Skip to main content

Showing 1–13 of 13 results for author: Johnston, A

  1. arXiv:2406.06512  [pdf, other

    cs.CV cs.AI

    Merlin: A Vision Language Foundation Model for 3D Computed Tomography

    Authors: Louis Blankemeier, Joseph Paul Cohen, Ashwin Kumar, Dave Van Veen, Syed Jamal Safdar Gardezi, Magdalini Paschali, Zhihong Chen, Jean-Benoit Delbrouck, Eduardo Reis, Cesar Truyts, Christian Bluethgen, Malte Engmann Kjeldskov Jensen, Sophie Ostmeier, Maya Varma, Jeya Maria Jose Valanarasu, Zhongnan Fang, Zepeng Huo, Zaid Nabulsi, Diego Ardila, Wei-Hung Weng, Edson Amaro Junior, Neera Ahuja, Jason Fries, Nigam H. Shah, Andrew Johnston , et al. (6 additional authors not shown)

    Abstract: Over 85 million computed tomography (CT) scans are performed annually in the US, of which approximately one quarter focus on the abdomen. Given the current radiologist shortage, there is a large impetus to use artificial intelligence to alleviate the burden of interpreting these complex imaging studies. Prior state-of-the-art approaches for automated medical image interpretation leverage vision la… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: 18 pages, 7 figures

  2. arXiv:2401.12208  [pdf, other

    cs.CV cs.CL

    CheXagent: Towards a Foundation Model for Chest X-Ray Interpretation

    Authors: Zhihong Chen, Maya Varma, Jean-Benoit Delbrouck, Magdalini Paschali, Louis Blankemeier, Dave Van Veen, Jeya Maria Jose Valanarasu, Alaa Youssef, Joseph Paul Cohen, Eduardo Pontes Reis, Emily B. Tsai, Andrew Johnston, Cameron Olsen, Tanishq Mathew Abraham, Sergios Gatidis, Akshay S. Chaudhari, Curtis Langlotz

    Abstract: Chest X-rays (CXRs) are the most frequently performed imaging test in clinical practice. Recent advances in the development of vision-language foundation models (FMs) give rise to the possibility of performing automated CXR interpretation, which can assist physicians with clinical decision-making and improve patient outcomes. However, developing FMs that can accurately interpret CXRs is challengin… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 24 pages, 8 figures

  3. arXiv:2308.08576  [pdf

    cs.HC cs.GR

    Artistic control over the glitch in AI-generated motion capture

    Authors: Jamal Knight, Andrew Johnston, Adam Berry

    Abstract: Artificial intelligence (AI) models are prevalent today and provide a valuable tool for artists. However, a lesser-known artifact that comes with AI models that is not always discussed is the glitch. Glitches occur for various reasons; sometimes, they are known, and sometimes they are a mystery. Artists who use AI models to generate art might not understand the reason for the glitch but often want… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  4. arXiv:2307.15273  [pdf, other

    cs.CV cs.LG eess.IV

    Recovering high-quality FODs from a reduced number of diffusion-weighted images using a model-driven deep learning architecture

    Authors: J Bartlett, C E Davey, L A Johnston, J Duan

    Abstract: Fibre orientation distribution (FOD) reconstruction using deep learning has the potential to produce accurate FODs from a reduced number of diffusion-weighted images (DWIs), decreasing total imaging time. Diffusion acquisition invariant representations of the DWI signals are typically used as input to these methods to ensure that they can be applied flexibly to data with different b-vectors and b-… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

    Comments: 10 pages, 7 figures, This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  5. A Boosting Approach to Constructing an Ensemble Stack

    Authors: Zhilei Zhou, Ziyu Qiu, Brad Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm Heywood

    Abstract: An approach to evolutionary ensemble learning for classification is proposed in which boosting is used to construct a stack of programs. Each application of boosting identifies a single champion and a residual dataset, i.e. the training records that thus far were not correctly classified. The next program is only trained against the residual, with the process iterating until some maximum ensemble… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: 16 pages, 3 figures, 6 tables

    Report number: 13986

    Journal ref: LNCS, 29 March 2023

  6. arXiv:2210.10391  [pdf

    cond-mat.mtrl-sci cs.LG

    Machine Learning for a Sustainable Energy Future

    Authors: Zhenpeng Yao, Yanwei Lum, Andrew Johnston, Luis Martin Mejia-Mendoza, Xin Zhou, Yonggang Wen, Alan Aspuru-Guzik, Edward H. Sargent, Zhi Wei Seh

    Abstract: Transitioning from fossil fuels to renewable energy sources is a critical global challenge; it demands advances at the levels of materials, devices, and systems for the efficient harvesting, storage, conversion, and management of renewable energy. Researchers globally have begun incorporating machine learning (ML) techniques with the aim of accelerating these advances. ML technologies leverage sta… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

  7. arXiv:2206.06217  [pdf, other

    cs.DC

    Towards an Approximation-Aware Computational Workflow Framework for Accelerating Large-Scale Discovery Tasks

    Authors: Michael A. Johnston, Vassilis Vassiliadis

    Abstract: The use of approximation is fundamental in computational science. Almost all computational methods adopt approximations in some form in order to obtain a favourable cost/accuracy trade-off and there are usually many approximations that could be used. As a result, when a researcher wishes to measure a property of a system with a computational technique, they are faced with an array of options. Curr… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

    Comments: Pre-print of paper in ApPLIED 2022 (part of PODC 2022)

  8. arXiv:2003.13951  [pdf, other

    cs.CV cs.LG

    Self-supervised Monocular Trained Depth Estimation using Self-attention and Discrete Disparity Volume

    Authors: Adrian Johnston, Gustavo Carneiro

    Abstract: Monocular depth estimation has become one of the most studied applications in computer vision, where the most accurate approaches are based on fully supervised learning models. However, the acquisition of accurate and large ground truth data sets to model these fully supervised methods is a major challenge for the further development of the area. Self-supervised methods trained with monocular vide… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  9. arXiv:1904.02382  [pdf, other

    cs.CV

    Inferring Dynamic Representations of Facial Actions from a Still Image

    Authors: Siyang Song, Enrique Sánchez-Lozano, Linlin Shen, Alan Johnston, Michel Valstar

    Abstract: Facial actions are spatio-temporal signals by nature, and therefore their modeling is crucially dependent on the availability of temporal information. In this paper, we focus on inferring such temporal dynamics of facial actions when no explicit temporal information is available, i.e. from still images. We present a novel approach to capture multiple scales of such temporal dynamics, with an appli… ▽ More

    Submitted 4 April, 2019; originally announced April 2019.

    Comments: 10 pages, 5 figures

    MSC Class: 65D19

  10. arXiv:1901.02399  [pdf, ps, other

    cs.IT

    Service Rate Region of Content Access from Erasure Coded Storage

    Authors: Sarah Anderson, Ann Johnston, Gauri Joshi, Gretchen Matthews, Carolyn Mayer, Emina Soljanin

    Abstract: We consider storage systems in which $K$ files are stored over $N$ nodes. A node may be systematic for a particular file in the sense that access to it gives access to the file. Alternatively, a node may be coded, meaning that it gives access to a particular file only when combined with other nodes (which may be coded or systematic). Requests for file $f_k$ arrive at rate $λ_k$, and we are interes… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

    Comments: To be published in the Proceedings of the 2018 Information Theory Workshop

  11. arXiv:1710.03376  [pdf, other

    cs.IT

    On the Service Capacity Region of Accessing Erasure Coded Content

    Authors: Mehmet Aktas, Sarah E. Anderson, Ann Johnston, Gauri Joshi, Swanand Kadhe, Gretchen L. Matthews, Carolyn Mayer, Emina Soljanin

    Abstract: Cloud storage systems generally add redundancy in storing content files such that $K$ files are replicated or erasure coded and stored on $N > K$ nodes. In addition to providing reliability against failures, the redundant copies can be used to serve a larger volume of content access requests. A request for one of the files can be either be sent to a systematic node, or one of the repair groups. In… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: To be published in 2017 55th Annual Allerton Conference on Communication, Control, and Computing

  12. arXiv:1209.4365  [pdf, other

    math.OC cs.IT

    Stochastic Stabilization of Partially Observed and Multi-Sensor Systems Driven by Gaussian Noise under Fixed-Rate Information Constraints

    Authors: Andrew P. Johnston, Serdar Yüksel

    Abstract: We investigate the stabilization of unstable multidimensional partially observed single-sensor and multi-sensor linear systems driven by unbounded noise and controlled over discrete noiseless channels under fixed-rate information constraints. Stability is achieved under fixed-rate communication requirements that are asymptotically tight in the limit of large sampling periods. Through the use of si… ▽ More

    Submitted 19 September, 2012; originally announced September 2012.

    Comments: 31 pages, 2 figures. This paper is to appear in part at the IEEE Conference on Decision and Control, Hawaii, 2012

  13. arXiv:1106.6333  [pdf

    cs.NI cs.MM

    SIP APIs for Voice and Video Communications on the Web

    Authors: Carol Davids, Alan Johnston, Kundan Singh, Henry Sinnreich, Wilhelm Wimmreuter

    Abstract: Existing standard protocols for the web and Internet telephony fail to deliver real-time interactive communication from within a web browser. In particular, the client-server web protocol over reliable TCP is not always suitable for end-to-end low latency media path needed for interactive voice and video communication. To solve this, we compare the available platform options using the existing tec… ▽ More

    Submitted 30 June, 2011; originally announced June 2011.

    Comments: Accepted at IPTcomm 2011, 7 pages, 4 figures