1.
In this paper, we present our experience integrating Rust, a memory-safe systems programming language, into an introductory database systems course project. Our findings [...]
28 July 2025 | Computer Science | Article |
2.
Concurrency bugs are difficult to detect, reproduce, and diagnose, as they manifest under rare timing conditions. Recently, active delay injection has proven efficient fo [...]
08 May 2023 | Computer Science | Article |
3.
Quantum neural networks, parameterized quantum circuits optimized under a specific cost function, provide a paradigm for achieving near-term quantum advantage in quantum [...]
06 August 2025 | Computer Science[...] | Article |
4.
The computing continuum describes the convergence of global compute infrastructure as network bandwidths increase. To mobilize that infrastructure, we need to create a sy [...]
2025-08 | Computer Science | Dissertation |
5.
Today’s data practitioners operate in an open world of data—a setting where data is vast, messy, and constantly evolving. There is no complete catalog or consistent schem [...]
2025-08 | Computer Science | Dissertation |
6.
Generative modeling and representation learning are core pillars of modern machine learning and computer vision. In recent years, the field has progressed from analyzing [...]
2025-08 | Computer Science | Dissertation |
7.
Artificial Intelligence was once seen as a net good---an engine of progress, efficiency, and creativity. That view no longer holds. Today, the unchecked rise of generativ [...]
2025-08 | Computer Science | Dissertation |
8.
Modern software systems are designed for high availability, resilience, and performance. Their scale, however, makes them prone to latent, complex bugs that escape in-hou [...]
2025-08 | Computer Science | Dissertation |
9.
Scientific machine learning offers methods of building approximate but efficient solutions to challenging tasks in scientific computing, such as simulating a physical phe [...]
2025-08 | Computer Science | Dissertation |
10.
In every enterprise database, administrators must define an access control policy that specifies which users have access to which tables. Access control straddles two wor [...]
2025-08 | Computer Science | Dissertation |
11.
In computability theory, the classical definition of a Turing machine M solving a problem requires M to always halt and always give the right answer. If we relax the “alw [...]
2025-08 | Computer Science | Dissertation |
12.
Clinical notes should capture important information from a physician-patient encounter, but they may also contain signals indicative of physician fatigue. Using data from [...]
01 July 2025 | Computer Science | Article |
13.
In higher-order languages, a function captures its free variables in a closure, often implemented as a flat record. While this simple structure is effective, more sophist [...]
2024-12 | Computer Science | Thesis |
14.
Coaxing out desired behavior from pretrained models, while avoiding undesirable ones, has redefined Natural Language Processing (NLP) and is reshaping how we interact wit [...]
30 June 2025 | Computer Science | Article |
15.
Exchange-only (EO) spin qubits in quantum dots offer an expansive design landscape for engineering scalable device layouts. The study of two-EO-qubit operations, which in [...]
16 May 2025 | Computer Science | Article |
16.
Engaging consumers with e-waste rather than relegating it to manufacturers.
05 June 2025 | Computer Science | Article |
17.
With the explosive progress of machine learning (ML), especially recent foundation models, these advanced systems are increasingly reshaping our daily workflows across do [...]
2025-08 | Computer Science | Dissertation |
18.
The development of explainable artificial intelligence (AI) has become a crucial step in enhancing model transparency, robustness, and usability. This thesis explores the [...]
2025-08 | Computer Science | Dissertation |
19.
The proliferation of Compound AI systems, which integrate multiple models and data streams for real-time decision-making, present significant challenges in achieving low [...]
2025-08 | Computer Science | Dissertation |
20.
Today, a wide range of machine learning applications, including video analytics and large language model (LLM) applications, are becoming distributed. Specifically, they [...]
2025-08 | Computer Science | Dissertation |
21.
Foundation models, such as large language models (LLMs), operate within vector spaces, whereas human perception of concepts does not naturally align with this framework. [...]
2025-08 | Computer Science | Dissertation |
22.
This dissertation investigates machine learning (ML) approaches for modeling complex physical systems across multiple domains. We examine three interconnected research ar [...]
2025-08 | Computer Science | Dissertation |
23.
Energy-harvesting sensors utilize local, ambient energy resources to operate and thus eliminate the need for batteries. A key challenge for such systems is avoiding power [...]
07 May 2025 | Computer Science | Article |
24.
As artificial intelligence systems grow increasingly powerful and influential, their design often overlooks the critical incentive structures embedded within the environm [...]
2025-06 | Computer Science | Dissertation |
25.
Modern computer networks generate extensive amounts of data that can benefit network research, management, and security. This data is fast-evolving, increasingly encrypt [...]
2025-06 | Computer Science | Dissertation |