Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4681 - 4710 of 302419

Full-Text Articles in Physical Sciences and Mathematics

On Generating Bijections For Permutations And Inversion Sequences, Melanie J. Ferreri Apr 2024

On Generating Bijections For Permutations And Inversion Sequences, Melanie J. Ferreri

Dartmouth College Ph.D Dissertations

Given an algebraic proof of a combinatorial identity, we use recursive methods to construct a bijection demonstrating the identity.

Our first application centers around derangements and nonderangements. A derangement is a permutation with no fixed point, and a nonderangement is a permutation with at least one fixed point. There is a one-term recurrence for the number of derangements of n elements, and we describe a bijective proof of this recurrence which can be found using a recursive map. We then show the combinatorial interpretation of this bijection and how it compares with other known bijections, and show how this extends …


Seasonal Variability In Peak Flow Of Maine Rivers, Brianna L. Benson, Salfa Hendrix, Christopher Houdeshell, Emma Mae Hovencamp, Kaylee M. Perron, Wyeth Bird Purkiss Apr 2024

Seasonal Variability In Peak Flow Of Maine Rivers, Brianna L. Benson, Salfa Hendrix, Christopher Houdeshell, Emma Mae Hovencamp, Kaylee M. Perron, Wyeth Bird Purkiss

Research Learning Experiences (RLEs)

Questions and Hypotheses

  • How has the timing of peak flow changed over time? ○ Hypothesis: Peak flow has moved earlier in the spring due to a warming climate melting snow earlier.

  • How has the variation of flow changed over time?

○ Hypothesis: Flow has grown more

variable in more recent years due to an increase in more variable precipitation patterns, especially in the spring months.


A Computer Vision Solution To Cross-Cultural Food Image Classification And Nutrition Logging​, Rohan Sethi, George K. Thiruvathukal Apr 2024

A Computer Vision Solution To Cross-Cultural Food Image Classification And Nutrition Logging​, Rohan Sethi, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

The US is a culturally and ethnically diverse country, and with this diversity comes a myriad of cuisines and eating habits that expand well beyond that of western culture. Each of these meals have their own good and bad effects when it comes to the nutritional value and its potential impact on human health. Thus, there is a greater need for people to be able to access the nutritional profile of their diverse daily meals and better manage their health. A revolutionary solution to democratize food image classification and nutritional logging is using deep learning to extract that information from …


Probing Shielding Tensor Components Of Amino Acids Using Nuclear Magnetic Resonance, Shiva Agarwal, Sungsool Wi, Michael Famiano, John Miller, Zbigniew Chajecki Apr 2024

Probing Shielding Tensor Components Of Amino Acids Using Nuclear Magnetic Resonance, Shiva Agarwal, Sungsool Wi, Michael Famiano, John Miller, Zbigniew Chajecki

Waldo Library Student Exhibits

Amino acids combine to form proteins in living organisms; most are chiral. On Earth amino acids appear only in the L- form, which is likely due to the amplification of enantiomeric excess (ee). However, a small ee for the L-form of amino acids has been observed in meteorites that have fallen on Earth. One possibility for this ee is the effect of antisymmetric components of the magnetic shielding tensor for 14N nuclei in amino acids, which in NMR manifests as the antisymmetric chemical shift (ACS). This can result in preferential destruction of their D-form through interactions with polarized leptons (e.g., …


State Energy Research Center, University Of North Dakota. Energy And Environmental Research Center Apr 2024

State Energy Research Center, University Of North Dakota. Energy And Environmental Research Center

EERC Brochures and Fact Sheets

Fact sheet about the Energy & Environmental Research Center (EERC) and its role as North Dakota's State Energy Research Center (SERC). Includes SERC accomplishments.


Bibliography For "Earth Day Display: Planet Vs Plastics: A Book Display Increasing The Awareness Of The Harms Of Plastic In Our Ecosystem", Arianna Tillman, Isabella Piechota, Kalea Brown Apr 2024

Bibliography For "Earth Day Display: Planet Vs Plastics: A Book Display Increasing The Awareness Of The Harms Of Plastic In Our Ecosystem", Arianna Tillman, Isabella Piechota, Kalea Brown

Library Displays and Bibliographies

A bibliography created to accompany a display about Earth Day, sustainability, and the harms of plastic during April 2024 at the Leatherby Libraries at Chapman University.


Subsurface Mapping Of Intra-Arbuckle Shale In North-West Kansas Using Well Log Data, Cole M. Denny Apr 2024

Subsurface Mapping Of Intra-Arbuckle Shale In North-West Kansas Using Well Log Data, Cole M. Denny

SACAD: John Heinrichs Scholarly and Creative Activity Days

The aim of this research was to enhance knowledge of Intra-Arbuckle Shale (IAS) distribution and structure through new maps, cross sections, and well log correlations. Understanding the shale(s) ultimately advances the discernment of complex Arbuckle reservoirs that are critical to the Kansas petroleum industry. IAS has been intercepted by oil wells throughout Kansas, but this study focuses on their presence in portions of Ellis, Rooks, Graham, and Trego counties. To study the distribution and structure of IAS, data from micro-resistivity and gamma ray well logs were collected from more than three hundred Arbuckle oil and gas wells. On each well …


2024 April - Tennessee Monthly Climate Report, Tennessee Climate Office, East Tennessee State University Apr 2024

2024 April - Tennessee Monthly Climate Report, Tennessee Climate Office, East Tennessee State University

Tennessee Climate Office Monthly Report

No abstract provided.


Redefining Readiness: Higher Education's Role In An Ai World How Higher Education Can Bridge The Gap Between Human Talent And Machine Intelligence For The Workforce Of Tomorrow, Paloma Shelton Apr 2024

Redefining Readiness: Higher Education's Role In An Ai World How Higher Education Can Bridge The Gap Between Human Talent And Machine Intelligence For The Workforce Of Tomorrow, Paloma Shelton

HON 499 Honors Thesis or Creative Project

As the world changes all around us in the landscape of Artificial Intelligence (AI), our educational pathways need to adapt quickly. This paper presents a comprehensive analysis of the current and future state of higher education, its relationship with AI and technology, and the evolving requirements of the workforce. It outlines the historical progression of higher education since the Colonial Era, emphasizing the need for constant adaptation to societal and economic demands. It reflects how higher education must evolve to equip students with the necessary skills and adaptability for future careers in the digital and AI-augmented landscape. As AI advances …


Let’S Move! Benefits Of Exercise Compared To Ssris (Escitalopram) For The Management Of Depression: Research From 2020 And Beyond, Brianna Droessler-Aschliman Apr 2024

Let’S Move! Benefits Of Exercise Compared To Ssris (Escitalopram) For The Management Of Depression: Research From 2020 And Beyond, Brianna Droessler-Aschliman

Physician Assistant Scholarly Project Posters

• Purpose: Determine the effectiveness of exercise as either monotherapy or in combination with SSRIs (selective serotonin reuptake inhibitors) for the management of major depressive disorder.

• Studies gathered for this review came from the following databases: PubMed, SpringerLink, Academic Search Ultimate, Academic Search Complete, and CINAHL.

• Review of current research that was completed between the years 2020-2023 that consisted of either clinical trials, RCTs, or meta-analysis. • Upon completion of the literature review: exercise is equivocal to SSRIs as a treatment option. While this is a significant finding, the benefits of exercises are more consistent in those that …


Moid Using New Sets Of Universal Functions, Ayman Homda, Hany R. Dwidar, Abdelaziz A. Bakry, M.N. Mohamad Ismail, Ahmed El-Raffie Apr 2024

Moid Using New Sets Of Universal Functions, Ayman Homda, Hany R. Dwidar, Abdelaziz A. Bakry, M.N. Mohamad Ismail, Ahmed El-Raffie

Al-Azhar Bulletin of Science

In this paper, based on Goodyear's time transformation formula, we used a set of modified universal functions to construct the minimum distance function between any two celestial objects. We determined the distance between objects in space under a specific time constraint. We used the continued fractions method for quick convergence of the distance function. We used the inverse series to obtain a first initial guess to solve the convergence equation. Furthermore, the Lagrange multiplier method was used to determine the minimum distance between the two objects under the specified time constraint. We constructed an algorithm and applied it with the …


The Effects Of Phenological Shifts On The Reproductive Success Of Common Terns (Sterna Hirundo) And Arctic Terns (Sterna Paradisaea) In The Gulf Of Maine, Jamie W. Dinella Apr 2024

The Effects Of Phenological Shifts On The Reproductive Success Of Common Terns (Sterna Hirundo) And Arctic Terns (Sterna Paradisaea) In The Gulf Of Maine, Jamie W. Dinella

Student Publications

Climate change is resulting in ecosystem-wide consequences, including shifts in the geographical distribution of species and the timing of biological events, or phenology. The rapidly warming Gulf of Maine hosts breeding populations of migratory common terns (Sterna hirundo) and Arctic terns (Sterna paradisaea). I used nest check data (2013-2022) and eggshell membrane stable isotope data (2022) from Petit Manan Island in the Gulf of Maine to examine the causes and consequences of variation in phenology in common and Arctic terns. I hypothesized that the timing of an individual’s breeding was impacted by their foraging behavior and that female terns that …


Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin Apr 2024

Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin

Research Collection School Of Computing and Information Systems

Concolic execution is a powerful program analysis technique for code path exploration. Despite recent advances that greatly improved the efficiency of concolic execution engines, path constraint solving remains a major bottleneck of concolic testing. An intelligent scheduler for inputs/branches becomes even more crucial. Our studies show that the previously under-studied branch-flipping policy adopted by state-of-the-art concolic execution engines has several limitations. We propose to assess each branch by its potential for new code coverage from a global view, concerning the path divergence probability at each branch. To validate this idea, we implemented a prototype Marco and evaluated it against the …


Redriver: Runtime Enforcement For Autonomous Vehicles, Yang Sun, Christopher M. Poskitt, Xiaodong Zhang, Jun Sun Apr 2024

Redriver: Runtime Enforcement For Autonomous Vehicles, Yang Sun, Christopher M. Poskitt, Xiaodong Zhang, Jun Sun

Research Collection School Of Computing and Information Systems

Autonomous driving systems (ADSs) integrate sensing, perception, drive control, and several other critical tasks in autonomous vehicles, motivating research into techniques for assessing their safety. While there are several approaches for testing and analysing them in high-fidelity simulators, ADSs may still encounter additional critical scenarios beyond those covered once they are deployed on real roads. An additional level of confidence can be established by monitoring and enforcing critical properties when the ADS is running. Existing work, however, is only able to monitor simple safety properties (e.g., avoidance of collisions) and is limited to blunt enforcement mechanisms such as hitting the …


Acav: A Framework For Automatic Causality Analysis In Autonomous Vehicle Accident Recordings, Huijia Sun, Christopher M. Poskitt, Yang Sun, Jun Sun, Yuqi Chen Apr 2024

Acav: A Framework For Automatic Causality Analysis In Autonomous Vehicle Accident Recordings, Huijia Sun, Christopher M. Poskitt, Yang Sun, Jun Sun, Yuqi Chen

Research Collection School Of Computing and Information Systems

The rapid progress of autonomous vehicles (AVs) has brought the prospect of a driverless future closer than ever. Recent fatalities, however, have emphasized the importance of safety validation through large-scale testing. Multiple approaches achieve this fully automatically using high-fidelity simulators, i.e., by generating diverse driving scenarios and evaluating autonomous driving systems (ADSs) against different test oracles. While effective at finding violations, these approaches do not identify the decisions and actions that caused them -- information that is critical for improving the safety of ADSs. To address this challenge, we propose ACAV, an automated framework designed to conduct causality analysis for …


Flgan: Gan-Based Unbiased Federated Learning Under Non-Iid Settings, Zhuoran Ma, Yang Liu, Yinbin Miao, Guowen Xu, Ximeng Liu, Jianfeng Ma, Robert H. Deng Apr 2024

Flgan: Gan-Based Unbiased Federated Learning Under Non-Iid Settings, Zhuoran Ma, Yang Liu, Yinbin Miao, Guowen Xu, Ximeng Liu, Jianfeng Ma, Robert H. Deng

Research Collection School Of Computing and Information Systems

Federated Learning (FL) suffers from low convergence and significant accuracy loss due to local biases caused by non-Independent and Identically Distributed (non-IID) data. To enhance the non-IID FL performance, a straightforward idea is to leverage the Generative Adversarial Network (GAN) to mitigate local biases using synthesized samples. Unfortunately, existing GAN-based solutions have inherent limitations, which do not support non-IID data and even compromise user privacy. To tackle the above issues, we propose a GAN-based unbiased FL scheme, called FlGan, to mitigate local biases using synthesized samples generated by GAN while preserving user-level privacy in the FL setting. Specifically, FlGan first …


Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, Qi Guo, Shangqing Liu, Junming Cao, Xiaohong Li, Xin Peng, Xiaofei Xie, Bihuan Chen Apr 2024

Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, Qi Guo, Shangqing Liu, Junming Cao, Xiaohong Li, Xin Peng, Xiaofei Xie, Bihuan Chen

Research Collection School Of Computing and Information Systems

Code review is an essential activity for ensuring the quality and maintainability of software projects. However, it is a time-consuming and often error-prone task that can significantly impact the development process. Recently, ChatGPT, a cutting-edge language model, has demonstrated impressive performance in various natural language processing tasks, suggesting its potential to automate code review processes. However, it is still unclear how well ChatGPT performs in code review tasks. To fill this gap, in this paper, we conduct the first empirical study to understand the capabilities of ChatGPT in code review tasks, specifically focusing on automated code refinement based on given …


Towards Low-Resource Rumor Detection: Unified Contrastive Transfer With Propagation Structure, Hongzhan Lin, Jing Ma, Ruichao Yang, Zhiwei Yang, Mingfei Cheng Apr 2024

Towards Low-Resource Rumor Detection: Unified Contrastive Transfer With Propagation Structure, Hongzhan Lin, Jing Ma, Ruichao Yang, Zhiwei Yang, Mingfei Cheng

Research Collection School Of Computing and Information Systems

The truth is significantly hampered by massive rumors that spread along with breaking news or popular topics. Since there is sufficient corpus gathered from the same domain for model training, existing rumor detection algorithms show promising performance on yesterday's news. However, due to a lack of substantial training data and prior expert knowledge, they are poor at spotting rumors concerning unforeseen events, especially those propagated in different languages (i.e., low-resource regimes). In this paper, we propose a simple yet effective framework with unified contrastive transfer learning, to detect rumors by adapting the features learned from well-resourced rumor data to that …


Teaching Software Development For Real-World Problems Using A Microservice-Based Collaborative Problem-Solving Approach, Yi Meng Lau, Christian Michael Koh, Lingxiao Jiang Apr 2024

Teaching Software Development For Real-World Problems Using A Microservice-Based Collaborative Problem-Solving Approach, Yi Meng Lau, Christian Michael Koh, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Experienced and skillful software developers are needed in organizations to develop software products effective for their business with shortened time-to-market. Such developers will not only need to code but also be able to work in teams and collaboratively solve real-world problems that organizations arefacing. It is challenging for educators to nurture students to become such developers with strong technical, social, and cognitive skills. Towards addressing the challenge, this study presents a Collaborative Software Development Project Framework for a course that focuses on learning microservices architectures anddeveloping a software application for a real-world business. Students get to work in teams to …


Experience Report: Identifying Common Misconceptions And Errors Of Novice Programmers With Chatgpt, Hua Leong Fwa Apr 2024

Experience Report: Identifying Common Misconceptions And Errors Of Novice Programmers With Chatgpt, Hua Leong Fwa

Research Collection School Of Computing and Information Systems

Identifying the misconceptions of novice programmers is pertinent for informing instructors of the challenges faced by their students in learning computer programming. In the current literature, custom tools, test scripts were developed and, in most cases, manual effort to go through the individual codes were required to identify and categorize the errors latent within the students' code submissions. This entails investment of substantial effort and time from the instructors. In this study, we thus propose the use of ChatGPT in identifying and categorizing the errors. Using prompts that were seeded only with the student's code and the model code solution …


Improving Automated Code Reviews: Learning From Experience, Hong Yi Lin, Patanamon Thongtanunam, Christoph Treude, Wachiraphan Charoenwet Apr 2024

Improving Automated Code Reviews: Learning From Experience, Hong Yi Lin, Patanamon Thongtanunam, Christoph Treude, Wachiraphan Charoenwet

Research Collection School Of Computing and Information Systems

Modern code review is a critical quality assurance process that is widely adopted in both industry and open source software environments. This process can help newcomers learn from the feedback of experienced reviewers; however, it often brings a large workload and stress to reviewers. To alleviate this burden, the field of automated code reviews aims to automate the process, teaching large language models to provide reviews on submitted code, just as a human would. A recent approach pre-trained and fine-tuned the code intelligent language model on a large-scale code review corpus. However, such techniques did not fully utilise quality reviews …


Encoding Version History Context For Better Code Representation, Huy Nguyen, Christoph Treude, Patanamon Thongtanunam Apr 2024

Encoding Version History Context For Better Code Representation, Huy Nguyen, Christoph Treude, Patanamon Thongtanunam

Research Collection School Of Computing and Information Systems

With the exponential growth of AI tools that generate source code, understanding software has become crucial. When developers comprehend a program, they may refer to additional contexts to look for information, e.g. program documentation or historical code versions. Therefore, we argue that encoding this additional contextual information could also benefit code representation for deep learning. Recent papers incorporate contextual data (e.g. call hierarchy) into vector representation to address program comprehension problems. This motivates further studies to explore additional contexts, such as version history, to enhance models' understanding of programs. That is, insights from version history enable recognition of patterns in …


Dronlomaly: Runtime Log-Based Anomaly Detector For Dji Drones, Wei Minn, Naing Tun Yan, Lwin Khin Shar, Lingxiao Jiang Apr 2024

Dronlomaly: Runtime Log-Based Anomaly Detector For Dji Drones, Wei Minn, Naing Tun Yan, Lwin Khin Shar, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

We present an automated tool for realtime detection of anomalous behaviors while a DJI drone is executing a flight mission. The tool takes sensor data logged by drone at fixed time intervals and performs anomaly detection using a Bi-LSTM model. The model is trained on baseline flight logs from a successful mission physically or via a simulator. The tool has two modules --- the first module is responsible for sending the log data to the remote controller station, and the second module is run as a service in the remote controller station powered by a Bi-LSTM model, which receives the …


My Github Sponsors Profile Is Live!": Investigating The Impact Of Twitter/X Mentions On Github Sponsors, Youmei Fan, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto Apr 2024

My Github Sponsors Profile Is Live!": Investigating The Impact Of Twitter/X Mentions On Github Sponsors, Youmei Fan, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto

Research Collection School Of Computing and Information Systems

GitHub Sponsors was launched in 2019, enabling donations to opensource software developers to provide financial support, as per GitHub’s slogan: “Invest in the projects you depend on”. However, a 2022 study on GitHub Sponsors found that only two-fifths of developers who were seeking sponsorship received a donation. The study found that, other than internal actions (such as offering perks to sponsors), developers had advertised their GitHub Sponsors profiles on social media, such as Twitter (also known as X). Therefore, in this work, we investigate the impact of tweets that contain links to GitHub Sponsors profiles on sponsorship, as well as …


Classifying Source Code: How Far Can Compressor-Based Classifiers Go?, Zhou Yang Apr 2024

Classifying Source Code: How Far Can Compressor-Based Classifiers Go?, Zhou Yang

Research Collection School Of Computing and Information Systems

Pre-trained language models of code, which are built upon large-scale datasets, millions of trainable parameters, and high computational resources cost, have achieved phenomenal success. Recently, researchers have proposed a compressor-based classifier (Cbc); it trains no parameters but is found to outperform BERT. We conduct the first empirical study to explore whether this lightweight alternative can accurately classify source code. Our study is more than applying Cbc to code-related tasks. We first identify an issue that the original implementation overestimates Cbc. After correction, Cbc's performance on defect prediction drops from 80.7% to 63.0%, which is still comparable to CodeBERT (63.7%). We …


Beyond A Joke: Dead Code Elimination Can Delete Live Code, Haoxin Tu, Lingxiao Jiang, Debin Gao, He Jiang Apr 2024

Beyond A Joke: Dead Code Elimination Can Delete Live Code, Haoxin Tu, Lingxiao Jiang, Debin Gao, He Jiang

Research Collection School Of Computing and Information Systems

Dead Code Elimination (DCE) is a fundamental compiler optimization technique that removes dead code (e.g., unreachable or reachable but whose results are unused) in the program to produce smaller or faster executables. However, since compiler optimizations are typically aggressively performed and there are complex relationships/interplay among a vast number of compiler optimizations (including DCE), it is not known whether DCE is indeed correctly performed and will only delete dead code in practice. In this study, we open a new research problem to investigate: can DCE happen to erroneously delete live code? To tackle this problem, we design a new approach …


Impact Of Government Outsourcing Contracts On High-Tech Vendors: An Empirical Study, Yi Dong, Nan Hu, Yonghua Ji, Chenkai Ni, Jing Xie Apr 2024

Impact Of Government Outsourcing Contracts On High-Tech Vendors: An Empirical Study, Yi Dong, Nan Hu, Yonghua Ji, Chenkai Ni, Jing Xie

Research Collection School Of Computing and Information Systems

Outsourcing is an important strategic decision of high-tech firms. However, while the research has extensively studied the implications of outsourcing to high-tech clients, its impact on high-tech vendors remains underexplored. This study empirically estimates the impact of government outsourcing contracts on high-tech vendors. Employing the earnings-return analyses framework, we find that, for high-tech vendors engaged in government outsourcing contracts, the stock market places a higher value on each unit of unexpected earnings compared to other firms. Additionally, this impact becomes stronger for contracts with longer terms, for contracts outsourced by the U.S. government or by countries with better political and …


Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, Guo Qi, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng Apr 2024

Exploring The Potential Of Chatgpt In Automated Code Refinement: An Empirical Study, Guo Qi, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng

Research Collection School Of Computing and Information Systems

Code review is an essential activity for ensuring the quality and maintainability of software projects. However, it is a time-consuming and often error-prone task that can significantly impact the development process. Recently, ChatGPT, a cutting-edge language model, has demonstrated impressive performance in various natural language processing tasks, suggesting its potential to automate code review processes. However, it is still unclear how well ChatGPT performs in code review tasks. To fill this gap, in this paper, we conduct the first empirical study to understand the capabilities of ChatGPT in code review tasks, specifically focusing on automated code refinement based on given …


Out Of Sight, Out Of Mind: Better Automatic Vulnerability Repair By Broadening Input Ranges And Sources, Xin Zhou, Kisub Kim, Bowen Xu, Donggyun Han, David Lo Apr 2024

Out Of Sight, Out Of Mind: Better Automatic Vulnerability Repair By Broadening Input Ranges And Sources, Xin Zhou, Kisub Kim, Bowen Xu, Donggyun Han, David Lo

Research Collection School Of Computing and Information Systems

The advances of deep learning (DL) have paved the way for automatic software vulnerability repair approaches, which effectively learn the mapping from the vulnerable code to the fixed code. Nevertheless, existing DL-based vulnerability repair methods face notable limitations: 1) they struggle to handle lengthy vulnerable code, 2) they treat code as natural language texts, neglecting its inherent structure, and 3) they do not tap into the valuable expert knowledge present in the expert system. To address this, we propose VulMaster, a Transformer-based neural network model that excels at generating vulnerability repairs by comprehensively understanding the entire vulnerable code, irrespective of …


Greening Large Language Models Of Code, Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo Apr 2024

Greening Large Language Models Of Code, Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo

Research Collection School Of Computing and Information Systems

Large language models of code have shown remarkable effectiveness across various software engineering tasks. Despite the availability of many cloud services built upon these powerful models, there remain several scenarios where developers cannot take full advantage of them, stemming from factors such as restricted or unreliable internet access, institutional privacy policies that prohibit external transmission of code to third-party vendors, and more. Therefore, developing a compact, efficient, and yet energy-saving model for deployment on developers' devices becomes essential.To this aim, we propose Avatar, a novel approach that crafts a deployable model from a large language model of code by optimizing …