Skip to main content

Showing 1–9 of 9 results for author: Roque, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.19914  [pdf, other

    quant-ph cs.IT

    Efficient entanglement purification based on noise guessing decoding

    Authors: André Roque, Diogo Cruz, Francisco A. Monteiro, Bruno C. Coutinho

    Abstract: In this paper, we propose a novel bipartite entanglement purification protocol built upon hashing and upon the guessing random additive noise decoding (GRAND) approach recently devised for classical error correction codes. Our protocol offers substantial advantages over existing hashing protocols, requiring fewer qubits for purification, achieving higher fidelities, and delivering better yields wi… ▽ More

    Submitted 13 November, 2023; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: 16 pages

  2. Decision-Theoretic Question Generation for Situated Reference Resolution: An Empirical Study and Computational Model

    Authors: Felix Gervits, Gordon Briggs, Antonio Roque, Genki A. Kadomatsu, Dean Thurston, Matthias Scheutz, Matthew Marge

    Abstract: Dialogue agents that interact with humans in situated environments need to manage referential ambiguity across multiple modalities and ask for help as needed. However, it is not clear what kinds of questions such agents should ask nor how the answers to such questions can be used to resolve ambiguity. To address this, we analyzed dialogue data from an interactive study in which participants contro… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

    Comments: To be published in the proceedings of the 23rd ACM International Conference on Multimodal Interaction (ICMI) 2021

    ACM Class: I.2.6; J.4

  3. arXiv:2106.06504  [pdf, other

    cs.CL

    How Should Agents Ask Questions For Situated Learning? An Annotated Dialogue Corpus

    Authors: Felix Gervits, Antonio Roque, Gordon Briggs, Matthias Scheutz, Matthew Marge

    Abstract: Intelligent agents that are confronted with novel concepts in situated environments will need to ask their human teammates questions to learn about the physical world. To better understand this problem, we need data about asking questions in situated task-based interactions. To this end, we present the Human-Robot Dialogue Learning (HuRDL) Corpus - a novel dialogue corpus collected in an online in… ▽ More

    Submitted 11 June, 2021; originally announced June 2021.

    Comments: Corpus available at https://github.com/USArmyResearchLab/ARL-HuRDL . To appear in proceedings of SIGDial 2021

    ACM Class: I.2.7; J.4; J.5

  4. arXiv:2105.08510  [pdf, other

    cs.CY

    Study of a Hybrid Photovoltaic-Wind Smart Microgrid using Data Science Approach

    Authors: Josimar Edinson Chire Saire, José Armando Gastelo Roque, Franco Canziani

    Abstract: In this paper, a smart microgrid implemented in Paracas, Ica, Peru, composed of 6kWp PV + 6kW Wind and that provides electricity to a rural community of 40 families, was studied using a data science approach. Real data of solar irradiance, wind speed, energy demand, and voltage of the battery bank from 2 periods of operation were studied to find patterns, seasonality, and existing correlations bet… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  5. arXiv:2005.03764  [pdf, other

    cs.PL math.DS nlin.AO

    NetPyNE implementation and rescaling of the Potjans-Diesmanncortical microcircuit model

    Authors: Cecilia Romaro, Fernando Araujo Najman, William W Lytton, Antonio C Roque, Salvador Dura-Bernal

    Abstract: The Potjans-Diesmann cortical microcircuit model is a widely used model originallyimplemented in NEST. Here, we re-implemented the model using NetPyNE, a high-level Python interface to the NEURON simulator, and reproduced the findings of theoriginal publication. We also implemented a method for rescaling the network sizewhich preserves first and second order statistics, building on existing work o… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

  6. arXiv:1911.00229  [pdf, ps, other

    cs.CL cs.AI

    Engaging in Dialogue about an Agent's Norms and Behaviors

    Authors: Daniel Kasenberg, Antonio Roque, Ravenna Thielstrom, Matthias Scheutz

    Abstract: We present a set of capabilities allowing an agent planning with moral and social norms represented in temporal logic to respond to queries about its norms and behaviors in natural language, and for the human user to add and remove norms directly in natural language. The user may also pose hypothetical modifications to the agent's norms and inquire about their effects.

    Submitted 1 November, 2019; originally announced November 2019.

    Comments: Accepted to the 1st Workshop on Interactive Natural Language Technology for Explainable Artificial Intelligence (NL4XAI)

  7. arXiv:1911.00226  [pdf, ps, other

    cs.CL cs.AI

    Generating Justifications for Norm-Related Agent Decisions

    Authors: Daniel Kasenberg, Antonio Roque, Ravenna Thielstrom, Meia Chita-Tegmark, Matthias Scheutz

    Abstract: We present an approach to generating natural language justifications of decisions derived from norm-based reasoning. Assuming an agent which maximally satisfies a set of rules specified in an object-oriented temporal logic, the user can ask factual questions (about the agent's rules, actions, and the extent to which the agent violated the rules) as well as "why" questions that require the agent co… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

    Comments: Accepted to the Proceedings of the 12th International Conference on Natural Language Generation (INLG 2019)

  8. arXiv:1804.08672  [pdf

    cs.CR

    Prediction in Cyber Security: Complications and Consolations

    Authors: Antonio Roque

    Abstract: Uncertainty, error, and similar complications add to the many challenges of cyber security. Various disciplines have developed methods for managing these complications, but applying these methods involves disambiguating overlap** terminology and determining a method's proper usage in the context of cyber security, which has unique properties. This process is here guided by the need for predictio… ▽ More

    Submitted 25 April, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

  9. arXiv:1710.01367  [pdf

    cs.CR

    Validating Computer Security Methods: Meta-methodology for an Adversarial Science

    Authors: Antonio Roque

    Abstract: How can we justify the validity of our computer security methods? This meta-methodological question is related to recent explorations on the science of computer security, which have been hindered by computer security's unique properties. We confront this by develo** a taxonomy of properties and methods. Interdisciplinary foundations provide a solid grounding for a set of essential concepts, incl… ▽ More

    Submitted 22 January, 2018; v1 submitted 3 October, 2017; originally announced October 2017.

    Comments: v3: wording changes, clarification of figures