Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (115)
- Western University (12)
- Rochester Institute of Technology (8)
- University of Arkansas, Fayetteville (8)
- City University of New York (CUNY) (7)
-
- Minnesota State University Moorhead (4)
- University of Nebraska - Lincoln (4)
- Air Force Institute of Technology (3)
- California Polytechnic State University, San Luis Obispo (3)
- San Jose State University (3)
- Technological University Dublin (3)
- The University of Akron (3)
- American University in Cairo (2)
- Chapman University (2)
- Dakota State University (2)
- Kennesaw State University (2)
- Loyola University Chicago (2)
- Portland State University (2)
- United Arab Emirates University (2)
- West Virginia University (2)
- Western Michigan University (2)
- Association of Arab Universities (1)
- California State University, San Bernardino (1)
- Dartmouth College (1)
- DePaul University (1)
- East Tennessee State University (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Georgia Southern University (1)
- Grand Valley State University (1)
- Keyword
-
- Deep learning (11)
- Software engineering (9)
- Deep Learning (6)
- Machine learning (6)
- Software Engineering (6)
-
- Machine Learning (5)
- Python (5)
- Refactoring (5)
- Security (5)
- Software (5)
- Computer Science (4)
- Human factors in software engineering (4)
- Software testing (4)
- Android (3)
- Blockchain (3)
- Deep neural networks (3)
- Empirical study (3)
- Mobile app (3)
- Neural networks (3)
- Sentiment analysis (3)
- Smart contract (3)
- Software development (3)
- Software maintenance (3)
- Visualization (3)
- Adaptive System (2)
- Adversarial examples (2)
- Android malware (2)
- Application (2)
- Artificial intelligence (2)
- Augmented Reality (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (111)
- Articles (9)
- Electrical and Computer Engineering Publications (6)
- Honors Theses (6)
- Graduate Theses and Dissertations (5)
-
- Publications and Research (5)
- Electronic Thesis and Dissertation Repository (4)
- Student Academic Conference (4)
- Computer Science and Computer Engineering Undergraduate Honors Theses (3)
- Dissertations and Theses Collection (Open Access) (3)
- Theses (3)
- Williams Honors College, Honors Research Projects (3)
- Archived Theses and Dissertations (2)
- Computer Science: Faculty Publications and Other Works (2)
- Electronic Theses and Dissertations (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
- Library Philosophy and Practice (e-journal) (2)
- Masters Theses & Doctoral Dissertations (2)
- Open Educational Resources (2)
- Theses and Dissertations (2)
- Undergraduate Student Research Internships Conference (2)
- Chancellor’s Honors Program Projects (1)
- Computational and Data Sciences (PhD) Dissertations (1)
- Computer Engineering (1)
- Computer Science ETDs (1)
- Computer Science and Software Engineering (1)
- Culminating Experience Projects (1)
- Dartmouth College Undergraduate Theses (1)
- Dissertations (1)
- Dissertations and Theses (1)
- Publication Type
- File Type
Articles 1 - 30 of 216
Full-Text Articles in Computer Sciences
On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu
On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu
Articles
Commit messages are the atomic level of software documentation. They provide a natural language description of the code change and its purpose. Messages are critical for software maintenance and program comprehension. Unlike documenting feature updates and bug fixes, little is known about how developers document their refactoring activities. Specifically, developers can perform multiple refactoring operations, including moving methods, extracting classes, renaming attributes, for various reasons, such as improving software quality, managing technical debt, and removing defects. Yet, there is no systematic study that analyzes the extent to which the documentation of refactoring accurately describes the refactoring operations performed at the …
Winter 2021
In The Loop
2021 Emmy Nominees; Animator Tapped by Cartoon Network; IndieCade Horizons 2021; Hack4Space; Security Daemons Prevail; Role Models: DePaul Originals Game Studio students build industry-level skills that benefit themselves and others; Frames and Fortune: Eugene Bush programmed his indie video studio with patience and planning; Reality Check: Heather Snyder Quinn augments reality to question systems of unchecked power
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao
Posters-at-the-Capitol
Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …
Utilizing Software Engineering And Cloud Computing Principles To Develop The Revised Self-Report Assessment Of Functional Visual Performance (R-Srafvp) Application, Kirk Hedlich
Culminating Experience Projects
Can principles from software engineering and concepts from cloud computing be applied to and aid in the development of a small project, specifically improving the use of the Revised Self-Report Assessment of Functional Visual Performance (R-SRAFVP)? The target for this project is to create a new application and improve on existing attempts to move the R-SRAFVP assessment from an electronic document format to a web-based application. The new application should provide better ease of use, simplicity in design and understanding for use, and hopefully increased access and adoption by Occupation Therapists who specialize in low vision rehabilitation. The benefits of …
Resource Optimization Property Manager For Autonomic Computing, Hazem A. M. Sharaf El Din
Resource Optimization Property Manager For Autonomic Computing, Hazem A. M. Sharaf El Din
Archived Theses and Dissertations
No abstract provided.
Surface Reconstruction Library, Jhye Tim Chi
Surface Reconstruction Library, Jhye Tim Chi
Honors Theses
The project aims to convert an arbitrary point cloud into a triangular mesh. Point clouds are a list of 3d points that model the topology of an object. Point clouds can have various issues, such as missing or noisy data. For the scope, we had no control over point cloud generation. We were also unable to deal with underlying registration or alignment problems. Triangular meshes are a list of triangles that have 3d vertices. This aggregate list of triangles defines the reconstructed surface. Our project implementation is based on Alexander Hornung and Leif Kobbelt’s method for surface reconstruction using the …
Class Scheduling Web App, Anubhav Rawal
Class Scheduling Web App, Anubhav Rawal
Honors Theses
This Scheduling Web Application in Django was built to allow a user to create a schedule for upcoming semesters. Users with appropriate privileges could upload an excel schedule to which instructors could be assigned. Additionally features included dynamic editing for admin users and viewing the main schedule for general users. Our goal was to create an application from the ground up using the Django framework to accomplish these tasks.
Machine Learning For Stock Prediction Based On Fundamental Analysis, Yuxuan Huang, Luiz Fernando Capretz, Danny Ho
Machine Learning For Stock Prediction Based On Fundamental Analysis, Yuxuan Huang, Luiz Fernando Capretz, Danny Ho
Electrical and Computer Engineering Publications
Application of machine learning for stock prediction is attracting a lot of attention in recent years. A large amount of research has been conducted in this area and multiple existing results have shown that machine learning methods could be successfully used toward stock predicting using stocks’ historical data. Most of these existing approaches have focused on short term prediction using stocks’ historical price and technical indicators. In this paper, we prepared 22 years’ worth of stock quarterly financial data and investigated three machine learning algorithms: Feed-forward Neural Network (FNN), Random Forest (RF) and Adaptive Neural Fuzzy Inference System (ANFIS) for …
Recurrent Connectionist Models For Map Explanation In Bayesian Networks, Murad Assaggaf
Recurrent Connectionist Models For Map Explanation In Bayesian Networks, Murad Assaggaf
Archived Theses and Dissertations
No abstract provided.
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Messiness: Automating Iot Data Streaming Spatial Analysis, Christopher White, Atilio Barreda Ii
Publications and Research
The spaces we live in go through many transformations over the course of a year, a month, or a day; My room has seen tremendous clutter and pristine order within the span of a few hours. My goal is to discover patterns within my space and formulate an understanding of the changes that occur. This insight will provide actionable direction for maintaining a cleaner environment, as well as provide some information about the optimal times for productivity and energy preservation.
Using a Raspberry Pi, I will set up automated image capture in a room in my home. These images will …
Procedural Plant Generation With Floragen, Christopher Wesley Wright
Procedural Plant Generation With Floragen, Christopher Wesley Wright
Computer Engineering
A particularly challenging aspect of game design revolves around asset creation. Often new developers become lost in nuances and time investment required to learn 3d asset creation software. While many game development platforms provide an internal asset store, these assets are often expensive or limited. These assets restrict the flexibility for a creator to fully control the product they create. A critical asset type in many games is flora. Good looking trees and plants add environmental variation when added properly. In this project, I designed and implemented an add-on dubbed FloraGen to the 3D modeling software Blender in which users …
On Preserving The Behavior In Software Refactoring: A Systematic Mapping Study, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni
On Preserving The Behavior In Software Refactoring: A Systematic Mapping Study, Eman Abdullah Alomar, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni
Articles
Context: Refactoring is the art of modifying the design of a system without altering its behavior. The idea is to reorganize variables, classes and methods to facilitate their future adaptations and comprehension. As the concept of behavior preservation is fundamental for refactoring, several studies, using formal verification, language transformation and dynamic analysis, have been proposed to monitor the execution of refactoring operations and their impact on the program semantics. However, there is no existing study that examines the available behavior preservation strategies for each refactoring operation.
Objective: This paper identifies behavior preservation approaches in the research literature. Method: We conduct, …
Etherlearn: Decentralizing Learning Via Blockchain, Nguyen Binh Duong Ta, Tian Jun Joel Yang
Etherlearn: Decentralizing Learning Via Blockchain, Nguyen Binh Duong Ta, Tian Jun Joel Yang
Research Collection School Of Computing and Information Systems
In institutes of higher learning, most of the time course material development and delivery follow a centralized model which is fully lecturer-controlled. In this model, engaging students as partners in learning is a challenging problem as: 1) students are usually hesitant to contribute due to the fear of getting it wrong, 2) not much incentive for them to put in the extra effort, and 3) current online learning systems lack adequate facilities to support seamless and anonymous interactions between students. In this work, we propose EtherLearn, a blockchain based peer-learning system to distribute the control of how course material and …
Microservices Orchestration Vs. Choreography: A Decision Framework, Alan @ Ali Madjelisi Megargel, Christopher M. Poskitt, Shankararaman, Venky
Microservices Orchestration Vs. Choreography: A Decision Framework, Alan @ Ali Madjelisi Megargel, Christopher M. Poskitt, Shankararaman, Venky
Research Collection School Of Computing and Information Systems
Microservices-based applications consist of loosely coupled, independently deployable services that encapsulate units of functionality. To implement larger application processes, these microservices must communicate and collaborate. Typically, this follows one of two patterns: (1) choreography, in which communication is done via asynchronous message-passing; or (2) orchestration, in which a controller is used to synchronously manage the process flow. Choosing the right pattern requires the resolution of some trade-offs concerning coupling, chattiness, visibility, and design. To address this problem, we propose a decision framework for microservices collaboration patterns that helps solution architects to crystallize their goals, compare the key factors, and then …
Towards Non-Intrusive Camera-Based Heart Rate Variability Estimation In The Car Under Naturalistic Condition, Shu Liu, Kevin Koch, Zimu Zhou, Martin Maritsch, Xiaoxi He, Elgar Fleisch, Felix Wortmann
Towards Non-Intrusive Camera-Based Heart Rate Variability Estimation In The Car Under Naturalistic Condition, Shu Liu, Kevin Koch, Zimu Zhou, Martin Maritsch, Xiaoxi He, Elgar Fleisch, Felix Wortmann
Research Collection School Of Computing and Information Systems
Driver status monitoring systems are a vital component of smart cars in the future, especially in the era when an increasing amount of time is spent in the vehicle. The heart rate (HR) is one of the most important physiological signals of driver status. To infer HR of drivers, the mainstream of existing research focused on capturing subtle heartbeat-induced vibration of the torso or leveraged photoplethysmography (PPG) that detects cardiac cycle-related blood volume changes in the microvascular. However, existing approaches rely on dedicated sensors that are expensive and cumbersome to be integrated or are vulnerable to ambient noise. Moreover, their …
Imon: Appearance-Based Gaze Tracking System On Mobile Devices, Sinh Huynh, Rajesh Krishna Balan, Jeonggil Ko
Imon: Appearance-Based Gaze Tracking System On Mobile Devices, Sinh Huynh, Rajesh Krishna Balan, Jeonggil Ko
Research Collection School Of Computing and Information Systems
Gaze tracking is a key building block used in many mobile applications including entertainment, personal productivity, accessibility, medical diagnosis, and visual attention monitoring. In this paper, we present iMon, an appearance-based gaze tracking system that is both designed for use on mobile phones and has significantly greater accuracy compared to prior state-of-the-art solutions. iMon achieves this by comprehensively considering the gaze estimation pipeline and then overcoming three different sources of errors. First, instead of assuming that the user's gaze is fixed to a single 2D coordinate, we construct each gaze label using a probabilistic 2D heatmap gaze representation input to …
Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler
Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler
Computer Science and Computer Engineering Undergraduate Honors Theses
Sounds with a high level of stationarity, also known as sound textures, have perceptually relevant features which can be captured by stimulus-computable models. This makes texture-like sounds, such as those made by rain, wind, and fire, an appealing test case for understanding the underlying mechanisms of auditory recognition. Previous auditory texture models typically measured statistics from auditory filter bank representations, and the statistics they used were somewhat ad-hoc, hand-engineered through a process of trial and error. Here, we investigate whether a better auditory texture representation can be obtained via contrastive learning, taking advantage of the stationarity of auditory textures to …
Graph Learning Assisted Multi-Objective Integer Programming, Yaoxin Wu, Wen Song, Zhiguang Cao, Jie Zhang, Abhishek Gupta, Mingyan Simon Lin
Graph Learning Assisted Multi-Objective Integer Programming, Yaoxin Wu, Wen Song, Zhiguang Cao, Jie Zhang, Abhishek Gupta, Mingyan Simon Lin
Research Collection School Of Computing and Information Systems
Objective-space decomposition algorithms (ODAs) are widely studied for solvingmulti-objective integer programs. However, they often encounter difficulties inhandling scalarized problems, which could cause infeasibility or repetitive nondominatedpoints and thus induce redundant runtime. To mitigate the issue, we presenta graph neural network (GNN) based method to learn the reduction rule in the ODA.We formulate the algorithmic procedure of generic ODAs as a Markov decisionprocess, and parameterize the policy (reduction rule) with a novel two-stage GNNto fuse information from variables, constraints and especially objectives for betterstate representation. We train our model with imitation learning and deploy it ona state-of-the-art ODA. Results show that …
Checking Smart Contracts With Structural Code Embedding, Zhipeng Gao, Lingxiao Jiang, Xin Xia, David Lo, John Grundy
Checking Smart Contracts With Structural Code Embedding, Zhipeng Gao, Lingxiao Jiang, Xin Xia, David Lo, John Grundy
Research Collection School Of Computing and Information Systems
Smart contracts have been increasingly used together with blockchains to automate financial and business transactions. However, many bugs and vulnerabilities have been identified in many contracts which raises serious concerns about smart contract security, not to mention that the blockchain systems on which the smart contracts are built can be buggy. Thus, there is a significant need to better maintain smart contract code and ensure its high reliability. In this paper, we propose an automated approach to learn characteristics of smart contracts in Solidity, useful for repetitive contract code, bug detection and contract validation. Our new approach is based on …
Degree Doesn't Matter: Identifying The Drivers Of Interaction In Software Development Ecosystem, Amrita Bhattacharjee, Subhajit Datta, Subhashis Majumder
Degree Doesn't Matter: Identifying The Drivers Of Interaction In Software Development Ecosystem, Amrita Bhattacharjee, Subhajit Datta, Subhashis Majumder
Research Collection School Of Computing and Information Systems
Large scale software development ecosystems represent one of the most complex human enterprises. In such settings, developers are embedded in a web of shared concerns, responsibilities, and objectives at individual and collective levels. A deep understanding of the factors that influence developers to connect with one another is crucial in appreciating the challenges of such ecosystems as well as formulating strategies to overcome those challenges. We use real world data from multiple software development ecosystems to construct developer interaction networks and examine the mechanisms of such network formation using statistical models to identify developer attributes that have maximal influence on …
Adadeep: A Usage-Driven, Automated Deep Model Compression Framework For Enabling Ubiquitous Intelligent Mobiles, Sicong Liu, Junzhao Du, Kaiming Nan, Zimu Zhou, Hui Liu, Zhangyang Wang, Yingyan Lin
Adadeep: A Usage-Driven, Automated Deep Model Compression Framework For Enabling Ubiquitous Intelligent Mobiles, Sicong Liu, Junzhao Du, Kaiming Nan, Zimu Zhou, Hui Liu, Zhangyang Wang, Yingyan Lin
Research Collection School Of Computing and Information Systems
Recent breakthroughs in deep neural networks (DNNs) have fueled a tremendously growing demand for bringing DNN-powered intelligence into mobile platforms. While the potential of deploying DNNs on resource-constrained platforms has been demonstrated by DNN compression techniques, the current practice suffers from two limitations: 1) merely stand-alone compression schemes are investigated even though each compression technique only suit for certain types of DNN layers; and 2) mostly compression techniques are optimized for DNNs’ inference accuracy, without explicitly considering other application-driven system performance (e.g., latency and energy cost) and the varying resource availability across platforms (e.g., storage and processing capability). To this …
Verification Assisted Gas Reduction For Smart Contracts, Bo Gao, Siyuan Shen, Ling Shi, Jiaying Li, Jun Sun, Lei Bu
Verification Assisted Gas Reduction For Smart Contracts, Bo Gao, Siyuan Shen, Ling Shi, Jiaying Li, Jun Sun, Lei Bu
Research Collection School Of Computing and Information Systems
Smart contracts are computerized transaction protocols built on top of blockchain networks. Users are charged with fees, a.k.a. gas in Ethereum, when they create, deploy or execute smart contracts. Since smart contracts may contain vulnerabilities which may result in huge financial loss, developers and smart contract compilers often insert codes for security checks. The trouble is that those codes consume gas every time they are executed. Many of the inserted codes are however redundant. In this work, we present sOptimize, a tool that optimizes smart contract gas consumption automatically without compromising functionality or security. sOptimize works on smart contract bytecode, …
Building Action Sets In A Deep Reinforcement Learner, Yongzhao Wang, Arunesh Sinha, Sky C.H. Wang, Michael P. Wellman
Building Action Sets In A Deep Reinforcement Learner, Yongzhao Wang, Arunesh Sinha, Sky C.H. Wang, Michael P. Wellman
Research Collection School Of Computing and Information Systems
In many policy-learning applications, the agent may execute a set of actions at each decision stage. Choosing among an exponential number of alternatives poses a computational challenge, and even representing actions naturally expressed as sets can be a tricky design problem. Building upon prior approaches that employ deep neural networks and iterative construction of action sets, we introduce a reward-shaping approach to apportion reward to each atomic action based on its marginal contribution within an action set, thereby providing useful feedback for learning to build these sets. We demonstrate our method in two environments where action spaces are combinatorial. Experiments …
Empirical Evaluation Of Minority Oversampling Techniques In The Context Of Android Malware Detection, Lwin Khin Shar, Nguyen Binh Duong Ta, David Lo
Empirical Evaluation Of Minority Oversampling Techniques In The Context Of Android Malware Detection, Lwin Khin Shar, Nguyen Binh Duong Ta, David Lo
Research Collection School Of Computing and Information Systems
In Android malware classification, the distribution of training data among classes is often imbalanced. This causes the learning algorithm to bias towards the dominant classes, resulting in mis-classification of minority classes. One effective way to improve the performance of classifiers is the synthetic generation of minority instances. One pioneer technique in this area is Synthetic Minority Oversampling Technique (SMOTE) and since its publication in 2002, several variants of SMOTE have been proposed and evaluated on various imbalanced datasets. However, these techniques have not been evaluated in the context of Android malware detection. Studies have shown that the performance of SMOTE …
Hrpdf: A Software-Based Heterogeneous Redundant Proactive Defense Framework For Programmable Logic Controller, Ke Liu, Jing-Yi Wang, Qiang Wei, Zhen-Yong Zhang, Jun Sun, Rong-Kuan Ma, Rui-Long Deng
Hrpdf: A Software-Based Heterogeneous Redundant Proactive Defense Framework For Programmable Logic Controller, Ke Liu, Jing-Yi Wang, Qiang Wei, Zhen-Yong Zhang, Jun Sun, Rong-Kuan Ma, Rui-Long Deng
Research Collection School Of Computing and Information Systems
Programmable logic controllers (PLCs) play a critical role in many industrial control systems, yet face increasingly serious cyber threats. In this paper, we propose a novel PLC-compatible software-based defense mechanism, called Heterogeneous Redundant Proactive Defense Framework (HRPDF). We propose a heterogeneous PLC architecture in HRPDF, including multiple heterogeneous, equivalent, and synchronous runtimes, which can thwart multiple types of attacks against PLC without the need of external devices. To ensure the availability of PLC, we also design an inter-process communication algorithm that minimizes the overhead of HRPDF. We implement a prototype system of HRPDF and test it in a real-world PLC …
The Development Of Qmms: A Case Study For Reliable Online Quiz Maker And Management System, Mohamed Abdelmoneim Elshafey Dr., Tarek Said Ghoniemy Dr.
The Development Of Qmms: A Case Study For Reliable Online Quiz Maker And Management System, Mohamed Abdelmoneim Elshafey Dr., Tarek Said Ghoniemy Dr.
Future Computing and Informatics Journal
The e-learning and assessment systems became a dominant technology nowadays and distribute across the globe. With severe consequences of COVID19-like crises, the key importance of such technology appeared in which courses, quizzes and questionnaires have to be conducted remotely. Moreover, the use of Learning Management Systems (LMSs), such as blackboard, eCollege, and Moodle, has been sanctioned in all respects of education. This paper presents an open-source interactive Quiz Maker and Management System (QMMS) that suits the research, education (under-grad, grad, or post-grad), and industrial organizations to perform distant quizzes, training and questionnaires with an integration facility with other LMS tools …
Comparing The Popularity Of Testing Careers Among Canadian, Indian, Chinese, And Malaysian Students, Luiz Fernando Capretz, Pradeep Waychal, Jingdong Jia, Shuib Basri
Comparing The Popularity Of Testing Careers Among Canadian, Indian, Chinese, And Malaysian Students, Luiz Fernando Capretz, Pradeep Waychal, Jingdong Jia, Shuib Basri
Electrical and Computer Engineering Publications
This study attempts to understand motivators and de-motivators that influence the decisions of software students to take up and sustain software testing careers across four different countries, Canada, India, China, and Malaysia. Towards that end, we have developed a cross-sectional, but simple, survey-based instrument. In this study we investigated how software engineering and computer science students perceive and value what they do and their environmental settings. This study found that very few students are keen to take up software testing careers - why is this happening with such an important task in the software life cycle? The common advantages of …
Can We Make It Better? Assessing And Improving Quality Of Github Repositories, Gede Artha Azriadi Prana
Can We Make It Better? Assessing And Improving Quality Of Github Repositories, Gede Artha Azriadi Prana
Dissertations and Theses Collection (Open Access)
The code hosting platform GitHub has gained immense popularity worldwide in recent years, with over 200 million repositories hosted as of June 2021. Due to its popularity, it has great potential to facilitate widespread improvements across many software projects. Naturally, GitHub has attracted much research attention, and the source code in the various repositories it hosts also provide opportunity to apply techniques and tools developed by software engineering researchers over the years. However, much of existing body of research applicable to GitHub focuses on code quality of the software projects and ways to improve them. Fewer work focus on potential …
Pruning Meta-Trained Networks For On-Device Adaptation, Dawei Gao, Xiaoxi He, Zimu Zhou, Yongxin Tong, Lothar Thiele
Pruning Meta-Trained Networks For On-Device Adaptation, Dawei Gao, Xiaoxi He, Zimu Zhou, Yongxin Tong, Lothar Thiele
Research Collection School Of Computing and Information Systems
Adapting neural networks to unseen tasks with few training samples on resource-constrained devices benefits various Internet-of-Things applications. Such neural networks should learn the new tasks in few shots and be compact in size. Meta-learning enables few-shot learning, yet the meta-trained networks can be overparameterised. However, naive combination of standard compression techniques like network pruning with meta-learning jeopardises the ability for fast adaptation. In this work, we propose adaptation-aware network pruning (ANP), a novel pruning scheme that works with existing meta-learning methods for a compact network capable of fast adaptation. ANP uses weight importance metric that is based on the sensitivity …
Probablistic Verification Of Neural Networks Against Group Fairness, Bing Sun, Jun Sun, Ting Dai, Lijun Zhang
Probablistic Verification Of Neural Networks Against Group Fairness, Bing Sun, Jun Sun, Ting Dai, Lijun Zhang
Research Collection School Of Computing and Information Systems
Fairness is crucial for neural networks which are used in applications with important societal implication. Recently, there have been multiple attempts on improving fairness of neural networks, with a focus on fairness testing (e.g., generating individual discriminatory instances) and fairness training (e.g., enhancing fairness through augmented training). In this work, we propose an approach to formally verify neural networks against fairness, with a focus on independence-based fairness such as group fairness. Our method is built upon an approach for learning Markov Chains from a user-provided neural network (i.e., a feed-forward neural network or a recurrent neural network) which is guaranteed …