Shivam Handa
YOU?
Author Swipe
View article: Supply-Chain Vulnerability Elimination via Active Learning and Regeneration
Supply-Chain Vulnerability Elimination via Active Learning and Regeneration Open
Software supply-chain attacks target components that are integrated into client applications. Such attacks often target widely-used components, with the attack taking place via operations (for example, file system or network accesses) that…
View article: An order-aware dataflow model for parallel Unix pipelines
An order-aware dataflow model for parallel Unix pipelines Open
We present a dataflow model for modelling parallel Unix shell pipelines. To accurately capture the semantics of complex Unix pipelines, the dataflow model is order-aware, i.e., the order in which a node in the dataflow graph consumes input…
View article: Inductive Program Synthesis over Noisy Datasets using Abstraction Refinement Based Optimization
Inductive Program Synthesis over Noisy Datasets using Abstraction Refinement Based Optimization Open
We present a new synthesis algorithm to solve program synthesis over noisy datasets, i.e., data that may contain incorrect/corrupted input-output examples. Our algorithm uses an abstraction refinement based optimization process to synthesi…
View article: Program Synthesis Over Noisy Data with Guarantees
Program Synthesis Over Noisy Data with Guarantees Open
We explore and formalize the task of synthesizing programs over noisy data, i.e., data that may contain corrupted input-output examples. By formalizing the concept of a Noise Source, an Input Source, and a prior distribution over programs,…
View article: Optimal Program Synthesis Over Noisy Data
Optimal Program Synthesis Over Noisy Data Open
We explore and formalize the task of synthesizing programs over noisy data, i.e., data that may contain corrupted input-output examples. By formalizing the concept of a Noise Source, an Input Source, and a prior distribution over programs,…
View article: An Order-Aware Dataflow Model for Parallel Unix Pipelines
An Order-Aware Dataflow Model for Parallel Unix Pipelines Open
We present a dataflow model for modelling parallel Unix shell pipelines. To accurately capture the semantics of complex Unix pipelines, the dataflow model is order-aware, i.e., the order in which a node in the dataflow graph consumes input…
View article: Landau quantization of a circular Quantum Dot using the BenDaniel-Duke boundary condition
Landau quantization of a circular Quantum Dot using the BenDaniel-Duke boundary condition Open
View article: Compositional Inference Metaprogramming with Convergence Guarantees
Compositional Inference Metaprogramming with Convergence Guarantees Open
Inference metaprogramming enables effective probabilistic programming by supporting the decomposition of executions of probabilistic programs into subproblems and the deployment of hybrid probabilistic inference algorithms that apply diffe…
View article: Composable inference metaprogramming using subproblems
Composable inference metaprogramming using subproblems Open
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019