maintained, open-sourced and extendable libraries ava… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

  7. arXiv:2103.14407  [pdf, other

    cs.LG

    Bellman: A Toolbox for Model-Based Reinforcement Learning in TensorFlow

    Authors: John McLeod, Hrvoje Stojic, Vincent Adam, Dongho Kim, Jordi Grau-Moya, Peter Vrancx, Felix Leibfried

    Abstract: In the past decade, model-free reinforcement learning (RL) has provided solutions to challenging domains such as robotics. Model-based RL shows the prospect of being more sample-efficient than model-free methods in terms of agent-environment interactions, because the model enables to extrapolate to unseen situations. In the more recent past, model-based methods have shown superior results compared… ▽ More

    Submitted 13 April, 2021; v1 submitted 26 March, 2021; originally announced March 2021.

  8. arXiv:2101.01133  [pdf, other

    cs.CV

    Stereo Correspondence and Reconstruction of Endoscopic Data Challenge

    Authors: Max Allan, Jonathan Mcleod, Congcong Wang, Jean Claude Rosenthal, Zhenglei Hu, Niklas Gard, Peter Eisert, Ke Xue Fu, Trevor Zeffiro, Wenyao Xia, Zhanshi Zhu, Huoling Luo, Fucang Jia, Xiran Zhang, Xiaohong Li, Lalith Sharan, Tom Kurmann, Sebastian Schmid, Raphael Sznitman, Dimitris Psychogyios, Mahdi Azizian, Danail Stoyanov, Lena Maier-Hein, Stefanie Speidel

    Abstract: The stereo correspondence and reconstruction of endoscopic data sub-challenge was organized during the Endovis challenge at MICCAI 2019 in Shenzhen, China. The task was to perform dense depth estimation using 7 training datasets and 2 test sets of structured light data captured using porcine cadavers. These were provided by a team at Intuitive Surgical. 10 teams participated in the challenge day.… ▽ More

    Submitted 28 January, 2021; v1 submitted 4 January, 2021; originally announced January 2021.

  9. arXiv:2002.02921  [pdf, other

    cs.CV cs.LG cs.RO eess.IV

    Temporal Segmentation of Surgical Sub-tasks through Deep Learning with Multiple Data Sources

    Authors: Yidan Qin, Sahba Aghajani Pedram, Seyedshams Feyzabadi, Max Allan, A. Jonathan McLeod, Joel W. Burdick, Mahdi Azizian

    Abstract: Many tasks in robot-assisted surgeries (RAS) can be represented by finite-state machines (FSMs), where each state represents either an action (such as picking up a needle) or an observation (such as bleeding). A crucial step towards the automation of such surgical tasks is the temporal perception of the current surgical scene, which requires a real-time estimation of the states in the FSMs. The ob… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

    Comments: Accepted to ICRA 2020

  10. arXiv:1910.02301  [pdf, other

    cs.LG stat.CO stat.ML

    Change Detection in Noisy Dynamic Networks: A Spectral Embedding Approach

    Authors: Isuru Udayangani Hewapathirana, Dominic Lee, Elena Moltchanova, Jeanette McLeod

    Abstract: Change detection in dynamic networks is an important problem in many areas, such as fraud detection, cyber intrusion detection and health care monitoring. It is a challenging problem because it involves a time sequence of graphs, each of which is usually very large and sparse with heterogeneous vertex degrees, resulting in a complex, high dimensional mathematical object. Spectral embedding methods… ▽ More

    Submitted 5 October, 2019; originally announced October 2019.

    Comments: 44 pages, 33 figures

    ACM Class: G.3; I.5.3; I.6.5

  11. arXiv:1511.03629  [pdf, other

    cs.CV

    A Continuous Max-Flow Approach to Cyclic Field Reconstruction

    Authors: John S. H. Baxter, Jonathan McLeod, Terry M. Peters

    Abstract: Reconstruction of an image from noisy data using Markov Random Field theory has been explored by both the graph-cuts and continuous max-flow community in the form of the Potts and Ishikawa models. However, neither model takes into account the particular cyclic topology of specific intensity types such as the hue in natural colour images, or the phase in complex valued MRI. This paper presents \tex… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Comments: 8 pages, 1 figure

  12. arXiv:1001.2155  [pdf

    cs.AI cs.CR cs.NE

    Cooperative Automated Worm Response and Detection Immune Algorithm

    Authors: Jungwon Kim, William Wilson, Uwe Aickelin, Julie McLeod

    Abstract: The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell matu… ▽ More

    Submitted 13 January, 2010; originally announced January 2010.

    Comments: 14 pages, 2 figures, 2 tables, 4th International Conference on Artificial Immune Systems (ICARIS)

  13. arXiv:0803.1997  [pdf

    cs.NE cs.AI cs.CR

    Danger Theory: The Link between AIS and IDS?

    Authors: Uwe Aickelin, Peter Bentley, Steve Cayzer, Kim Jungwon, Julie McLeod

    Abstract: We present ideas about creating a next generation Intrusion Detection System based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and f… ▽ More

    Submitted 16 May, 2008; v1 submitted 13 March, 2008; originally announced March 2008.

    Journal ref: Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS 2003), Lecture Notes in Computer Science 2787, pp 147-155, doi: 10.1007/b12020, Edinburgh, UK 2003