Advanced search

Showing result 1 - 5 of 32 essays matching the above criteria.

  1. 1. Mitigating Unintended Bias in Toxic Comment Detection using Entropy-based Attention Regularization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fabio Camerota; [2023]
    Keywords : XLNet; BERT; Toxic Comment Classification; Entropy-based Attention Regularization; XLNet; BERT; Toxisk Kommentar Klassificering; Entropibaserad uppmärksamhetsreglering;

    Abstract : The proliferation of hate speech is a growing challenge for social media platforms, as toxic online comments can have dangerous consequences also in real life. There is a need for tools that can automatically and reliably detect hateful comments, and deep learning models have proven effective in solving this issue. READ MORE

  2. 2. Investigating programming language support for fault-tolerance

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ismail Demirkoparan; [2023]
    Keywords : Dataflow; Fault tolerance; Data streaming; Distributed systems; Checkpointing; Logging; Lineage; Lineage stash; Arc-Lang; Apache Flink;

    Abstract : Dataflow systems have become the norm for developing data-intensive computing applications. These systems provide transparent scalability and fault tolerance. For fault tolerance, many dataflow-system adopt a snapshotting approach which persists the state of an operator once it has received a snapshot marker on all its input channels. READ MORE

  3. 3. Intermediate-mass black hole binary as an origin of super-massive black holes

    University essay from Lunds universitet/Astrofysik; Lunds universitet/Fysiska institutionen

    Author : Isabelle Signe Maj Maria Thord; [2023]
    Keywords : Intermediate-mass black holes; binary; merger; hardening; encounters; Physics and Astronomy;

    Abstract : Galactic nuclei contain super-massive black holes (SMBHs), nuclear stellar clusters (NSCs), or both. In the NSC, intermediate-mass black holes (IMBHs) are likely to reside and form highly eccentric binaries. Over time, the orbit of a binary could harden via interaction with surrounding low-mass stars. READ MORE

  4. 4. Static Analysis Of Client-Side JavaScript Code To Detect Server-Side Business Logic Vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frederick van der Windt; [2023]
    Keywords : JavaScript; Static Analysis; Business Logic Vulnerabilities; Client-side; Fuzzing; Black-box; JavaScript; statisk analys; sårbarheter i affärslogiken; klientsidan; Fuzzing; Black-box;

    Abstract : In the real world, web applications are crucial in various domains, from e-commerce to finance and healthcare. However, these applications are not immune to vulnerabilities, particularly in business logic. Detecting such vulnerabilities can be challenging due to the complexity and diversity of application functionality. READ MORE

  5. 5. Cracking the AI-gma Code? - The Interpretability and Explainability of AI in light of Forst’s Right to Justification

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Suana Tafic; [2023]
    Keywords : EU law; EU-rätt; AI; Artificial Intelligence; Artificiell Intelligens; AI Act; AI-Act; AI-förordningen; GDPR; Right to Justification; Human rights; Fundamental Rights; Mänskliga rättigheter; Transparency; Explainability; Interpretability; Transparens; Förklarbarhet; Tolkningsbarhet; Trustworthy AI; tillförlitlig AI; Black Box; Opacitet; IT-rätt; Forst; Law and Political Science;

    Abstract : In April 2018 the European Commission took their first step into establishing the European AI Strategy, which aims to make Europe the world-leading centre for AI while ensuring fundamental rights and freedoms. In April 2021 the proposal for a regulation on artificial intelligence, referred to as the AI Act, was announced. READ MORE