Skip to main content

Showing 1–4 of 4 results for author: Thomson, R

  1. arXiv:2402.11712  [pdf, other

    cs.CL

    Modelling Political Coalition Negotiations Using LLM-based Agents

    Authors: Farhad Moghimifar, Yuan-Fang Li, Robert Thomson, Gholamreza Haffari

    Abstract: Coalition negotiations are a cornerstone of parliamentary democracies, characterised by complex interactions and strategic communications among political parties. Despite its significance, the modelling of these negotiations has remained unexplored with the domain of Natural Language Processing (NLP), mostly due to lack of proper data. In this paper, we introduce coalition negotiations as a novel… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

  2. arXiv:2303.14568  [pdf, ps, other

    stat.ML cs.AI cs.LG math.DG math.PR

    Measuring Classification Decision Certainty and Doubt

    Authors: Alexander M. Berenbeim, Iain J. Cruickshank, Susmit Jha, Robert H. Thomson, Nathaniel D. Bastian

    Abstract: Quantitative characterizations and estimations of uncertainty are of fundamental importance in optimization and decision-making processes. Herein, we propose intuitive scores, which we call certainty and doubt, that can be used in both a Bayesian and frequentist framework to assess and compare the quality and uncertainty of predictions in (multi-)classification decision machine learning problems.

    Submitted 27 March, 2023; v1 submitted 25 March, 2023; originally announced March 2023.

    Comments: 4 pages

  3. arXiv:1907.13060  [pdf, other

    astro-ph.IM cs.DB

    The demise of the filesystem and multi level service architecture

    Authors: William O'Mullane, Niall Gaffney, Frossie Economou, Arfon M. Smith, J. Ross Thomson, Tim Jenness

    Abstract: Many astronomy data centres still work on filesystems. Industry has moved on; current practice in computing infrastructure is to achieve Big Data scalability using object stores rather than POSIX file systems. This presents us with opportunities for portability and reuse of software underlying processing and archive systems but it also causes problems for legacy implementations in current data cen… ▽ More

    Submitted 31 July, 2019; v1 submitted 26 July, 2019; originally announced July 2019.

    Comments: Submitted as decadal APC paper 2019. arXiv admin note: text overlap with arXiv:1905.05116

  4. arXiv:1507.01930  [pdf, other

    cs.CR

    Malware Task Identification: A Data Driven Approach

    Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch

    Abstract: Identifying the tasks a given piece of malware was designed to perform (e.g. logging keystrokes, recording video, establishing remote access, etc.) is a difficult and time-consuming operation that is largely human-driven in practice. In this paper, we present an automated method to identify malware tasks. Using two different malware collections, we explore various circumstances for each - includin… ▽ More

    Submitted 7 July, 2015; originally announced July 2015.

    Comments: 8 pages full paper, accepted FOSINT-SI (2015)