这是indexloc提供的服务,不要输入任何密码
Skip to main content

Showing 1–29 of 29 results for author: Watson, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.09023  [pdf, ps, other

    cs.SE cs.AI cs.MA

    Accelerating Drug Discovery Through Agentic AI: A Multi-Agent Approach to Laboratory Automation in the DMTA Cycle

    Authors: Yao Fehlis, Charles Crain, Aidan Jensen, Michael Watson, James Juhasz, Paul Mandel, Betty Liu, Shawn Mahon, Daren Wilson, Nick Lynch-Jonely, Ben Leedom, David Fuller

    Abstract: The pharmaceutical industry faces unprecedented challenges in drug discovery, with traditional approaches struggling to meet modern therapeutic development demands. This paper introduces a novel AI framework, Tippy, that transforms laboratory automation through specialized AI agents operating within the Design-Make-Test-Analyze (DMTA) cycle. Our multi-agent system employs five specialized agents -… ▽ More

    Submitted 11 July, 2025; originally announced July 2025.

  2. arXiv:2507.06261  [pdf, ps, other

    cs.CL cs.AI

    Gemini 2.5: Pushing the Frontier with Advanced Reasoning, Multimodality, Long Context, and Next Generation Agentic Capabilities

    Authors: Gheorghe Comanici, Eric Bieber, Mike Schaekermann, Ice Pasupat, Noveen Sachdeva, Inderjit Dhillon, Marcel Blistein, Ori Ram, Dan Zhang, Evan Rosen, Luke Marris, Sam Petulla, Colin Gaffney, Asaf Aharoni, Nathan Lintz, Tiago Cardal Pais, Henrik Jacobsson, Idan Szpektor, Nan-Jiang Jiang, Krishna Haridasan, Ahmed Omran, Nikunj Saunshi, Dara Bahri, Gaurav Mishra, Eric Chu , et al. (3284 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 2.X model family: Gemini 2.5 Pro and Gemini 2.5 Flash, as well as our earlier Gemini 2.0 Flash and Flash-Lite models. Gemini 2.5 Pro is our most capable model yet, achieving SoTA performance on frontier coding and reasoning benchmarks. In addition to its incredible coding and reasoning skills, Gemini 2.5 Pro is a thinking model that excels at multimodal unde… ▽ More

    Submitted 22 July, 2025; v1 submitted 7 July, 2025; originally announced July 2025.

    Comments: 72 pages, 17 figures

  3. arXiv:2506.20553  [pdf, ps, other

    cs.RO

    Leveraging Correlation Across Test Platforms for Variance-Reduced Metric Estimation

    Authors: Rachel Luo, Heng Yang, Michael Watson, Apoorva Sharma, Sushant Veer, Edward Schmerling, Marco Pavone

    Abstract: Learning-based robotic systems demand rigorous validation to assure reliable performance, but extensive real-world testing is often prohibitively expensive, and if conducted may still yield insufficient data for high-confidence guarantees. In this work, we introduce a general estimation framework that leverages paired data across test platforms, e.g., paired simulation and real-world observations,… ▽ More

    Submitted 25 June, 2025; originally announced June 2025.

  4. arXiv:2504.10165  [pdf, other

    cs.CV cs.AI

    WildLive: Near Real-time Visual Wildlife Tracking onboard UAVs

    Authors: Nguyen Ngoc Dat, Tom Richardson, Matthew Watson, Kilian Meier, Jenna Kline, Sid Reid, Guy Maalouf, Duncan Hine, Majid Mirmehdi, Tilo Burghardt

    Abstract: Live tracking of wildlife via high-resolution video processing directly onboard drones is widely unexplored and most existing solutions rely on streaming video to ground stations to support navigation. Yet, both autonomous animal-reactive flight control beyond visual line of sight and/or mission-specific individual and behaviour recognition tasks rely to some degree on this capability. In response… ▽ More

    Submitted 23 May, 2025; v1 submitted 14 April, 2025; originally announced April 2025.

  5. arXiv:2504.07744  [pdf, ps, other

    cs.CV

    MMLA: Multi-Environment, Multi-Species, Low-Altitude Drone Dataset

    Authors: Jenna Kline, Samuel Stevens, Guy Maalouf, Camille Rondeau Saint-Jean, Dat Nguyen Ngoc, Majid Mirmehdi, David Guerin, Tilo Burghardt, Elzbieta Pastucha, Blair Costelloe, Matthew Watson, Thomas Richardson, Ulrik Pagh Schultz Lundquist

    Abstract: Real-time wildlife detection in drone imagery supports critical ecological and conservation monitoring. However, standard detection models like YOLO often fail to generalize across locations and struggle with rare species, limiting their use in automated drone deployments. We present MMLA, a novel multi-environment, multi-species, low-altitude drone dataset collected across three sites (Ol Pejeta… ▽ More

    Submitted 3 June, 2025; v1 submitted 10 April, 2025; originally announced April 2025.

    Comments: Accepted at CVPR Workshop, CV4Animals 2025

  6. arXiv:2503.19786  [pdf, other

    cs.CL cs.AI

    Gemma 3 Technical Report

    Authors: Gemma Team, Aishwarya Kamath, Johan Ferret, Shreya Pathak, Nino Vieillard, Ramona Merhej, Sarah Perrin, Tatiana Matejovicova, Alexandre Ramé, Morgane Rivière, Louis Rouillard, Thomas Mesnard, Geoffrey Cideron, Jean-bastien Grill, Sabela Ramos, Edouard Yvinec, Michelle Casbon, Etienne Pot, Ivo Penchev, Gaël Liu, Francesco Visin, Kathleen Kenealy, Lucas Beyer, Xiaohai Zhai, Anton Tsitsulin , et al. (191 additional authors not shown)

    Abstract: We introduce Gemma 3, a multimodal addition to the Gemma family of lightweight open models, ranging in scale from 1 to 27 billion parameters. This version introduces vision understanding abilities, a wider coverage of languages and longer context - at least 128K tokens. We also change the architecture of the model to reduce the KV-cache memory that tends to explode with long context. This is achie… ▽ More

    Submitted 25 March, 2025; originally announced March 2025.

  7. arXiv:2501.01484  [pdf, other

    astro-ph.EP astro-ph.IM cs.LG

    Sequencing Silicates in the IRS Debris Disk Catalog I: Methodology for Unsupervised Clustering

    Authors: Cicero X. Lu, Tushar Mittal, Christine H. Chen, Alexis Y. Li, Kadin Worthen, B. A. Sargent, Carey M. Lisse, G. C. Sloan, Dean C. Hines, Dan M. Watson, Isabel Rebollido, Bin B. Ren, Joel D. Green

    Abstract: Debris disks, which consist of dust, planetesimals, planets, and gas, offer a unique window into the mineralogical composition of their parent bodies, especially during the critical phase of terrestrial planet formation spanning 10 to a few hundred million years. Observations from the $\textit{Spitzer}$ Space Telescope have unveiled thousands of debris disks, yet systematic studies remain scarce,… ▽ More

    Submitted 2 January, 2025; originally announced January 2025.

    Comments: 23 pages, 16 figures, Accepted to ApJS, $\texttt{CLUES}$ software available on GitHub

  8. arXiv:2408.00118  [pdf, other

    cs.CL cs.AI

    Gemma 2: Improving Open Language Models at a Practical Size

    Authors: Gemma Team, Morgane Riviere, Shreya Pathak, Pier Giuseppe Sessa, Cassidy Hardin, Surya Bhupatiraju, Léonard Hussenot, Thomas Mesnard, Bobak Shahriari, Alexandre Ramé, Johan Ferret, Peter Liu, Pouya Tafti, Abe Friesen, Michelle Casbon, Sabela Ramos, Ravin Kumar, Charline Le Lan, Sammy Jerome, Anton Tsitsulin, Nino Vieillard, Piotr Stanczyk, Sertan Girgin, Nikola Momchev, Matt Hoffman , et al. (173 additional authors not shown)

    Abstract: In this work, we introduce Gemma 2, a new addition to the Gemma family of lightweight, state-of-the-art open models, ranging in scale from 2 billion to 27 billion parameters. In this new version, we apply several known technical modifications to the Transformer architecture, such as interleaving local-global attentions (Beltagy et al., 2020a) and group-query attention (Ainslie et al., 2023). We al… ▽ More

    Submitted 2 October, 2024; v1 submitted 31 July, 2024; originally announced August 2024.

  9. arXiv:2406.00555  [pdf

    eess.IV cs.CV

    Length-scale study in deep learning prediction for non-small cell lung cancer brain metastasis

    Authors: Haowen Zhou, Steven, Lin, Mark Watson, Cory T. Bernadt, Oumeng Zhang, Ramaswamy Govindan, Richard J. Cote, Changhuei Yang

    Abstract: Deep learning assisted digital pathology has the potential to impact clinical practice in significant ways. In recent studies, deep neural network (DNN) enabled analysis outperforms human pathologists. Increasing sizes and complexity of the DNN architecture generally improves performance at the cost of DNN's explainability. For pathology, this lack of DNN explainability is particularly problematic… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  10. arXiv:2405.20247  [pdf, other

    cs.AI cs.CV cs.LG cs.SE

    KerasCV and KerasNLP: Vision and Language Power-Ups

    Authors: Matthew Watson, Divyashree Shivakumar Sreepathihalli, Francois Chollet, Martin Gorner, Kiranbir Sodhia, Ramesh Sampath, Tirth Patel, Haifeng Jin, Neel Kovelamudi, Gabriel Rasskin, Samaneh Saadat, Luke Wood, Chen Qian, Jonathan Bischof, Ian Stenbit, Abheesht Sharma, Anshuman Mishra

    Abstract: We present the Keras domain packages KerasCV and KerasNLP, extensions of the Keras API for Computer Vision and Natural Language Processing workflows, capable of running on either JAX, TensorFlow, or PyTorch. These domain packages are designed to enable fast experimentation, with a focus on ease-of-use and performance. We adopt a modular, layered design: at the library's lowest level of abstraction… ▽ More

    Submitted 5 June, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

    Comments: Submitted to Journal of Machine Learning Open Source Software

    ACM Class: I.2.5; I.2.7; I.2.10

  11. arXiv:2405.17965  [pdf, other

    cs.CV

    AttenCraft: Attention-guided Disentanglement of Multiple Concepts for Text-to-Image Customization

    Authors: Junjie Shentu, Matthew Watson, Noura Al Moubayed

    Abstract: With the unprecedented performance being achieved by text-to-image (T2I) diffusion models, T2I customization further empowers users to tailor the diffusion model to new concepts absent in the pre-training dataset, termed subject-driven generation. Moreover, extracting several new concepts from a single image enables the model to learn multiple concepts, and simultaneously decreases the difficultie… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  12. arXiv:2404.10754  [pdf

    cs.ET cs.CY cs.HC eess.SY

    A Systematic Survey of the Gemini Principles for Digital Twin Ontologies

    Authors: James Michael Tooth, Nilufer Tuptuk, Jeremy Daniel McKendrick Watson

    Abstract: Ontologies are widely used for achieving interoperable Digital Twins (DTws), yet competing DTw definitions compound interoperability issues. Semantically linking these differing twins is feasible through ontologies and Cognitive Digital Twins (CDTws). However, it is often unclear how ontology use bolsters broader DTw advancements. This article presents a systematic survey following the PRISMA meth… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 35 pages + 4 page appendix, 8 figures

  13. arXiv:2402.09966  [pdf, other

    cs.CV

    Textual Localization: Decomposing Multi-concept Images for Subject-Driven Text-to-Image Generation

    Authors: Junjie Shentu, Matthew Watson, Noura Al Moubayed

    Abstract: Subject-driven text-to-image diffusion models empower users to tailor the model to new concepts absent in the pre-training dataset using a few sample images. However, prevalent subject-driven models primarily rely on single-concept input images, facing challenges in specifying the target concept when dealing with multi-concept input images. To this end, we introduce a textual localized text-to-ima… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  14. arXiv:2310.00933  [pdf, other

    cs.OS cs.CR

    Case Study: Securing MMU-less Linux Using CHERI

    Authors: Hesham Almatary, Alfredo Mazzinghi, Robert N. M. Watson

    Abstract: MMU-less Linux variant lacks security because it does not have protection or isolation mechanisms. It also does not use MPUs as they do not fit with its software model because of the design drawbacks of MPUs (\ie coarse-grained protection with fixed number of protected regions). We secure the existing MMU-less Linux version of the RISC-V port using CHERI. CHERI is a hardware-software capability-ba… ▽ More

    Submitted 18 January, 2024; v1 submitted 2 October, 2023; originally announced October 2023.

  15. arXiv:2305.05108  [pdf

    cs.CR cs.CY

    Socio-Technical Security Modelling: Analysis of State-of-the-Art, Application, and Maturity in Critical Industrial Infrastructure Environments/Domains

    Authors: Uchenna D Ani, Jeremy M Watson, Nilufer Tuptuk, Steve Hailes, Aslam Jawar

    Abstract: This study explores the state-of-the-art, application, and maturity of socio-technical security models for industries and sectors dependent on CI and investigates the gap between academic research and industry practices concerning the modelling of both the social and technical aspects of security. Systematic study and critical analysis of literature show that a steady and growing on socio-technica… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: 56 Pages, 15 Figures, 4 tables, PETRAS 2 MASS Project Deliverable 2

  16. arXiv:2208.07965  [pdf

    cs.CR

    Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation

    Authors: Uchenna D Ani, Jeremy D McK Watson, Nilufer Tuptuk, Steve Hailes, Madeline Carr, Carsten Maple

    Abstract: The UK Critical National Infrastructure is critically dependent on digital technologies that provide communications, monitoring, control, and decision-support functionalities. Digital technologies are progressively enhancing efficiency, reliability, and availability of infrastructure, and enabling new benefits not previously available. These benefits can introduce vulnerabilities through the conne… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: 7 pages, 5 Figures, Policy Briefing

  17. arXiv:2206.02852  [pdf, other

    cs.CR

    CompartOS: CHERI Compartmentalization for Embedded Systems

    Authors: Hesham Almatary, Michael Dodson, Jessica Clarke, Peter Rugg, Ivan Gomes, Michal Podhradsky, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson

    Abstract: Existing high-end embedded systems face frequent security attacks. Software compartmentalization is one technique to limit the attacks' effects to the compromised compartment and not the entire system. Unfortunately, the existing state-of-the-art embedded hardware-software solutions do not work well to enforce software compartmentalization for high-end embedded systems. MPUs are not fine-grained a… ▽ More

    Submitted 11 June, 2022; v1 submitted 6 June, 2022; originally announced June 2022.

  18. arXiv:2108.06457  [pdf, other

    cs.CR math.NT

    Probability Distributions for Elliptic Curves in the CGL Hash Function

    Authors: Dhruv Bhatia, Kara Fagerstrom, Maximillian Watson

    Abstract: Hash functions map data of arbitrary length to data of predetermined length. Good hash functions are hard to predict, making them useful in cryptography. We are interested in the elliptic curve CGL hash function, which maps a bitstring to an elliptic curve by traversing an input-determined path through an isogeny graph. The nodes of an isogeny graph are elliptic curves, and the edges are special m… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

    Comments: 34 pages, 15 figures. Written during the 2021 Rose Hulman Institute of Technology Mathematics REU

  19. arXiv:2105.06791  [pdf, other

    cs.LG

    Agree to Disagree: When Deep Learning Models With Identical Architectures Produce Distinct Explanations

    Authors: Matthew Watson, Bashar Awwad Shiekh Hasan, Noura Al Moubayed

    Abstract: Deep Learning of neural networks has progressively become more prominent in healthcare with models reaching, or even surpassing, expert accuracy levels. However, these success stories are tainted by concerning reports on the lack of model transparency and bias against some medical conditions or patients' sub-groups. Explainable methods are considered the gateway to alleviate many of these concerns… ▽ More

    Submitted 30 October, 2021; v1 submitted 14 May, 2021; originally announced May 2021.

    Comments: 9 pages, 5 figures, 3 tables

    ACM Class: I.2

  20. arXiv:2105.01959  [pdf, other

    cs.LG cs.CR

    Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning

    Authors: Matthew Watson, Noura Al Moubayed

    Abstract: Explainable machine learning has become increasingly prevalent, especially in healthcare where explainable models are vital for ethical and trusted automated decision making. Work on the susceptibility of deep learning models to adversarial attacks has shown the ease of designing samples to mislead a model into making incorrect predictions. In this work, we propose a model agnostic explainability-… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: 13 pages, 6 figures, accepted to ICPR 2020

    ACM Class: I.2; I.4

  21. arXiv:2101.08812  [pdf

    cs.CY

    The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (Policy Brief)

    Authors: Feja Lesniewska, Uchenna D Ani, Jeremy M Watson, Madeline Carr

    Abstract: In January 2019, the UK Government published its Maritime 2050 on Navigating the Future strategy. In the strategy, the government highlighted the importance of digitalization (with well-designed regulatory support) to achieve its goal of ensuring that the UK plays a global leadership role in the maritime sector. Ports, the gateways for 95% of UK trade movements, were identified as key sites for in… ▽ More

    Submitted 21 January, 2021; originally announced January 2021.

    Comments: 4 pages, 3 Figures, Policy Briefing, Based on research funded by EPSR and carried out by UCL STEaPP NIPC-ALIoTT collaboration project under the PETRAS Cybersecurity Hub

    Journal ref: The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (A Policy Brief). London: PETRAS National Centre of Excellence for IoT System Cybersecurity (2019)

  22. arXiv:1911.01471  [pdf

    cs.CR

    Design Considerations for Building Credible Security Testbeds: A Systematic Study of Industrial Control System Use Cases

    Authors: Uchenna D Ani, Jeremy M Watson, Benjamin Green, Barnaby Craggs, Jason Nurse

    Abstract: This paper presents a mapping framework for design factors and implementation process for building credible Industrial Control Systems (ICS) security testbeds. The resilience of ICSs has become a critical concern to operators and governments following widely publicised cyber security events. The inability to apply conventional Information Technology security practice to ICSs further compounds chal… ▽ More

    Submitted 4 November, 2019; originally announced November 2019.

    Comments: 17 pages (including Appendix), 2 Figures, 4 Tables, A Research output from the Analytical Lenses for Internet of Things Threats (ALIoTT) project

  23. arXiv:1910.05382  [pdf, other

    eess.SP cs.RO

    Robust Incremental State Estimation through Covariance Adaptation

    Authors: Ryan M. Watson, Jason N. Gross, Clark N. Taylor, Robert C. Leishman

    Abstract: Recent advances in the fields of robotics and automation have spurred significant interest in robust state estimation. To enable robust state estimation, several methodologies have been proposed. One such technique, which has shown promising performance, is the concept of iteratively estimating a Gaussian Mixture Model (GMM), based upon the state estimation residuals, to characterize the measureme… ▽ More

    Submitted 11 October, 2019; originally announced October 2019.

    Comments: 8 pages, 4 figures, 2 tables, submitted to IEEE Robotics and Automation Letters

  24. Enabling Robust State Estimation through Measurement Error Covariance Adaptation

    Authors: Ryan M. Watson, Jason N. Gross, Clark N. Taylor, Robert C. Leishman

    Abstract: Accurate platform localization is an integral component of most robotic systems. As these robotic systems become more ubiquitous, it is necessary to develop robust state estimation algorithms that are able to withstand novel and non-cooperative environments. When dealing with novel and non-cooperative environments, little is known a priori about the measurement error uncertainty, thus, there is a… ▽ More

    Submitted 13 August, 2019; v1 submitted 10 June, 2019; originally announced June 2019.

    Comments: 14 pages, 13 figures, Submitted to IEEE Transactions on Aerospace And Electronic Systems

  25. arXiv:1904.02225  [pdf, other

    cs.CV

    Revisiting Visual Grounding

    Authors: Erik Conser, Kennedy Hahn, Chandler M. Watson, Melanie Mitchell

    Abstract: We revisit a particular visual grounding method: the "Image Retrieval Using Scene Graphs" (IRSG) system of Johnson et al. (2015). Our experiments indicate that the system does not effectively use its learned object-relationship models. We also look closely at the IRSG dataset, as well as the widely used Visual Relationship Dataset (VRD) that is adapted from it. We find that these datasets exhibit… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: To appear in Proceedings of the Workshop on Shortcomings in Vision and Language, NAACL-2019, ACL

  26. arXiv:1904.01551  [pdf

    cs.CR cs.NI eess.SY

    A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape

    Authors: Uchenna D Ani, Jeremy D McK. Watson, Jason R. C. Nurse, Al Cook, Carsten Maple

    Abstract: As new technologies such as the Internet of Things (IoT) are integrated into Critical National Infrastructures (CNI), new cybersecurity threats emerge that require specific security solutions. Approaches used for analysis include the modelling and simulation of critical infrastructure systems using attributes, functionalities, operations, and behaviours to support various security analysis viewpoi… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

    Comments: PETRAS/IET Conference Living in the Internet of Things: Cybersecurity of the IoT 2019

  27. arXiv:1806.08899  [pdf, other

    cs.RO

    Robust Navigation In GNSS Degraded Environment Using Graph Optimization

    Authors: Ryan M. Watson, Jason N. Gross

    Abstract: Robust navigation in urban environments has received a considerable amount of both academic and commercial interest over recent years. This is primarily due to large commercial organizations such as Google and Uber stepping into the autonomous navigation market. Most of this research has shied away from Global Navigation Satellite System (GNSS) based navigation. The aversion to utilizing GNSS data… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: 7 pages, 8 figures, Proceedings of the 30th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2017)

  28. Evaluation of Kinematic Precise Point Positioning Convergence with an Incremental Graph Optimizer

    Authors: Ryan M. Watson, Jason N. Gross

    Abstract: Estimation techniques to precisely localize a kinematic platform with GNSS observables can be broadly partitioned into two categories: differential, or undifferenced. The differential techniques (e.g., real-time kinematic (RTK)) have several attractive properties, such as correlated error mitigation and fast convergence; however, to support a differential processing scheme, an infrastructure of re… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: 8 pages

    Journal ref: 2018 IEEE/ION Position, Location and Navigation Symposium (PLANS)

  29. arXiv:1401.2209  [pdf, other

    cs.NI

    Using the Buffer to Avoid Rebuffers: Evidence from a Large Video Streaming Service

    Authors: Te-Yuan Huang, Ramesh Johari, Nick McKeown, Matthew Trunnell, Mark Watson

    Abstract: To provide a better streaming experience, video clients today select their video rates by observing and estimating the available capacity. Recent work has shown that capacity estimation is fraught with difficulties because of complex interactions between the ABR control loop, HTTP server performance and TCP congestion control. Estimation-based rate selection algorithms can lead to unnecessary rebu… ▽ More

    Submitted 9 January, 2014; originally announced January 2014.