Skip to main content

Showing 1–34 of 34 results for author: Hall, J

  1. arXiv:2405.10254  [pdf, other

    eess.IV cs.CV cs.LG

    PRISM: A Multi-Modal Generative Foundation Model for Slide-Level Histopathology

    Authors: George Shaikovski, Adam Casson, Kristen Severson, Eric Zimmermann, Yi Kan Wang, Jeremy D. Kunz, Juan A. Retamero, Gerard Oakley, David Klimstra, Christopher Kanan, Matthew Hanna, Michal Zelechowski, Julian Viret, Neil Tenenholtz, James Hall, Nicolo Fusi, Razik Yousfi, Peter Hamilton, William A. Moye, Eugene Vorontsov, Siqi Liu, Thomas J. Fuchs

    Abstract: Foundation models in computational pathology promise to unlock the development of new clinical decision support systems and models for precision medicine. However, there is a mismatch between most clinical analysis, which is defined at the level of one or more whole slide images, and foundation models to date, which process the thousands of image tiles contained in a whole slide image separately.… ▽ More

    Submitted 22 May, 2024; v1 submitted 16 May, 2024; originally announced May 2024.

  2. arXiv:2405.01688  [pdf, other

    cs.CV

    Adapting Self-Supervised Learning for Computational Pathology

    Authors: Eric Zimmermann, Neil Tenenholtz, James Hall, George Shaikovski, Michal Zelechowski, Adam Casson, Fausto Milletari, Julian Viret, Eugene Vorontsov, Siqi Liu, Kristen Severson

    Abstract: Self-supervised learning (SSL) has emerged as a key technique for training networks that can generalize well to diverse tasks without task-specific supervision. This property makes SSL desirable for computational pathology, the study of digitized images of tissues, as there are many target applications and often limited labeled training samples. However, SSL algorithms and models have been primari… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: Presented at DCA in MI Workshop, CVPR 2024

  3. arXiv:2403.14872  [pdf, other

    cs.CR

    Structuring the Chaos: Enabling Small Business Cyber-Security Risks & Assets Modelling with a UML Class Model

    Authors: Tracy Tam, Asha Rao, Joanne Hall

    Abstract: Small businesses are increasingly adopting IT, and consequently becoming more vulnerable to cyber-incidents. Whilst small businesses are aware of the cyber-security risks, many struggle with implementing mitigations. Some of these can be traced to fundamental differences in the characteristics of small business versus large enterprises where modern cyber-security solutions are widely deployed. S… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

  4. arXiv:2402.05140  [pdf, other

    cs.LG cs.AI cs.CL

    Tag-LLM: Repurposing General-Purpose LLMs for Specialized Domains

    Authors: Junhong Shen, Neil Tenenholtz, James Brian Hall, David Alvarez-Melis, Nicolo Fusi

    Abstract: Large Language Models (LLMs) have demonstrated remarkable proficiency in understanding and generating natural language. However, their capabilities wane in highly specialized domains underrepresented in the pretraining corpus, such as physical and biomedical sciences. This work explores how to repurpose general LLMs into effective task solvers for specialized domains. We introduce a novel, model-a… ▽ More

    Submitted 30 May, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

  5. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  6. arXiv:2311.18521  [pdf, other

    cs.LG

    Combining deep generative models with extreme value theory for synthetic hazard simulation: a multivariate and spatially coherent approach

    Authors: Alison Peard, Jim Hall

    Abstract: Climate hazards can cause major disasters when they occur simultaneously as compound hazards. To understand the distribution of climate risk and inform adaptation policies, scientists need to simulate a large number of physically realistic and spatially coherent events. Current methods are limited by computational constraints and the probabilistic spatial distribution of compound events is not giv… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: Accepted at NeurIPS 2023 Workshop: Tackling Climate Change with Machine Learning (CCAI)

  7. arXiv:2310.07176  [pdf, other

    cs.CV

    Improving mitosis detection on histopathology images using large vision-language models

    Authors: Ruiwen Ding, James Hall, Neil Tenenholtz, Kristen Severson

    Abstract: In certain types of cancerous tissue, mitotic count has been shown to be associated with tumor proliferation, poor prognosis, and therapeutic resistance. Due to the high inter-rater variability of mitotic counting by pathologists, convolutional neural networks (CNNs) have been employed to reduce the subjectivity of mitosis detection in hematoxylin and eosin (H&E)-stained whole slide images. Howeve… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: Submitted to IEEE ISBI 2024. Under review

  8. arXiv:2309.07778  [pdf, other

    eess.IV cs.CV cs.LG q-bio.TO

    Virchow: A Million-Slide Digital Pathology Foundation Model

    Authors: Eugene Vorontsov, Alican Bozkurt, Adam Casson, George Shaikovski, Michal Zelechowski, Siqi Liu, Kristen Severson, Eric Zimmermann, James Hall, Neil Tenenholtz, Nicolo Fusi, Philippe Mathieu, Alexander van Eck, Donghun Lee, Julian Viret, Eric Robert, Yi Kan Wang, Jeremy D. Kunz, Matthew C. H. Lee, Jan Bernhard, Ran A. Godrich, Gerard Oakley, Ewan Millar, Matthew Hanna, Juan Retamero , et al. (6 additional authors not shown)

    Abstract: The use of artificial intelligence to enable precision medicine and decision support systems through the analysis of pathology images has the potential to revolutionize the diagnosis and treatment of cancer. Such applications will depend on models' abilities to capture the diverse patterns observed in pathology images. To address this challenge, we present Virchow, a foundation model for computati… ▽ More

    Submitted 17 January, 2024; v1 submitted 14 September, 2023; originally announced September 2023.

  9. arXiv:2309.00915  [pdf, ps, other

    cs.CR

    Manifesting Unobtainable Secrets: Threshold Elliptic Curve Key Generation using Nested Shamir Secret Sharing

    Authors: J. L. Hall, Y. Hertzog, M. Loewy, M. P. Skerritt, D. Valladolid, G. Verma

    Abstract: We present a mechanism to manifest unobtainable secrets using a nested Shamir secret sharing scheme to create public/private key pairs for elliptic curves. A threshold secret sharing scheme can be used as a decentralised trust mechanism with applications in identity validation, message decryption, and agreement empowerment. Decentralising trust means that there is no single point vulnerability whi… ▽ More

    Submitted 2 September, 2023; originally announced September 2023.

  10. arXiv:2208.13690  [pdf, other

    eess.SP cs.IT cs.NI

    Terahertz Communications Can Work in Rain and Snow: Impact of Adverse Weather Conditions on Channels at 140 GHz

    Authors: Priyangshu Sen, Jacob Hall, Michele Polese, Vitaly Petrov, Duschia Bodet, Francesco Restuccia, Tommaso Melodia, Josep M. Jornet

    Abstract: Next-generation wireless networks will leverage the spectrum above 100 GHz to enable ultra-high data rate communications over multi-GHz-wide bandwidths. The propagation environment at such high frequencies, however, introduces challenges throughout the whole protocol stack design, from physical layer signal processing to application design. Therefore, it is fundamental to develop a holistic unders… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

    Comments: P. Sen, J. Hall, M. Polese, V. Petrov, D. Bodet, F. Restuccia, T. Melodia, J. M. Jornet. 2022. Terahertz Communications Can Work in Rain and Snow: Impact of Adverse Weather Conditions on Channels at 140 GHz. In 6th ACM Workshop on Millimeter-Wave and Terahertz Networks and Sensing Systems (mmNets'22), October 17, 2022, Sydney, NSW, Australia. ACM, New York, NY, USA, 6 pages

  11. arXiv:2206.03585  [pdf, other

    cs.CR cs.AI

    XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions

    Authors: Gautam Srivastava, Rutvij H Jhaveri, Sweta Bhattacharya, Sharnil Pandya, Rajeswari, Praveen Kumar Reddy Maddikunta, Gokul Yenduri, Jon G. Hall, Mamoun Alazab, Thippa Reddy Gadekallu

    Abstract: In the past few years, artificial intelligence (AI) techniques have been implemented in almost all verticals of human life. However, the results generated from the AI models often lag explainability. AI models often appear as a blackbox wherein developers are unable to explain or trace back the reasoning behind a specific decision. Explainable AI (XAI) is a rapid growing field of research which he… ▽ More

    Submitted 2 June, 2022; originally announced June 2022.

    Comments: Submitted to peer review

  12. arXiv:2204.06348  [pdf, other

    q-bio.BM cs.LG q-bio.QM

    Meaningful machine learning models and machine-learned pharmacophores from fragment screening campaigns

    Authors: Carl Poelking, Gianni Chessari, Christopher W. Murray, Richard J. Hall, Lucy Colwell, Marcel Verdonk

    Abstract: Machine learning (ML) is widely used in drug discovery to train models that predict protein-ligand binding. These models are of great value to medicinal chemists, in particular if they provide case-specific insight into the physical interactions that drive the binding process. In this study we derive ML models from over 50 fragment-screening campaigns to introduce two important elements that we be… ▽ More

    Submitted 25 March, 2022; originally announced April 2022.

  13. arXiv:2201.08239  [pdf, other

    cs.CL cs.AI

    LaMDA: Language Models for Dialog Applications

    Authors: Romal Thoppilan, Daniel De Freitas, Jamie Hall, Noam Shazeer, Apoorv Kulshreshtha, Heng-Tze Cheng, Alicia Jin, Taylor Bos, Leslie Baker, Yu Du, YaGuang Li, Hongrae Lee, Huaixiu Steven Zheng, Amin Ghafouri, Marcelo Menegali, Yanping Huang, Maxim Krikun, Dmitry Lepikhin, James Qin, Dehao Chen, Yuanzhong Xu, Zhifeng Chen, Adam Roberts, Maarten Bosma, Vincent Zhao , et al. (35 additional authors not shown)

    Abstract: We present LaMDA: Language Models for Dialog Applications. LaMDA is a family of Transformer-based neural language models specialized for dialog, which have up to 137B parameters and are pre-trained on 1.56T words of public dialog data and web text. While model scaling alone can improve quality, it shows less improvements on safety and factual grounding. We demonstrate that fine-tuning with annotat… ▽ More

    Submitted 10 February, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

  14. arXiv:2111.09472  [pdf, other

    quant-ph cs.CC

    Exploring Airline Gate-Scheduling Optimization Using Quantum Computers

    Authors: Hamed Mohammadbagherpoor, Patrick Dreher, Mohannad Ibrahim, Young-Hyun Oh, James Hall, Richard E Stone, Mirela Stojkovic

    Abstract: This paper investigates the application of quantum computing technology to airline gate-scheduling quadratic assignment problems (QAP). We explore the quantum computing hardware architecture and software environment required for porting classical versions of these type of problems to quantum computers. We discuss the variational quantum eigensolver and the inclusion of space-efficient graph colori… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

  15. The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses

    Authors: Tracy Tam, Asha Rao, Joanne Hall

    Abstract: Small businesses (0-19 employees) are becoming attractive targets for cyber-criminals, but struggle to implement cyber-security measures that large businesses routinely deploy. There is an urgent need for effective and suitable cyber-security solutions for small businesses as they employ a significant proportion of the workforce. In this paper, we consider the small business cyber-security chall… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

    ACM Class: K.6.5; K.4

    Journal ref: Computer & Security 109 (2021) 102385

  16. arXiv:2108.03676  [pdf, other

    cs.CV

    AMDet: A Tool for Mitotic Cell Detection in Histopathology Slides

    Authors: Walt Williams, Jimmy Hall

    Abstract: Breast Cancer is the most prevalent cancer in the world. The World Health Organization reports that the disease still affects a significant portion of the developing world citing increased mortality rates in the majority of low to middle income countries. The most popular protocol pathologists use for diagnosing breast cancer is the Nottingham grading system which grades the proliferation of tumor… ▽ More

    Submitted 8 August, 2021; originally announced August 2021.

  17. arXiv:2107.10624  [pdf, other

    cs.CV cs.AI cs.LG

    LANA: Latency Aware Network Acceleration

    Authors: Pavlo Molchanov, Jimmy Hall, Hongxu Yin, Jan Kautz, Nicolo Fusi, Arash Vahdat

    Abstract: We introduce latency-aware network acceleration (LANA) - an approach that builds on neural architecture search techniques and teacher-student distillation to accelerate neural networks. LANA consists of two phases: in the first phase, it trains many alternative operations for every layer of the teacher network using layer-wise feature map distillation. In the second phase, it solves the combinator… ▽ More

    Submitted 18 November, 2021; v1 submitted 12 July, 2021; originally announced July 2021.

  18. arXiv:2104.12385  [pdf, other

    cs.LG cs.CR

    Syft 0.5: A Platform for Universally Deployable Structured Transparency

    Authors: Adam James Hall, Madhava Jay, Tudor Cebere, Bogdan Cebere, Koen Lennart van der Veen, George Muraru, Tongye Xu, Patrick Cason, William Abramson, Ayoub Benaissa, Chinmay Shah, Alan Aboudib, Théo Ryffel, Kritika Prakash, Tom Titcombe, Varun Kumar Khare, Maddie Shang, Ionesio Junior, Animesh Gupta, Jason Paumier, Nahua Kang, Vova Manannikov, Andrew Trask

    Abstract: We present Syft 0.5, a general-purpose framework that combines a core group of privacy-enhancing technologies that facilitate a universal set of structured transparency systems. This framework is demonstrated through the design and implementation of a novel privacy-preserving inference information flow where we pass homomorphically encrypted activation signals through a split neural network for in… ▽ More

    Submitted 27 April, 2021; v1 submitted 26 April, 2021; originally announced April 2021.

    Comments: ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021)

  19. arXiv:2104.05743  [pdf, other

    cs.LG cs.CR cs.DC

    Practical Defences Against Model Inversion Attacks for Split Neural Networks

    Authors: Tom Titcombe, Adam J. Hall, Pavlos Papadopoulos, Daniele Romanini

    Abstract: We describe a threat model under which a split network-based federated learning system is susceptible to a model inversion attack by a malicious computational server. We demonstrate that the attack can be successfully performed with limited knowledge of the data distribution by the attacker. We propose a simple additive noise method to defend against model inversion, finding that the method can si… ▽ More

    Submitted 21 April, 2021; v1 submitted 12 April, 2021; originally announced April 2021.

    Comments: ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021)

  20. arXiv:2104.00489  [pdf, other

    cs.LG cs.CR cs.DC

    PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN

    Authors: Daniele Romanini, Adam James Hall, Pavlos Papadopoulos, Tom Titcombe, Abbas Ismail, Tudor Cebere, Robert Sandmann, Robin Roehm, Michael A. Hoeh

    Abstract: We introduce PyVertical, a framework supporting vertical federated learning using split neural networks. The proposed framework allows a data scientist to train neural networks on data features vertically partitioned across multiple owners while keeping raw data on an owner's device. To link entities shared across different datasets' partitions, we use Private Set Intersection on IDs associated wi… ▽ More

    Submitted 14 April, 2021; v1 submitted 1 April, 2021; originally announced April 2021.

    Comments: ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021)

  21. arXiv:2103.15753  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Privacy and Trust Redefined in Federated Machine Learning

    Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan

    Abstract: A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited. Luckily, privacy-preserving technologies have been developed to overcome this hurdle by distributing the computation of the training and ensuring th… ▽ More

    Submitted 30 March, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: MDPI Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356; https://doi.org/10.3390/make3020017

    Journal ref: Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356

  22. arXiv:2101.07820  [pdf

    econ.GN cs.CY cs.NI

    Policy choices can help keep 4G and 5G universal broadband affordable

    Authors: Edward J Oughton, Niccolò Comini, Vivien Foster, Jim W Hall

    Abstract: The United Nations Broadband Commission has committed the international community to accelerate universal broadband. However, the cost of meeting this objective, and the feasibility of doing so on a commercially viable basis, are not well understood. Using scenario analysis, this paper compares the global cost-effectiveness of different infrastructure strategies for the developing world to achieve… ▽ More

    Submitted 19 February, 2021; v1 submitted 19 January, 2021; originally announced January 2021.

  23. arXiv:2012.02738  [pdf, other

    eess.IV cs.CV cs.LG

    Ultrasound Scatterer Density Classification Using Convolutional Neural Networks by Exploiting Patch Statistics

    Authors: Ali K. Z. Tehrani, Mina Amiri, Ivan M. Rosado-Mendez, Timothy J. Hall, Hassan Rivaz

    Abstract: Quantitative ultrasound (QUS) can reveal crucial information on tissue properties such as scatterer density. If the scatterer density per resolution cell is above or below 10, the tissue is considered as fully developed speckle (FDS) or low-density scatterers (LDS), respectively. Conventionally, the scatterer density has been classified using estimated statistical parameters of the amplitude of ba… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  24. arXiv:2012.00155  [pdf, other

    cs.IT eess.SY

    A Contemporary Survey on Free Space Optical Communication: Potential, Technical Challenges, Recent Advances and Research Direction

    Authors: Abu Jahid, Mohammed H. Alsharif, Trevor J. Hall

    Abstract: Optical wireless communication (OWC) covering an ultra-wide range of unlicensed spectrum has emerged as an extent efficient solution to mitigate conventional RF spectrum scarcity ranging from communication distances from nm to several kilometers. Free space optical (FSO) systems operating near IR (NIR) band in OWC links has received substantial attention for enormous data transmission between fixe… ▽ More

    Submitted 30 November, 2020; originally announced December 2020.

    Comments: 59 pages, 14 figures

  25. arXiv:2011.09350  [pdf, other

    cs.CR cs.LG

    Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning

    Authors: Nick Angelou, Ayoub Benaissa, Bogdan Cebere, William Clark, Adam James Hall, Michael A. Hoeh, Daniel Liu, Pavlos Papadopoulos, Robin Roehm, Robert Sandmann, Phillipp Schoppmann, Tom Titcombe

    Abstract: We present a multi-language, cross-platform, open-source library for asymmetric private set intersection (PSI) and PSI-Cardinality (PSI-C). Our protocol combines traditional DDH-based PSI and PSI-C protocols with compression based on Bloom filters that helps reduce communication in the asymmetric setting. Currently, our library supports C++, C, Go, WebAssembly, JavaScript, Python, and Rust, and ru… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: NeurIPS 2020 Workshop on Privacy Preserving Machine Learning (PPML 2020)

  26. arXiv:2009.04570  [pdf, other

    cs.LG math.NA stat.ML

    Mutual Information for Explainable Deep Learning of Multiscale Systems

    Authors: Søren Taverniers, Eric J. Hall, Markos A. Katsoulakis, Daniel M. Tartakovsky

    Abstract: Timely completion of design cycles for complex systems ranging from consumer electronics to hypersonic vehicles relies on rapid simulation-based prototyping. The latter typically involves high-dimensional spaces of possibly correlated control variables (CVs) and quantities of interest (QoIs) with non-Gaussian and possibly multimodal distributions. We develop a model-agnostic, moment-independent gl… ▽ More

    Submitted 19 May, 2021; v1 submitted 7 September, 2020; originally announced September 2020.

    Comments: 27 pages, 8 figures. Added additional examples

    MSC Class: 93B35 (Primary) 68T07; 62R07 (Secondary)

  27. arXiv:2006.02456  [pdf, other

    cs.CR cs.CY cs.DC cs.GT cs.LG

    A Distributed Trust Framework for Privacy-Preserving Machine Learning

    Authors: Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J Buchanan

    Abstract: When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluctant to relinquish control of private information to third parties. Privacy-preserving techniques distribute computation in order to ensure that data r… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

    Comments: To be published in the proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020

    Report number: TrustBus 2020, LNCS 12395, pp. 205--220, 2020 MSC Class: 68M25 ACM Class: C.2.0

    Journal ref: 17th International Conference TrustBus 2020

  28. arXiv:2001.09977  [pdf, other

    cs.CL cs.LG cs.NE stat.ML

    Towards a Human-like Open-Domain Chatbot

    Authors: Daniel Adiwardana, Minh-Thang Luong, David R. So, Jamie Hall, Noah Fiedel, Romal Thoppilan, Zi Yang, Apoorv Kulshreshtha, Gaurav Nemade, Yifeng Lu, Quoc V. Le

    Abstract: We present Meena, a multi-turn open-domain chatbot trained end-to-end on data mined and filtered from public domain social media conversations. This 2.6B parameter neural network is simply trained to minimize perplexity of the next token. We also propose a human evaluation metric called Sensibleness and Specificity Average (SSA), which captures key elements of a human-like multi-turn conversation.… ▽ More

    Submitted 27 February, 2020; v1 submitted 27 January, 2020; originally announced January 2020.

    Comments: 38 pages, 12 figures

  29. arXiv:1907.10272  [pdf, other

    cs.CR

    Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

    Authors: Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor

    Abstract: Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exists between the requirements of this community and the solutions that are currently available. This paper uses the CERT dataset r4.2 along with a series of machine learning classifiers to predict the occurrence of a particular… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Journal ref: 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018

  30. arXiv:1805.00787  [pdf, ps, other

    cs.MA cs.AI cs.GT cs.LG

    Cognition in Dynamical Systems, Second Edition

    Authors: Jack Hall

    Abstract: Cognition is the process of knowing. As carried out by a dynamical system, it is the process by which the system absorbs information into its state. A complex network of agents cognizes knowledge about its environment, internal dynamics and initial state by forming emergent, macro-level patterns. Such patterns require each agent to find its place while partially aware of the whole pattern. Such pa… ▽ More

    Submitted 12 July, 2022; v1 submitted 9 April, 2018; originally announced May 2018.

    Comments: 50 pages w/references. Base file is `cognition.tex`. All figures generated by TikZ. This is a revised version of my doctoral thesis, which was published under the name of John Wendell Hall since UT-Austin required my full name. All of this work is unpublished aside from the UT library, where the first edition is stored as my dissertation. Fixes an errata in Chapter 2

  31. arXiv:1705.05996  [pdf, other

    cs.IT

    A Survey on Trapping Sets and Stopping Sets

    Authors: Aiden Price, Joanne Hall

    Abstract: LDPC codes are used in many applications, however, their error correcting capabilities are limited by the presence of stopping sets and trapping sets. Trapping sets and stopping sets occur when specific low-wiehgt error patterns cause a decoder to fail. Trapping sets were first discovered with investigation of the error floor of the Margulis code. Possible solutions are constructions which avoid c… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

  32. arXiv:1407.3178  [pdf, ps, other

    cs.IT

    Modifications on Character Sequences and Construction of Large Even Length Binary Sequences

    Authors: Tingyao Xiong, Jonathan I. Hall

    Abstract: It has been noticed that all the known binary sequences having the asymptotic merit factor $\ge 6$ are the modifications to the real primitive characters. In this paper, we give a new modification of the character sequences at length $N=p_1p_2\dots p_r$, where $p_i$'s are distinct odd primes and $r$ is finite. Based on these new modifications, for $N=p_1p_2\dots p_r$ with $p_i$'s distinct odd prim… ▽ More

    Submitted 11 July, 2014; originally announced July 2014.

  33. arXiv:1206.0531  [pdf, ps, other

    math.CO cs.IT quant-ph

    Mutually unbiased bases as submodules and subspaces

    Authors: Joanne L. Hall, Jan Stovicek

    Abstract: Mutually unbiased bases (MUBs) have been used in several cryptographic and communications applications. There has been much speculation regarding connections between MUBs and finite geometries. Most of which has focused on a connection with projective and affine planes. We propose a connection with higher dimensional projective geometries and projective Hjelmslev geometries. We show that this prop… ▽ More

    Submitted 4 June, 2012; originally announced June 2012.

    Comments: 5 pages. Accepted to ISIT2012

    MSC Class: 81P45; 51C05

  34. arXiv:1205.3310  [pdf, ps, other

    math.CO cs.IT quant-ph

    Planar Difference Functions

    Authors: Joanne L. Hall, Asha Rao, Diane Donovan

    Abstract: In 1980 Alltop produced a family of cubic phase sequences that nearly meet the Welch bound for maximum non-peak correlation magnitude. This family of sequences were shown by Wooters and Fields to be useful for quantum state tomography. Alltop's construction used a function that is not planar, but whose difference function is planar. In this paper we show that Alltop type functions cannot exist in… ▽ More

    Submitted 30 July, 2012; v1 submitted 15 May, 2012; originally announced May 2012.

    Comments: Accepted to ISIT2012. v2 added a reference and adjusted margins