Title

Topic

  • ‘Transforming Complex Problems Into K-Means Solutions’

    ,

    “K-means is a fundamental clustering algorithm widely used in both academic and industrial applications. … Studies show the equivalence of K-means to principal component analysis, non-negative matrix factorization, and spectral clustering. However, these studies focus on standard K-means with squared euclidean distance. In this review paper, we unify the available approaches in generalizing K-means to solve challenging and complex problems. We show that these generalizations can be seen from four aspects: data representation, distance measure, label assignment and centroid updating.” Find the paper and full list of authors at IEEE Transactions on Pattern Analysis and Machine Intelligence.

    Learn more

  • ‘GlueGen: Plug and Play Multi-Modal Encoders for X-to-Image Generation’

    “Text-to-image (T2I) models based on diffusion processes have achieved remarkable success in controllable image generation using user-provided captions. However, the tight coupling between the current text encoder and image decoder in T2I models makes it challenging to replace or upgrade. Such changes often require massive fine-tuning or even training from scratch with the prohibitive expense. To address this problem, we propose GlueGen, which applies a newly proposed GlueNet model to align features from single-modal or multi-modal encoders with the latent space of an existing T2I model.” Find the paper and full list of authors at ArXiv.

    Learn more

  • ‘Sturgeon-MKIII: Simultaneous Level and Example Playthrough Generation via Constraint Satisfaction With Tile Rewrite Rules’

    “Completability is a key aspect of procedural level generation. In this work, we present a constraint-based approach to level generation for 2D tile-based games that simultaneously generates a level and an example playthrough of the level demonstrating its completability. … The mechanics are represented as constraints in the same problem along with the constraints used to generate the level itself. … We demonstrate the flexibilty of the system and of tile rewrite rules in several applications, including lock-and-key dungeons, platformers, puzzles and match-three style games.”

    Learn more

  • ‘An Online Therapeutic Intervention for Veterans Patients Suffering With Chronic Pain’

    “Chronic pain affects a large proportion of veterans. … However, opioid-based medication can lead to overuse or misuse. Thus, the Veteran’s Health Administration (VHA) is interested in non-pharmacological approaches that target both pain management and chronic pain-related functional issues. … This manuscript describes a project to develop and evaluate Veteran ACT for Chronic Pain (VACT-CP), an online therapy conducted by an embodied conversational agent (ECA) portraying a mental healthcare coach tasked to lessen the effects of chronic pain and improve functioning.” Find the paper and list of authors in IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and…

    Learn more

    ,
  • ‘Continuously Accelerating Research’ through reproducible software for scientists

    “Science is facing a software reproducibility crisis. Software powers experimentation, and fuels insights, yielding new scientific contributions. Yet, the research software is often difficult for other researchers to reproducibly run. … As software engineering researchers, we believe that it is our duty to create tools and processes that instill reproducibility, reusability and extensibility into research software. This paper outlines a vision for a community infrastructure that will bring the benefits of continuous integration to scientists developing research software.” Find the paper and full list of authors in the IEEE/ACM International Conference on Software Engineering proceedings.

    Learn more

  • ‘Edge Grasp Network: A Graph-Based SE(3)-Invariant Approach to Grasp Detection’

    ,

    “Given point cloud input, the problem of 6-DoF grasp pose detection is to identify a set of hand poses in SE(3) from which an object can be successfully grasped. This important problem has many practical applications. Here we propose a novel method and neural network model that enables better grasp success rates relative to what is available in the literature. The method takes standard point cloud data as input and works well with single-view point clouds observed from arbitrary viewing directions.” Find the paper and full list of authors in the IEEE International Conference on Robotics and Automation proceedings.

    Learn more

  • ‘mmSpoof: Resilient Spoofing of Automotive Millimeter-Wave Radars Using Reflect Array’

    “FMCW radars are integral to automotive driving for robust and weather-resistant sensing of surrounding objects. However, these radars are vulnerable to spoofing attacks that can cause sensor malfunction and potentially lead to accidents. Previous attempts at spoofing FMCW radars using an attacker device have not been very effective due to the need for synchronization between the attacker and the victim. We present a novel spoofing mechanism called mmSpoof that does not require synchronization and is resilient to various security features and countermeasures.” Find the paper and list of authors in the IEEE Symposium on Security and Privacy proceedings.

    Learn more

    ,
  • ‘Fully Dynamic Matching: (2−2‾√)-Approximation in Polylog Update Time’

    “We study maximum matchings in fully dynamic graphs, which are graphs that undergo both edge insertions and deletions. Our focus is on algorithms that estimate the size of maximum matching after each update while spending a small time. … We show that for any fixed ε>0, a (2−2‾√−ε) approximation can be maintained in poly(logn) time per update even in general graphs. Our techniques also lead to the same approximation for general graphs in two passes of the semi-streaming setting, removing a similar gap in that setting.” Find the paper and full list of authors at ArXiv.

    Learn more

  • ‘McMini: A Programmable DPOR-Based Model Checker for Multithreaded Programs’

    “Current model checkers hardwire the behavior of common thread operations, and do not recognize application-dependent thread paradigms or functions using simpler primitive operations. This introduces additional operations, causing current model checkers to be excessively slow. In addition, there is no mechanism to model the semantics of the actual thread wakeup policies implemented in the underlying thread library or operating system. Eliminating these constraints can make model checkers faster. … McMini is an extensible model checker based on DPOR (Dynamic Partial Order Reduction).” Find the paper and full list of authors at Programming Journal.

    Learn more

  • ‘Type Prediction With Program Decomposition and Fill-in-the-Type Training’

    ,

    “TypeScript and Python are two programming languages that support optional type annotations, which are useful but tedious to introduce and maintain. This has motivated automated type prediction: given an untyped program, produce a well-typed output program. Large language models (LLMs) are promising for type prediction, but there are challenges. … We address these challenges [with] OpenTau, a search-based approach for type prediction that leverages large language models. We propose a new metric for type prediction quality, give a tree-based program decomposition that searches a space of generated types and present fill-in-the-type fine-tuning.” Find the paper and full list of authors…

    Learn more

    ,
  • ‘HVA_CPS Proposal: A Process for Hazardous Vulnerability Analysis in Distributed Cyber-Physical Systems’

    “Society is increasingly dependent upon the use of distributed cyber-physical systems (CPSs), such as energy networks, chemical processing plants and transport systems. Such CPSs typically have multiple layers of protection to prevent harm to people or the CPS. However, if both the control and protection systems are vulnerable to cyber-attacks, an attack may cause CPS damage or breaches of safety. … This article identifies the attributes that a rigorous hazardous vulnerability analysis (HVA) process would require and compares them against related works. None fully meet the requirements for rigour.” Find the paper and full list of authors at PeerJ Computer Science.

    Learn more

  • ‘Companion: A Pilot Randomized Clinical Trial … for Detecting and Modifying Daily Inactivity Among Adults >60 Years — Design and Protocol’

    , , ,

    “Supervised personal training is most effective in improving the health effects of exercise in older adults. … Strategies to extend the effect of trainer contact outside of supervision and that integrate meaningful and intelligent two-way communication to provide complex and interactive problem solving may motivate older adults to “move more and sit less” and sustain positive behaviors to further improve health. This paper describes … a technology-based behavior-aware text-based virtual “Companion” … to deliver behavior change strategies using socially engaging, contextually salient, and tailored text message conversations in near-real-time.” Find the paper and full list of authors at MDPI Sensors.

    Learn more

    , ,
  • ‘SECDA-TFLite: A Toolkit for Efficient Development of FPGA-Based DNN Accelerators for Edge Inference’

    “In this paper we propose SECDA-TFLite, a new open source toolkit for developing DNN hardware accelerators integrated within the TFLite framework. The toolkit leverages the principles of SECDA, a hardware/software co-design methodology, to reduce the design time of optimized DNN inference accelerators on edge devices with FPGAs. With SECDA-TFLite, we reduce the initial setup costs associated with integrating a new accelerator design within a target DNN framework, allowing developers to focus on the design.” Find the paper and full list of authors in the Journal of Parallel and Distributed Computing.

    Learn more

  • ‘A Study of Multi-Factor and Risk-Based Authentication Availability’

    ,

    “Password-based authentication (PBA) remains the most popular form of user authentication on the web despite its long-understood insecurity. Given the deficiencies of PBA, many online services support multi-factor authentication (MFA) and/or risk-based authentication (RBA) to better secure user accounts. … In this paper, we present a study of 208 popular sites in the Tranco top 5K that support account creation to understand the availability of MFA and RBA on the web … and how logging into sites through more secure SSO providers changes the landscape of user authentication security.” Find the paper and full list of authors at USENIX Security…

    Learn more

    ,
  • ‘The Science of Fake News’

    “Fake news emerged as an apparent global problem during the 2016 U.S. Presidential election. Addressing it requires a multidisciplinary effort to define the nature and extent of the problem, detect fake news in real time and mitigate its potentially harmful effects. This will require a better understanding of how the Internet spreads content, how people process news and how the two interact. We review the state of knowledge in these areas and discuss two broad potential mitigation strategies: better enabling individuals to identify fake news” and aiding platforms in intervention. Find the paper and full list of authors at ArXiv.

    Learn more

    ,
  • ‘Wrapped in Story: The Affordances of Narrative for Citizen Science Games’

    “Citizen science games enable public participation in scientific research, yet these games often struggle to engage wide audiences. As a potential solution, some game developers look to narrative as an experience-enhancing feature. … We investigated the effects of wrapping a story around the tutorial puzzles of the citizen science game Foldit. We found that the narrative increased the time players spent engaging with the game’s tutorial and its scientific puzzles but did not substantially affect their progress through the tutorial.” Find the paper and full list of authors in the 18th International Conference on the Foundations of Digital Games proceedings.

    Learn more

  • ‘Iterative Soft Shrinkage Learning for Efficient Image Super-Resolution’

    “Image super-resolution (SR) has witnessed extensive neural network designs from CNN to transformer architectures. However, prevailing SR models suffer from prohibitive memory footprint and intensive computations, which limits further deployment on edge devices. This work investigates the potential of network pruning for super-resolution to take advantage of off-the-shelf network designs and reduce the underlying computational overhead. … We adopt unstructured pruning with sparse models directly trained from scratch.” Find the paper and full list of authors at ArXiv.

    Learn more

  • ‘UniControl: A Unified Diffusion Model for Controllable Visual Generation in the Wild’

    “Achieving machine autonomy and human control often represent divergent objectives in the design of interactive AI systems. Visual generative foundation models such as Stable Diffusion show promise in navigating these goals, especially when prompted with arbitrary languages. However, they often fall short in generating images with spatial, structural or geometric controls. … In response, we introduce UniControl, a new generative foundation model that consolidates a wide array of controllable condition-to-image (C2I) tasks within a singular framework, while still allowing for arbitrary language prompts.” Find the paper and full list of authors at ArXiv.

    Learn more

  • ‘Linearity of Relation Decoding in Transformer Language Models’

    “Much of the knowledge encoded in transformer language models (LMs) may be expressed in terms of relations: relations between words and their synonyms, entities and their attributes, etc. We show that, for a subset of relations, this computation is well-approximated by a single linear transformation on the subject representation. Linear relation representations may be obtained by constructing a first-order approximation to the LM from a single prompt, and they exist for a variety of factual, commonsense, and linguistic relations.” Find the paper and full list of authors at ArXiv.

    Learn more

  • At the world’s largest conference of management scholars, Northeastern pulls out all the stops

    , ,

    Northeastern University faculty members presented research, won awards and hosted a reception for some of the 8,000 attendees who visited Boston for the 2023 Academy of Management Conference.

    Learn more

  • Academy of Management 2023 Publication Awards

    , ,

    Northeastern faculty and post-docs were the recipients of numerous awards at the 2023 Academy of Management Conference.

    Learn more

  • ‘Action Research’ can empower higher education administrators toward better problem solving

    , ,

    In “Faculty Development: Achieving Change Through Action Research,” three professors from the Northeastern University College of Professional Studies want to “empower all administrators in higher education to engage more effectively in resolving challenges in colleges and universities,” the publisher’s webpage states. This empowerment comes through “”Action Research… a powerful, localized methodology for impacting difficult and complex issues embedded in organizations.”

    Learn more

  • Department of Civil and Environmental Engineerign hosts 2023 FUNWAVE Workshop

    “The Department of Civil and Environmental Engineering at Northeastern, alongside partners from The Center for Applied Coastal Research, University of Delaware and the US Army Engineer and Development Center hosted the fifth FUNWAVE-TVD Training Workshop.” As an open-source modeling program, FUNWAVE meant the workshop could cover “a variety of topics, ranging from wave theory to numerical modeling to coastal engineering applications, and included hands-on trainings and seminars on modeling development and case studies.” During the conference, “professor Qin Jim Chen gave a seminar on predicting hazardous rip currents using FUNWAVE-TVD.”

    Learn more

    ,
  • Enhancing antenna defense using smart metamaterials: A patent

    “Vincent Harris, University Distinguished and William Lincoln Smith Professor of electrical and computer engineering, was awarded a patent for ‘Magnetodielectric Metamaterials and Articles Including Magnetodielectric Metamaterials.'”

    Learn more

    ,
  • Maheswaran speaks at ATINER2023 Round Table on ‘The Future of Science and Engineering Education’

    Teaching professor in electrical and computer engineering, Bala Maheswaran presented “at the ATINER2023 Round Table Discussion on ‘The Future of Science and Engineering Education.’ This event took place on July 17-18 at the Athens Institute for Education and Research (ATINER) in Athens, Greece. During the roundtable discussion, Maheswaran spoke on the topic of ‘Sustainability in Engineering Education’ and shared the stage with presenters from various countries. The event fostered a diverse and dynamic exchange of ideas, shaping the future trajectory of science and engineering education.”

    Learn more

    ,
  • Ratilal-Makris selected to serve on Ocean Research Advisory Panel

    “Electrical and computer engineering professor Purnima Ratilal-Makris is one of eighteen members selected for the newly formed Ocean Research Advisory Panel, who will serve as advisors to the White House Office of Science and Technology Policy and the interagency Ocean Policy Committee. It is expected that the Panel will help carry out the administration’s goals regarding the Blue economy, resilience, ecosystem health and renewable ocean energy.”

    Learn more

    ,
  • More efficient deep neural networks for edge devices

    “Electrical and computer engineering associate professor Yanzhi Wang, in collaboration with the University of Pittsburgh, was awarded a $600,000 NSF grant for ‘Expediting Continual Online Learning on Edge Platforms Through Software-Hardware Co-designs.'”

    Learn more

    ,
  • Developing secure next generation cellular networks

    , ,

    “Electrical and computer engineering assistant professor Francesco Restuccia, William Lincoln Smith Professor Tommaso Melodia, and Khoury College of Computer science associate professor Alina Oprea were awarded a $900,000 NSF grant for ‘Resilient-by-Design Data-Driven NextG Open Radio Access Networks.'”

    Learn more

    ,
  • ‘TikTok as Algorithmically Mediated Biographical Illumination: Autism, Self-Discovery and Platformed Diagnosis on #Autisktok’

    “Scholarship in the sociology of medicine has tended to characterize diagnosis as disruptive to one’s self-concept. This categorization, though, requires reconsideration in light of public conversations about mental health and community building around neurocognitive conditions, particularly among youth online. … We explored the shifting nature of [‘biographical illumination’] through the case of TikTok. Combining quantitative and qualitative methods, we argue that TikTok serves as a space to discuss diagnosis and refine one’s sense of self as a result of diagnosis.” Find the paper and full list of authors at New Media & Society.

    Learn more

    ,
  • Ries receives NOAA grant to study future effects of CO2 climate change in the ocean

    “Professor Justin Ries was funded to collect and analyze sediments from the western Atlantic shelf (Maine to Maryland) as part NOAA’s third East Coast Ocean Acidification (ECOA-3) cruise aboard the NOAAS Ronald H. Brown — NOAA’s only scientific ship for global scale oceanographic survey. The objective of Ries’ specific project is to characterize the distribution and composition of calcium carbonate sediments deposited within shelf sediments of the western Atlantic shelf. Characterizing the distribution and composition of shelf carbonates will improve our understanding of future CO2-induced climate and ocean change.”

    Learn more

    ,