Skip to main content

Showing 1–24 of 24 results for author: Hanna, A

  1. arXiv:2312.14259  [pdf, other

    cs.LG cs.DC cs.MA

    Multi-Agent Bandit Learning through Heterogeneous Action Erasure Channels

    Authors: Osama A. Hanna, Merve Karakas, Lin F. Yang, Christina Fragouli

    Abstract: Multi-Armed Bandit (MAB) systems are witnessing an upswing in applications within multi-agent distributed environments, leading to the advancement of collaborative MAB algorithms. In such settings, communication between agents executing actions and the primary learner making decisions can hinder the learning process. A prevalent challenge in distributed learning is action erasure, often induced by… ▽ More

    Submitted 29 April, 2024; v1 submitted 21 December, 2023; originally announced December 2023.

  2. Much Ado About Gender: Current Practices and Future Recommendations for Appropriate Gender-Aware Information Access

    Authors: Christine Pinney, Amifa Raj, Alex Hanna, Michael D. Ekstrand

    Abstract: Information access research (and development) sometimes makes use of gender, whether to report on the demographics of participants in a user study, as inputs to personalized results or recommendations, or to make systems gender-fair, amongst other purposes. This work makes a variety of assumptions about gender, however, that are not necessarily aligned with current understandings of what gender is… ▽ More

    Submitted 13 January, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

    Comments: Published in CHIIR 2023

  3. arXiv:2211.05632  [pdf, ps, other

    stat.ML cs.LG

    Contexts can be Cheap: Solving Stochastic Contextual Bandits with Linear Bandit Algorithms

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: In this paper, we address the stochastic contextual linear bandit problem, where a decision maker is provided a context (a random set of actions drawn from a distribution). The expected reward of each action is specified by the inner product of the action and an unknown parameter. The goal is to design an algorithm that learns to play as close as possible to the unknown optimal policy after a numb… ▽ More

    Submitted 26 May, 2023; v1 submitted 8 November, 2022; originally announced November 2022.

  4. arXiv:2207.04958  [pdf, other

    cs.HC cs.CY

    Documenting Data Production Processes: A Participatory Approach for Data Work

    Authors: Milagros Miceli, Tianling Yang, Adriana Alvarado Garcia, Julian Posada, Sonja Mei Wang, Marc Pohl, Alex Hanna

    Abstract: The opacity of machine learning data is a significant threat to ethical data work and intelligible systems. Previous research has addressed this issue by proposing standardized checklists to document datasets. This paper expands that field of inquiry by proposing a shift of perspective: from documenting datasets toward documenting data production. We draw on participatory design and collaborate wi… ▽ More

    Submitted 9 August, 2022; v1 submitted 11 July, 2022; originally announced July 2022.

    Journal ref: Proceedings of the ACM on Human-Computer Interaction, 6(CSCW2), 2022

  5. arXiv:2207.03445  [pdf, other

    cs.LG cs.CR

    Differentially Private Stochastic Linear Bandits: (Almost) for Free

    Authors: Osama A. Hanna, Antonious M. Girgis, Christina Fragouli, Suhas Diggavi

    Abstract: In this paper, we propose differentially private algorithms for the problem of stochastic linear bandits in the central, local and shuffled models. In the central model, we achieve almost the same regret as the optimal non-private algorithms, which means we get privacy for free. In particular, we achieve a regret of $\tilde{O}(\sqrt{T}+\frac{1}ε)$ matching the known lower bound for private linear… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

  6. arXiv:2206.04180  [pdf, ps, other

    cs.LG

    Learning in Distributed Contextual Linear Bandits Without Sharing the Context

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: Contextual linear bandits is a rich and theoretically important model that has many practical applications. Recently, this setup gained a lot of interest in applications over wireless where communication constraints can be a performance bottleneck, especially when the contexts come from a large $d$-dimensional space. In this paper, we consider a distributed memoryless contextual linear bandit lear… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

  7. arXiv:2112.01716  [pdf, other

    cs.LG cs.CL cs.CV cs.CY stat.ML

    Reduced, Reused and Recycled: The Life of a Dataset in Machine Learning Research

    Authors: Bernard Koch, Emily Denton, Alex Hanna, Jacob G. Foster

    Abstract: Benchmark datasets play a central role in the organization of machine learning research. They coordinate researchers around shared research problems and serve as a measure of progress towards shared goals. Despite the foundational role of benchmarking practices in this field, relatively little attention has been paid to the dynamics of benchmark dataset use and reuse, within or across machine lear… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: 35th Conference on Neural Information Processing Systems (NeurIPS 2021), Sydney, Australia

  8. arXiv:2111.15366  [pdf, other

    cs.LG cs.AI cs.PF

    AI and the Everything in the Whole Wide World Benchmark

    Authors: Inioluwa Deborah Raji, Emily M. Bender, Amandalynne Paullada, Emily Denton, Alex Hanna

    Abstract: There is a tendency across different subfields in AI to valorize a small collection of influential benchmarks. These benchmarks operate as stand-ins for a range of anointed common problems that are frequently framed as foundational milestones on the path towards flexible and generalizable AI systems. State-of-the-art performance on these benchmarks is widely understood as indicative of progress to… ▽ More

    Submitted 26 November, 2021; originally announced November 2021.

    Comments: Accepted in NeurIPS 2021 Benchmarks and Datasets track

  9. arXiv:2111.06067  [pdf, other

    cs.LG

    Solving Multi-Arm Bandit Using a Few Bits of Communication

    Authors: Osama A. Hanna, Lin F. Yang, Christina Fragouli

    Abstract: The multi-armed bandit (MAB) problem is an active learning framework that aims to select the best among a set of actions by sequentially observing rewards. Recently, it has become popular for a number of applications over wireless networks, where communication constraints can form a bottleneck. Existing works usually fail to address this issue and can become infeasible in certain applications. In… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

  10. arXiv:2108.04308  [pdf, other

    cs.CV cs.HC

    Do Datasets Have Politics? Disciplinary Values in Computer Vision Dataset Development

    Authors: Morgan Klaus Scheuerman, Emily Denton, Alex Hanna

    Abstract: Data is a crucial component of machine learning. The field is reliant on data to train, validate, and test models. With increased technical capabilities, machine learning research has boomed in both academic and industry settings, and one major focus has been on computer vision. Computer vision is a popular domain of machine learning increasingly pertinent to real-world applications, from facial r… ▽ More

    Submitted 16 September, 2021; v1 submitted 9 August, 2021; originally announced August 2021.

    Comments: CSCW 2021; 37 pages

    Journal ref: Proc. ACM Hum.-Comput. Interact.5, CSCW2, Article 317(October 2021), 37 pages

  11. arXiv:2104.04546  [pdf, other

    eess.SP cs.LG stat.AP

    One-class Autoencoder Approach for Optimal Electrode Set-up Identification in Wearable EEG Event Monitoring

    Authors: Laura M. Ferrari, Guy Abi Hanna, Paolo Volpe, Esma Ismailova, François Bremond, Maria A. Zuluaga

    Abstract: A limiting factor towards the wide routine use of wearables devices for continuous healthcare monitoring is their cumbersome and obtrusive nature. This is particularly true for electroencephalography (EEG) recordings, which require the placement of multiple electrodes in contact with the scalp. In this work, we propose to identify the optimal wearable EEG electrode set-up, in terms of minimal numb… ▽ More

    Submitted 19 May, 2021; v1 submitted 9 April, 2021; originally announced April 2021.

  12. arXiv:2012.07913  [pdf, other

    cs.LG

    Quantizing data for distributed learning

    Authors: Osama A. Hanna, Yahya H. Ezzeldin, Christina Fragouli, Suhas Diggavi

    Abstract: We consider machine learning applications that train a model by leveraging data distributed over a trusted network, where communication constraints can create a performance bottleneck. A number of recent approaches propose to overcome this bottleneck through compression of gradient updates. However, as models become larger, so does the size of the gradient updates. In this paper, we propose an alt… ▽ More

    Submitted 8 September, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  13. Data and its (dis)contents: A survey of dataset development and use in machine learning research

    Authors: Amandalynne Paullada, Inioluwa Deborah Raji, Emily M. Bender, Emily Denton, Alex Hanna

    Abstract: Datasets have played a foundational role in the advancement of machine learning research. They form the basis for the models we design and deploy, as well as our primary medium for benchmarking and evaluation. Furthermore, the ways in which we collect, construct and share these datasets inform the kinds of problems the field pursues and the methods explored in algorithm development. However, recen… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Journal ref: Patterns, Volume 2, Issue 11, 100336. 2021

  14. arXiv:2010.13970  [pdf, other

    cs.CR

    An Analysis of Security Vulnerabilities in Container Images for Scientific Data Analysis

    Authors: Bhupinder Kaur, Mathieu Dugré, Aiman Hanna, Tristan Glatard

    Abstract: Software containers greatly facilitate the deployment and reproducibility of scientific data analyses in various platforms. However, container images often contain outdated or unnecessary software packages, which increases the number of security vulnerabilities in the images, widens the attack surface in the container host, and creates substantial security risks for computing infrastructures at la… ▽ More

    Submitted 17 March, 2021; v1 submitted 26 October, 2020; originally announced October 2020.

  15. arXiv:2010.13561  [pdf, other

    cs.LG cs.CY cs.DB cs.SE

    Towards Accountability for Machine Learning Datasets: Practices from Software Engineering and Infrastructure

    Authors: Ben Hutchinson, Andrew Smart, Alex Hanna, Emily Denton, Christina Greer, Oddur Kjartansson, Parker Barnes, Margaret Mitchell

    Abstract: Rising concern for the societal implications of artificial intelligence systems has inspired demands for greater transparency and accountability. However the datasets which empower machine learning are often used, shared and re-used with little visibility into the processes of deliberation which led to their creation. Which stakeholder groups had their perspectives included when the dataset was co… ▽ More

    Submitted 29 January, 2021; v1 submitted 22 October, 2020; originally announced October 2020.

  16. arXiv:2010.08850  [pdf, other

    cs.CY

    Against Scale: Provocations and Resistances to Scale Thinking

    Authors: Alex Hanna, Tina M. Park

    Abstract: At the heart of what drives the bulk of innovation and activity in Silicon Valley and elsewhere is scalability. This unwavering commitment to scalability -- to identify strategies for efficient growth -- is at the heart of what we refer to as "scale thinking." Whether people are aware of it or not, scale thinking is all-encompassing. It is not just an attribute of one's product, service, or compan… ▽ More

    Submitted 20 November, 2020; v1 submitted 17 October, 2020; originally announced October 2020.

  17. arXiv:2007.07399  [pdf, ps, other

    cs.CY

    Bringing the People Back In: Contesting Benchmark Machine Learning Datasets

    Authors: Remi Denton, Alex Hanna, Razvan Amironesei, Andrew Smart, Hilary Nicole, Morgan Klaus Scheuerman

    Abstract: In response to algorithmic unfairness embedded in sociotechnical systems, significant attention has been focused on the contents of machine learning datasets which have revealed biases towards white, cisgender, male, and Western data subjects. In contrast, comparatively less attention has been paid to the histories, values, and norms embedded in such datasets. In this work, we outline a research… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

  18. Diversity and Inclusion Metrics in Subset Selection

    Authors: Margaret Mitchell, Dylan Baker, Nyalleng Moorosi, Emily Denton, Ben Hutchinson, Alex Hanna, Timnit Gebru, Jamie Morgenstern

    Abstract: The ethical concept of fairness has recently been applied in machine learning (ML) settings to describe a wide range of constraints and objectives. When considering the relevance of ethical concepts to subset selection problems, the concepts of diversity and inclusion are additionally applicable in order to create outputs that account for social power and access differentials. We introduce metrics… ▽ More

    Submitted 8 February, 2020; originally announced February 2020.

    Journal ref: AIES 2020: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society

  19. Towards a Critical Race Methodology in Algorithmic Fairness

    Authors: Alex Hanna, Emily Denton, Andrew Smart, Jamila Smith-Loud

    Abstract: We examine the way race and racial categories are adopted in algorithmic fairness frameworks. Current methodologies fail to adequately account for the socially constructed nature of race, instead adopting a conceptualization of race as a fixed attribute. Treating race as an attribute, rather than a structural, institutional, and relational phenomenon, can serve to minimize the structural aspects o… ▽ More

    Submitted 7 December, 2019; originally announced December 2019.

    Comments: Conference on Fairness, Accountability, and Transparency (FAT* '20), January 27-30, 2020, Barcelona, Spain

  20. arXiv:1911.00216  [pdf, other

    cs.LG cs.IT stat.ML

    On Distributed Quantization for Classification

    Authors: Osama A. Hanna, Yahya H. Ezzeldin, Tara Sadjadpour, Christina Fragouli, Suhas Diggavi

    Abstract: We consider the problem of distributed feature quantization, where the goal is to enable a pretrained classifier at a central node to carry out its classification on features that are gathered from distributed nodes through communication constrained channels. We propose the design of distributed quantization schemes specifically tailored to the classification task: unlike quantization schemes that… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  21. arXiv:1905.09654  [pdf

    cs.RO

    A ROS2 based communication architecture for control in collaborative and intelligent automation systems

    Authors: Endre Erős, Martin Dahl, Kristofer Bengtsson, Atieh Hanna, Petter Falkman

    Abstract: Collaborative robots are becoming part of intelligent automation systems in modern industry. Development and control of such systems differs from traditional automation methods and consequently leads to new challenges. Thankfully, Robot Operating System (ROS) provides a communication platform and a vast variety of tools and utilities that can aid that development. However, it is hard to use ROS in… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

    Comments: 9 pages, 4 figures, 3 tables, to be published in the proceedings of 29th International Conference on Flexible Automation and Intelligent Manufacturing (FAIM2019), June 2019

  22. arXiv:1903.05850  [pdf, other

    cs.RO

    Sequence Planner - Automated Planning and Control for ROS2-based Collaborative and Intelligent Automation Systems

    Authors: Martin Dahl, Endre Erös, Atieh Hanna, Kristofer Bengtsson, Petter Falkman

    Abstract: Systems based on the Robot Operating System (ROS) are easy to extend with new on-line algorithms and devices. However, there is relatively little support for coordinating a large number of heterogeneous sub-systems. In this paper we propose an architecture to model and control collaborative and intelligent automation systems in a hierarchical fashion.

    Submitted 14 March, 2019; originally announced March 2019.

    Comments: Submitted to IROS 2019. \c{opyright} 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses

  23. arXiv:1803.03610  [pdf, other

    cs.IT

    Random Access Schemes in Wireless Systems With Correlated User Activity

    Authors: Anders Ellersgaard Kalør, Osama A. Hanna, Petar Popovski

    Abstract: Traditional random access schemes are designed based on the aggregate process of user activation, which is created on the basis of independent activations of the users. However, in Machine-Type Communications (MTC), some users are likely to exhibit a high degree of correlation, e.g. because they observe the same physical phenomenon. This paves the way to devise access schemes that combine scheduli… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

    Comments: Submitted to SPAWC 2018

  24. arXiv:1702.05528  [pdf, other

    cs.IT

    Degrees of Freedom in Cached MIMO Relay Networks With Multiple Base Stations

    Authors: Osama A. Hanna, Amr El-Keyi, Mohammed Nafie

    Abstract: The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that… ▽ More

    Submitted 17 February, 2017; originally announced February 2017.