Skip to main content

Showing 1–50 of 92 results for author: Shah, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01688  [pdf, other

    cs.SE

    How We Built Cedar: A Verification-Guided Approach

    Authors: Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks, Kesha Hietala, John Kastner, Anwar Mamat, Matt McCutchen, Neha Rungta, Bhakti Shah, Emina Torlak, Andrew Wells

    Abstract: This paper presents verification-guided development (VGD), a software engineering process we used to build Cedar, a new policy language for expressive, fast, safe, and analyzable authorization. Develo** a system with VGD involves writing an executable model of the system and mechanically proving properties about the model; writing production code for the system and using differential random test… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2405.06563  [pdf, other

    cs.CL

    What Can Natural Language Processing Do for Peer Review?

    Authors: Ilia Kuznetsov, Osama Mohammed Afzal, Koen Dercksen, Nils Dycke, Alexander Goldberg, Tom Hope, Dirk Hovy, Jonathan K. Kummerfeld, Anne Lauscher, Kevin Leyton-Brown, Sheng Lu, Mausam, Margot Mieskes, Aurélie Névéol, Danish Pruthi, Lizhen Qu, Roy Schwartz, Noah A. Smith, Thamar Solorio, **gyan Wang, Xiaodan Zhu, Anna Rogers, Nihar B. Shah, Iryna Gurevych

    Abstract: The number of scientific articles produced every year is growing rapidly. Providing quality control over them is crucial for scientists and, ultimately, for the public good. In modern science, this process is largely delegated to peer review -- a distributed procedure in which each submission is evaluated by several independent experts in the field. Peer review is widely used, yet it is hard, time… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  3. arXiv:2404.08163  [pdf, other

    cs.PL math.CT

    ViCAR: Visualizing Categories with Automated Rewriting in Coq

    Authors: Bhakti Shah, William Spencer, Laura Zielinski, Ben Caldwell, Adrian Lehmann, Robert Rand

    Abstract: We present ViCAR, a library for working with monoidal categories in the Coq proof assistant. ViCAR provides definitions for categorical structures that users can instantiate with their own verification projects. Upon verifying relevant coherence conditions, ViCAR gives a set of lemmas and tactics for manipulating categorical structures. We also provide a visualizer that can display any composition… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: 13 pages, 10 figures

  4. arXiv:2403.01015  [pdf, other

    cs.CY cs.DL

    A Randomized Controlled Trial on Anonymizing Reviewers to Each Other in Peer Review Discussions

    Authors: Charvi Rastogi, Xiangchen Song, Zhi**g **, Ivan Stelmakh, Hal Daumé III, Kun Zhang, Nihar B. Shah

    Abstract: Peer review often involves reviewers submitting their independent reviews, followed by a discussion among reviewers of each paper. A question among policymakers is whether the reviewers of a paper should be anonymous to each other during the discussion. We shed light on this by conducting a randomized controlled trial at the UAI 2022 conference. We randomly split the reviewers and papers into two… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

    Comments: 18 pages, 4 figures, 3 tables

  5. arXiv:2402.07860  [pdf, other

    cs.SI cs.AI cs.GT

    On the Detection of Reviewer-Author Collusion Rings From Paper Bidding

    Authors: Steven Jecmen, Nihar B. Shah, Fei Fang, Leman Akoglu

    Abstract: A major threat to the peer-review systems of computer science conferences is the existence of "collusion rings" between reviewers. In such collusion rings, reviewers who have also submitted their own papers to the conference work together to manipulate the conference's paper assignment, with the aim of being assigned to review each other's papers. The most straightforward way that colluding review… ▽ More

    Submitted 10 March, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

  6. arXiv:2402.01021  [pdf, other

    cs.SE

    Towards Understanding the Challenges of Bug Localization in Deep Learning Systems

    Authors: Sigma Jahan, Mehil B. Shah, Mohammad Masudur Rahman

    Abstract: Software bugs cost the global economy billions of dollars annually and claim ~50\% of the programming time from software developers. Locating these bugs is crucial for their resolution but challenging. It is even more challenging in deep-learning systems due to their black-box nature. Bugs in these systems are also hidden not only in the code but also in the models and training data, which might m… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  7. arXiv:2401.03069  [pdf, other

    cs.SE cs.LG

    Towards Enhancing the Reproducibility of Deep Learning Bugs: An Empirical Study

    Authors: Mehil B. Shah, Mohammad Masudur Rahman, Foutse Khomh

    Abstract: Context: Deep learning has achieved remarkable progress in various domains. However, like any software system, deep learning systems contain bugs, some of which can have severe impacts, as evidenced by crashes involving autonomous vehicles. Despite substantial advancements in deep learning techniques, little research has focused on reproducing deep learning bugs, which is an essential step for the… ▽ More

    Submitted 18 June, 2024; v1 submitted 5 January, 2024; originally announced January 2024.

    Comments: Under Major Revision at the EMSE (Empirical Software Engineering) Journal

  8. arXiv:2311.11571  [pdf, other

    cs.PL quant-ph

    VyZX: Formal Verification of a Graphical Quantum Language

    Authors: Adrian Lehmann, Ben Caldwell, Bhakti Shah, Robert Rand

    Abstract: Mathematical representations of graphs often resemble adjacency matrices or lists, representations that facilitate whiteboard reasoning and algorithm design. In the realm of proof assistants, inductive representations effectively define semantics for formal reasoning. This highlights a gap where algorithm design and proof assistants require a fundamentally different structure of graphs, particular… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: 28 pages, 26 figures

  9. arXiv:2311.09497  [pdf, other

    cs.DL cs.GT

    Peer Reviews of Peer Reviews: A Randomized Controlled Trial and Other Experiments

    Authors: Alexander Goldberg, Ivan Stelmakh, Kyunghyun Cho, Alice Oh, Alekh Agarwal, Danielle Belgrave, Nihar B. Shah

    Abstract: Is it possible to reliably evaluate the quality of peer reviews? We study this question driven by two primary motivations -- incentivizing high-quality reviewing using assessed quality of reviews and measuring changes to review quality in experiments. We conduct a large scale study at the NeurIPS 2022 conference, a top-tier conference in machine learning, in which we invited (meta)-reviewers and a… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  10. arXiv:2309.06195  [pdf, other

    cs.LG eess.SP

    Optimization Guarantees of Unfolded ISTA and ADMM Networks With Smooth Soft-Thresholding

    Authors: Shaik Basheeruddin Shah, Pradyumna Pradhan, Wei Pu, Ramunaidu Randhi, Miguel R. D. Rodrigues, Yonina C. Eldar

    Abstract: Solving linear inverse problems plays a crucial role in numerous applications. Algorithm unfolding based, model-aware data-driven approaches have gained significant attention for effectively addressing these problems. Learned iterative soft-thresholding algorithm (LISTA) and alternating direction method of multipliers compressive sensing network (ADMM-CSNet) are two widely used such approaches, ba… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

  11. arXiv:2309.04635  [pdf, other

    cs.CL

    Can NLP Models 'Identify', 'Distinguish', and 'Justify' Questions that Don't have a Definitive Answer?

    Authors: Ayushi Agarwal, Nisarg Patel, Neeraj Varshney, Mihir Parmar, Pavan Mallina, Aryan Bhavin Shah, Srihari Raju Sangaraju, Tirth Patel, Nihar Thakkar, Chitta Baral

    Abstract: Though state-of-the-art (SOTA) NLP systems have achieved remarkable performance on a variety of language understanding tasks, they primarily focus on questions that have a correct and a definitive answer. However, in real-world applications, users often ask questions that don't have a definitive answer. Incorrectly answering such questions certainly hampers a system's reliability and trustworthine… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

    Comments: TrustNLP Workshop at ACL 2023

  12. arXiv:2307.05443  [pdf, other

    cs.HC cs.DL

    Testing for Reviewer Anchoring in Peer Review: A Randomized Controlled Trial

    Authors: Ryan Liu, Steven Jecmen, Vincent Conitzer, Fei Fang, Nihar B. Shah

    Abstract: Peer review frequently follows a process where reviewers first provide initial reviews, authors respond to these reviews, then reviewers update their reviews based on the authors' response. There is mixed evidence regarding whether this process is useful, including frequent anecdotal complaints that reviewers insufficiently update their scores. In this study, we aim to investigate whether reviewer… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

    Comments: 14 pages (19 including references and appendix), 2 figures

  13. Intersectionality and Testimonial Injustice in Medical Records

    Authors: Kenya S. Andrews, Bhuvani Shah, Lu Cheng

    Abstract: Detecting testimonial injustice is an essential element of addressing inequities and promoting inclusive healthcare practices, many of which are life-critical. However, using a single demographic factor to detect testimonial injustice does not fully encompass the nuanced identities that contribute to a patient's experience. Further, some injustices may only be evident when examining the nuances th… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Journal ref: In Proceedings of the 5th ClinicalNLP Workshop, pages 358-372, Toronto, Canada. Association for Computational Linguistics (2023)

  14. Machine Vision Using Cellphone Camera: A Comparison of deep networks for classifying three challenging denominations of Indian Coins

    Authors: Keyur D. Joshi, Dhruv Shah, Varshil Shah, Nilay Gandhi, Sanket J. Shah, Sanket B. Shah

    Abstract: Indian currency coins come in a variety of denominations. Off all the varieties Rs.1, RS.2, and Rs.5 have similar diameters. Majority of the coin styles in market circulation for denominations of Rs.1 and Rs.2 coins are nearly the same except for numerals on its reverse side. If a coin is resting on its obverse side, the correct denomination is not distinguishable by humans. Therefore, it was hypo… ▽ More

    Submitted 12 May, 2023; originally announced June 2023.

    Comments: 6 Pages, 4 Figures, 6 Tables, Conference paper

  15. arXiv:2306.00622  [pdf, other

    cs.CL cs.AI cs.DL

    ReviewerGPT? An Exploratory Study on Using Large Language Models for Paper Reviewing

    Authors: Ryan Liu, Nihar B. Shah

    Abstract: Given the rapid ascent of large language models (LLMs), we study the question: (How) can large language models help in reviewing of scientific papers or proposals? We first conduct some pilot studies where we find that (i) GPT-4 outperforms other LLMs (Bard, Vicuna, Koala, Alpaca, LLaMa, Dolly, OpenAssistant, StableLM), and (ii) prompting with a specific question (e.g., to identify errors) outperf… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

  16. arXiv:2305.17339  [pdf, other

    cs.IR cs.DL stat.AP

    Counterfactual Evaluation of Peer-Review Assignment Policies

    Authors: Martin Saveski, Steven Jecmen, Nihar B. Shah, Johan Ugander

    Abstract: Peer review assignment algorithms aim to match research papers to suitable expert reviewers, working to maximize the quality of the resulting reviews. A key challenge in designing effective assignment policies is evaluating how changes to the assignment algorithm map to changes in review quality. In this work, we leverage recently proposed policies that introduce randomness in peer-review assignme… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

  17. arXiv:2303.16750  [pdf, other

    cs.IR cs.DL cs.LG

    A Gold Standard Dataset for the Reviewer Assignment Problem

    Authors: Ivan Stelmakh, John Wieting, Graham Neubig, Nihar B. Shah

    Abstract: Many peer-review venues are either using or looking to use algorithms to assign submissions to reviewers. The crux of such automated approaches is the notion of the "similarity score"--a numerical estimate of the expertise of a reviewer in reviewing a paper--and many algorithms have been proposed to compute these scores. However, these algorithms have not been subjected to a principled comparison,… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  18. arXiv:2303.09192  [pdf, other

    cs.RO

    Metric-Free Exploration for Topological Map** by Task and Motion Imitation in Feature Space

    Authors: Yuhang He, Irving Fang, Yiming Li, Rushi Bhavesh Shah, Chen Feng

    Abstract: We propose DeepExplorer, a simple and lightweight metric-free exploration method for topological map** of unknown environments. It performs task and motion planning (TAMP) entirely in image feature space. The task planner is a recurrent network using the latest image observation sequence to hallucinate a feature as the next-best exploration goal. The motion planner then utilizes the current and… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  19. arXiv:2302.08450  [pdf, other

    cs.LG cs.HC

    Assisting Human Decisions in Document Matching

    Authors: Joon Sik Kim, Valerie Chen, Danish Pruthi, Nihar B. Shah, Ameet Talwalkar

    Abstract: Many practical applications, ranging from paper-reviewer assignment in peer review to job-applicant matching for hiring, require human decision makers to identify relevant matches by combining their expertise with predictions from machine learning models. In many such model-assisted document matching tasks, the decision makers have stressed the need for assistive information about the model output… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

  20. The Role of Author Identities in Peer Review

    Authors: Nihar B. Shah

    Abstract: There is widespread debate on whether to anonymize author identities in peer review. The key argument for anonymization is to mitigate bias, whereas arguments against anonymization posit various uses of author identities in the review process. The Innovations in Theoretical Computer Science (ITCS) 2023 conference adopted a middle ground by initially anonymizing the author identities from reviewers… ▽ More

    Submitted 25 June, 2023; v1 submitted 31 December, 2022; originally announced January 2023.

  21. arXiv:2211.14446  [pdf, other

    cs.CV cs.LG

    Sign Language to Text Conversion in Real Time using Transfer Learning

    Authors: Shubham Thakar, Samveg Shah, Bhavya Shah, Anant V. Nimkar

    Abstract: The people in the world who are hearing impaired face many obstacles in communication and require an interpreter to comprehend what a person is saying. There has been constant scientific research and the existing models lack the ability to make accurate predictions. So we propose a deep learning model trained on ASL i.e. American Sign Language which will take actions in the form of ASL as input an… ▽ More

    Submitted 7 December, 2022; v1 submitted 13 November, 2022; originally announced November 2022.

    Comments: Will be published in IEEE Explore; Typos corrected

  22. arXiv:2211.12966  [pdf, other

    cs.LG cs.DB cs.DL

    How do Authors' Perceptions of their Papers Compare with Co-authors' Perceptions and Peer-review Decisions?

    Authors: Charvi Rastogi, Ivan Stelmakh, Alina Beygelzimer, Yann N. Dauphin, Percy Liang, Jennifer Wortman Vaughan, Zhenyu Xue, Hal Daumé III, Emma Pierson, Nihar B. Shah

    Abstract: How do author perceptions match up to the outcomes of the peer-review process and perceptions of others? In a top-tier computer science conference (NeurIPS 2021) with more than 23,000 submitting authors and 9,000 submitted papers, we survey the authors on three questions: (i) their predicted probability of acceptance for each of their papers, (ii) their perceived ranking of their own papers based… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  23. arXiv:2211.12686  [pdf, other

    cs.CR cs.SI

    Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and Protection

    Authors: Alexander Goldberg, Giulia Fanti, Nihar B. Shah

    Abstract: There are a number of forums where people participate under pseudonyms. One example is peer review, where the identity of reviewers for any paper is confidential. When participating in these forums, people frequently engage in "batching": executing multiple related tasks (e.g., commenting on multiple papers) at nearly the same time. Our empirical analysis shows that batching is common in two appli… ▽ More

    Submitted 11 September, 2023; v1 submitted 22 November, 2022; originally announced November 2022.

  24. arXiv:2211.08268  [pdf, other

    cs.LG cs.AI

    A Comparative Study of Machine Learning and Deep Learning Techniques for Prediction of Co2 Emission in Cars

    Authors: Samveg Shah, Shubham Thakar, Kashish Jain, Bhavya Shah, Sudhir Dhage

    Abstract: The most recent concern of all people on Earth is the increase in the concentration of greenhouse gas in the atmosphere. The concentration of these gases has risen rapidly over the last century and if the trend continues it can cause many adverse climatic changes. There have been ways implemented to curb this by the government by limiting processes that emit a higher amount of CO2, one such greenh… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: Will be published in Springer L.N.N.S. Data set used https://www.eea.europa.eu/data-and-maps/data/co2-cars-emission-22

  25. arXiv:2209.08665  [pdf, other

    cs.HC cs.AI cs.LG

    Allocation Schemes in Analytic Evaluation: Applicant-Centric Holistic or Attribute-Centric Segmented?

    Authors: **gyan Wang, Carmel Baharav, Nihar B. Shah, Anita Williams Woolley, R Ravi

    Abstract: Many applications such as hiring and university admissions involve evaluation and selection of applicants. These tasks are fundamentally difficult, and require combining evidence from multiple different aspects (what we term "attributes"). In these applications, the number of applicants is often large, and a common practice is to assign the task to multiple evaluators in a distributed fashion. Spe… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

  26. arXiv:2208.13982  [pdf

    cs.DB

    Performance Study of Time Series Databases

    Authors: Bonil Shah, P. M. Jat, Kalyan Sashidhar

    Abstract: The growth of big-data sectors such as the Internet of Things (IoT) generates enormous volumes of data. As IoT devices generate a vast volume of time-series data, the Time Series Database (TSDB) popularity has grown alongside the rise of IoT. Time series databases are developed to manage and analyze huge amounts of time series data. However, it is not easy to choose the best one from them. The mos… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

  27. arXiv:2207.11315  [pdf, other

    cs.AI cs.CR cs.GT

    Tradeoffs in Preventing Manipulation in Paper Bidding for Reviewer Assignment

    Authors: Steven Jecmen, Nihar B. Shah, Fei Fang, Vincent Conitzer

    Abstract: Many conferences rely on paper bidding as a key component of their reviewer assignment procedure. These bids are then taken into account when assigning reviewers to help ensure that each reviewer is assigned to suitable papers. However, despite the benefits of using bids, reliance on paper bidding can allow malicious reviewers to manipulate the paper assignment for unethical purposes (e.g., gettin… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

  28. arXiv:2207.02303  [pdf, other

    cs.CR cs.AI cs.GT

    A Dataset on Malicious Paper Bidding in Peer Review

    Authors: Steven Jecmen, Minji Yoon, Vincent Conitzer, Nihar B. Shah, Fei Fang

    Abstract: In conference peer review, reviewers are often asked to provide "bids" on each submitted paper that express their interest in reviewing that paper. A paper assignment algorithm then uses these bids (along with other data) to compute a high-quality assignment of reviewers to papers. However, this process has been exploited by malicious reviewers who strategically bid in order to unethically manipul… ▽ More

    Submitted 10 March, 2023; v1 submitted 24 June, 2022; originally announced July 2022.

  29. arXiv:2204.03505  [pdf, other

    cs.IR stat.ME

    Integrating Rankings into Quantized Scores in Peer Review

    Authors: Yusha Liu, Yichong Xu, Nihar B. Shah, Aarti Singh

    Abstract: In peer review, reviewers are usually asked to provide scores for the papers. The scores are then used by Area Chairs or Program Chairs in various ways in the decision-making process. The scores are usually elicited in a quantized form to accommodate the limited cognitive ability of humans to describe their opinions in numerical values. It has been found that the quantized scores suffer from a lar… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

    Comments: 14 main pages, 7 appendix pages

  30. arXiv:2204.00977  [pdf

    cs.CL cs.SD eess.AS

    Deep Speech Based End-to-End Automated Speech Recognition (ASR) for Indian-English Accents

    Authors: Priyank Dubey, Bilal Shah

    Abstract: Automated Speech Recognition (ASR) is an interdisciplinary application of computer science and linguistics that enable us to derive the transcription from the uttered speech waveform. It finds several applications in Military like High-performance fighter aircraft, helicopters, air-traffic controller. Other than military speech recognition is used in healthcare, persons with disabilities and many… ▽ More

    Submitted 2 April, 2022; originally announced April 2022.

  31. arXiv:2203.17259  [pdf, other

    cs.DL stat.AP

    To ArXiv or not to ArXiv: A Study Quantifying Pros and Cons of Posting Preprints Online

    Authors: Charvi Rastogi, Ivan Stelmakh, Xinwei Shen, Marina Meila, Federico Echenique, Shuchi Chawla, Nihar B. Shah

    Abstract: Double-blind conferences have engaged in debates over whether to allow authors to post their papers online on arXiv or elsewhere during the review process. Independently, some authors of research papers face the dilemma of whether to put their papers on arXiv due to its pros and cons. We conduct a study to substantiate this debate and dilemma via quantitative measurements. Specifically, we conduct… ▽ More

    Submitted 11 June, 2022; v1 submitted 31 March, 2022; originally announced March 2022.

    Comments: 17 pages, 3 figures

  32. Cite-seeing and Reviewing: A Study on Citation Bias in Peer Review

    Authors: Ivan Stelmakh, Charvi Rastogi, Ryan Liu, Shuchi Chawla, Federico Echenique, Nihar B. Shah

    Abstract: Citations play an important role in researchers' careers as a key factor in evaluation of scientific impact. Many anecdotes advice authors to exploit this fact and cite prospective reviewers to try obtaining a more positive evaluation for their submission. In this work, we investigate if such a citation bias actually exists: Does the citation of a reviewer's own work in a submission cause them to… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

    Comments: 19 pages, 3 figures

  33. arXiv:2201.11308  [pdf, other

    cs.CR cs.IT

    Calibration with Privacy in Peer Review

    Authors: Wenxin Ding, Gautam Kamath, Weina Wang, Nihar B. Shah

    Abstract: Reviewers in peer review are often miscalibrated: they may be strict, lenient, extreme, moderate, etc. A number of algorithms have previously been proposed to calibrate reviews. Such attempts of calibration can however leak sensitive information about which reviewer reviewed which paper. In this paper, we identify this problem of calibration with privacy, and provide a foundational building block… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

    Comments: 31 pages, 6 figures

  34. arXiv:2201.10631  [pdf, other

    cs.GT cs.AI

    Strategyproofing Peer Assessment via Partitioning: The Price in Terms of Evaluators' Expertise

    Authors: Komal Dhull, Steven Jecmen, Pravesh Kothari, Nihar B. Shah

    Abstract: Strategic behavior is a fundamental problem in a variety of real-world applications that require some form of peer assessment, such as peer grading of homeworks, grant proposal review, conference peer review of scientific papers, and peer assessment of employees in organizations. Since an individual's own work is in competition with the submissions they are evaluating, they may provide dishonest e… ▽ More

    Submitted 28 August, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

  35. Frequency Centric Defense Mechanisms against Adversarial Examples

    Authors: Sanket B. Shah, Param Raval, Harin Khakhi, Mehul S. Raval

    Abstract: Adversarial example (AE) aims at fooling a Convolution Neural Network by introducing small perturbations in the input image.The proposed work uses the magnitude and phase of the Fourier Spectrum and the entropy of the image to defend against AE. We demonstrate the defense in two ways: by training an adversarial detector and denoising the adversarial effect. Experiments were conducted on the low-re… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

    Comments: AdvM '21: Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia, at ACM Multimedia '21

  36. arXiv:2108.06371  [pdf, other

    cs.AI math.OC

    Near-Optimal Reviewer Splitting in Two-Phase Paper Reviewing and Conference Experiment Design

    Authors: Steven Jecmen, Hanrui Zhang, Ryan Liu, Fei Fang, Vincent Conitzer, Nihar B. Shah

    Abstract: Many scientific conferences employ a two-phase paper review process, where some papers are assigned additional reviewers after the initial reviews are submitted. Many conferences also design and run experiments on their paper review process, where some papers are assigned reviewers who provide reviews under an experimental condition. In this paper, we consider the question: how should reviewers be… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

  37. arXiv:2108.05523  [pdf, other

    cs.LG

    Fair Decision-Making for Food Inspections

    Authors: Shubham Singh, Bhuvni Shah, Chris Kanich, Ian A. Kash

    Abstract: Data and algorithms are essential and complementary parts of a large-scale decision-making process. However, their injudicious use can lead to unforeseen consequences, as has been observed by researchers and activists alike in the recent past. In this paper, we revisit the application of predictive models by the Chicago Department of Public Health to schedule restaurant inspections and prioritize… ▽ More

    Submitted 9 March, 2022; v1 submitted 12 August, 2021; originally announced August 2021.

    Comments: 28 pages, 16 figures

  38. Orthogonal and Non-Orthogonal Signal Representations Using New Transformation Matrices Having NPM Structure

    Authors: Shaik Basheeruddin Shah, Vijay Kumar Chakka, Arikatla Satyanarayana Reddy

    Abstract: In this paper, we introduce two types of real-valued sums known as Complex Conjugate Pair Sums (CCPSs) denoted as CCPS$^{(1)}$ and CCPS$^{(2)}$, and discuss a few of their properties. Using each type of CCPSs and their circular shifts, we construct two non-orthogonal Nested Periodic Matrices (NPMs). As NPMs are non-singular, this introduces two non-orthogonal transforms known as Complex Conjugate… ▽ More

    Submitted 20 June, 2021; originally announced July 2021.

    Comments: 13 pages, 5 figures,

    Journal ref: IEEE Transactions on Signal Processing, 06 February 2020

  39. arXiv:2105.05946  [pdf, other

    cs.CE

    Composing Modeling and Simulation with Machine Learning in Julia

    Authors: Chris Rackauckas, Ranjan Anantharaman, Alan Edelman, Shashi Gowda, Maja Gwozdz, Anand Jain, Chris Laughman, Yingbo Ma, Francesco Martinuzzi, Avik Pal, Utkarsh Rajput, Elliot Saba, Viral B. Shah

    Abstract: In this paper we introduce JuliaSim, a high-performance programming environment designed to blend traditional modeling and simulation with machine learning. JuliaSim can build accelerated surrogates from component-based models, such as those conforming to the FMI standard, using continuous-time echo state networks (CTESN). The foundation of this environment, ModelingToolkit.jl, is an acausal model… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

  40. arXiv:2105.03949  [pdf, other

    cs.CL cs.MS cs.PL cs.SC

    High-performance symbolic-numerics via multiple dispatch

    Authors: Shashi Gowda, Yingbo Ma, Alessandro Cheli, Maja Gwozdz, Viral B. Shah, Alan Edelman, Christopher Rackauckas

    Abstract: As mathematical computing becomes more democratized in high-level languages, high-performance symbolic-numeric systems are necessary for domain scientists and engineers to get the best performance out of their machine without deep knowledge of code optimization. Naturally, users need different term types either to have different algebraic properties for them, or to use efficient data structures. T… ▽ More

    Submitted 5 February, 2022; v1 submitted 9 May, 2021; originally announced May 2021.

    ACM Class: D.3.3; I.1.1; I.1.3

  41. arXiv:2012.00714  [pdf, other

    stat.ML cs.IT cs.LG

    Debiasing Evaluations That are Biased by Evaluations

    Authors: **gyan Wang, Ivan Stelmakh, Yuting Wei, Nihar B. Shah

    Abstract: It is common to evaluate a set of items by soliciting people to rate them. For example, universities ask students to rate the teaching quality of their instructors, and conference organizers ask authors of submissions to evaluate the quality of the reviews. However, in these applications, students often give a higher rating to a course if they receive higher grades in a course, and authors often g… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

  42. arXiv:2011.15083  [pdf, other

    cs.HC cs.LG stat.AP

    A Large Scale Randomized Controlled Trial on Herding in Peer-Review Discussions

    Authors: Ivan Stelmakh, Charvi Rastogi, Nihar B. Shah, Aarti Singh, Hal Daumé III

    Abstract: Peer review is the backbone of academia and humans constitute a cornerstone of this process, being responsible for reviewing papers and making the final acceptance/rejection decisions. Given that human decision making is known to be susceptible to various cognitive biases, it is important to understand which (if any) biases are present in the peer-review process and design the pipeline such that t… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

  43. arXiv:2011.15050  [pdf, other

    cs.HC cs.LG

    A Novice-Reviewer Experiment to Address Scarcity of Qualified Reviewers in Large Conferences

    Authors: Ivan Stelmakh, Nihar B. Shah, Aarti Singh, Hal Daumé III

    Abstract: Conference peer review constitutes a human-computation process whose importance cannot be overstated: not only it identifies the best submissions for acceptance, but, ultimately, it impacts the future of the whole research area by promoting some ideas and restraining others. A surge in the number of submissions received by leading AI conferences has challenged the sustainability of the review proc… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

  44. arXiv:2011.14646  [pdf, other

    cs.DL cs.LG stat.AP

    Prior and Prejudice: The Novice Reviewers' Bias against Resubmissions in Conference Peer Review

    Authors: Ivan Stelmakh, Nihar B. Shah, Aarti Singh, Hal Daumé III

    Abstract: Modern machine learning and computer science conferences are experiencing a surge in the number of submissions that challenges the quality of peer review as the number of competent reviewers is growing at a much slower rate. To curb this trend and reduce the burden on reviewers, several conferences have started encouraging or even requiring authors to declare the previous submission history of the… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

  45. arXiv:2010.15300  [pdf, other

    cs.CL cs.CY cs.LG

    Uncovering Latent Biases in Text: Method and Application to Peer Review

    Authors: Emaad Manzoor, Nihar B. Shah

    Abstract: Quantifying systematic disparities in numerical quantities such as employment rates and wages between population subgroups provides compelling evidence for the existence of societal biases. However, biases in the text written for members of different subgroups (such as in recommendation letters for male and non-male candidates), though widely reported anecdotally, remain challenging to quantify. I… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

  46. arXiv:2010.04899  [pdf, other

    cs.RO cs.AI

    Human-Supervised Semi-Autonomous Mobile Manipulators for Safely and Efficiently Executing Machine Tending Tasks

    Authors: Sarah Al-Hussaini, Shantanu Thakar, Hyojeong Kim, Pradeep Rajendran, Brual C. Shah, Jeremy A. Marvel, Satyandra K. Gupta

    Abstract: Mobile manipulators can be used for machine tending and material handling tasks in small volume manufacturing applications. These applications usually have semi-structured work environment. The use of a fully autonomous mobile manipulator for such applications can be risky, as an inaccurate model of the workspace may result in damage to expensive equipment. On the other hand, the use of a fully te… ▽ More

    Submitted 16 October, 2020; v1 submitted 10 October, 2020; originally announced October 2020.

  47. arXiv:2010.04041  [pdf, other

    cs.MA cs.GT cs.LG

    Catch Me if I Can: Detecting Strategic Behaviour in Peer Assessment

    Authors: Ivan Stelmakh, Nihar B. Shah, Aarti Singh

    Abstract: We consider the issue of strategic behaviour in various peer-assessment tasks, including peer grading of exams or homeworks and peer review in hiring or promotions. When a peer-assessment task is competitive (e.g., when students are graded on a curve), agents may be incentivized to misreport evaluations in order to improve their own final standing. Our focus is on designing methods for detection o… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

  48. arXiv:2007.07079  [pdf, other

    cs.AI cs.IR cs.LG

    A SUPER* Algorithm to Optimize Paper Bidding in Peer Review

    Authors: Tanner Fiez, Nihar B. Shah, Lillian Ratliff

    Abstract: A number of applications involve sequential arrival of users, and require showing each user an ordering of items. A prime example (which forms the focus of this paper) is the bidding process in conference peer review where reviewers enter the system sequentially, each reviewer needs to be shown the list of submitted papers, and the reviewer then "bids" to review some papers. The order of the paper… ▽ More

    Submitted 31 July, 2020; v1 submitted 27 June, 2020; originally announced July 2020.

  49. arXiv:2006.16437  [pdf, other

    cs.AI cs.GT

    Mitigating Manipulation in Peer Review via Randomized Reviewer Assignments

    Authors: Steven Jecmen, Hanrui Zhang, Ryan Liu, Nihar B. Shah, Vincent Conitzer, Fei Fang

    Abstract: We consider three important challenges in conference peer review: (i) reviewers maliciously attempting to get assigned to certain papers to provide positive reviews, possibly as part of quid-pro-quo arrangements with the authors; (ii) "torpedo reviewing," where reviewers deliberately attempt to get assigned to certain papers that they dislike in order to reject them; (iii) reviewer de-anonymizatio… ▽ More

    Submitted 23 October, 2020; v1 submitted 29 June, 2020; originally announced June 2020.

  50. arXiv:2006.16385  [pdf, other

    cs.CR cs.DB cs.LG

    On the Privacy-Utility Tradeoff in Peer-Review Data Analysis

    Authors: Wenxin Ding, Nihar B. Shah, Weina Wang

    Abstract: A major impediment to research on improving peer review is the unavailability of peer-review data, since any release of such data must grapple with the sensitivity of the peer review data in terms of protecting identities of reviewers from authors. We posit the need to develop techniques to release peer-review data in a privacy-preserving manner. Identifying this problem, in this paper we propose… ▽ More

    Submitted 29 June, 2020; originally announced June 2020.