About
Currently, I am the co-founder and chief technology officer at patched.codes, a company…
Articles by Asankhaya
Contributions
Activity
-
Gemma 3 is here and its the best open non-reasoning model on LMSYS! 🚀Google DeepMind Gemma 3 is an open, multimodal (text + vision), multilingual…
Gemma 3 is here and its the best open non-reasoning model on LMSYS! 🚀Google DeepMind Gemma 3 is an open, multimodal (text + vision), multilingual…
Liked by Asankhaya Sharma
-
Here is Youtube Video about Kreatebots https://lnkd.in/gXd4MJWK In this Video, discover how Dataknobs LLMs can transform raw data into valuable…
Here is Youtube Video about Kreatebots https://lnkd.in/gXd4MJWK In this Video, discover how Dataknobs LLMs can transform raw data into valuable…
Liked by Asankhaya Sharma
-
Has anyone else noticed the rise in sophisticated 𝗶𝗻𝘁𝗲𝗿𝘃𝗶𝗲𝘄 𝗰𝗵𝗲𝗮𝘁𝗶𝗻𝗴 𝗺𝗲𝘁𝗵𝗼𝗱𝘀 lately? I've added links to some of these tools…
Has anyone else noticed the rise in sophisticated 𝗶𝗻𝘁𝗲𝗿𝘃𝗶𝗲𝘄 𝗰𝗵𝗲𝗮𝘁𝗶𝗻𝗴 𝗺𝗲𝘁𝗵𝗼𝗱𝘀 lately? I've added links to some of these tools…
Liked by Asankhaya Sharma
Experience
Education
Licenses & Certifications
Publications
-
Patched MOA: optimizing inference for diverse software development tasks
This paper introduces Patched MOA (Mixture of Agents), an inference optimization technique that significantly enhances the performance of large language models (LLMs) across diverse software development tasks. We evaluate three inference optimization algorithms - Best of N, Mixture of Agents, and Monte Carlo Tree Search and demonstrate that Patched MOA can boost the performance of smaller models to surpass that of larger, more expensive models. Notably, our approach improves the gpt-4o-mini…
This paper introduces Patched MOA (Mixture of Agents), an inference optimization technique that significantly enhances the performance of large language models (LLMs) across diverse software development tasks. We evaluate three inference optimization algorithms - Best of N, Mixture of Agents, and Monte Carlo Tree Search and demonstrate that Patched MOA can boost the performance of smaller models to surpass that of larger, more expensive models. Notably, our approach improves the gpt-4o-mini model's performance on the Arena-Hard-Auto benchmark by 15.52%, outperforming gpt-4-turbo at a fraction of the cost. We also apply Patched MOA to various software development workflows, showing consistent improvements in task completion rates. Our method is model-agnostic, transparent to end-users, and can be easily integrated into existing LLM pipelines. This work contributes to the growing field of LLM optimization, offering a cost-effective solution for enhancing model performance without the need for fine-tuning or larger models.
-
Patched RTC: evaluating LLMs for diverse software development tasks
This paper introduces Patched Round-Trip Correctness (Patched RTC), a novel evaluation technique for Large Language Models (LLMs) applied to diverse software development tasks, particularly focusing on "outer loop" activities such as bug fixing, code review, and documentation updates. Patched RTC extends the original Round-Trip Correctness method to work with any LLM and downstream task, offering a self-evaluating framework that measures consistency and robustness of model responses without…
This paper introduces Patched Round-Trip Correctness (Patched RTC), a novel evaluation technique for Large Language Models (LLMs) applied to diverse software development tasks, particularly focusing on "outer loop" activities such as bug fixing, code review, and documentation updates. Patched RTC extends the original Round-Trip Correctness method to work with any LLM and downstream task, offering a self-evaluating framework that measures consistency and robustness of model responses without human intervention. The study demonstrates a correlation between Patched RTC scores and task-specific accuracy metrics, presenting it as an alternative to the LLM-as-Judge paradigm for open-domain task evaluation. We implement Patched RTC in an open-source framework called patchwork, allowing for transparent evaluation during inference across various patchflows. Experiments comparing GPT-3.5 and GPT-4 models across different software development tasks reveal that Patched RTC effectively distinguishes model performance and task difficulty. The paper also explores the impact of consistency prompts on improving model accuracy, suggesting that Patched RTC can guide prompt refinement and model selection for complex software development workflows.
-
Certified Reasoning with Infinity
International Symposium on Formal Methods
We demonstrate how infinities improve the expressivity, power, readability,
conciseness, and compositionality of a program logic. We prove that adding
infinities to Presburger arithmetic enables these improvements without sacrificing
decidability. We develop Omega++, a Coq-certified decision procedure for
Presburger arithmetic with infinity and benchmark its performance. Both the program
and proof of Omega++ are paramaterized over user-selected semantics for
the indeterminate…We demonstrate how infinities improve the expressivity, power, readability,
conciseness, and compositionality of a program logic. We prove that adding
infinities to Presburger arithmetic enables these improvements without sacrificing
decidability. We develop Omega++, a Coq-certified decision procedure for
Presburger arithmetic with infinity and benchmark its performance. Both the program
and proof of Omega++ are paramaterized over user-selected semantics for
the indeterminate terms (such as 0 * ∞).Other authorsSee publication -
Exploiting undefined behaviors for efficient symbolic execution
ACM ICSE
Symbolic execution is an important and popular technique used in several software engineering tools for test case generation, debugging and program analysis. As such improving the performance of symbolic execution can have huge impact on the effectiveness of such tools. In this paper, we present a technique to systematically introduce undefined behaviors during compilation to speed up the subsequent symbolic execution of the program. We have implemented our technique inside LLVM and tested with…
Symbolic execution is an important and popular technique used in several software engineering tools for test case generation, debugging and program analysis. As such improving the performance of symbolic execution can have huge impact on the effectiveness of such tools. In this paper, we present a technique to systematically introduce undefined behaviors during compilation to speed up the subsequent symbolic execution of the program. We have implemented our technique inside LLVM and tested with an existing symbolic execution engine (Pathgrind). Preliminary results on the SIR repository benchmark are encouraging and show 48% speed up in time and 30% reduction in the number of constraints.
-
Cloud Based Document Delivery Service for Emerging Markets
ICSEM
Presented this paper on Services Design at ‘International Conference for Services in Emerging Markets’ (ICSEM, 2010)
-
PRISM: platform for remote sensing using smartphones
Proceeding MobiSys '10 Proceedings of the 8th international conference on Mobile systems, applications, and services
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, without the need for the application writer to reinvent the wheel each time. To this end, we present a Platform for Remote Sensing using Smartphones (PRISM) that balances the interconnected goals of generality, security, and scalability. PRISM allows application writers to package their applications as executable…
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, without the need for the application writer to reinvent the wheel each time. To this end, we present a Platform for Remote Sensing using Smartphones (PRISM) that balances the interconnected goals of generality, security, and scalability. PRISM allows application writers to package their applications as executable binaries, which offers efficiency and also the flexibility of reusing existing code modules. PRISM then pushes the application out automatically to an appropriate set of phones based on a specified set of predicates. This push model enables timely and scalable application deployment while still ensuring a good degree of privacy. To safely execute untrusted applications on the smartphones, while allowing them controlled access to sensitive sensor data, we augment standard software sandboxing with several PRISM-specific elements like resource metering and forced amnesia.
We present three applications built on our implementation of PRISM on Windows Mobile: citizen journalist, party thermometer, and road bump monitor. These applications vary in the set of sensors they use and in their mode of operation (depending on human input vs. automatic). We report on our experience from a small-scale deployment of these applications. We also present a large-scale simulation-based analysis of the scalability of PRISM's push model.Other authors -
Patents
-
Development pipeline integrated ongoing learning for assisted code remediation
Filed US20230409464A1
-
Open source vulnerability prediction with machine learning ensemble
Filed US 16/105,016
A system to create a stacked classifier model combination or classifier ensemble has been designed for identification of undisclosed flaws in software components on a large-scale. This classifier ensemble is capable of at least a 54.55% improvement in precision. The system uses a K-folding cross validation algorithm to partition a sample dataset and then train and test a set of N classifiers with the dataset folds. At each test iteration, trained models of the set of classifiers generate…
A system to create a stacked classifier model combination or classifier ensemble has been designed for identification of undisclosed flaws in software components on a large-scale. This classifier ensemble is capable of at least a 54.55% improvement in precision. The system uses a K-folding cross validation algorithm to partition a sample dataset and then train and test a set of N classifiers with the dataset folds. At each test iteration, trained models of the set of classifiers generate probabilities that a sample has a flaw, resulting in a set of N probabilities or predictions for each sample in the test data. With a sample size of S, the system passes the S sets of N predictions to a logistic regressor along with “ground truth” for the sample dataset to train a logistic regression model. The trained classifiers and the logistic regression model are stored as the classifier ensemble.
Other inventorsSee patent -
Software vulnerability graph database
Filed US 16/050,109
To analyze open-source code at a large scale, a security domain graph language (“SGL”) has been created that functions as a vulnerability description language and facilitates program analysis queries. The SGL facilitates building and maintaining a graph database to catalogue vulnerabilities found in open-source components. This graphical database can be accessed via a database interface directly or accessed by an agent that interacts with the database interface. To build the graph database, a…
To analyze open-source code at a large scale, a security domain graph language (“SGL”) has been created that functions as a vulnerability description language and facilitates program analysis queries. The SGL facilitates building and maintaining a graph database to catalogue vulnerabilities found in open-source components. This graphical database can be accessed via a database interface directly or accessed by an agent that interacts with the database interface. To build the graph database, a database interface processes an open-source component and creates graph structures which represent relationships present in the open-source component. The database interface transforms a vulnerability description into a canonical form based on a schema for the graph database and updates the database based on a determination of whether the vulnerability is a duplicate. This ensures quality and consistency of the vulnerability dataset maintained in the graph database.
Other inventorsSee patent -
Open-source software vulnerability analysis
Filed US 16/050,050
To analyze open-source code at a large scale, a security domain graph language (“SGL”) has been created that functions as a vulnerability description language and facilitates program analysis queries. The SGL facilitates building and maintaining a graph database to catalogue vulnerabilities found in open-source components. This vulnerability database generated with SGL is used for analysis of software projects which use open source components. An agent which interacts with the vulnerability…
To analyze open-source code at a large scale, a security domain graph language (“SGL”) has been created that functions as a vulnerability description language and facilitates program analysis queries. The SGL facilitates building and maintaining a graph database to catalogue vulnerabilities found in open-source components. This vulnerability database generated with SGL is used for analysis of software projects which use open source components. An agent which interacts with the vulnerability database can perform a scan of a software project to identify open-source components used in the project and submit queries to the vulnerability database to identify vulnerabilities which may affect the open-source components in the project. Results of the scan are presented to a user in the form of a vulnerability report which indicates vulnerabilities that have been discovered and which open-source components the vulnerabilities affect.
Other inventorsSee patent -
Signatures for software components
Filed US 14506490
A facility for analyzing a pair of code files is described. From each of the code files, the facility extracts a hierarchy of textual names. The facility then determines the score reflecting a level of similarity between the extracted hierarchies of textual names for attribution to the pair of code files.
-
Displaying content on multiple web pages
Filed US 12623458
Aspects of the subject matter described herein relate to displaying content on multiple
pages. In aspects, a request for content is received from a browsing component. The content
is divided into pages suitable for displaying on a display associated with the browsing
component. Navigation elements may be embedded in the pages to allow a user using the
browsing component to navigate between pages corresponding to the content.
Honors & Awards
-
WSHAsia Award
World of Safety and Health Asia
-
Veracode Way Award
Veracode
-
ACM Distinguished Paper Award
ACM
For the paper titled “A Machine Learning Approach for Vulnerability Curation” at the MSR 2020 conference.
-
Editors' Picks
Medium
For the series "How to be an Authentic Leader?" - https://medium.com/series/how-to-be-an-authentic-leader-5f7d18e70255
-
Top 10 Downloaded Articles
ACM SIGSOFT
For the paper titled "Exploiting Undefined Behaviors for Efficient Symbolic Execution".
Software Engineering Notes - http://portalparts.acm.org/2700000/2693208/fm/frontmatter.pdf -
Bronze Medal
ACM
Student Research Competition (http://src.acm.org/) at ICSE 2014
Languages
-
English
Native or bilingual proficiency
-
Hindi
Native or bilingual proficiency
Organizations
-
3 Day Startup
Mentor
3 Day Startup’s mission is to kick-start new student-run companies and build entrepreneurial capabilities in students and their university communities. We rent work space for 3 full days, recruit 45 student participants from a wide range of backgrounds, cater food and drinks, and bring in top-notch entrepreneurs and investors. The participants pick the best ideas for startups during the Day 1 brainstorming session and deliver prototypes and investor pitches on the final night.
-
Okyasoft
Co-Founder
Helping Startups Succeed
Recommendations received
2 people have recommended Asankhaya
Join now to viewMore activity by Asankhaya
-
If you want to get to know know us better and our journey at Unsloth AI, we teamed up with GitHub on a special video to share our story + love for…
If you want to get to know know us better and our journey at Unsloth AI, we teamed up with GitHub on a special video to share our story + love for…
Liked by Asankhaya Sharma
-
When we launched Arcee AI, it was based on our conviction that small language models (SLMs) would become as important as large language models (LLMs)…
When we launched Arcee AI, it was based on our conviction that small language models (SLMs) would become as important as large language models (LLMs)…
Liked by Asankhaya Sharma
-
Join StackHawk, Modus Create and our friends at GitHub for cocktails and conversation about the latest trends in AppSec, AI and Auto-fix on April…
Join StackHawk, Modus Create and our friends at GitHub for cocktails and conversation about the latest trends in AppSec, AI and Auto-fix on April…
Liked by Asankhaya Sharma
-
We recently launched major updates to MergeKit, and they’re already making an impact – featured in a new academic paper from Peking University &…
We recently launched major updates to MergeKit, and they’re already making an impact – featured in a new academic paper from Peking University &…
Liked by Asankhaya Sharma
-
Model Context Protocol (MCP): A Primer Model Context Protocol (MCP) is a framework that standardises how Language Models represent and process…
Model Context Protocol (MCP): A Primer Model Context Protocol (MCP) is a framework that standardises how Language Models represent and process…
Liked by Asankhaya Sharma
-
A year ago, we unveiled Circuit Mind’s Architecture to Schematic in 60 Seconds. Today, at embedded world Exhibition&Conference booth 4-215, we're…
A year ago, we unveiled Circuit Mind’s Architecture to Schematic in 60 Seconds. Today, at embedded world Exhibition&Conference booth 4-215, we're…
Liked by Asankhaya Sharma
-
One of the most important aspects to develop in todays society is a strong personal will and intent Software and AI systems seek to put on us on…
One of the most important aspects to develop in todays society is a strong personal will and intent Software and AI systems seek to put on us on…
Liked by Asankhaya Sharma
-
🔌 Just launched: optiLLM now supports Model Context Protocol (MCP) servers! 🚀 Your AI models can now seamlessly access tools, resources, and…
🔌 Just launched: optiLLM now supports Model Context Protocol (MCP) servers! 🚀 Your AI models can now seamlessly access tools, resources, and…
Liked by Asankhaya Sharma
-
🔌 Just launched: optiLLM now supports Model Context Protocol (MCP) servers! 🚀 Your AI models can now seamlessly access tools, resources, and…
🔌 Just launched: optiLLM now supports Model Context Protocol (MCP) servers! 🚀 Your AI models can now seamlessly access tools, resources, and…
Posted by Asankhaya Sharma
-
Qwen released QwQ-32B - an open source reasoning model with performance on par with DeepSeek-R1! But people had infinite generations - I fixed it! I…
Qwen released QwQ-32B - an open source reasoning model with performance on par with DeepSeek-R1! But people had infinite generations - I fixed it! I…
Liked by Asankhaya Sharma
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Asankhaya Sharma
1 other named Asankhaya Sharma is on LinkedIn
See others named Asankhaya Sharma