Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Shashank Srikant"'
Autor:
Anna A Ivanova, Shashank Srikant, Yotaro Sueoka, Hope H Kean, Riva Dhamala, Una-May O'Reilly, Marina U Bers, Evelina Fedorenko
Publikováno v:
eLife, Vol 9 (2020)
Computer programming is a novel cognitive tool that has transformed modern society. What cognitive and neural mechanisms support this skill? Here, we used functional magnetic resonance imaging to investigate two candidate brain systems: the multiple
Externí odkaz:
https://doaj.org/article/6e076d6db2e14885b9691d3d61c7e8b3
Autor:
Greta Tuckute, Aalok Sathe, Shashank Srikant, Maya Taliaferro, Mingye Wang, Martin Schrimpf, Kendrick Kay, Evelina Fedorenko
Transformer language models are today’s most accurate models of language processing in the brain. Here, using fMRI-measured brain responses to 1,000 diverse sentences, we develop a GPT-based encoding model and use this model to identify new sentenc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::edae26b6285af3d4a2a95b9f48eb308d
https://doi.org/10.1101/2023.04.16.537080
https://doi.org/10.1101/2023.04.16.537080
Publikováno v:
Journal of Advanced Research in Dynamical and Control Systems. 11:119-125
Autor:
Yotaro Sueoka, Una-May O'Reilly, Riva Dhamala, Evelina Fedorenko, Shashank Srikant, Hope Kean, Marina Umaschi Bers, Anna Ivanova
Publikováno v:
eLife
eLife, Vol 9 (2020)
eLife, Vol 9 (2020)
Computer programming is a novel cognitive tool that has transformed modern society. An integral part of programming is code comprehension: the ability to process individual program tokens, combine them into statements, which, in turn, combine to form
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::185c063d0e265f4eca2320c4f8e34e93
https://doi.org/10.1101/2020.04.16.045732
https://doi.org/10.1101/2020.04.16.045732
Publikováno v:
AIP Conference Proceedings.
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
Botnets are a significant threat to cyber security. Compromised, a.k.a. malicious hosts in a network have, of late, been detected by machine learning from hand-crafted features directly sourced from different types of network logs. Our interest is in
Publikováno v:
Communications of the ACM. 62:60-61
Autor:
Shashank Srikant, Varun Aggarwal
Publikováno v:
SIGCSE
Data-driven decision making is fast becoming a necessary skill in jobs across the board. The industry today uses analytics and machine learning to get useful insights from a wealth of digital information in order to make decisions. With data science
Publikováno v:
KDD
Learning supervised models to grade open-ended responses is an expensive process. A model has to be trained for every prompt/question separately, which in turn requires graded samples. In automatic programming evaluation specifically, the focus of th