Skip to main content

Showing 1–38 of 38 results for author: Wood, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00438  [pdf, other

    cs.CV

    AI Age Discrepancy: A Novel Parameter for Frailty Assessment in Kidney Tumor Patients

    Authors: Rikhil Seshadri, Jayant Siva, Angelica Bartholomew, Clara Goebel, Gabriel Wallerstein-King, Beatriz López Morato, Nicholas Heller, Jason Scovell, Rebecca Campbell, Andrew Wood, Michal Ozery-Flato, Vesna Barros, Maria Gabrani, Michal Rosen-Zvi, Resha Tejpaul, Vidhyalakshmi Ramesh, Nikolaos Papanikolopoulos, Subodh Regmi, Ryan Ward, Robert Abouassaly, Steven C. Campbell, Erick Remer, Christopher Weight

    Abstract: Kidney cancer is a global health concern, and accurate assessment of patient frailty is crucial for optimizing surgical outcomes. This paper introduces AI Age Discrepancy, a novel metric derived from machine learning analysis of preoperative abdominal CT scans, as a potential indicator of frailty and postoperative risk in kidney cancer patients. This retrospective study of 599 patients from the 20… ▽ More

    Submitted 2 July, 2024; v1 submitted 29 June, 2024; originally announced July 2024.

    Comments: 10 pages, 3 figures, 2 tables

  2. arXiv:2406.12513  [pdf, other

    cs.CR

    Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs

    Authors: Ahmad Mohsin, Helge Janicke, Adrian Wood, Iqbal H. Sarker, Leandros Maglaras, Naeem Janjua

    Abstract: Large Language Models (LLMs) such as ChatGPT and GitHub Copilot have revolutionized automated code generation in software engineering. However, as these models are increasingly utilized for software development, concerns have arisen regarding the security and quality of the generated code. These concerns stem from LLMs being primarily trained on publicly available code repositories and internet-ba… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 27 pages, Standard Journal Paper submitted to Q1 Elsevier

  3. arXiv:2405.05658  [pdf

    eess.IV cs.CV

    Artificial intelligence for abnormality detection in high volume neuroimaging: a systematic review and meta-analysis

    Authors: Siddharth Agarwal, David A. Wood, Mariusz Grzeda, Chandhini Suresh, Munaib Din, James Cole, Marc Modat, Thomas C Booth

    Abstract: Purpose: Most studies evaluating artificial intelligence (AI) models that detect abnormalities in neuroimaging are either tested on unrepresentative patient cohorts or are insufficiently well-validated, leading to poor generalisability to real-world tasks. The aim was to determine the diagnostic test accuracy and summarise the evidence supporting the use of AI models performing first-line, high-vo… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  4. arXiv:2405.02782  [pdf

    cs.CV

    A self-supervised text-vision framework for automated brain abnormality detection

    Authors: David A. Wood, Emily Guilhem, Sina Kafiabadi, Ayisha Al Busaidi, Kishan Dissanayake, Ahmed Hammam, Nina Mansoor, Matthew Townend, Siddharth Agarwal, Yiran Wei, Asif Mazumder, Gareth J. Barker, Peter Sasieni, Sebastien Ourselin, James H. Cole, Thomas C. Booth

    Abstract: Artificial neural networks trained on large, expert-labelled datasets are considered state-of-the-art for a range of medical image recognition tasks. However, categorically labelled datasets are time-consuming to generate and constrain classification to a pre-defined, fixed set of classes. For neuroradiological applications in particular, this represents a barrier to clinical adoption. To address… ▽ More

    Submitted 11 June, 2024; v1 submitted 4 May, 2024; originally announced May 2024.

    Comments: Under Review

  5. arXiv:2404.15198  [pdf, other

    cs.LG cs.IT

    Lossless and Near-Lossless Compression for Foundation Models

    Authors: Moshik Hershcovitch, Leshem Choshen, Andrew Wood, Ilias Enmouri, Peter Chin, Swaminathan Sundararaman, Danny Harnik

    Abstract: With the growth of model sizes and scale of their deployment, their sheer size burdens the infrastructure requiring more network and more storage to accommodate these. While there is a vast literature about reducing model sizes, we investigate a more traditional type of compression -- one that compresses the model to a smaller form and is coupled with a decompression algorithm that returns it to i… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

  6. arXiv:2404.07154  [pdf, other

    math.RA cs.IT

    Weights with Maximal Symmetry and Failures of the MacWilliams Identities

    Authors: Jay A. Wood

    Abstract: This paper examines the $w$-weight enumerators of weights $w$ with maximal symmetry over finite chain rings and matrix rings over finite fields. In many cases, including the homogeneous weight, the MacWilliams identities for $w$-weight enumerators fail because there exist two linear codes with the same $w$-weight enumerator whose dual codes have different $w$-weight enumerators.

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 84 pages, 1 figure

    MSC Class: 94B05

  7. On mission Twitter Profiles: A Study of Selective Toxic Behavior

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, an D. Wood, Nicolas Kourtellis, Mohamed Ali Kaafar

    Abstract: The argument for persistent social media influence campaigns, often funded by malicious entities, is gaining traction. These entities utilize instrumented profiles to disseminate divisive content and disinformation, sha** public perception. Despite ample evidence of these instrumented profiles, few identification methods exist to locate them in the wild. To evade detection and appear genuine, sm… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Journal ref: 2023 IEEE International Conference on Big Data (BigData)

  8. arXiv:2401.11737  [pdf, other

    cs.MS physics.atom-ph physics.comp-ph

    Sphractal: Estimating the Fractal Dimension of Surfaces Computed from Precise Atomic Coordinates via Box-Counting Algorithm

    Authors: Jonathan Yik Chang Ting, Andrew Thomas Agars Wood, Amanda Susan Barnard

    Abstract: The fractal dimension of a surface allows its degree of roughness to be characterized quantitatively. However, limited effort is attempted to calculate the fractal dimension of surfaces computed from precisely known atomic coordinates from computational biomolecular and nanomaterial studies. This work proposes methods to estimate the fractal dimension of the surface of any 3D object composed of sp… ▽ More

    Submitted 10 March, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

    Comments: 18 pages, 13 figures

    ACM Class: J.2

    Journal ref: Adv. Theory Simul. 2024, 2301227

  9. arXiv:2311.02992  [pdf

    eess.IV cs.CV

    NEURO HAND: A weakly supervised Hierarchical Attention Network for interpretable neuroimaging abnormality Detection

    Authors: David A. Wood

    Abstract: Clinical neuroimaging data is naturally hierarchical. Different magnetic resonance imaging (MRI) sequences within a series, different slices covering the head, and different regions within each slice all confer different information. In this work we present a hierarchical attention network for abnormality detection using MRI scans obtained in a clinical hospital setting. The proposed network is su… ▽ More

    Submitted 16 January, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

  10. arXiv:2308.13127  [pdf, other

    physics.ins-det cs.SE

    JISA: A Polymorphic Test-and-Measurement Automation Library

    Authors: William Alexander Wood, Thomas Marsh, Henning Sirringhaus

    Abstract: JISA is a software library, written in Java, aimed at providing an easy, flexible and standardised means of creating experimental control software for physical sciences researchers. Specifically, with an emphasis on enabling measurement code to be written in an instrument-agnostic way, allowing such routines to be reused across multiple different setups without requiring modification. Additionally… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

    Comments: Submitted to SoftwareX, under review

  11. arXiv:2212.12724  [pdf, other

    cs.RO eess.SY math.OC

    Certification of Bottleneck Task Assignment with Shortest Path Criteria

    Authors: Tony A. Wood, Maryam Kamgarpour

    Abstract: Minimising the longest travel distance for a group of mobile robots with interchangeable goals requires knowledge of the shortest length paths between all robots and goal destinations. Determining the exact length of the shortest paths in an environment with obstacles is NP-hard however. In this paper, we investigate when polynomial-time approximations of the shortest path search are sufficient to… ▽ More

    Submitted 8 June, 2023; v1 submitted 24 December, 2022; originally announced December 2022.

  12. arXiv:2202.12802  [pdf, other

    cs.RO eess.SY

    Probabilistic Data Association for Semantic SLAM at Scale

    Authors: Elad Michael, Tyler Summers, Tony A. Wood, Chris Manzie, Iman Shames

    Abstract: With advances in image processing and machine learning, it is now feasible to incorporate semantic information into the problem of simultaneous localisation and map** (SLAM). Previously, SLAM was carried out using lower level geometric features (points, lines, and planes) which are often view-point dependent and error prone in visually repetitive environments. Semantic information can improve th… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: 6 Pages, 3 figures, submitted to Robotics and Automation Letters and the IROS 2020 conference

    MSC Class: 4104 (Primary); 05-08 (Secondary)

  13. arXiv:2202.11518  [pdf, other

    cs.LG cs.AR

    Non-Volatile Memory Accelerated Geometric Multi-Scale Resolution Analysis

    Authors: Andrew Wood, Moshik Hershcovitch, Daniel Waddington, Sarel Cohen, Meredith Wolf, Hongjun Suh, Weiyu Zong, Peter Chin

    Abstract: Dimensionality reduction algorithms are standard tools in a researcher's toolbox. Dimensionality reduction algorithms are frequently used to augment downstream tasks such as machine learning, data science, and also are exploratory methods for understanding complex phenomena. For instance, dimensionality reduction is commonly used in Biology as well as Neuroscience to understand data collected from… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: 2021 IEEE High Performance Extreme Computing Conference (HPEC)

  14. arXiv:2202.10522  [pdf, other

    cs.LG cs.AR

    Non-Volatile Memory Accelerated Posterior Estimation

    Authors: Andrew Wood, Moshik Hershcovitch, Daniel Waddington, Sarel Cohen, Peter Chin

    Abstract: Bayesian inference allows machine learning models to express uncertainty. Current machine learning models use only a single learnable parameter combination when making predictions, and as a result are highly overconfident when their predictions are wrong. To use more learnable parameter combinations efficiently, these samples must be drawn from the posterior distribution. Unfortunately computing t… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

  15. arXiv:2201.11742  [pdf, other

    cs.NE

    A neural net architecture based on principles of neural plasticity and development evolves to effectively catch prey in a simulated environment

    Authors: Addison Wood, Jory Schossau, Nick Sabaj, Richard Liu, Mark Reimers

    Abstract: A profound challenge for A-Life is to construct agents whose behavior is 'life-like' in a deep way. We propose an architecture and approach to constructing networks driving artificial agents, using processes analogous to the processes that construct and sculpt the brains of animals. Furthermore the instantiation of action is dynamic: the whole network responds in real-time to sensory inputs to act… ▽ More

    Submitted 30 January, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: 7 pages, 4 figures, 1 appendix page

  16. arXiv:2110.09978  [pdf, other

    cs.AI

    What is Learned in Knowledge Graph Embeddings?

    Authors: Michael R. Douglas, Michael Simkin, Omri Ben-Eliezer, Tianqi Wu, Peter Chin, Trung V. Dang, Andrew Wood

    Abstract: A knowledge graph (KG) is a data structure which represents entities and relations as the vertices and edges of a directed graph with edge types. KGs are an important primitive in modern machine learning and artificial intelligence. Embedding-based models, such as the seminal TransE [Bordes et al., 2013] and the recent PairRE [Chao et al., 2020] are among the most popular and successful approaches… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

    Comments: 16 pages

    ACM Class: I.2.4

  17. arXiv:2106.08176  [pdf, other

    eess.IV cs.CV

    Automated triaging of head MRI examinations using convolutional neural networks

    Authors: David A. Wood, Sina Kafiabadi, Ayisha Al Busaidi, Emily Guilhem, Antanas Montvila, Siddharth Agarwal, Jeremy Lynch, Matthew Townend, Gareth Barker, Sebastien Ourselin, James H. Cole, Thomas C. Booth

    Abstract: The growing demand for head magnetic resonance imaging (MRI) examinations, along with a global shortage of radiologists, has led to an increase in the time taken to report head MRI scans around the world. For many neurological conditions, this delay can result in increased morbidity and mortality. An automated triaging tool could reduce reporting times for abnormal examinations by identifying abno… ▽ More

    Submitted 28 June, 2022; v1 submitted 15 June, 2021; originally announced June 2021.

    Comments: Accepted as an oral presentation at Medical Imaging with Deep Learning (MIDL) 2021

  18. arXiv:2010.01730  [pdf, other

    cs.CY cs.SI

    Facebook Political Ads And Accountability: Outside Groups Are Most Negative, Especially When Hiding Donors

    Authors: Shomik Jain, Abby K. Wood

    Abstract: The emergence of online political advertising has come with little regulation, allowing political advertisers on social media to avoid accountability. We analyze how transparency and accountability deficits caused by dark money and disappearing groups relate to the sentiment of political ads on Facebook. We obtained 430,044 ads with FEC-registered advertisers from Facebook's ad library that ran be… ▽ More

    Submitted 26 January, 2024; v1 submitted 4 October, 2020; originally announced October 2020.

    ACM Class: K.4.0

  19. arXiv:2009.11992  [pdf, other

    physics.comp-ph cs.LG math.NA stat.ML

    A physics-informed operator regression framework for extracting data-driven continuum models

    Authors: Ravi G. Patel, Nathaniel A. Trask, Mitchell A. Wood, Eric C. Cyr

    Abstract: The application of deep learning toward discovery of data-driven models requires careful application of inductive biases to obtain a description of physics which is both accurate and robust. We present here a framework for discovering continuum models from high fidelity molecular simulation data. Our approach applies a neural network parameterization of governing physics in modal space, allowing a… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

    Comments: 37 pages, 15 figures

  20. arXiv:2007.04226  [pdf, other

    eess.IV cs.CV

    Labelling imaging datasets on the basis of neuroradiology reports: a validation study

    Authors: David A. Wood, Sina Kafiabadi, Aisha Al Busaidi, Emily Guilhem, Jeremy Lynch, Matthew Townend, Antanas Montvila, Juveria Siddiqui, Naveen Gadapa, Matthew Benger, Gareth Barker, Sebastian Ourselin, James H. Cole, Thomas C. Booth

    Abstract: Natural language processing (NLP) shows promise as a means to automate the labelling of hospital-scale neuroradiology magnetic resonance imaging (MRI) datasets for computer vision applications. To date, however, there has been no thorough investigation into the validity of this approach, including determining the accuracy of report labels compared to image labels as well as examining the performan… ▽ More

    Submitted 8 March, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

  21. arXiv:2007.03152  [pdf, other

    cs.AR

    The gem5 Simulator: Version 20.0+

    Authors: Jason Lowe-Power, Abdul Mutaal Ahmad, Ayaz Akram, Mohammad Alian, Rico Amslinger, Matteo Andreozzi, Adrià Armejach, Nils Asmussen, Brad Beckmann, Srikant Bharadwaj, Gabe Black, Gedare Bloom, Bobby R. Bruce, Daniel Rodrigues Carvalho, Jeronimo Castrillon, Lizhong Chen, Nicolas Derumigny, Stephan Diestelhorst, Wendy Elsasser, Carlos Escuin, Marjan Fariborz, Amin Farmahini-Farahani, Pouya Fotouhi, Ryan Gambord, Jayneel Gandhi , et al. (53 additional authors not shown)

    Abstract: The open-source and community-supported gem5 simulator is one of the most popular tools for computer architecture research. This simulation infrastructure allows researchers to model modern computer hardware at the cycle level, and it has enough fidelity to boot unmodified Linux-based operating systems and run full applications for multiple architectures including x86, Arm, and RISC-V. The gem5 si… ▽ More

    Submitted 29 September, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: Source, comments, and feedback: https://github.com/darchr/gem5-20-paper

  22. arXiv:2004.12481  [pdf, other

    cs.AI cs.MA cs.RO

    GymFG: A Framework with a Gym Interface for FlightGear

    Authors: Andrew Wood, Ali Sydney, Peter Chin, Bishal Thapa, Ryan Ross

    Abstract: Over the past decades, progress in deployable autonomous flight systems has slowly stagnated. This is reflected in today's production air-crafts, where pilots only enable simple physics-based systems such as autopilot for takeoff, landing, navigation, and terrain/traffic avoidance. Evidently, autonomy has not gained the trust of the community where higher problem complexity and cognitive workload… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

    ACM Class: I.2.1; I.6.5

  23. arXiv:2002.06588  [pdf, other

    cs.CV

    Automated Labelling using an Attention model for Radiology reports of MRI scans (ALARM)

    Authors: David A. Wood, Jeremy Lynch, Sina Kafiabadi, Emily Guilhem, Aisha Al Busaidi, Antanas Montvila, Thomas Varsavsky, Juveria Siddiqui, Naveen Gadapa, Matthew Townend, Martin Kiik, Keena Patel, Gareth Barker, Sebastian Ourselin, James H. Cole, Thomas C. Booth

    Abstract: Labelling large datasets for training high-capacity neural networks is a major obstacle to the development of deep learning-based medical imaging applications. Here we present a transformer-based network for magnetic resonance imaging (MRI) radiology report classification which automates this task by assigning image labels on the basis of free-text expert radiology reports. Our model's performance… ▽ More

    Submitted 16 February, 2020; originally announced February 2020.

  24. arXiv:1910.10096  [pdf, other

    cs.CR

    Formalizing Privacy Laws for License Generation and Data Repository Decision Automation

    Authors: Micah Altman, Stephen Chong, Alexandra Wood

    Abstract: In this paper, we summarize work-in-progress on expert system support to automate some data deposit and release decisions within a data repository, and to generate custom license agreements for those data transfers. Our approach formalizes via a logic programming language the privacy-relevant aspects of laws, regulations, and best practices, supported by legal analysis documented in legal memora… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

  25. arXiv:1907.05164  [pdf

    eess.IV cs.CV cs.LG

    Disease classification of macular Optical Coherence Tomography scans using deep learning software: validation on independent, multi-centre data

    Authors: Kanwal K. Bhatia, Mark S. Graham, Louise Terry, Ashley Wood, Paris Tranos, Sameer Trikha, Nicolas Jaccard

    Abstract: Purpose: To evaluate Pegasus-OCT, a clinical decision support software for the identification of features of retinal disease from macula OCT scans, across heterogenous populations involving varying patient demographics, device manufacturers, acquisition sites and operators. Methods: 5,588 normal and anomalous macular OCT volumes (162,721 B-scans), acquired at independent centres in five countrie… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

  26. arXiv:1806.05130  [pdf, other

    cs.SE cs.CL

    Detecting Speech Act Types in Developer Question/Answer Conversations During Bug Repair

    Authors: Andrew Wood, Paige Rodeghero, Ameer Armaly, Collin McMillan

    Abstract: This paper targets the problem of speech act detection in conversations about bug repair. We conduct a "Wizard of Oz" experiment with 30 professional programmers, in which the programmers fix bugs for two hours, and use a simulated virtual assistant for help. Then, we use an open coding manual annotation procedure to identify the speech act types in the conversations. Finally, we train and evaluat… ▽ More

    Submitted 3 July, 2018; v1 submitted 13 June, 2018; originally announced June 2018.

    Comments: 12 pages (10 for content, two for references), accepted into FSE (Foundations of Software Engineering) 2018

  27. The Extension Theorem for Bi-invariant Weights over Frobenius Rings and Frobenius Bimodules

    Authors: Oliver W. Gnilke, Marcus Greferath, Thomas Honold, Jay A. Wood, Jens Zumbrägel

    Abstract: We give a sufficient condition for a bi-invariant weight on a Frobenius bimodule to satisfy the extension property. This condition applies to bi-invariant weights on a finite Frobenius ring as a special case. The complex-valued functions on a Frobenius bimodule are viewed as a module over the semigroup ring of the multiplicative semigroup of the coefficient ring.

    Submitted 27 November, 2017; originally announced November 2017.

    Comments: 15 pages

    MSC Class: 94B05

    Journal ref: Rings, Modules and Codes, 117-129, Contemp. Math., 727, AMS

  28. arXiv:1711.01134  [pdf

    cs.AI stat.ML

    Accountability of AI Under the Law: The Role of Explanation

    Authors: Finale Doshi-Velez, Mason Kortz, Ryan Budish, Chris Bavitz, Sam Gershman, David O'Brien, Kate Scott, Stuart Schieber, James Waldo, David Weinberger, Adrian Weller, Alexandra Wood

    Abstract: The ubiquity of systems using artificial intelligence or "AI" has brought increasing attention to how those systems should be regulated. The choice of how to regulate AI systems will require care. AI systems have the potential to synthesize large amounts of data, allowing for greater levels of personalization and precision than ever before---applications range from clinical decision support to aut… ▽ More

    Submitted 20 December, 2019; v1 submitted 3 November, 2017; originally announced November 2017.

  29. arXiv:1706.07165  [pdf, other

    cs.NI

    Content-Centric Networking - Architectural Overview and Protocol Description

    Authors: Marc Mosko, Ignacio Solis, Christopher A. Wood

    Abstract: This document describes the core concepts of the CCNx architecture and presents a minimum network protocol based on two messages: Interests and Content Objects. It specifies the set of mandatory and optional fields within those messages and describes their behavior and interpretation. This architecture and protocol specification is independent of a specific wire encoding.

    Submitted 22 June, 2017; originally announced June 2017.

  30. arXiv:1608.07485  [pdf, ps, other

    cs.AR cs.DB

    When to use 3D Die-Stacked Memory for Bandwidth-Constrained Big Data Workloads

    Authors: Jason Lowe-Power, Mark D. Hill, David A. Wood

    Abstract: Response time requirements for big data processing systems are shrinking. To meet this strict response time requirement, many big data systems store all or most of their data in main memory to reduce the access latency. Main memory capacities have grown, and systems with 2 TB of main memory capacity available today. However, the rate at which processors can access this data--the memory bandwidth--… ▽ More

    Submitted 26 August, 2016; originally announced August 2016.

    Comments: Originally presented The Seventh workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware (BPOE-7). http://www.bafst.com/events/asplos16/bpoe7/

  31. arXiv:1512.07755  [pdf, other

    cs.NI

    Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking

    Authors: Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood

    Abstract: Information-Centric Networking (ICN) is a recent paradigm that claims to mitigate some limitations of the current IP-based Internet architecture. The centerpiece of ICN is named and addressable content, rather than hosts or interfaces. Content-Centric Networking (CCN) is a prominent ICN instance that shares the fundamental architectural design with its equally popular academic sibling Named-Data N… ▽ More

    Submitted 24 December, 2015; originally announced December 2015.

    Comments: 10 pages, 6 figures

  32. arXiv:1512.07311  [pdf, other

    cs.NI

    BEAD: Best Effort Autonomous Deletion in Content-Centric Networking

    Authors: Cesar Ghali, Gene Tsudik, Christopher A. Wood

    Abstract: A core feature of Content-Centric Networking (CCN) is opportunistic content caching in routers. It enables routers to satisfy content requests with in-network cached copies, thereby reducing bandwidth utilization, decreasing congestion, and improving overall content retrieval latency. One major drawback of in-network caching is that content producers have no knowledge about where their content i… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Comments: 9 pages, 4 figures

  33. arXiv:1510.01852  [pdf, other

    cs.NI

    Practical Accounting in Content-Centric Networking (extended version)

    Authors: Cesar Ghali, Gene Tsudik, Christopher A. Wood, Edmund Yeh

    Abstract: Content-Centric Networking (CCN) is a new class of network architectures designed to address some key limitations of the current IP-based Internet. One of its main features is in-network content caching, which allows requests for content to be served by routers. Despite improved bandwidth utilization and lower latency for popular content retrieval, in-network content caching offers producers no me… ▽ More

    Submitted 7 October, 2015; originally announced October 2015.

    Comments: 13 pages, 6 figures

  34. Interest-Based Access Control for Content Centric Networks (extended version)

    Authors: Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood

    Abstract: Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network. Consumers request content by issuing interest messages with the desired content name. These interests are forwarded by routers to producers, and the re… ▽ More

    Submitted 22 May, 2015; originally announced May 2015.

    Comments: 11 pages, 2 figures

  35. arXiv:1405.2861  [pdf, other

    cs.NI cs.CR

    Secure Fragmentation for Content-Centric Networks (extended version)

    Authors: Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik, Christopher A. Wood

    Abstract: Content-Centric Networking (CCN) is a communication paradigm that emphasizes content distribution. Named-Data Networking (NDN) is an instantiation of CCN, a candidate Future Internet Architecture. NDN supports human-readable content naming and router-based content caching which lends itself to efficient, secure, and scalable content distribution. Because of NDN's fundamental requirement that each… ▽ More

    Submitted 19 August, 2015; v1 submitted 12 May, 2014; originally announced May 2014.

    Comments: 13 pages, 6 figures

  36. arXiv:1309.3292  [pdf, ps, other

    math.RA cs.IT

    MacWilliams' Extension Theorem for Bi-Invariant Weights over Finite Principal Ideal Rings

    Authors: Marcus Greferath, Thomas Honold, Cathy Mc Fadden, Jay A. Wood, Jens Zumbrägel

    Abstract: A finite ring R and a weight w on R satisfy the Extension Property if every R-linear w-isometry between two R-linear codes in R^n extends to a monomial transformation of R^n that preserves w. MacWilliams proved that finite fields with the Hamming weight satisfy the Extension Property. It is known that finite Frobenius rings with either the Hamming weight or the homogeneous weight satisfy the Exten… ▽ More

    Submitted 12 September, 2013; originally announced September 2013.

    Comments: 12 pages

  37. arXiv:0904.3912  [pdf, ps, other

    cs.CC

    Refutation of Aslam's Proof that NP = P

    Authors: Frank Ferraro, Garrett Hall, Andrew Wood

    Abstract: Aslam presents an algorithm he claims will count the number of perfect matchings in any incomplete bipartite graph with an algorithm in the function-computing version of NC, which is itself a subset of FP. Counting perfect matchings is known to be #P-complete; therefore if Aslam's algorithm is correct, then NP=P. However, we show that Aslam's algorithm does not correctly count the number of perf… ▽ More

    Submitted 14 May, 2009; v1 submitted 24 April, 2009; originally announced April 2009.

    Comments: 13 pages, 2 figures, a response to Aslam's paper (arXiv:0812.1385v11) and the underlying arguments (arXiv:0812.1385v9). Very minor content changes and typos fixed

    ACM Class: F.2.0; F.2.2

  38. arXiv:cs/0509050  [pdf

    cs.MA

    Effect of door delay on aircraft evacuation time

    Authors: Martyn Amos, Andrew Wood

    Abstract: The recent commercial launch of twin-deck Very Large Transport Aircraft (VLTA) such as the Airbus A380 has raised questions concerning the speed at which they may be evacuated. The abnormal height of emergency exits on the upper deck has led to speculation that emotional factors such as fear may lead to door delay, and thus play a significant role in increasing overall evacuation time. Full-scal… ▽ More

    Submitted 16 September, 2005; originally announced September 2005.

    Comments: 8 pages, 2 figures