Skip to main content

Showing 1–10 of 10 results for author: Harrison, S

  1. arXiv:2305.14468  [pdf, other

    cs.CV cs.CL

    Run Like a Girl! Sports-Related Gender Bias in Language and Vision

    Authors: Sophia Harrison, Eleonora Gualdoni, Gemma Boleda

    Abstract: Gender bias in Language and Vision datasets and models has the potential to perpetuate harmful stereotypes and discrimination. We analyze gender bias in two Language and Vision datasets. Consistent with prior work, we find that both datasets underrepresent women, which promotes their invisibilization. Moreover, we hypothesize and find that a bias affects human naming choices for people playing spo… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  2. arXiv:2111.04204  [pdf, other

    cs.CV

    Natural Adversarial Objects

    Authors: Felix Lau, Nishant Subramani, Sasha Harrison, Aerin Kim, Elliot Branson, Rosanne Liu

    Abstract: Although state-of-the-art object detection methods have shown compelling performance, models often are not robust to adversarial attacks and out-of-distribution data. We introduce a new dataset, Natural Adversarial Objects (NAO), to evaluate the robustness of object detection models. NAO contains 7,934 images and 9,943 objects that are unmodified and representative of real-world scenarios, but cau… ▽ More

    Submitted 7 November, 2021; originally announced November 2021.

    Journal ref: Advances in Neural Information Processing Systems Data Centric AI workshop 2021

  3. arXiv:2108.00114  [pdf, ps, other

    cs.CV cs.AI

    On The State of Data In Computer Vision: Human Annotations Remain Indispensable for Developing Deep Learning Models

    Authors: Zeyad Emam, Andrew Kondrich, Sasha Harrison, Felix Lau, Yushi Wang, Aerin Kim, Elliot Branson

    Abstract: High-quality labeled datasets play a crucial role in fueling the development of machine learning (ML), and in particular the development of deep learning (DL). However, since the emergence of the ImageNet dataset and the AlexNet model in 2012, the size of new open-source labeled vision datasets has remained roughly constant. Consequently, only a minority of publications in the computer vision comm… ▽ More

    Submitted 30 July, 2021; originally announced August 2021.

  4. arXiv:2005.08669  [pdf

    cs.CY

    Translating the Concept of Goal Setting into Practice -- What 'Else' does it Require than a Goal Setting Tool?

    Authors: Gábor Kismihók, Catherine Zhao, Michaéla C. Schippers, Stefan T. Mol, Scott Harrison, Shady Shehata

    Abstract: This conceptual paper reviews the current status of goal setting in the area of technology enhanced learning and education. Besides a brief literature review, three current projects on goal setting are discussed. The paper shows that the main barriers for goal setting applications in education are not related to the technology, the available data or analytical methods, but rather the human factor.… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

    Comments: This paper has been accepted to be published in the proceedings of CSEDU 2020 by SciTePress

  5. Crafting, Communality, and Computing: Building on Existing Strengths To Support a Vulnerable Population

    Authors: Aakash Gautam, Deborah Tatar, Steve Harrison

    Abstract: In Nepal, sex-trafficking survivors and the organizations that support them have limited resources to assist the survivors in their on-going journey towards reintegration. We take an asset-based approach wherein we identify and build on the strengths possessed by such groups. In this work, we present reflections from introducing a voice-annotated web application to a group of survivors. The web ap… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: 14 pages, 1 figure. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI'20)

    ACM Class: K.4

  6. arXiv:1811.03541  [pdf, other

    cs.HC

    Towards Connecting Experiences during Collocated Events through Data Mining and Visualization

    Authors: Shuo Niu, D. Scott McCrickard, Steve Harrison

    Abstract: Themed collocated events, such as conferences, workshops, and seminars, invite people with related life experiences to connect with each other. In this era when people record lives through the Internet, individual experiences exist in different forms of digital contents. People share digital life records during collocated events, such as sharing blogs they wrote, Twitter posts they forwarded, and… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

  7. arXiv:1802.05534  [pdf, other

    cs.HC

    Opportunity in Conflict: Understanding Tension Among Key Groups on the Trail

    Authors: Lindah Kotut, Michael Horning, Steve Harrison, D. Scott McCrickard

    Abstract: This paper examines the question of who technology users on the trail are, what their technological uses and needs are, and what conflicts exist between different trail users regarding technology use and experience, toward understanding how experiences of trail users contribute to designers. We argue that exploring these tensions provide opportunities for design that can be used to both mitigate c… ▽ More

    Submitted 13 February, 2018; originally announced February 2018.

    Comments: Workshop Paper Submitted to CHI HCI Outdoors: Understanding Human-Computer Interaction in the Outdoors (2018)

    ACM Class: H.5.m

  8. A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development

    Authors: Steve Harrison, Antonis Tzounis, Leandros A. Maglaras, Francois Siewe, Richard Smith, Helge Janicke

    Abstract: This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been used for several years. We discuss the pros and cons of Waterfall before moving onto the Agile Scrum methodology. Agile has been adopted by the majority of Government digital departments including the G… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 19 pages, 4 figures, International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 2016

  9. arXiv:1209.3315  [pdf, ps, other

    cs.PF

    Storage Workload Modelling by Hidden Markov Models: Application to FLASH Memory

    Authors: P. G. Harrison, S. K. Harrison, N. M. Patel, S. Zertal

    Abstract: A workload analysis technique is presented that processes data from operation type traces and creates a Hidden Markov Model (HMM) to represent the workload that generated those traces. The HMM can be used to create representative traces for performance models, such as simulators, avoiding the need to repeatedly acquire suitable traces. It can also be used to estimate directly the transition probab… ▽ More

    Submitted 14 September, 2012; originally announced September 2012.

    Comments: 29 pages, 18 figures

    Journal ref: Performance Evaluation 69, 1 (2012), 17-40

  10. arXiv:cs/0612081  [pdf, ps, other

    cs.HC

    Personal Information Ecosystems and Implications for Design

    Authors: Manas Tungare, Pardha S. Pyla, Manuel Pérez-Quiñones, Steve Harrison

    Abstract: Today, people use multiple devices to fulfill their information needs. However, designers design each device individually, without accounting for the other devices that users may also use. In many cases, the applications on all these devices are designed to be functional replicates of each other. We argue that this results in an over-reliance on data synchronization across devices, version contr… ▽ More

    Submitted 18 December, 2006; originally announced December 2006.