Customer-obsessed science
Research areas
-
January 14, 2025Key exchange protocols and authentication mechanisms solve distinct problems and must be integrated in a secure communication system.
-
December 24, 2024
-
December 24, 2024
-
-
Featured news
-
2024Abductive reasoning is the process of making educated guesses to provide explanations for observations. Although many applications require the use of knowledge for explanations, the utilization of abductive reasoning in conjunction with structured knowledge, such as a knowledge graph, remains largely unexplored. To fill this gap, this paper introduces the task of complex logical hypothesis generation, as
-
EPTC 20242024Plastic encapsulation is a key feature for System-in-Package (SiP) technology as it provides robust mechanical protection and structural support for all the electronic components enclosed within the package. This allows a highly compact design with minimal component-to-component spacing without compromising long-term reliability and performance. However, as the density and complexity of SiP modules continue
-
2024In-context learning (ICL) adapts Large Language Models (LLMs) to new tasks, without requiring any parameter updates, but few an-notated examples as input. In this work, we investigate selective annotation for ICL, where there is a limited budget for annotating examples, similar to low-budget active learning (AL). Although uncertainty-based selection is unreliable with few annotated data, we present COVERICL
-
LoG 20242024Graph clustering on text-attributed graphs (TAGS), i.e., graphs that include natural language text as additional node information, is typically performed using graph neural networks (GNNs), which forego the text in lieu of embeddings. While GNN methods ensure scalability and effectively leverage graph topology, text attributes contain rich information that can be leveraged using large language models (LLMs
-
2024The superior performance of large foundation models relies on the use of massive amounts of high-quality data, which often contain sensitive, private and copyrighted material that requires formal protection. While differential privacy (DP) is a prominent method to gauge the degree of security provided to the models, its application is commonly limited to the model fine-tuning stage, due to the performance
Academia
View allWhether you're a faculty member or student, there are number of ways you can engage with Amazon.
View all