Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 301 - 330 of 57897

Full-Text Articles in Physical Sciences and Mathematics

Generative Ai For Pull Request Descriptions: Adoption, Impact, And Developer Interventions, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto Jul 2024

Generative Ai For Pull Request Descriptions: Adoption, Impact, And Developer Interventions, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto

Research Collection School Of Computing and Information Systems

GitHub's Copilot for Pull Requests (PRs) is a promising service aiming to automate various developer tasks related to PRs, such as generating summaries of changes or providing complete walkthroughs with links to the relevant code. As this innovative technology gains traction in the Open Source Software (OSS) community, it is crucial to examine its early adoption and its impact on the development process. Additionally, it offers a unique opportunity to observe how developers respond when they disagree with the generated content. In our study, we employ a mixed-methods approach, blending quantitative analysis with qualitative insights, to examine 18,256 PRs in …


A Bottom-Up Multi-Disciplinary Approach For Sustainability Education: Un-Sdg 13.3, Benjamin Gan, Thomas Menkhoff, Eng Lieh Ouh, Kevin Cheong Jul 2024

A Bottom-Up Multi-Disciplinary Approach For Sustainability Education: Un-Sdg 13.3, Benjamin Gan, Thomas Menkhoff, Eng Lieh Ouh, Kevin Cheong

Research Collection School Of Computing and Information Systems

Teaching both information systems and business undergraduates to break the current inertia in sustainability action requires innovative teaching & learning approaches as well as inter-disciplinary knowledge inputs. This study presents a bottom-up T&L approach delivered by a group of educators from different disciplines aimed at addressing UN-SDG Goal 13 ‘Climate Action’ with a novel approach. Integrating a problem-centric community project assignment into existing courses, our students worked on different disciplinary elements such as persuasive technologies and awareness campaigns to help to address local sustainability initiatives by community partners. We collected data to measure how students’ motivation, engagement, teamwork, and community …


Exploring The Market Impact Of Web3 Identity Imitation In Ethereum Name Service, Ping Fan Ke, Yi Meng Lau Jul 2024

Exploring The Market Impact Of Web3 Identity Imitation In Ethereum Name Service, Ping Fan Ke, Yi Meng Lau

Research Collection School Of Computing and Information Systems

Digital identities are paramount in today’s digital landscape. However, in the Web3 ecosystem, the absence of a central governing body leaves digital identities, such as domain names, vulnerable to cybersquatting and identity imitation. This study examines the market impact of identity imitation in the Web3 ecosystem. By scrutinizing trading activities within Web3 domain names from Ethereum Name Service (ENS) and its imitator, "Ether Name Service," we found that the presence of a newly imitating domain name increases the subsequent resale value of the authentic domain name. Additionally, we find a positive correlation between the resale value of the imitating domain …


Application Of An Improved Harmony Search Algorithm On Electric Vehicle Routing Problems, Vanny Minanda, Yun-Chia Liang, Angela H. L. Chen, Aldy Gunawan Jul 2024

Application Of An Improved Harmony Search Algorithm On Electric Vehicle Routing Problems, Vanny Minanda, Yun-Chia Liang, Angela H. L. Chen, Aldy Gunawan

Research Collection School Of Computing and Information Systems

Electric vehicles (EVs) have gained considerable popularity, driven in part by an increased concern for the impact of automobile emissions on climate change. Electric vehicles (EVs) cover more than just conventional cars and trucks. They also include electric motorcycles, such as those produced by Gogoro, which serve as the primary mode of transportation for food and package delivery services in Taiwan. Consequently, the Electric Vehicle Routing Problem (EVRP) has emerged as an important variation of the Capacitated Vehicle Routing Problem (CVRP). In addition to the CVRP’s constraints, the EVRP requires vehicles to visit a charging station before the battery level …


Adan: Adaptive Nesterov Momentum Algorithm For Faster Optimizing Deep Models, Xingyu Xie, Pan Zhou, Huan Li, Zhouchen Lin, Shuicheng Yan Jul 2024

Adan: Adaptive Nesterov Momentum Algorithm For Faster Optimizing Deep Models, Xingyu Xie, Pan Zhou, Huan Li, Zhouchen Lin, Shuicheng Yan

Research Collection School Of Computing and Information Systems

In deep learning, different kinds of deep networks typically need different optimizers, which have to be chosen after multiple trials, making the training process inefficient. To relieve this issue and consistently improve the model training speed across deep networks, we propose the ADAptive Nesterov momentum algorithm, Adan for short. Adan first reformulates the vanilla Nesterov acceleration to develop a new Nesterov momentum estimation (NME) method, which avoids the extra overhead of computing gradient at the extrapolation point. Then Adan adopts NME to estimate the gradient's first- and second-order moments in adaptive gradient algorithms for convergence acceleration. Besides, we prove that …


Broadening The View: Demonstration-Augmented Prompt Learning For Conversational Recommendation, Quang Huy Dao, Yang Deng, Dung D. Le, Lizi Liao Jul 2024

Broadening The View: Demonstration-Augmented Prompt Learning For Conversational Recommendation, Quang Huy Dao, Yang Deng, Dung D. Le, Lizi Liao

Research Collection School Of Computing and Information Systems

Conversational Recommender Systems (CRSs) leverage natural language dialogues to provide tailored recommendations. Traditional methods in this field primarily focus on extracting user preferences from isolated dialogues. It often yields responses with a limited perspective, confined to the scope of individual conversations. Recognizing the potential in collective dialogue examples, our research proposes an expanded approach for CRS models, utilizing selective analogues from dialogue histories and responses to enrich both generation and recommendation processes. This introduces significant research challenges, including: (1) How to secure high-quality collections of recommendation dialogue exemplars? (2) How to effectively leverage these exemplars to enhance CRS models?To tackle …


Towards Human-Centered Proactive Conversational Agents, Yang Deng, Lizi Liao, Zhonghua Zheng, Grace Hui Yang, Tat-Seng Chua Jul 2024

Towards Human-Centered Proactive Conversational Agents, Yang Deng, Lizi Liao, Zhonghua Zheng, Grace Hui Yang, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Recent research on proactive conversational agents (PCAs) mainly focuses on improving the system's capabilities in anticipating and planning action sequences to accomplish tasks and achieve goals before users articulate their requests. This perspectives paper highlights the importance of moving towards building human-centered PCAs that emphasize human needs and expectations, and that considers ethical and social implications of these agents, rather than solely focusing on technological capabilities. The distinction between a proactive and a reactive system lies in the proactive system's initiative-taking nature. Without thoughtful design, proactive systems risk being perceived as intrusive by human users. We address the issue by …


Reinforcement Learning For Strategic Airport Slot Scheduling: Analysis Of State Observations And Reward Designs, Anh Nguyen-Duy, Duc-Thinh Pham, Jian-Yi Lye, Nguyen Binh Duong Ta Jul 2024

Reinforcement Learning For Strategic Airport Slot Scheduling: Analysis Of State Observations And Reward Designs, Anh Nguyen-Duy, Duc-Thinh Pham, Jian-Yi Lye, Nguyen Binh Duong Ta

Research Collection School Of Computing and Information Systems

Due to the NP-hard nature, the strategic airport slot scheduling problem is calling for exploring sub-optimal approaches, such as heuristics and learning-based approaches. Moreover, the continuous increase in air traffic demand requires approaches that can work well in new scenarios. While heuristics rely on a fixed set of rules, which limits the ability to explore new solutions, Reinforcement Learning offers a versatile framework to automate the search and generalize to unseen scenarios. Finding a suitable state observation and reward structure design is essential in using Reinforcement Learning. In this paper, we investigate the impact of providing the Reinforcement Learning agent …


Establishing Metrics To Encourage Broader Use Of Atomic Requirements – A Call For Exchange And Experimentation, William L. Honig Jul 2024

Establishing Metrics To Encourage Broader Use Of Atomic Requirements – A Call For Exchange And Experimentation, William L. Honig

Computer Science: Faculty Publications and Other Works

There are seemingly many advantages to being able to identify, document, test, and trace single or “atomic” requirements during system development and maintenance. Ongoing work with Agile development has focused on “user stories” that can capture individual features for implementation. However, it is still difficult to evaluate the quality of such requirements and teaching their creation is difficult.

Based on a working definition of atomic requirement, this paper proposes a set of metrics for their evaluation. Ten metrics designed to measure atomic requirements are presented here: five used on individual requirements statements and five applied to a requirements document or …


Empirical Insights Into Ai-Assisted Game Development: A Case Study On The Integration Of Generative Ai Tools In Creative Pipelines, Andrew Begemann, James Hutson Jul 2024

Empirical Insights Into Ai-Assisted Game Development: A Case Study On The Integration Of Generative Ai Tools In Creative Pipelines, Andrew Begemann, James Hutson

Student Scholarship

This study conducts an empirical exploration of generative Artificial Intelligence (AI) tools across the game development pipeline, from concept art creation to 3D model integration in a game engine. Employing AI generators like Leonardo AI, Scenario AI, Alpha 3D, and Luma AI, the research investigates their application in generating game assets. The process, documented in a diary-like format, ranges from producing concept art using fantasy game prompts to optimizing 3D models in Blender and applying them in Unreal Engine 5. The findings highlight the potential of AI to enhance the conceptualization phase and identify challenges in producing optimized, high-quality 3D …


Development Of A Rule-Based Monitoring System For Autonomous Heavy Equipment Safety, Amirpooya Shirazi Jul 2024

Development Of A Rule-Based Monitoring System For Autonomous Heavy Equipment Safety, Amirpooya Shirazi

Department of Construction Engineering and Management: Dissertations, Theses, and Student Research

Roadway construction work zones are constantly exposed to interactions among construction equipment, workers, and vehicles. Furthermore, ensuring safety in these areas is considered a challenging task due to the complexity of the environment. As shown in the rising trend of fatal accidents in roadway work zones, current OSHA regulations in construction safety are insufficient in effectively detecting unsafe situations and mitigating the risks. Furthermore, best practices, such as internal traffic control planning (ITCP), exhibit critical limitations requiring continuous monitoring of active work zones as well as adjustments to the site coordination plans due to the dynamic nature of work zone …


My Ai Companion: An Examination Of The Removal Of Erotic Role Play From Replika Through User Discussion On Reddit, Chelsee M. Allen Jul 2024

My Ai Companion: An Examination Of The Removal Of Erotic Role Play From Replika Through User Discussion On Reddit, Chelsee M. Allen

Department of Sociology: Dissertations, Theses, and Student Research

The development of artificial intelligence (AI) software has expanded rapidly in recent years, and thus has emerged the importance of exploring human relationships with AI chatbots. Replika, an app which uses AI to mimic human conversation, removed a function called Erotic Role Play (ERP) that allowed for sexual conversation with users’ customizable chatbots in February of 2023. This exploratory qualitative study examines the aftermath of ERP’s removal through an analysis of user interactions on Reddit. Five overarching themes emerged through the analysis of top posts to a Replika-specific subreddit, encompassing topics around mental health, stigma, coping, sex work and gendered …


Sequential Decision Learning For Social Good And Fairness, Dexun Li Jul 2024

Sequential Decision Learning For Social Good And Fairness, Dexun Li

Dissertations and Theses Collection (Open Access)

Sequential decision learning is one of the key research areas in artificial intelligence. Typically, a sequence of events is observed through a transformation that introduces uncertainty into the observations and based on these observations, the recognition process produces a hypothesis of the underlying events. This learning process is characterized by maximizing the sum of the reward signals. However, many real-life problems are inherently constrained by limited resources. Besides, when the learning algorithms are used to inform decisions involving human beings (e.g., Security and justice, health intervention, etc), they may inherit the potential, pre-existing bias in the dataset and exhibit similar …


Creating And Delivering Audio Descriptions For Videos, Rosiana Natalie Jul 2024

Creating And Delivering Audio Descriptions For Videos, Rosiana Natalie

Dissertations and Theses Collection (Open Access)

Despite anti-discrimination regulations mandating the provision of audio descriptions (ADs), the majority of online video content remains inaccessible to blind and low-vision (BLV) individuals. This is because these ADs are either absent or fail to adequately address the diverse and unique needs of the audience. Traditionally, content creators have relied on professionals to author ADs. However, this gold standard may not be accessible for some content creators because this method is still costly and has a long turnaround time. Moreover, when ADs are available, they tend to be static and unalterable, failing to cater to the unique preferences of BLV …


Certified Robust Accuracy Of Neural Networks Are Bounded Due To Bayes Errors, Ruihan Zhang, Jun Sun Jul 2024

Certified Robust Accuracy Of Neural Networks Are Bounded Due To Bayes Errors, Ruihan Zhang, Jun Sun

Research Collection School Of Computing and Information Systems

Adversarial examples pose a security threat to many critical systems built on neural networks. While certified training improves robustness, it also decreases accuracy noticeably. Despite various proposals for addressing this issue, the significant accuracy drop remains. More importantly, it is not clear whether there is a certain fundamental limit on achieving robustness whilst maintaining accuracy. In this work, we offer a novel perspective based on Bayes errors. By adopting Bayes error to robustness analysis, we investigate the limit of certified robust accuracy, taking into account data distribution uncertainties. We first show that the accuracy inevitably decreases in the pursuit of …


Predicting Iot Distributed Ledger Fraud Transactions With A Lightweight Gan Network, Charles Rawlins, Jagannathan Sarangapani Jul 2024

Predicting Iot Distributed Ledger Fraud Transactions With A Lightweight Gan Network, Charles Rawlins, Jagannathan Sarangapani

Electrical and Computer Engineering Faculty Research & Creative Works

Decision-making and consensus in traditional blockchain protocols is formulated as a repeated Bernoulli trial that solves a computationally intense lottery puzzle, called Proof-of-Work (PoW) in Bitcoin. This approach has shown robustness through practice but does not scale with increasing network size and generation of new transactions. Resource constrained Internet of Things (IoT) networks are incompatible with full computation of schemes like Bitcoin's PoW. Our effort proposes a first step towards an alternative consensus using machine learning-based decision-making with prediction of fraud transactions to alleviate need for intense computation. To improve base approval probabilities for fraud detection in an ideal security …


A Portable Numerical Library For The Calculation Of Multi-Dimensional Integrals, Ioannis Sakiotis Jul 2024

A Portable Numerical Library For The Calculation Of Multi-Dimensional Integrals, Ioannis Sakiotis

Computer Science Theses & Dissertations

Multi-dimensional numerical integration is a prevalent task in physics and other scientific fields, e.g., in the simulation of particle-beam dynamics and Bayesian parameter estimation. Scientific computing applications that simulate complex phenomena may require the solution to numerous multi-variate integrals. However, functions that have features such as sharp peaks or oscillations in high dimensional spaces, can result in an exorbitant number of computations. For many cases, convergence to accurate results in a reasonable amount of time is infeasible with existing numerical libraries. One approach towards making multi-dimensional integration viable is to parallelize existing algorithms. No commonly available algorithms or libraries exist …


True Contraction Decomposition And Almost Eth-Tight Bipartization For Unit-Disk Graphs, Sayan Bandyapadhyay, William Lochet, Daniel Lokshtanov, Saket Saurabh, Jie Xue Jul 2024

True Contraction Decomposition And Almost Eth-Tight Bipartization For Unit-Disk Graphs, Sayan Bandyapadhyay, William Lochet, Daniel Lokshtanov, Saket Saurabh, Jie Xue

Computer Science Faculty Publications and Presentations

We prove a structural theorem for unit-disk graphs, which (roughly) states that given a set D of n unit disks inducing a unit-disk graph ...


Towards Automated Slide Augmentation To Discover Credible And Relevant Links, Dilan Dinushka Senarath Arachchige, Christopher M. Poskitt, Kwan Chin (Xu Guangjin) Koh, Heng Ngee Mok, Hady Wirawan Lauw Jul 2024

Towards Automated Slide Augmentation To Discover Credible And Relevant Links, Dilan Dinushka Senarath Arachchige, Christopher M. Poskitt, Kwan Chin (Xu Guangjin) Koh, Heng Ngee Mok, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

Learning from concise educational materials, such as lecture notes and presentation slides, often prompts students to seek additional resources. Newcomers to a subject may struggle to find the best keywords or lack confidence in the credibility of the supplementary materials they discover. To address these problems, we introduce Slide++, an automated tool that identifies keywords from lecture slides, and uses them to search for relevant links, videos, and Q&As. This interactive website integrates the original slides with recommended resources, and further allows instructors to 'pin' the most important ones. To evaluate the effectiveness of the tool, we trialled the system …


Jigsaw: Edge-Based Streaming Perception Over Spatially Overlapped Multi-Camera Deployments, Ila Gokarn, Yigong Hu, Tarek Abdelzaher, Archan Misra Jul 2024

Jigsaw: Edge-Based Streaming Perception Over Spatially Overlapped Multi-Camera Deployments, Ila Gokarn, Yigong Hu, Tarek Abdelzaher, Archan Misra

Research Collection School Of Computing and Information Systems

We present JIGSAW, a novel system that performs edge-based streaming perception over multiple video streams, while additionally factoring in the redundancy offered by the spatial overlap often exhibited in urban, multi-camera deployments. To assure high streaming throughput, JIGSAW extracts and spatially multiplexes multiple regions-of-interest from different camera frames into a smaller canvas frame. Moreover, to ensure that perception stays abreast of evolving object kinematics, JIGSAW includes a utility-based weighted scheduler to preferentially prioritize and even skip object-specific tiles extracted from an incoming stream of camera frames. Using the CityflowV2 traffic surveillance dataset, we show that JIGSAW can simultaneously process 25 …


Generalization Analysis Of Deep Nonlinear Matrix Completion, Antoine Ledent, Rodrigo Alves Jul 2024

Generalization Analysis Of Deep Nonlinear Matrix Completion, Antoine Ledent, Rodrigo Alves

Research Collection School Of Computing and Information Systems

We provide generalization bounds for matrix completion with Schatten $p$ quasi-norm constraints, which is equivalent to deep matrix factorization with Frobenius constraints. In the uniform sampling regime, the sample complexity scales like $\widetilde{O}\left( rn\right)$ where $n$ is the size of the matrix and $r$ is a constraint of the same order as the ground truth rank in the isotropic case. In the distribution-free setting, the bounds scale as $\widetilde{O}\left(r^{1-\frac{p}{2}}n^{1+\frac{p}{2}}\right)$, which reduces to the familiar $\sqrt{r}n^{\frac{3}{2}}$ for $p=1$. Furthermore, we provide an analogue of the weighted trace norm for this setting which brings the sample complexity down to $\widetilde{O}(nr)$ in all …


How People Prompt Generative Ai To Create Interactive Vr Scenes, Setareh Aghel Manesh, Tianyi Zhang, Yuki Onishi, Kotaro Hara, Scott Bateman, Jiannan Li, Anthony Tang Jul 2024

How People Prompt Generative Ai To Create Interactive Vr Scenes, Setareh Aghel Manesh, Tianyi Zhang, Yuki Onishi, Kotaro Hara, Scott Bateman, Jiannan Li, Anthony Tang

Research Collection School Of Computing and Information Systems

Generative AI tools can provide people with the ability to create virtual environments and scenes with natural language prompts. Yet, how people will formulate such prompts is unclear---particularly when they inhabit the environment that they are designing. For instance, it is likely that a person might say, "Put a chair here,'' while pointing at a location. If such linguistic and embodied features are common to people's prompts, we need to tune models to accommodate them. In this work, we present a Wizard of Oz elicitation study with 22 participants, where we studied people's implicit expectations when verbally prompting such programming …


A Deep Learning Method To Predict Bacterial Adp-Ribosyltransferase Toxins, Dandan Zheng, Siyu Zhou, Lihong Chen, Guansong Pang, Jian Yang Jul 2024

A Deep Learning Method To Predict Bacterial Adp-Ribosyltransferase Toxins, Dandan Zheng, Siyu Zhou, Lihong Chen, Guansong Pang, Jian Yang

Research Collection School Of Computing and Information Systems

Motivation: ADP-ribosylation is a critical modification involved in regulating diverse cellular processes, including chromatin structure regulation, RNA transcription, and cell death. Bacterial ADP-ribosyltransferase toxins (bARTTs) serve as potent virulence factors that orchestrate the manipulation of host cell functions to facilitate bacterial pathogenesis. Despite their pivotal role, the bioinformatic identification of novel bARTTs poses a formidable challenge due to limited verified data and the inherent sequence diversity among bARTT members. Results: We proposed a deep learning-based model, ARTNet, specifically engineered to predict bARTTs from bacterial genomes. Initially, we introduced an effective data augmentation method to address the issue of data scarcity …


Large Language Model Powered Agents For Information Retrieval, An Zhang, Yang Deng, Yankai Lin, Xu Chen, Ji-Rong Wen, Tat-Seng Chua Jul 2024

Large Language Model Powered Agents For Information Retrieval, An Zhang, Yang Deng, Yankai Lin, Xu Chen, Ji-Rong Wen, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

The vital goal of information retrieval today extends beyond merely connecting users with relevant information they search for. It also aims to enrich the diversity, personalization, and interactivity of that connection, ensuring the information retrieval process is as seamless, beneficial, and supportive as possible in the global digital era. Current information retrieval systems often encounter challenges like a constrained understanding of queries, static and inflexible responses, limited personalization, and restricted interactivity. With the advent of large language models (LLMs), there's a transformative paradigm shift as we integrate LLM-powered agents into these systems. These agents bring forth crucial human capabilities like …


Microkarta: Visualising Microservice Architectures, Oscar Manglaras, Alex Farkas, Peter Fule, Christoph Treude, Markus Wagner Jul 2024

Microkarta: Visualising Microservice Architectures, Oscar Manglaras, Alex Farkas, Peter Fule, Christoph Treude, Markus Wagner

Research Collection School Of Computing and Information Systems

Conceptualising and debugging a microservice architecture can be a challenge for developers due to the complex topology of inter-service communication, which may only apparent when viewing the architecture as a whole. In this paper, we present MicroKarta, a dashboard containing three types of network diagram that visualise complex microservice architectures, and that are designed to address problems faced by developers of these architectures. Initial feedback from industry developers has been positive. This dashboard can be used by developers to explore and debug microservice architectures, and can be used to compare the effectiveness of different types of network visualisation for assisting …


Toward Effective Secure Code Reviews: An Empirical Study Of Security-Related Coding Weaknesses, Wachiraphan Charoenwet, Patanamon Thongtanunam, Thuan Pham, Christoph Treude Jul 2024

Toward Effective Secure Code Reviews: An Empirical Study Of Security-Related Coding Weaknesses, Wachiraphan Charoenwet, Patanamon Thongtanunam, Thuan Pham, Christoph Treude

Research Collection School Of Computing and Information Systems

Identifying security issues early is encouraged to reduce the latent negative impacts on software systems. Code review is a widely-used method that allows developers to manually inspect modified code, catching security issues during a software development cycle. However, existing code review studies often focus on known vulnerabilities, neglecting coding weaknesses, which can introduce real-world security issues that are more visible through code review. The practices of code reviews in identifying such coding weaknesses are not yet fully investigated. To better understand this, we conducted an empirical case study in two large open-source projects, OpenSSL and PHP. Based on 135,560 code …


Partial Solution Based Constraint Solving Cache In Symbolic Execution, Ziqi Shuai, Zhenbang Chen, Kelin Ma, Kunlin Liu, Yufeng Zhang, Jun Sun, Ji Wang Jul 2024

Partial Solution Based Constraint Solving Cache In Symbolic Execution, Ziqi Shuai, Zhenbang Chen, Kelin Ma, Kunlin Liu, Yufeng Zhang, Jun Sun, Ji Wang

Research Collection School Of Computing and Information Systems

Constraint solving is one of the main challenges for symbolic execution. Caching is an effective mechanism to reduce the number of the solver invocations in symbolic execution and is adopted by many mainstream symbolic execution engines. However, caching can not perform well on all programs. How to improve caching’s effectiveness is challenging in general. In this work, we propose a partial solution-based caching method for improving caching’s effectiveness. Our key idea is to utilize the partial solutions inside the constraint solving to generate more cache entries. A partial solution may satisfy other constraints of symbolic execution. Hence, our partial solution-based …


Esem: To Harden Process Synchronization For Servers, Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu Jul 2024

Esem: To Harden Process Synchronization For Servers, Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu

Research Collection School Of Computing and Information Systems

Process synchronization primitives lubricate server computing involving a group of processes as they ensure those processes to properly coordinate their executions for a common purpose such as provisioning a web service. A malfunctioned synchronization due to attacks causes friction among processes and leads to unexpected, and often hard-to-detect, application transaction errors. Unfortunately, synchronization primitives are not naturally protected by existing hardware-assisted isolation techniques e.g., SGX, because their process-oriented isolation conflicts with the primitive's demand for cross-process operations.This paper introduces the Enclave-Semaphore service (ESem) which shelters application semaphores and their operations against kernel-privileged attacks. ESem encapsulates all semaphores in the platform …


Enhancing Adult Learner Success In Higher Education Through Decision Tree Models: A Machine Learning Approach, Emily Barnes, James Hutson, Karriem Perry Jul 2024

Enhancing Adult Learner Success In Higher Education Through Decision Tree Models: A Machine Learning Approach, Emily Barnes, James Hutson, Karriem Perry

Faculty Scholarship

This article explores the use of machine learning, specifically Classification and Regression Trees (CART), to address the unique challenges faced by adult learners in higher education. These learners confront socio-cultural, economic, and institutional hurdles, such as stereotypes, financial constraints, and systemic inefficiencies. The study utilizes decision tree models to evaluate their effectiveness in predicting graduation outcomes, which helps in formulating tailored educational strategies. The research analyzed a comprehensive dataset spanning the academic years 2013–2014 to 2021–2022, evaluating the predictive accuracy of CART models using precision, recall, and F1 score. Findings indicate that attendance, age, and Pell Grant eligibility are key …


Mvmoe: Multi-Task Vehicle Routing Solver With Mixture-Of-Experts, Jianan Zhou, Zhiguang Cao, Yaoxin Wu, Wen Song, Yining Ma, Jie Zhang, Chi Xu Jul 2024

Mvmoe: Multi-Task Vehicle Routing Solver With Mixture-Of-Experts, Jianan Zhou, Zhiguang Cao, Yaoxin Wu, Wen Song, Yining Ma, Jie Zhang, Chi Xu

Research Collection School Of Computing and Information Systems

Learning to solve vehicle routing problems (VRPs) has garnered much attention. However, most neural solvers are only structured and trained independently on a specific problem, making them less generic and practical. In this paper, we aim to develop a unified neural solver that can cope with a range of VRP variants simultaneously. Specifically, we propose a multi-task vehicle routing solver with mixture-of-experts (MVMoE), which greatly enhances the model capacity without a proportional increase in computation. We further develop a hierarchical gating mechanism for the MVMoE, delivering a good trade-off between empirical performance and computational complexity. Experimentally, our method significantly promotes …