-
The diameter of a stochastic matrix: A new measure for sensitivity analysis in Bayesian networks
Authors:
Manuele Leonelli,
Jim Q. Smith,
Sophia K. Wright
Abstract:
Bayesian networks are one of the most widely used classes of probabilistic models for risk management and decision support because of their interpretability and flexibility in including heterogeneous pieces of information. In any applied modelling, it is critical to assess how robust the inferences on certain target variables are to changes in the model. In Bayesian networks, these analyses fall u…
▽ More
Bayesian networks are one of the most widely used classes of probabilistic models for risk management and decision support because of their interpretability and flexibility in including heterogeneous pieces of information. In any applied modelling, it is critical to assess how robust the inferences on certain target variables are to changes in the model. In Bayesian networks, these analyses fall under the umbrella of sensitivity analysis, which is most commonly carried out by quantifying dissimilarities using Kullback-Leibler information measures. In this paper, we argue that robustness methods based instead on the familiar total variation distance provide simple and more valuable bounds on robustness to misspecification, which are both formally justifiable and transparent. We introduce a novel measure of dependence in conditional probability tables called the diameter to derive such bounds. This measure quantifies the strength of dependence between a variable and its parents. We demonstrate how such formal robustness considerations can be embedded in building a Bayesian network.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Perivascular space Identification Nnunet for Generalised Usage (PINGU)
Authors:
Benjamin Sinclair,
Lucy Vivash,
Jasmine Moses,
Miranda Lynch,
William Pham,
Karina Dorfman,
Cassandra Marotta,
Shaun Koh,
Jacob Bunyamin,
Ella Rowsthorn,
Alex Jarema,
Himashi Peiris,
Zhaolin Chen,
Sandy R Shultz,
David K Wright,
Dexiao Kong,
Sharon L. Naismith,
Terence J. OBrien,
Meng Law
Abstract:
Perivascular spaces(PVSs) form a central component of the brainś waste clearance system, the glymphatic system. These structures are visible on MRI images, and their morphology is associated with aging and neurological disease. Manual quantification of PVS is time consuming and subjective. Numerous deep learning methods for PVS segmentation have been developed, however the majority have been devel…
▽ More
Perivascular spaces(PVSs) form a central component of the brainś waste clearance system, the glymphatic system. These structures are visible on MRI images, and their morphology is associated with aging and neurological disease. Manual quantification of PVS is time consuming and subjective. Numerous deep learning methods for PVS segmentation have been developed, however the majority have been developed and evaluated on homogenous datasets and high resolution scans, perhaps limiting their applicability for the wide range of image qualities acquired in clinic and research. In this work we train a nnUNet, a top-performing biomedical image segmentation algorithm, on a heterogenous training sample of manually segmented MRI images of a range of different qualities and resolutions from 6 different datasets. These are compared to publicly available deep learning methods for 3D segmentation of PVS. The resulting model, PINGU (Perivascular space Identification Nnunet for Generalised Usage), achieved voxel and cluster level dice scores of 0.50(SD=0.15), 0.63(0.17) in the white matter(WM), and 0.54(0.11), 0.66(0.17) in the basal ganglia(BG). Performance on data from unseen sites was substantially lower for both PINGU(0.20-0.38(WM, voxel), 0.29-0.58(WM, cluster), 0.22-0.36(BG, voxel), 0.46-0.60(BG, cluster)) and the publicly available algorithms(0.18-0.30(WM, voxel), 0.29-0.38(WM cluster), 0.10-0.20(BG, voxel), 0.15-0.37(BG, cluster)), but PINGU strongly outperformed the publicly available algorithms, particularly in the BG. Finally, training PINGU on manual segmentations from a single site with homogenous scan properties gave marginally lower performances on internal cross-validation, but in some cases gave higher performance on external validation. PINGU stands out as broad-use PVS segmentation tool, with particular strength in the BG, an area of PVS related to vascular disease and pathology.
△ Less
Submitted 17 May, 2024; v1 submitted 14 May, 2024;
originally announced May 2024.
-
A High School Camp on Algorithms and Coding in Jamaica
Authors:
Daniel T. Fokum,
Zaria Chen Shui,
Kerene Wright,
Orr Paradise,
Gunjan Mansingh,
Daniel Coore
Abstract:
This is a report on JamCoders, a four-week long computer-science camp for high school students in Jamaica. The camp teaches college-level coding and algorithms, and targets academically excellent students in grades 9--11 (ages 14--17). Qualitative assessment shows that the camp was, in general terms, a success. We reflect on the background and academic structure of the camp and share key takeaways…
▽ More
This is a report on JamCoders, a four-week long computer-science camp for high school students in Jamaica. The camp teaches college-level coding and algorithms, and targets academically excellent students in grades 9--11 (ages 14--17). Qualitative assessment shows that the camp was, in general terms, a success. We reflect on the background and academic structure of the camp and share key takeaways on designing and operating a successful camp. We analyze data collected before, during and after the camp and map the effects of demographic differences on student performance in camp. We conclude with a discussion on possible improvements on our approach.
△ Less
Submitted 31 December, 2023;
originally announced January 2024.
-
InstructPipe: Building Visual Programming Pipelines with Human Instructions
Authors:
Zhongyi Zhou,
Jing Jin,
Vrushank Phadnis,
Xiuxiu Yuan,
Jun Jiang,
Xun Qian,
Jingtao Zhou,
Yiyi Huang,
Zheng Xu,
Yinda Zhang,
Kristen Wright,
Jason Mayes,
Mark Sherwood,
Johnny Lee,
Alex Olwal,
David Kim,
Ram Iyengar,
Na Li,
Ruofei Du
Abstract:
Visual programming provides beginner-level programmers with a coding-free experience to build their customized pipelines. Existing systems require users to build a pipeline entirely from scratch, implying that novice users need to set up and link appropriate nodes all by themselves, starting from a blank workspace. We present InstructPipe, an AI assistant that enables users to start prototyping ma…
▽ More
Visual programming provides beginner-level programmers with a coding-free experience to build their customized pipelines. Existing systems require users to build a pipeline entirely from scratch, implying that novice users need to set up and link appropriate nodes all by themselves, starting from a blank workspace. We present InstructPipe, an AI assistant that enables users to start prototyping machine learning (ML) pipelines with text instructions. We designed two LLM modules and a code interpreter to execute our solution. LLM modules generate pseudocode of a target pipeline, and the interpreter renders a pipeline in the node-graph editor for further human-AI collaboration. Technical evaluations reveal that InstructPipe reduces user interactions by 81.1% compared to traditional methods. Our user study (N=16) showed that InstructPipe empowers novice users to streamline their workflow in creating desired ML pipelines, reduce their learning curve, and spark innovative ideas with open-ended commands.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
A Multi-Perspective Learning to Rank Approach to Support Children's Information Seeking in the Classroom
Authors:
Garrett Allen,
Katherine Landau Wright,
Jerry Alan Fails,
Casey Kennington,
Maria Soledad Pera
Abstract:
We introduce a novel re-ranking model that aims to augment the functionality of standard search engines to support classroom search activities for children (ages 6 to 11). This model extends the known listwise learning-to-rank framework by balancing risk and reward. Doing so enables the model to prioritize Web resources of high educational alignment, appropriateness, and adequate readability by an…
▽ More
We introduce a novel re-ranking model that aims to augment the functionality of standard search engines to support classroom search activities for children (ages 6 to 11). This model extends the known listwise learning-to-rank framework by balancing risk and reward. Doing so enables the model to prioritize Web resources of high educational alignment, appropriateness, and adequate readability by analyzing the URLs, snippets, and page titles of Web resources retrieved by a given mainstream search engine. Experimental results, including an ablation study and comparisons with existing baselines, showcase the correctness of the proposed model. The outcomes of this work demonstrate the value of considering multiple perspectives inherent to the classroom setting, e.g., educational alignment, readability, and objectionability, when applied to the design of algorithms that can better support children's information discovery.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
The Cydoc smart patient intake form accelerates medical note writing
Authors:
Angela Hemesath,
Kenyon Wright,
Matthew Michael Draelos,
Rachel Lea Draelos
Abstract:
Purpose: This study evaluates the effect of Cydoc software tools on medical note time-to-completion and quality.
Methods: Medical students were recruited by email to participate in a video encounter with a standardized patient for three scenarios: writing a note from scratch (control), writing a note with the Cydoc educational tool, and writing a note with the Cydoc intake form. Notes were subse…
▽ More
Purpose: This study evaluates the effect of Cydoc software tools on medical note time-to-completion and quality.
Methods: Medical students were recruited by email to participate in a video encounter with a standardized patient for three scenarios: writing a note from scratch (control), writing a note with the Cydoc educational tool, and writing a note with the Cydoc intake form. Notes were subsequently anonymized and rated by a resident physician across four quality measures. Note time-to-completion was analyzed using a one-way ANOVA with post-hoc Bonferroni correction, while note quality scores were compared using a Wilcoxon paired signed rank test.
Results: Eighteen medical students participated in the study. The average note time-to-completion, which included the patient interview and note writing, was 17 +/- 7.0 minutes from scratch, 18 +/- 8.0 minutes with the educational tool, and 5.7 +/- 3.0 minutes with the intake form. Using the Cydoc intake form was significantly faster than writing from scratch (p = 0.0001) or using the educational tool (p = 8 x 10-5). Notes written with Cydoc tools had higher note comprehensiveness (3.24 > 3.06), pertinent positives (3.47 > 2.94), and pertinent negatives (3.47 > 2.67), although this trend did not reach statistical significance.
Conclusions: Using the Cydoc smart patient intake form accelerated note writing by 2.98x while maintaining note quality. The Cydoc smart patient intake form has the potential to streamline clinical documentation and save clinicians' time. Future work is needed to evaluate Cydoc tools in an in-person outpatient setting with practicing clinician users.
△ Less
Submitted 21 June, 2023;
originally announced June 2023.
-
Conversational Agents and Children: Let Children Learn
Authors:
Casey Kennington,
Jerry Alan Fails,
Katherine Landau Wright,
Maria Soledad Pera
Abstract:
Using online information discovery as a case study, in this position paper we discuss the need to design, develop, and deploy (conversational) agents that can -- non-intrusively -- guide children in their quest for online resources rather than simply finding resources for them. We argue that agents should "let children learn" and should be built to take on a teacher-facilitator function, allowing…
▽ More
Using online information discovery as a case study, in this position paper we discuss the need to design, develop, and deploy (conversational) agents that can -- non-intrusively -- guide children in their quest for online resources rather than simply finding resources for them. We argue that agents should "let children learn" and should be built to take on a teacher-facilitator function, allowing children to develop their technical and critical thinking abilities as they interact with varied technology in a broad range of use cases.
△ Less
Submitted 23 February, 2023;
originally announced February 2023.
-
ESAFE: Enterprise Security and Forensics at Scale
Authors:
Bernard McShea,
Kevin Wright,
Denley Lam,
Steve Schmidt,
Anna Choromanska,
Devansh Bisla,
Shihong Fang,
Alireza Sarmadi,
Prashanth Krishnamurthy,
Farshad Khorrami
Abstract:
Securing enterprise networks presents challenges in terms of both their size and distributed structure. Data required to detect and characterize malicious activities may be diffused and may be located across network and endpoint devices. Further, cyber-relevant data routinely exceeds total available storage, bandwidth, and analysis capability, often by several orders of magnitude. Real-time detect…
▽ More
Securing enterprise networks presents challenges in terms of both their size and distributed structure. Data required to detect and characterize malicious activities may be diffused and may be located across network and endpoint devices. Further, cyber-relevant data routinely exceeds total available storage, bandwidth, and analysis capability, often by several orders of magnitude. Real-time detection of threats within or across very large enterprise networks is not simply an issue of scale, but also a challenge due to the variable nature of malicious activities and their presentations. The system seeks to develop a hierarchy of cyber reasoning layers to detect malicious behavior, characterize novel attack vectors and present an analyst with a contextualized human-readable output from a series of machine learning models. We developed machine learning algorithms for scalable throughput and improved recall for our Multi-Resolution Joint Optimization for Enterprise Security and Forensics (ESAFE) solution. This Paper will provide an overview of ESAFE's Machine Learning Modules, Attack Ontologies, and Automated Smart Alert generation which provide multi-layer reasoning over cross-correlated sensors for analyst consumption.
△ Less
Submitted 7 December, 2021;
originally announced December 2021.
-
CASTing a Net: Supporting Teachers with Search Technology
Authors:
Garrett Allen,
Katherine Landau Wright,
Jerry Alan Fails,
Casey Kennington,
Maria Soledad Pera
Abstract:
Past and current research has typically focused on ensuring that search technology for the classroom serves children. In this paper, we argue for the need to broaden the research focus to include teachers and how search technology can aid them. In particular, we share how furnishing a behind-the-scenes portal for teachers can empower them by providing a window into the spelling, writing, and conce…
▽ More
Past and current research has typically focused on ensuring that search technology for the classroom serves children. In this paper, we argue for the need to broaden the research focus to include teachers and how search technology can aid them. In particular, we share how furnishing a behind-the-scenes portal for teachers can empower them by providing a window into the spelling, writing, and concept connection skills of their students.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Efficient Arbitrary Simultaneously Entangling Gates on a trapped-ion quantum computer
Authors:
Nikodem Grzesiak,
Reinhold Blümel,
Kristin Beck,
Kenneth Wright,
Vandiver Chaplin,
Jason M. Amini,
Neal C. Pisenti,
Shantanu Debnath,
Jwo-Sy Chen,
Yunseong Nam
Abstract:
Efficiently entangling pairs of qubits is essential to fully harness the power of quantum computing. Here, we devise an exact protocol that simultaneously entangles arbitrary pairs of qubits on a trapped-ion quantum computer. The protocol requires classical computational resources polynomial in the system size, and very little overhead in the quantum control compared to a single-pair case. We demo…
▽ More
Efficiently entangling pairs of qubits is essential to fully harness the power of quantum computing. Here, we devise an exact protocol that simultaneously entangles arbitrary pairs of qubits on a trapped-ion quantum computer. The protocol requires classical computational resources polynomial in the system size, and very little overhead in the quantum control compared to a single-pair case. We demonstrate an exponential improvement in both classical and quantum resources over the current state of the art. We implement the protocol on a software-defined trapped-ion quantum computer, where we reconfigure the quantum computer architecture on demand. Together with the all-to-all connectivity available in trapped-ion quantum computers, our results establish that trapped ions are a prime candidate for a scalable quantum computing platform with minimal quantum latency.
△ Less
Submitted 22 May, 2019;
originally announced May 2019.
-
Power-optimal, stabilized entangling gate between trapped-ion qubits
Authors:
Reinhold Blumel,
Nikodem Grzesiak,
Neal Pisenti,
Kenneth Wright,
Yunseong Nam
Abstract:
To achieve scalable quantum computing, improving entangling-gate fidelity and its implementation-efficiency are of utmost importance. We present here a linear method to construct provably power-optimal entangling gates on an arbitrary pair of qubits on a trapped-ion quantum computer. This method leverages simultaneous modulation of amplitude, frequency, and phase of the beams that illuminate the i…
▽ More
To achieve scalable quantum computing, improving entangling-gate fidelity and its implementation-efficiency are of utmost importance. We present here a linear method to construct provably power-optimal entangling gates on an arbitrary pair of qubits on a trapped-ion quantum computer. This method leverages simultaneous modulation of amplitude, frequency, and phase of the beams that illuminate the ions and, unlike the state of the art, does not require any search in the parameter space. The linear method is extensible, enabling stabilization against external parameter fluctuations to an arbitrary order at a cost linear in the order. We implement and demonstrate the power-optimal, stabilized gate on a trapped-ion quantum computer.
△ Less
Submitted 8 August, 2021; v1 submitted 22 May, 2019;
originally announced May 2019.
-
Ground-state energy estimation of the water molecule on a trapped ion quantum computer
Authors:
Yunseong Nam,
Jwo-Sy Chen,
Neal C. Pisenti,
Kenneth Wright,
Conor Delaney,
Dmitri Maslov,
Kenneth R. Brown,
Stewart Allen,
Jason M. Amini,
Joel Apisdorf,
Kristin M. Beck,
Aleksey Blinov,
Vandiver Chaplin,
Mika Chmielewski,
Coleman Collins,
Shantanu Debnath,
Andrew M. Ducore,
Kai M. Hudek,
Matthew Keesan,
Sarah M. Kreikemeier,
Jonathan Mizrahi,
Phil Solomon,
Mike Williams,
Jaime David Wong-Campos,
Christopher Monroe
, et al. (1 additional authors not shown)
Abstract:
Quantum computing leverages the quantum resources of superposition and entanglement to efficiently solve computational problems considered intractable for classical computers. Examples include calculating molecular and nuclear structure, simulating strongly-interacting electron systems, and modeling aspects of material function. While substantial theoretical advances have been made in mapping thes…
▽ More
Quantum computing leverages the quantum resources of superposition and entanglement to efficiently solve computational problems considered intractable for classical computers. Examples include calculating molecular and nuclear structure, simulating strongly-interacting electron systems, and modeling aspects of material function. While substantial theoretical advances have been made in mapping these problems to quantum algorithms, there remains a large gap between the resource requirements for solving such problems and the capabilities of currently available quantum hardware. Bridging this gap will require a co-design approach, where the expression of algorithms is developed in conjunction with the hardware itself to optimize execution. Here, we describe a scalable co-design framework for solving chemistry problems on a trapped ion quantum computer, and apply it to compute the ground-state energy of the water molecule. The robust operation of the trapped ion quantum computer yields energy estimates with errors approaching the chemical accuracy, which is the target threshold necessary for predicting the rates of chemical reaction dynamics.
△ Less
Submitted 7 March, 2019; v1 submitted 26 February, 2019;
originally announced February 2019.
-
Trinity: A Distributed Publish/Subscribe Broker with Blockchain-based Immutability
Authors:
Gowri Sankar Ramachandran,
Kwame-Lante Wright,
Bhaskar Krishnamachari
Abstract:
Internet-of-Things (IoT) and Supply Chain monitoring applications rely on messaging protocols for exchanging data. Contemporary IoT deployments widely use the publish-subscribe messaging model because of its resource-efficiency. However, the systems with publish-subscribe messaging model employ a centralized architecture, wherein the data from all the devices in the application network flows via a…
▽ More
Internet-of-Things (IoT) and Supply Chain monitoring applications rely on messaging protocols for exchanging data. Contemporary IoT deployments widely use the publish-subscribe messaging model because of its resource-efficiency. However, the systems with publish-subscribe messaging model employ a centralized architecture, wherein the data from all the devices in the application network flows via a central broker to the subscribers. Such a centralized architecture make publish-subscribe messaging model susceptible to a central point of failure. Besides, it provides an opportunity for the organization that owns the broker to tamper with the data. In this work, we contribute Trinity, a novel distributed publish-subscribe broker with blockchain-based immutability. Trinity distributes the data published to one of the brokers in the network to all the brokers in the network. The distributed data is stored in an immutable ledger through the use of the blockchain technology. Furthermore, Trinity executes smart contracts to validate the data before saving the data on the blockchain. Through the use of a blockchain network, Trinity can guarantee persistence, ordering, and immutability across trust boundaries. Our evaluation results show that Trinity consumes minimal resources, and the use of smart contracts enable the stakeholders to automate the data management processes. To the best of our knowledge, Trinity is the first framework that combines the components of the blockchain technology with the publish-subscribe messaging model.
△ Less
Submitted 12 June, 2018;
originally announced July 2018.
-
Experimental Comparison of Two Quantum Computing Architectures
Authors:
N. M. Linke,
D. Maslov,
M. Roetteler,
S. Debnath,
C. Figgatt,
K. A. Landsman,
K. Wright,
C. Monroe
Abstract:
We run a selection of algorithms on two state-of-the-art 5-qubit quantum computers that are based on different technology platforms. One is a publicly accessible superconducting transmon device with limited connectivity, and the other is a fully connected trapped-ion system. Even though the two systems have different native quantum interactions, both can be programmed in a way that is blind to the…
▽ More
We run a selection of algorithms on two state-of-the-art 5-qubit quantum computers that are based on different technology platforms. One is a publicly accessible superconducting transmon device with limited connectivity, and the other is a fully connected trapped-ion system. Even though the two systems have different native quantum interactions, both can be programmed in a way that is blind to the underlying hardware, thus allowing the first comparison of identical quantum algorithms between different physical systems. We show that quantum algorithms and circuits that employ more connectivity clearly benefit from a better connected system of qubits. While the quantum systems here are not yet large enough to eclipse classical computers, this experiment exposes critical factors of scaling quantum computers, such as qubit connectivity and gate expressivity. In addition, the results suggest that co-designing particular quantum applications with the hardware itself will be paramount in successfully using quantum computers in the future.
△ Less
Submitted 6 February, 2017;
originally announced February 2017.
-
Online Learning for Wireless Distributed Computing
Authors:
Yi-Hsuan Kao,
Kwame Wright,
Bhaskar Krishnamachari,
Fan Bai
Abstract:
There has been a growing interest for Wireless Distributed Computing (WDC), which leverages collaborative computing over multiple wireless devices. WDC enables complex applications that a single device cannot support individually. However, the problem of assigning tasks over multiple devices becomes challenging in the dynamic environments encountered in real-world settings, considering that the re…
▽ More
There has been a growing interest for Wireless Distributed Computing (WDC), which leverages collaborative computing over multiple wireless devices. WDC enables complex applications that a single device cannot support individually. However, the problem of assigning tasks over multiple devices becomes challenging in the dynamic environments encountered in real-world settings, considering that the resource availability and channel conditions change over time in unpredictable ways due to mobility and other factors. In this paper, we formulate a task assignment problem as an online learning problem using an adversarial multi-armed bandit framework. We propose MABSTA, a novel online learning algorithm that learns the performance of unknown devices and channel qualities continually through exploratory probing and makes task assignment decisions by exploiting the gained knowledge. For maximal adaptability, MABSTA is designed to make no stochastic assumption about the environment. We analyze it mathematically and provide a worst-case performance guarantee for any dynamic environment. We also compare it with the optimal offline policy as well as other baselines via emulations on trace-data obtained from a wireless IoT testbed, and show that it offers competitive and robust performance in all cases. To the best of our knowledge, MABSTA is the first online algorithm in this domain of task assignment problems and provides provable performance guarantee.
△ Less
Submitted 9 November, 2016;
originally announced November 2016.