Skip to main content

Showing 1–15 of 15 results for author: Wright, K

  1. arXiv:2407.04667  [pdf, other

    stat.ME cs.LG

    The diameter of a stochastic matrix: A new measure for sensitivity analysis in Bayesian networks

    Authors: Manuele Leonelli, Jim Q. Smith, Sophia K. Wright

    Abstract: Bayesian networks are one of the most widely used classes of probabilistic models for risk management and decision support because of their interpretability and flexibility in including heterogeneous pieces of information. In any applied modelling, it is critical to assess how robust the inferences on certain target variables are to changes in the model. In Bayesian networks, these analyses fall u… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  2. arXiv:2405.08337  [pdf

    cs.CV cs.AI

    Perivascular space Identification Nnunet for Generalised Usage (PINGU)

    Authors: Benjamin Sinclair, Lucy Vivash, Jasmine Moses, Miranda Lynch, William Pham, Karina Dorfman, Cassandra Marotta, Shaun Koh, Jacob Bunyamin, Ella Rowsthorn, Alex Jarema, Himashi Peiris, Zhaolin Chen, Sandy R Shultz, David K Wright, Dexiao Kong, Sharon L. Naismith, Terence J. OBrien, Meng Law

    Abstract: Perivascular spaces(PVSs) form a central component of the brainś waste clearance system, the glymphatic system. These structures are visible on MRI images, and their morphology is associated with aging and neurological disease. Manual quantification of PVS is time consuming and subjective. Numerous deep learning methods for PVS segmentation have been developed, however the majority have been devel… ▽ More

    Submitted 17 May, 2024; v1 submitted 14 May, 2024; originally announced May 2024.

  3. arXiv:2401.00610  [pdf, other

    cs.CY

    A High School Camp on Algorithms and Coding in Jamaica

    Authors: Daniel T. Fokum, Zaria Chen Shui, Kerene Wright, Orr Paradise, Gunjan Mansingh, Daniel Coore

    Abstract: This is a report on JamCoders, a four-week long computer-science camp for high school students in Jamaica. The camp teaches college-level coding and algorithms, and targets academically excellent students in grades 9--11 (ages 14--17). Qualitative assessment shows that the camp was, in general terms, a success. We reflect on the background and academic structure of the camp and share key takeaways… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

    Comments: To appear in Proceedings of the 55th ACM Technical Symposium on Computer Science Education (SIGCSE), 2024

    ACM Class: K.3.2

  4. arXiv:2312.09672  [pdf, other

    cs.HC cs.AI

    InstructPipe: Building Visual Programming Pipelines with Human Instructions

    Authors: Zhongyi Zhou, Jing Jin, Vrushank Phadnis, Xiuxiu Yuan, Jun Jiang, Xun Qian, Jingtao Zhou, Yiyi Huang, Zheng Xu, Yinda Zhang, Kristen Wright, Jason Mayes, Mark Sherwood, Johnny Lee, Alex Olwal, David Kim, Ram Iyengar, Na Li, Ruofei Du

    Abstract: Visual programming provides beginner-level programmers with a coding-free experience to build their customized pipelines. Existing systems require users to build a pipeline entirely from scratch, implying that novice users need to set up and link appropriate nodes all by themselves, starting from a blank workspace. We present InstructPipe, an AI assistant that enables users to start prototyping ma… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

  5. arXiv:2308.15265  [pdf, other

    cs.IR

    A Multi-Perspective Learning to Rank Approach to Support Children's Information Seeking in the Classroom

    Authors: Garrett Allen, Katherine Landau Wright, Jerry Alan Fails, Casey Kennington, Maria Soledad Pera

    Abstract: We introduce a novel re-ranking model that aims to augment the functionality of standard search engines to support classroom search activities for children (ages 6 to 11). This model extends the known listwise learning-to-rank framework by balancing risk and reward. Doing so enables the model to prioritize Web resources of high educational alignment, appropriateness, and adequate readability by an… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

    Comments: Extended version of the manuscript to appear in proceedings of the 22nd IEEE/WIC International Conference on Web Intelligence and Intelligent Agent Technology

  6. arXiv:2306.13680  [pdf

    cs.HC

    The Cydoc smart patient intake form accelerates medical note writing

    Authors: Angela Hemesath, Kenyon Wright, Matthew Michael Draelos, Rachel Lea Draelos

    Abstract: Purpose: This study evaluates the effect of Cydoc software tools on medical note time-to-completion and quality. Methods: Medical students were recruited by email to participate in a video encounter with a standardized patient for three scenarios: writing a note from scratch (control), writing a note with the Cydoc educational tool, and writing a note with the Cydoc intake form. Notes were subse… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  7. arXiv:2302.12043  [pdf, ps, other

    cs.CL

    Conversational Agents and Children: Let Children Learn

    Authors: Casey Kennington, Jerry Alan Fails, Katherine Landau Wright, Maria Soledad Pera

    Abstract: Using online information discovery as a case study, in this position paper we discuss the need to design, develop, and deploy (conversational) agents that can -- non-intrusively -- guide children in their quest for online resources rather than simply finding resources for them. We argue that agents should "let children learn" and should be built to take on a teacher-facilitator function, allowing… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Comments: 6 pages

  8. arXiv:2112.04114  [pdf, other

    cs.CR cs.NI

    ESAFE: Enterprise Security and Forensics at Scale

    Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Securing enterprise networks presents challenges in terms of both their size and distributed structure. Data required to detect and characterize malicious activities may be diffused and may be located across network and endpoint devices. Further, cyber-relevant data routinely exceeds total available storage, bandwidth, and analysis capability, often by several orders of magnitude. Real-time detect… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Comments: 15 pages, 7 figures

  9. arXiv:2105.03456  [pdf, other

    cs.CY cs.HC cs.IR

    CASTing a Net: Supporting Teachers with Search Technology

    Authors: Garrett Allen, Katherine Landau Wright, Jerry Alan Fails, Casey Kennington, Maria Soledad Pera

    Abstract: Past and current research has typically focused on ensuring that search technology for the classroom serves children. In this paper, we argue for the need to broaden the research focus to include teachers and how search technology can aid them. In particular, we share how furnishing a behind-the-scenes portal for teachers can empower them by providing a window into the spelling, writing, and conce… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Comments: KidRec '21: 5th International and Interdisciplinary Perspectives on Children & Recommender and Information Retrieval Systems (KidRec) Search and Recommendation Technology through the Lens of a Teacher- Co-located with ACM IDC 2021

  10. Efficient Arbitrary Simultaneously Entangling Gates on a trapped-ion quantum computer

    Authors: Nikodem Grzesiak, Reinhold Blümel, Kristin Beck, Kenneth Wright, Vandiver Chaplin, Jason M. Amini, Neal C. Pisenti, Shantanu Debnath, Jwo-Sy Chen, Yunseong Nam

    Abstract: Efficiently entangling pairs of qubits is essential to fully harness the power of quantum computing. Here, we devise an exact protocol that simultaneously entangles arbitrary pairs of qubits on a trapped-ion quantum computer. The protocol requires classical computational resources polynomial in the system size, and very little overhead in the quantum control compared to a single-pair case. We demo… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

  11. arXiv:1905.09292  [pdf, other

    quant-ph cs.ET

    Power-optimal, stabilized entangling gate between trapped-ion qubits

    Authors: Reinhold Blumel, Nikodem Grzesiak, Neal Pisenti, Kenneth Wright, Yunseong Nam

    Abstract: To achieve scalable quantum computing, improving entangling-gate fidelity and its implementation-efficiency are of utmost importance. We present here a linear method to construct provably power-optimal entangling gates on an arbitrary pair of qubits on a trapped-ion quantum computer. This method leverages simultaneous modulation of amplitude, frequency, and phase of the beams that illuminate the i… ▽ More

    Submitted 8 August, 2021; v1 submitted 22 May, 2019; originally announced May 2019.

  12. arXiv:1902.10171  [pdf, other

    quant-ph cs.ET

    Ground-state energy estimation of the water molecule on a trapped ion quantum computer

    Authors: Yunseong Nam, Jwo-Sy Chen, Neal C. Pisenti, Kenneth Wright, Conor Delaney, Dmitri Maslov, Kenneth R. Brown, Stewart Allen, Jason M. Amini, Joel Apisdorf, Kristin M. Beck, Aleksey Blinov, Vandiver Chaplin, Mika Chmielewski, Coleman Collins, Shantanu Debnath, Andrew M. Ducore, Kai M. Hudek, Matthew Keesan, Sarah M. Kreikemeier, Jonathan Mizrahi, Phil Solomon, Mike Williams, Jaime David Wong-Campos, Christopher Monroe , et al. (1 additional authors not shown)

    Abstract: Quantum computing leverages the quantum resources of superposition and entanglement to efficiently solve computational problems considered intractable for classical computers. Examples include calculating molecular and nuclear structure, simulating strongly-interacting electron systems, and modeling aspects of material function. While substantial theoretical advances have been made in mapping thes… ▽ More

    Submitted 7 March, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 14 pages, 7 figures

  13. arXiv:1807.03110  [pdf, other

    cs.DC

    Trinity: A Distributed Publish/Subscribe Broker with Blockchain-based Immutability

    Authors: Gowri Sankar Ramachandran, Kwame-Lante Wright, Bhaskar Krishnamachari

    Abstract: Internet-of-Things (IoT) and Supply Chain monitoring applications rely on messaging protocols for exchanging data. Contemporary IoT deployments widely use the publish-subscribe messaging model because of its resource-efficiency. However, the systems with publish-subscribe messaging model employ a centralized architecture, wherein the data from all the devices in the application network flows via a… ▽ More

    Submitted 12 June, 2018; originally announced July 2018.

  14. Experimental Comparison of Two Quantum Computing Architectures

    Authors: N. M. Linke, D. Maslov, M. Roetteler, S. Debnath, C. Figgatt, K. A. Landsman, K. Wright, C. Monroe

    Abstract: We run a selection of algorithms on two state-of-the-art 5-qubit quantum computers that are based on different technology platforms. One is a publicly accessible superconducting transmon device with limited connectivity, and the other is a fully connected trapped-ion system. Even though the two systems have different native quantum interactions, both can be programmed in a way that is blind to the… ▽ More

    Submitted 6 February, 2017; originally announced February 2017.

    Journal ref: PNAS 114, 3305-3310 (2017)

  15. arXiv:1611.02830  [pdf, other

    cs.LG

    Online Learning for Wireless Distributed Computing

    Authors: Yi-Hsuan Kao, Kwame Wright, Bhaskar Krishnamachari, Fan Bai

    Abstract: There has been a growing interest for Wireless Distributed Computing (WDC), which leverages collaborative computing over multiple wireless devices. WDC enables complex applications that a single device cannot support individually. However, the problem of assigning tasks over multiple devices becomes challenging in the dynamic environments encountered in real-world settings, considering that the re… ▽ More

    Submitted 9 November, 2016; originally announced November 2016.

    Comments: 10 pages, 8 figures, conference