Search Results for author: Shailja Thakur

Found 8 papers, 1 papers with code

Make Every Move Count: LLM-based High-Quality RTL Code Generation Using MCTS

no code implementations5 Feb 2024 Matthew DeLorenzo, Animesh Basak Chowdhury, Vasudev Gohil, Shailja Thakur, Ramesh Karri, Siddharth Garg, Jeyavijayan Rajendran

Existing large language models (LLMs) for register transfer level code generation face challenges like compilation failures and suboptimal power, performance, and area (PPA) efficiency.

Code Generation Language Modelling

Towards the Imagenets of ML4EDA

no code implementations16 Oct 2023 Animesh Basak Chowdhury, Shailja Thakur, Hammond Pearce, Ramesh Karri, Siddharth Garg

Here we describe our experience curating two large-scale, high-quality datasets for Verilog code generation and logic synthesis.

Code Generation Data Augmentation

Are Emily and Greg Still More Employable than Lakisha and Jamal? Investigating Algorithmic Hiring Bias in the Era of ChatGPT

no code implementations8 Oct 2023 Akshaj Kumar Veldanda, Fabian Grob, Shailja Thakur, Hammond Pearce, Benjamin Tan, Ramesh Karri, Siddharth Garg

We replicate this experiment on state-of-art LLMs (GPT-3. 5, Bard, Claude and Llama) to evaluate bias (or lack thereof) on gender, race, maternity status, pregnancy status, and political affiliation.

VeriGen: A Large Language Model for Verilog Code Generation

no code implementations28 Jul 2023 Shailja Thakur, Baleegh Ahmad, Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri, Siddharth Garg

In this study, we explore the capability of Large Language Models (LLMs) to automate hardware design by generating high-quality Verilog code, a common language for designing and modeling digital systems.

Code Generation Language Modelling +1

LLM-assisted Generation of Hardware Assertions

no code implementations24 Jun 2023 Rahul Kande, Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, Shailja Thakur, Ramesh Karri, Jeyavijayan Rajendran

As vulnerabilities in hardware can have severe implications on a system, there is a need for techniques to support security verification activities.

Code Generation

Security and Interpretability in Automotive Systems

no code implementations23 Dec 2022 Shailja Thakur

The lack of any sender authentication mechanism in place makes CAN (Controller Area Network) vulnerable to security threats.

Decision Making Time Series Analysis

A generalizable saliency map-based interpretation of model outcome

no code implementations16 Jun 2020 Shailja Thakur, Sebastian Fischmeister

To fully exploit the capabilities of complex neural networks, we propose a non-intrusive interpretability technique that uses the input and output of the model to generate a saliency map.

Cannot find the paper you are looking for? You can Submit a new open access paper.