Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 10081 - 10110 of 302421

Full-Text Articles in Physical Sciences and Mathematics

Optics Studies For Multipass Energy Recovery At Cebaf: Er@Cebaf, Isurumali Neththikumara Oct 2023

Optics Studies For Multipass Energy Recovery At Cebaf: Er@Cebaf, Isurumali Neththikumara

Physics Theses & Dissertations

Energy recovery linacs (ERLs), focus on recycling the kinetic energy of electron beam for the purpose of accelerating a newly injected beam within the same accelerating structure. The rising developments in the super conducting radio frequency technology, ERL technology has achieved several noteworthy milestones over the past few decades. In year 2003, Jefferson Lab has successfully demonstrated a single pass energy recovery at the CEBAF accelerator. Furthermore, they conducted successful experiments with IR-FEL demo and upgrades, as well as the UV FEL driver. This multi-pass, multi-GeV range energy recovery demonstration proposed to be carried out at CEBAF accelerator at Jefferson …


Search For Subsolar-Mass Black Hole Binaries In The Second Part Of Advanced Ligo’S And Advanced Virgo’S Third Observing Run, R. Abbott, H. Abe, F. Acernese, Teviet Creighton, Mario C. Diaz, Francisco Llamas, Soma Mukherjee, Gaukhar Nurbek, Volker Quetschke, Wenhui Wang Oct 2023

Search For Subsolar-Mass Black Hole Binaries In The Second Part Of Advanced Ligo’S And Advanced Virgo’S Third Observing Run, R. Abbott, H. Abe, F. Acernese, Teviet Creighton, Mario C. Diaz, Francisco Llamas, Soma Mukherjee, Gaukhar Nurbek, Volker Quetschke, Wenhui Wang

Physics and Astronomy Faculty Publications and Presentations

We describe a search for gravitational waves from compact binaries with at least one component with mass 0.2 –1.0M⊙ and mass ratio q ≥ 0.1 in Advanced Laser Interferometer Gravitational-Wave Observatory (LIGO) and Advanced Virgo data collected between 2019 November 1, 15:00 UTC and 2020 March 27, 17:00 UTC. No signals were detected. The most significant candidate has a false alarm rate of 0.2yr−1 ⁠. We estimate the sensitivity of our search over the entirety of Advanced LIGO’s and Advanced Virgo’s third observing run, and present the most stringent limits to date on the merger rate of binary black holes …


2023 October - Tennessee Monthly Climate Report, Tennessee Climate Office, East Tennessee State University Oct 2023

2023 October - Tennessee Monthly Climate Report, Tennessee Climate Office, East Tennessee State University

Tennessee Climate Office Monthly Report

No abstract provided.


A System For The Detection Of Adversarial Attacks In Computer Vision Via Performance Metrics, Sarah Reynolds Oct 2023

A System For The Detection Of Adversarial Attacks In Computer Vision Via Performance Metrics, Sarah Reynolds

Doctoral Dissertations and Master's Theses

Adversarial attacks, or attacks committed by an adversary to hijack a system, are prevalent in the deep learning tasks of computer vision and are one of the greatest threats to these models' safe and accurate use. These attacks force the trained model to misclassify an image, using pixel-level changes undetectable to the human eye. Various defenses against these attacks exist and are detailed in this work. The work of previous researchers has established that when adversarial attacks occur, different node patterns in a Deep Neural Network (DNN) are activated within the model. Additionally, it is known that CPU and GPU …


Investigating Evidence In Support Of Validity And Reliability For Data Collected With The Meaningful Learning In The Laboratory Instrument (Mlli), Elizabeth Vaughan, A. Montoya-Cowan, Jack Barbera Oct 2023

Investigating Evidence In Support Of Validity And Reliability For Data Collected With The Meaningful Learning In The Laboratory Instrument (Mlli), Elizabeth Vaughan, A. Montoya-Cowan, Jack Barbera

Chemistry Faculty Publications and Presentations

The Meaningful Learning in the Laboratory Instrument (MLLI) was designed to measure students’ expectations before and after their laboratory courses and experiences. Although the MLLI has been used in various studies and laboratory environments to investigate students’ cognitive and affective laboratory expectations, the authors of the instrument reported a discrepancy between the intended factor structure of the MLLI and the factor structure suggested by the data collected in preliminary studies. Therefore, the aim of this study was to investigate the validity and reliability evidence related to data collected with the MLLI, especially that related to structural validity. Evidence to support …


Metaverse’S Rise And Decline, Nir Kshetri, Jeffrey Voas, Yogesh K. Dwivedi, Diana Rojas Torres, Gayle O'Keefe Oct 2023

Metaverse’S Rise And Decline, Nir Kshetri, Jeffrey Voas, Yogesh K. Dwivedi, Diana Rojas Torres, Gayle O'Keefe

Faculty Publications: Business

Major companies in diverse industries have recently downsized or closed down their metaverse divisions. The authors look at the factors that have led to such strategies.


Voucher Abuse Detection With Prompt-Based Fine-Tuning On Graph Neural Networks, Zhihao Wen, Yuan Fang, Yihan Liu, Yang Guo, Shuji Hao Oct 2023

Voucher Abuse Detection With Prompt-Based Fine-Tuning On Graph Neural Networks, Zhihao Wen, Yuan Fang, Yihan Liu, Yang Guo, Shuji Hao

Research Collection School Of Computing and Information Systems

Voucher abuse detection is an important anomaly detection problem in E-commerce. While many GNN-based solutions have emerged, the supervised paradigm depends on a large quantity of labeled data. A popular alternative is to adopt self-supervised pre-training using label-free data, and further fine-tune on a downstream task with limited labels. Nevertheless, the "pre-train, fine-tune" paradigm is often plagued by the objective gap between pre-training and downstream tasks. Hence, we propose VPGNN, a prompt-based fine-tuning framework on GNNs for voucher abuse detection. We design a novel graph prompting function to reformulate the downstream task into a similar template as the pretext task …


Posmlp-Video: Spatial And Temporal Relative Position Encoding For Efficient Video Recognition, Yanbin Hao, Diansong Zhou, Zhicai Wang, Chong-Wah Ngo, Xiangnan He, Meng Wang Oct 2023

Posmlp-Video: Spatial And Temporal Relative Position Encoding For Efficient Video Recognition, Yanbin Hao, Diansong Zhou, Zhicai Wang, Chong-Wah Ngo, Xiangnan He, Meng Wang

Research Collection School Of Computing and Information Systems

In recent years, vision Transformers and MLPs have demonstrated remarkable performance in image understanding tasks. However, their inherently dense computational operators, such as self-attention and token-mixing layers, pose significant challenges when applied to spatio-temporal video data. To address this gap, we propose PosMLP-Video, a lightweight yet powerful MLP-like backbone for video recognition. Instead of dense operators, we use efficient relative positional encoding (RPE) to build pairwise token relations, leveraging small-sized parameterized relative position biases to obtain each relation score. Specifically, to enable spatio-temporal modeling, we extend the image PosMLP’s positional gating unit to temporal, spatial, and spatio-temporal variants, namely PoTGU, …


Understanding The Effect Of Counterfactual Explanations On Trust And Reliance On Ai For Human-Ai Collaborative Clinical Decision Making, Min Hun Lee, Chong Jun Chew Oct 2023

Understanding The Effect Of Counterfactual Explanations On Trust And Reliance On Ai For Human-Ai Collaborative Clinical Decision Making, Min Hun Lee, Chong Jun Chew

Research Collection School Of Computing and Information Systems

Artificial intelligence (AI) is increasingly being considered to assist human decision-making in high-stake domains (e.g. health). However, researchers have discussed an issue that humans can over-rely on wrong suggestions of the AI model instead of achieving human AI complementary performance. In this work, we utilized salient feature explanations along with what-if, counterfactual explanations to make humans review AI suggestions more analytically to reduce overreliance on AI and explored the effect of these explanations on trust and reliance on AI during clinical decision-making. We conducted an experiment with seven therapists and ten laypersons on the task of assessing post-stroke survivors' quality …


Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing, Fan. Zhang, Qianmei. Wu, Bohan. Xuan, Yuqi. Chen, Wei. Lin, Christopher M. Poskitt, Jun Sun, Binbin. Chen Oct 2023

Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing, Fan. Zhang, Qianmei. Wu, Bohan. Xuan, Yuqi. Chen, Wei. Lin, Christopher M. Poskitt, Jun Sun, Binbin. Chen

Research Collection School Of Computing and Information Systems

Cyber-physical systems (CPSs) automating critical public infrastructure face a pervasive threat of attack, motivating research into different types of countermeasures. Assessing the effectiveness of these countermeasures is challenging, however, as benchmarks are difficult to construct manually, existing automated testing solutions often make unrealistic assumptions, and blindly fuzzing is ineffective at finding attacks due to the enormous search spaces and resource requirements. In this work, we propose active sensor fuzzing , a fully automated approach for building test suites without requiring any a prior knowledge about a CPS. Our approach employs active learning techniques. Applied to a real-world water treatment system, …


Objectfusion: Multi-Modal 3d Object Detection With Object-Centric Fusion, Q. Cai, Y. Pan, T. Yao, Chong-Wah Ngo, T. Mei Oct 2023

Objectfusion: Multi-Modal 3d Object Detection With Object-Centric Fusion, Q. Cai, Y. Pan, T. Yao, Chong-Wah Ngo, T. Mei

Research Collection School Of Computing and Information Systems

Recent progress on multi-modal 3D object detection has featured BEV (Bird-Eye-View) based fusion, which effectively unifies both LiDAR point clouds and camera images in a shared BEV space. Nevertheless, it is not trivial to perform camera-to-BEV transformation due to the inherently ambiguous depth estimation of each pixel, resulting in spatial misalignment between these two multi-modal features. Moreover, such transformation also inevitably leads to projection distortion of camera image features in BEV space. In this paper, we propose a novel Object-centric Fusion (ObjectFusion) paradigm, which completely gets rid of camera-to-BEV transformation during fusion to align object-centric features across different modalities for …


Experiences Of Autistic Twitch Livestreamers: “I Have Made Easily The Most Meaningful And Impactful Relationships”, Terrance Mok, Anthony Tang, Adam Mccrimmon, Lora Oehlberg Oct 2023

Experiences Of Autistic Twitch Livestreamers: “I Have Made Easily The Most Meaningful And Impactful Relationships”, Terrance Mok, Anthony Tang, Adam Mccrimmon, Lora Oehlberg

Research Collection School Of Computing and Information Systems

We present perspectives from 10 autistic Twitch streamers regarding their experiences as livestreamers and how autism uniquely colors their experiences. Livestreaming offers a social online experience distinct from in-person, face-to-face communication, where autistic people tend to encounter challenges. Our reflexive thematic analysis of interviews with 10 participants showcases autistic livestreamers’ perspectives in their own words. Our findings center on the importance of having streamers establishing connections with other, sharing autistic identities, controlling a space for social interaction, personal growth, and accessibility challenges. In our discussion, we highlight the crucial value of having a medium for autistic representation, as well as …


Primates And Pregnancy: Lessons In Childbirth From Human Evolution, Amelia Merithew Oct 2023

Primates And Pregnancy: Lessons In Childbirth From Human Evolution, Amelia Merithew

The Synapse: Intercollegiate science magazine

No abstract provided.


The Cognitive Significance Of Mathematics: What The Educational And Psychological Literature — New And Old — Can Tell Us About The Importance Of Learning Math, Haddy Dardir Oct 2023

The Cognitive Significance Of Mathematics: What The Educational And Psychological Literature — New And Old — Can Tell Us About The Importance Of Learning Math, Haddy Dardir

The Synapse: Intercollegiate science magazine

No abstract provided.


Ubisurface: A Robotic Touch Surface For Supporting Mid-Air Planar Interactions In Room-Scale Vr, Ryota Gomi, Kazuki Takashima, Yuki Onishi, Kazuyuki Fujita, Yoshifumi Kitamura Oct 2023

Ubisurface: A Robotic Touch Surface For Supporting Mid-Air Planar Interactions In Room-Scale Vr, Ryota Gomi, Kazuki Takashima, Yuki Onishi, Kazuyuki Fujita, Yoshifumi Kitamura

Research Collection School Of Computing and Information Systems

Room-scale VR has been considered an alternative to physical office workspaces. For office activities, users frequently require planar input methods, such as typing or handwriting, to quickly record annotations to virtual content. However, current off-The-shelf VR HMD setups rely on mid-Air interactions, which can cause arm fatigue and decrease input accuracy. To address this issue, we propose UbiSurface, a robotic touch surface that can automatically reposition itself to physically present a virtual planar input surface (VR whiteboard, VR canvas, etc.) to users and to permit them to achieve accurate and fatigue-less input while walking around a virtual room. We design …


Invariant Training 2d-3d Joint Hard Samples For Few-Shot Point Cloud Recognition, Xuanyu Yi, Jiajun Deng, Qianru Sun, Xian-Sheng Hua, Joo-Hwee Lim, Hanwang Zhang Oct 2023

Invariant Training 2d-3d Joint Hard Samples For Few-Shot Point Cloud Recognition, Xuanyu Yi, Jiajun Deng, Qianru Sun, Xian-Sheng Hua, Joo-Hwee Lim, Hanwang Zhang

Research Collection School Of Computing and Information Systems

We tackle the data scarcity challenge in few-shot point cloud recognition of 3D objects by using a joint prediction from a conventional 3D model and a well-pretrained 2D model. Surprisingly, such an ensemble, though seems trivial, has hardly been shown effective in recent 2D-3D models. We find out the crux is the less effective training for the “joint hard samples”, which have high confidence prediction on different wrong labels, implying that the 2D and 3D models do not collaborate well. To this end, our proposed invariant training strategy, called INVJOINT, does not only emphasize the training more on the hard …


Hrgcn: Heterogeneous Graph-Level Anomaly Detection With Hierarchical Relation-Augmented Graph Neural Networks, Jiaxi Li, Guansong Pang, Ling Chen, Mohammad-Reza Namazi-Rad Oct 2023

Hrgcn: Heterogeneous Graph-Level Anomaly Detection With Hierarchical Relation-Augmented Graph Neural Networks, Jiaxi Li, Guansong Pang, Ling Chen, Mohammad-Reza Namazi-Rad

Research Collection School Of Computing and Information Systems

This work considers the problem of heterogeneous graph-level anomaly detection. Heterogeneous graphs are commonly used to represent behaviours between different types of entities in complex industrial systems for capturing as much information about the system operations as possible. Detecting anomalous heterogeneous graphs from a large set of system behaviour graphs is crucial for many real-world applications like online web/mobile service and cloud access control. To address the problem, we propose HRGCN, an unsupervised deep heterogeneous graph neural network, to model complex heterogeneous relations between different entities in the system for effectively identifying these anomalous behaviour graphs. HRGCN trains a hierarchical …


Residual Pattern Learning For Pixel-Wise Out-Of-Distribution Detection In Semantic Segmentation, Y Liu, Choubo Ding, Yu Tian, Guansong Pang, Vasileios Belagiannis, Ian Reid, Gustavo Carneiro Oct 2023

Residual Pattern Learning For Pixel-Wise Out-Of-Distribution Detection In Semantic Segmentation, Y Liu, Choubo Ding, Yu Tian, Guansong Pang, Vasileios Belagiannis, Ian Reid, Gustavo Carneiro

Research Collection School Of Computing and Information Systems

Semantic segmentation models classify pixels into a set of known ("in-distribution") visual classes. When deployed in an open world, the reliability of these models depends on their ability to not only classify in-distribution pixels but also to detect out-of-distribution (OoD) pixels. Historically, the poor OoD detection performance of these models has motivated the design of methods based on model re-training using synthetic training images that include OoD visual objects. Although successful, these re-trained methods have two issues: 1) their in-distribution segmentation accuracy may drop during re-training, and 2) their OoD detection accuracy does not generalise well to new contexts (e.g., …


Feature Prediction Diffusion Model For Video Anomaly Detection, Cheng Yan, Shiyu Zhang, Yang Liu, Guansong Pang, Wenjun Wang Oct 2023

Feature Prediction Diffusion Model For Video Anomaly Detection, Cheng Yan, Shiyu Zhang, Yang Liu, Guansong Pang, Wenjun Wang

Research Collection School Of Computing and Information Systems

Anomaly detection in the video is an important research area and a challenging task in real applications. Due to the unavailability of large-scale annotated anomaly events, most existing video anomaly detection (VAD) methods focus on learning the distribution of normal samples to detect the substantially deviated samples as anomalies. To well learn the distribution of normal motion and appearance, many auxiliary networks are employed to extract foreground object or action information. These high-level semantic features effectively filter the noise from the background to decrease its influence on detection models. However, the capability of these extra semantic models heavily affects the …


Configuring Timing Parameters To Ensure Execution-Time Opacity In Timed Automata, Étienne André, Engel Lefaucheux, Didier Lime, Dylan Marinho, Jun Sun Oct 2023

Configuring Timing Parameters To Ensure Execution-Time Opacity In Timed Automata, Étienne André, Engel Lefaucheux, Didier Lime, Dylan Marinho, Jun Sun

Research Collection School Of Computing and Information Systems

Timing information leakage occurs whenever an attacker successfully deduces confidential internal information by observing some timed information such as events with timestamps. Timed automata are an extension of finite-state automata with a set of clocks evolving linearly and that can be tested or reset, making this formalism able to reason on systems involving concurrency and timing constraints. In this paper, we summarize a recent line of works using timed automata as the input formalism, in which we assume that the attacker has access (only) to the system execution time. First, we address the following execution-time opacity problem: given a timed …


Designing A Human-Centered Intelligent System To Monitor & Explain Abnormal Patterns Of Older Adults, Min Hun Lee, Daniel P. Siewiorek, Alexandre Bernardino Oct 2023

Designing A Human-Centered Intelligent System To Monitor & Explain Abnormal Patterns Of Older Adults, Min Hun Lee, Daniel P. Siewiorek, Alexandre Bernardino

Research Collection School Of Computing and Information Systems

Older adult care technologies are increasingly explored to support the independent living of older adults by monitoring their abnormal activities and informing caregivers to provide intervention if necessary. However, the adoption of these technologies remains challenging due to several factors (e.g. lack of usability). In this work, we present a human-centered, intelligent system for older adult care. Our proposed designs of the system were created based on the findings from a focus group session with caregivers. This system monitors the abnormal activities of an older adult using wireless motion sensors and machine learning models. In addition, unlike previous work that …


Hallucination Detection: Robustly Discerning Reliable Answers In Large Language Models, Yuyuan Chen, Qiang Fu, Yichen Yuan, Zhihao Wen, Ge Fan, Dayiheng Liu, Dongmei Zhang, Zhixu Li, Yanghua Xiao Oct 2023

Hallucination Detection: Robustly Discerning Reliable Answers In Large Language Models, Yuyuan Chen, Qiang Fu, Yichen Yuan, Zhihao Wen, Ge Fan, Dayiheng Liu, Dongmei Zhang, Zhixu Li, Yanghua Xiao

Research Collection School Of Computing and Information Systems

Large language models (LLMs) have gained widespread adoption in various natural language processing tasks, including question answering and dialogue systems. However, a major drawback of LLMs is the issue of hallucination, where they generate unfaithful or inconsistent content that deviates from the input source, leading to severe consequences. In this paper, we propose a robust discriminator named RelD to effectively detect hallucination in LLMs' generated answers. RelD is trained on the constructed RelQA, a bilingual question-answering dialogue dataset along with answers generated by LLMs and a comprehensive set of metrics. Our experimental results demonstrate that the proposed RelD successfully detects …


Rigid: Recurrent Gan Inversion And Editing Of Real Face Videos, Yangyang Xu, Shengfeng He, Kwan-Yee K. Wong, Pingluo Luo Oct 2023

Rigid: Recurrent Gan Inversion And Editing Of Real Face Videos, Yangyang Xu, Shengfeng He, Kwan-Yee K. Wong, Pingluo Luo

Research Collection School Of Computing and Information Systems

GAN inversion is indispensable for applying the powerful editability of GAN to real images. However, existing methods invert video frames individually often leading to undesired inconsistent results over time. In this paper, we propose a unified recurrent framework, named Recurrent vIdeo GAN Inversion and eDiting (RIGID), to explicitly and simultaneously enforce temporally coherent GAN inversion and facial editing of real videos. Our approach models the temporal relations between current and previous frames from three aspects. To enable a faithful real video reconstruction, we first maximize the inversion fidelity and consistency by learning a temporal compensated latent code. Second, we observe …


Diffuse3d: Wide-Angle 3d Photography Via Bilateral Diffusion, Yutao Jiang, Yang Zhou, Yuan Liang, Wenxi Liu, Jianbo Jiao, Yuhui Quan, Shengfeng He Oct 2023

Diffuse3d: Wide-Angle 3d Photography Via Bilateral Diffusion, Yutao Jiang, Yang Zhou, Yuan Liang, Wenxi Liu, Jianbo Jiao, Yuhui Quan, Shengfeng He

Research Collection School Of Computing and Information Systems

This paper aims to resolve the challenging problem of wide-angle novel view synthesis from a single image, a.k.a. wide-angle 3D photography. Existing approaches rely on local context and treat them equally to inpaint occluded RGB and depth regions, which fail to deal with large-region occlusion (i.e., observing from an extreme angle) and foreground layers might blend into background inpainting. To address the above issues, we propose Diffuse3D which employs a pre-trained diffusion model for global synthesis, while amending the model to activate depth-aware inference. Our key insight is to alter the convolution mechanism in the denoising process. We inject depth …


Toward Intention Discovery For Early Malice Detection In Cryptocurrency, Ling Cheng, Feida Zhu, Yong Wang, Ruicheng Liang, Huiwen Liu Oct 2023

Toward Intention Discovery For Early Malice Detection In Cryptocurrency, Ling Cheng, Feida Zhu, Yong Wang, Ruicheng Liang, Huiwen Liu

Research Collection School Of Computing and Information Systems

Cryptocurrency’s pseudo-anonymous nature makes it vulnerable to malicious activities. However, existing deep learning solutions lack interpretability and only support retrospective analysis of specific malice types. To address these challenges, we propose Intention-Monitor for early malice detection in Bitcoin. Our model, utilizing Decision-Tree based feature Selection and Complement (DT-SC), builds different feature sets for different malice types. The Status Proposal Module (SPM) and hierarchical self-attention predictor provide real-time global status and address label predictions. A survival module determines the stopping point and proposes the status sequence (intention). Our model detects various malicious activities with strong interpretability, outperforming state-of-the-art methods in extensive …


The Future Can't Help Fix The Past: Assessing Program Repair In The Wild, Vinay Kabadi, Dezhen Kong, Siyu Xie, Lingfeng Bao, Gede Artha Azriadi Prana, Tien Duy B. Le, Xuan Bach D. Le, David Lo Oct 2023

The Future Can't Help Fix The Past: Assessing Program Repair In The Wild, Vinay Kabadi, Dezhen Kong, Siyu Xie, Lingfeng Bao, Gede Artha Azriadi Prana, Tien Duy B. Le, Xuan Bach D. Le, David Lo

Research Collection School Of Computing and Information Systems

Automated program repair (APR) has been gaining ground with substantial effort devoted to the area, opening up many challenges and opportunities. One such challenge is that the state-of-the-art repair techniques often resort to incomplete specifications, e.g., test cases that witness buggy behavior, to generate repairs. In practice, bug-exposing test cases are often available when: (1) developers, at the same time of (or after) submitting bug fixes, create the tests to assure the correctness of the fixes, or (2) regression errors occur. The former case – a scenario commonly used for creating popular bug datasets – however, may not be suitable …


Towards An Effective And Interpretable Refinement Approach For Dnn Verification, Jiaying Li, Guangdong Bai, Long H. Pham, Jun Sun Oct 2023

Towards An Effective And Interpretable Refinement Approach For Dnn Verification, Jiaying Li, Guangdong Bai, Long H. Pham, Jun Sun

Research Collection School Of Computing and Information Systems

Recently, several abstraction refinement techniques have been proposed to improve the verification precision for deep neural networks (DNNs). However, these techniques usually take many refinement steps to verify a property and the refinement decision in each step is hard to interpret, thus hindering their analysis, reasoning and optimization.In this work, we propose SURGEON, a novel DNN verification refinement approach that is both effective and interpretable, allowing analyst to understand why and how each refinement decision is made. The main insight is to leverage the ‘interpretable’ nature of debugging processes and formulate the verification refinement problem as a debugging problem. Given …


Icl-D3ie: In-Context Learning With Diverse Demonstrations Updating For Document Information Extraction, Jiabang He, Lei Wang, Yi Hu, Ning Liu, Hui Liu, Xing Xu, Heng Tao Shen Oct 2023

Icl-D3ie: In-Context Learning With Diverse Demonstrations Updating For Document Information Extraction, Jiabang He, Lei Wang, Yi Hu, Ning Liu, Hui Liu, Xing Xu, Heng Tao Shen

Research Collection School Of Computing and Information Systems

arge language models (LLMs), such as GPT-3 and ChatGPT, have demonstrated remarkable results in various natural language processing (NLP) tasks with in-context learning, which involves inference based on a few demonstration examples. Despite their successes in NLP tasks, no investigation has been conducted to assess the ability of LLMs to perform document information extraction (DIE) using in-context learning. Applying LLMs to DIE poses two challenges: the modality and task gap. To this end, we propose a simple but effective in-context learning framework called ICL-D3IE, which enables LLMs to perform DIE with different types of demonstration examples. Specifically, we extract the …


Wait, Wasn't That Code Here Before? Detecting Outdated Software Documentation, Wen Siang Tan, Markus Wagner, Christoph Treude Oct 2023

Wait, Wasn't That Code Here Before? Detecting Outdated Software Documentation, Wen Siang Tan, Markus Wagner, Christoph Treude

Research Collection School Of Computing and Information Systems

Encountering outdated documentation is not a rare occurrence for developers and users in the software engineering community. To ensure that software documentation is up-to-date, developers often have to manually check whether the documentation needs to be updated whenever changes are made to the source code. In our previous work, we proposed an approach to automatically detect outdated code element references in software repositories and found that more than a quarter of the 1000 most popular projects on GitHub contained at least one outdated reference. In this paper, we present a GitHub Actions tool that builds on our previous work’s approach …


Using The Typescript Compiler To Fix Erroneous Node.Js Snippets, Brittany Reid, Christoph Treude, Markus Wagner Oct 2023

Using The Typescript Compiler To Fix Erroneous Node.Js Snippets, Brittany Reid, Christoph Treude, Markus Wagner

Research Collection School Of Computing and Information Systems

Most online code snippets do not run. This means that developers looking to reuse code from online sources must manually find and fix errors. We present an approach for automatically evaluating and correcting errors in Node.js code snippets: Node Code Correction (NCC). NCC leverages the ability of the TypeScript compiler to generate errors and inform code corrections through the combination of TypeScript’s builtin codefixes, our own targeted fixes, and deletion of erroneous lines. Compared to existing approaches using linters, our findings suggest that NCC is capable of detecting a larger number of errors per snippet and more error types, and …