Skip to main content

Showing 1–19 of 19 results for author: Thompson, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16133  [pdf

    cs.CV cs.LG

    Quantitative Characterization of Retinal Features in Translated OCTA

    Authors: Rashadul Hasan Badhon, Atalie Carina Thompson, Jennifer I. Lim, Theodore Leng, Minhaj Nur Alam

    Abstract: Purpose: This study explores the feasibility of using generative machine learning (ML) to translate Optical Coherence Tomography (OCT) images into Optical Coherence Tomography Angiography (OCTA) images, potentially bypassing the need for specialized OCTA hardware. Methods: The method involved implementing a generative adversarial network framework that includes a 2D vascular segmentation model and… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: The article has been revised and edited

  2. arXiv:2303.18029  [pdf, other

    math.CO cs.DM

    All-path convexity: Combinatorial and complexity aspects

    Authors: Fábio Protti, João V. C. Thompson

    Abstract: Let $¶$ be any collection of paths of a graph $G=(V,E)$. For $S\subseteq V$, define $I(S)=S\cup\{v\mid v \ \mbox{lies in a path of} \ ¶\ \mbox{with endpoints in} \ S\}$. Let $\C$ be the collection of fixed points of the function $I$, that is, $\C=\{S\subseteq V\mid I(S)=S\}$. It is well known that $(V,\C)$ is a finite convexity space, where the members of $\C$ are precisely the convex sets. If… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

    Comments: 11 pages

    MSC Class: 05C85

  3. arXiv:2301.06799  [pdf, other

    cs.CR eess.SP

    Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

    Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman

    Abstract: The massive trend toward embedded systems introduces new security threats to prevent. Malicious firmware makes it easier to launch cyberattacks against embedded systems. Systems infected with malicious firmware maintain the appearance of normal firmware operation but execute undesirable activities, which is usually a security risk. Traditionally, cybercriminals use malicious firmware to develop po… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  4. arXiv:2211.06168  [pdf, other

    cs.CL

    Unimodal and Multimodal Representation Training for Relation Extraction

    Authors: Ciaran Cooney, Rachel Heyburn, Liam Madigan, Mairead O'Cuinn, Chloe Thompson, Joana Cavadas

    Abstract: Multimodal integration of text, layout and visual information has achieved SOTA results in visually rich document understanding (VrDU) tasks, including relation extraction (RE). However, despite its importance, evaluation of the relative predictive capacity of these modalities is less prevalent. Here, we demonstrate the value of shared representations for RE tasks by conducting experiments in whic… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

    Comments: 11 pages, 3 figures, 30th Irish Conference on Artificial Intelligence and Cognitive Science

  5. arXiv:2208.07904  [pdf, ps, other

    cs.SC math.AC

    Sturm's Theorem with Endpoints

    Authors: Philippe Pébay, J. Maurice Rojas, David C. Thompson

    Abstract: Sturm's Theorem is a fundamental 19th century result relating the number of real roots of a polynomial $f$ in an interval to the number of sign alternations in a sequence of polynomial division-like calculations. We provide a short direct proof of Sturm's Theorem, including the numerically vexing case (ignored in many published accounts) where an interval endpoint is a root of $f$.

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: 4 pages. A software implementation can be found in algorithm vtkPolynomialSolversUnivariate , within the VTK (Visualization Toolkit) software package

  6. arXiv:2206.14007  [pdf, other

    cs.AR cs.CY cs.PF

    The Importance of (Exponentially More) Computing Power

    Authors: Neil C. Thompson, Shuning Ge, Gabriel F. Manso

    Abstract: Denizens of Silicon Valley have called Moore's Law "the most important graph in human history," and economists have found that Moore's Law-powered I.T. revolution has been one of the most important sources of national productivity growth. But data substantiating these claims tend to either be abstracted - for example by examining spending on I.T., rather than I.T. itself - or anecdotal. In this pa… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

  7. Federated Learning Enables Big Data for Rare Cancer Boundary Detection

    Authors: Sarthak Pati, Ujjwal Baid, Brandon Edwards, Micah Sheller, Shih-Han Wang, G Anthony Reina, Patrick Foley, Alexey Gruzdev, Deepthi Karkada, Christos Davatzikos, Chiharu Sako, Satyam Ghodasara, Michel Bilello, Suyash Mohan, Philipp Vollmuth, Gianluca Brugnara, Chandrakanth J Preetha, Felix Sahm, Klaus Maier-Hein, Maximilian Zenk, Martin Bendszus, Wolfgang Wick, Evan Calabrese, Jeffrey Rudie, Javier Villanueva-Meyer , et al. (254 additional authors not shown)

    Abstract: Although machine learning (ML) has shown promise in numerous domains, there are concerns about generalizability to out-of-sample data. This is currently addressed by centrally sharing ample, and importantly diverse, data from multiple sites. However, such centralization is challenging to scale (or even not feasible) due to various limitations. Federated ML (FL) provides an alternative to train acc… ▽ More

    Submitted 25 April, 2022; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: federated learning, deep learning, convolutional neural network, segmentation, brain tumor, glioma, glioblastoma, FeTS, BraTS

  8. arXiv:2203.01661  [pdf, other

    cs.CR

    SoK: SCT Auditing in Certificate Transparency

    Authors: Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark

    Abstract: The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer misuse attacks, however, which has given rise to the Certificate Transparency (CT) project. The goal of CT is to store all issued certificates in publi… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: PETS 2022, issue 3

  9. arXiv:2105.07025  [pdf, other

    math.AT cs.CG stat.ML

    Minimal Cycle Representatives in Persistent Homology using Linear Programming: an Empirical Study with User's Guide

    Authors: Lu Li, Connor Thompson, Gregory Henselman-Petrusek, Chad Giusti, Lori Ziegelmeier

    Abstract: Cycle representatives of persistent homology classes can be used to provide descriptions of topological features in data. However, the non-uniqueness of these representatives creates ambiguity and can lead to many different interpretations of the same set of classes. One approach to solving this problem is to optimize the choice of representative against some measure that is meaningful in the cont… ▽ More

    Submitted 17 October, 2021; v1 submitted 14 May, 2021; originally announced May 2021.

  10. arXiv:2007.05558  [pdf, other

    cs.LG stat.ML

    The Computational Limits of Deep Learning

    Authors: Neil C. Thompson, Kristjan Greenewald, Keeheon Lee, Gabriel F. Manso

    Abstract: Deep learning's recent history has been one of achievement: from triumphing over humans in the game of Go to world-leading performance in image classification, voice recognition, translation, and other tasks. But this progress has come with a voracious appetite for computing power. This article catalogs the extent of this dependency, showing that progress across a wide variety of applications is s… ▽ More

    Submitted 27 July, 2022; v1 submitted 10 July, 2020; originally announced July 2020.

    Comments: 33 pages, 8 figures

  11. arXiv:1912.12355  [pdf, other

    cs.LG math.OC stat.ML

    SoftAdapt: Techniques for Adaptive Loss Weighting of Neural Networks with Multi-Part Loss Functions

    Authors: A. Ali Heydari, Craig A. Thompson, Asif Mehmood

    Abstract: Adaptive loss function formulation is an active area of research and has gained a great deal of popularity in recent years, following the success of deep learning. However, existing frameworks of adaptive loss functions often suffer from slow convergence and poor choice of weights for the loss components. Traditionally, the elements of a multi-part loss function are weighted equally or their weigh… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

    Comments: 8 pages with 2 pages of references. 6 Figures and 3 Tables

  12. arXiv:1908.01901  [pdf, other

    cs.LG eess.IV stat.ML

    Fully-automated patient-level malaria assessment on field-prepared thin blood film microscopy images, including Supplementary Information

    Authors: Charles B. Delahunt, Mayoore S. Jaiswal, Matthew P. Horning, Samantha Janko, Clay M. Thompson, Sourabh Kulhare, Liming Hu, Travis Ostbye, Grace Yun, Roman Gebrehiwot, Benjamin K. Wilson, Earl Long, Stephane Proux, Dionicia Gamboa, Peter Chiodini, Jane Carter, Mehul Dhorda, David Isaboke, Bernhards Ogutu, Wellington Oyibo, Elizabeth Villasis, Kyaw Myo Tun, Christine Bachman, David Bell, Courosh Mehanian

    Abstract: Malaria is a life-threatening disease affecting millions. Microscopy-based assessment of thin blood films is a standard method to (i) determine malaria species and (ii) quantitate high-parasitemia infections. Full automation of malaria microscopy by machine learning (ML) is a challenging task because field-prepared slides vary widely in quality and presentation, and artifacts often heavily outnumb… ▽ More

    Submitted 11 September, 2022; v1 submitted 5 August, 2019; originally announced August 2019.

    Comments: 16 pages, 13 figures

    MSC Class: 68T10 ACM Class: I.5.0

  13. arXiv:1810.10343  [pdf, other

    cs.CV cs.AI

    From Machine to Machine: An OCT-trained Deep Learning Algorithm for Objective Quantification of Glaucomatous Damage in Fundus Photographs

    Authors: Felipe A. Medeiros, Alessandro A. Jammal, Atalie C. Thompson

    Abstract: Previous approaches using deep learning algorithms to classify glaucomatous damage on fundus photographs have been limited by the requirement for human labeling of a reference training set. We propose a new approach using spectral-domain optical coherence tomography (SDOCT) data to train a deep learning algorithm to quantify glaucomatous structural damage on optic disc photographs. The dataset inc… ▽ More

    Submitted 20 October, 2018; originally announced October 2018.

  14. arXiv:1702.06112  [pdf, ps, other

    cs.DM

    A general framework for path convexities

    Authors: João Vinicius C. Thompson, Loana T. Nogueira, Fábio Protti, Raquel S. F. Bravo, Mitre C. Dourado, Uéverton S. Souza

    Abstract: In this work we deal with the so-called path convexities, defined over special collections of paths. For example, the collection of the shortest paths in a graph is associated with the well-known geodesic convexity, while the collection of the induced paths is associated with the monophonic convexity; and there are many other examples. Besides reviewing the path convexities in the literature, we p… ▽ More

    Submitted 19 June, 2019; v1 submitted 20 February, 2017; originally announced February 2017.

    MSC Class: 05C85

  15. arXiv:1608.03938  [pdf, other

    cs.CL cs.AI cs.CY cs.SI

    Determining Health Utilities through Data Mining of Social Media

    Authors: Christopher Thompson, Josh Introne, Clint Young

    Abstract: 'Health utilities' measure patient preferences for perfect health compared to specific unhealthy states, such as asthma, a fractured hip, or colon cancer. When integrated over time, these estimations are called quality adjusted life years (QALYs). Until now, characterizing health utilities (HUs) required detailed patient interviews or written surveys. While reliable and specific, this data remaine… ▽ More

    Submitted 13 August, 2016; originally announced August 2016.

    Comments: 8 pages, 2 figures, 3 tables

  16. arXiv:1312.2625  [pdf

    cs.NI

    A Distributed IP-Based Telecommunication System using SIP

    Authors: Carlton A. Thompson, Haniph A. Latchman, Nathan Angelacos, Bharath Kumar Pareek

    Abstract: Voice over Internet Protocol (VoIP) technologies are integral to modern telecommunications because of their advanced features, flexibility, and economic benefits. Internet Service Providers initially promoted these technologies by providing low cost local and international calling. At present, there is also a great deal of interest in using IP-based technologies to replace traditional small and la… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 16 pages, 10 figures

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013

  17. An Exploratory Study of Forces and Frictions affecting Large-Scale Model-Driven Development

    Authors: Adrian Kuhn, Gail C. Murphy, C. Albert Thompson

    Abstract: In this paper, we investigate model-driven engineering, reporting on an exploratory case-study conducted at a large automotive company. The study consisted of interviews with 20 engineers and managers working in different roles. We found that, in the context of a large organization, contextual forces dominate the cognitive issues of using model-driven technology. The four forces we identified that… ▽ More

    Submitted 3 July, 2012; originally announced July 2012.

    Comments: To appear in proceedings of MODELS 2012, LNCS Springer

  18. arXiv:1107.0029  [pdf, ps

    cs.IR cs.AI

    A Personalized System for Conversational Recommendations

    Authors: M. H. Goker, P. Langley, C. A. Thompson

    Abstract: Searching for and making decisions about information is becoming increasingly difficult as the amount of information and number of choices increases. Recommendation systems help users find items of interest of a particular type, such as movies or restaurants, but are still somewhat awkward to use. Our solution is to take advantage of the complementary strengths of personalized recommendation sys… ▽ More

    Submitted 30 June, 2011; originally announced July 2011.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 21, pages 393-428, 2004

  19. arXiv:1106.4571  [pdf, ps

    cs.CL cs.AI

    Acquiring Word-Meaning Map**s for Natural Language Interfaces

    Authors: C. Thompson

    Abstract: This paper focuses on a system, WOLFIE (WOrd Learning From Interpreted Examples), that acquires a semantic lexicon from a corpus of sentences paired with semantic representations. The lexicon learned consists of phrases paired with meaning representations. WOLFIE is part of an integrated system that learns to transform sentences into representations such as logical database queries… ▽ More

    Submitted 22 June, 2011; originally announced June 2011.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 18, pages 1-44, 2003