Extended overview of CLEF HIPE 2020: named entity processing on historical newspapers

M Ehrmann, M Romanello, A Flückiger… - CEUR Workshop …, 2020 - zora.uzh.ch
This paper presents an extended overview of the first edition of HIPE (Identifying Historical
People, Places and other Entities), a pioneering shared task dedicated to the evaluation of …

Less training, more repairing please: revisiting automated program repair via zero-shot learning

CS Xia, L Zhang - Proceedings of the 30th ACM Joint European …, 2022 - dl.acm.org
Due to the promising future of Automated Program Repair (APR), researchers have
proposed various APR techniques, including heuristic-based, template-based, and …

Dynamic graph convolutional recurrent network for traffic prediction: Benchmark and solution

F Li, J Feng, H Yan, G Jin, F Yang, F Sun… - ACM Transactions on …, 2023 - dl.acm.org
Traffic prediction is the cornerstone of intelligent transportation system. Accurate traffic
forecasting is essential for the applications of smart cities, ie, intelligent traffic management …

Simba: Scaling deep-learning inference with multi-chip-module-based architecture

YS Shao, J Clemons, R Venkatesan, B Zimmer… - Proceedings of the …, 2019 - dl.acm.org
Package-level integration using multi-chip-modules (MCMs) is a promising approach for
building large-scale systems. Compared to a large monolithic die, an MCM combines many …

How effective are neural networks for fixing security vulnerabilities

Y Wu, N Jiang, HV Pham, T Lutellier, J Davis… - Proceedings of the …, 2023 - dl.acm.org
Security vulnerability repair is a difficult task that is in dire need of automation. Two groups of
techniques have shown promise:(1) large code language models (LLMs) that have been pre …

Improving bug detection via context-based code representation learning and attention-based neural networks

Y Li, S Wang, TN Nguyen, S Van Nguyen - Proceedings of the ACM on …, 2019 - dl.acm.org
Bug detection has been shown to be an effective way to help developers in detecting bugs
early, thus, saving much effort and time in software development process. Recently, deep …

Triton: an intermediate language and compiler for tiled neural network computations

P Tillet, HT Kung, D Cox - Proceedings of the 3rd ACM SIGPLAN …, 2019 - dl.acm.org
The validation and deployment of novel research ideas in the field of Deep Learning is often
limited by the availability of efficient compute kernels for certain basic primitives. In …

[PDF][PDF] How novelists use generative language models: An exploratory user study.

A Calderwood, V Qiu, KI Gero, LB Chilton - HAI-GEN+ user2agent@ IUI, 2020 - ceur-ws.org
Generative language models are garnering interest as creative tools. We present a user
study to explore how fiction writers use generative language models during their writing …

Model generalization on COVID-19 fake news detection

Y Bang, E Ishii, S Cahyawijaya, Z Ji, P Fung - Combating Online Hostile …, 2021 - Springer
Amid the pandemic COVID-19, the world is facing unprecedented infodemic with the
proliferation of both fake and real information. Considering the problematic consequences …

Analyzing user perspectives on mobile app privacy at scale

P Nema, P Anthonysamy, N Taft… - Proceedings of the 44th …, 2022 - dl.acm.org
In this paper we present a methodology to analyze users' concerns and perspectives about
privacy at scale. We leverage NLP techniques to process millions of mobile app reviews and …