Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
9
10
submitter
stringlengths
1
64
authors
stringlengths
4
20.7k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
404
doi
stringlengths
11
153
report-no
stringlengths
2
254
categories
stringlengths
5
98
license
stringclasses
9 values
orig_abstract
stringlengths
14
3.35k
versions
listlengths
1
60
update_date
stringlengths
10
10
authors_parsed
sequencelengths
1
1.35k
abstract
stringlengths
11
3.34k
1906.10370
Miguel Sepulcre
Rafael Molina-Masegosa, Miguel Sepulcre and Javier Gozalvez
Geo-Based Scheduling for C-V2X Networks
null
IEEE Transactions on Vehicular Technology, Volume 68, Issue 9, pp. 8397 - 8407, September 2019
10.1109/TVT.2019.2924698
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cellular Vehicle-to-Everything (C-V2X) networks can operate without cellular infrastructure support. Vehicles can autonomously select their radio resources using the sensing-based Semi-Persistent Scheduling (SPS) algorithm specified by the Third Generation Partnership Project (3GPP). The sensing nature of the SPS sch...
[ { "created": "Tue, 25 Jun 2019 08:12:28 GMT", "version": "v1" } ]
2019-09-20
[ [ "Molina-Masegosa", "Rafael", "" ], [ "Sepulcre", "Miguel", "" ], [ "Gozalvez", "Javier", "" ] ]
Cellular Vehicle-to-Everything (C-V2X) networks can operate without cellular infrastructure support. Vehicles can autonomously select their radio resources using the sensing-based Semi-Persistent Scheduling (SPS) algorithm specified by the Third Generation Partnership Project (3GPP). The sensing nature of the SPS schem...
2312.07340
Yusen Feng
Yusen Feng, Xiyan Xu, Libin Liu
MuscleVAE: Model-Based Controllers of Muscle-Actuated Characters
null
null
null
null
cs.GR
http://creativecommons.org/licenses/by/4.0/
In this paper, we present a simulation and control framework for generating biomechanically plausible motion for muscle-actuated characters. We incorporate a fatigue dynamics model, the 3CC-r model, into the widely-adopted Hill-type muscle model to simulate the development and recovery of fatigue in muscles, which cr...
[ { "created": "Tue, 12 Dec 2023 15:01:17 GMT", "version": "v1" } ]
2023-12-13
[ [ "Feng", "Yusen", "" ], [ "Xu", "Xiyan", "" ], [ "Liu", "Libin", "" ] ]
In this paper, we present a simulation and control framework for generating biomechanically plausible motion for muscle-actuated characters. We incorporate a fatigue dynamics model, the 3CC-r model, into the widely-adopted Hill-type muscle model to simulate the development and recovery of fatigue in muscles, which crea...
2211.08292
Jennifer Andreoli-Fang
Jennifer Andreoli-Fang, John T Chapman
Mobile-Aware Scheduling for Low Latency Backhaul over DOCSIS
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2017
null
10.1109/PIMRC.2017.8292173
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we discuss latency reduction techniques for mobile backhaul over Data Over Cable Service Interface Specifications (DOCSIS) networks. When the latencies from both the wireless and the DOCSIS networks are added together, it can result in noticeable end-to-end system latency, particularly under network co...
[ { "created": "Tue, 15 Nov 2022 16:45:26 GMT", "version": "v1" }, { "created": "Wed, 16 Nov 2022 16:38:44 GMT", "version": "v2" } ]
2022-11-17
[ [ "Andreoli-Fang", "Jennifer", "" ], [ "Chapman", "John T", "" ] ]
In this paper, we discuss latency reduction techniques for mobile backhaul over Data Over Cable Service Interface Specifications (DOCSIS) networks. When the latencies from both the wireless and the DOCSIS networks are added together, it can result in noticeable end-to-end system latency, particularly under network cong...
2103.14856
Ciriaco Andrea D'Angelo
Giovanni Abramo, Ciriaco Andrea D'Angelo, Lin Zhang
A comparison of two approaches for measuring interdisciplinary research output: the disciplinary diversity of authors vs the disciplinary diversity of the reference list
null
Journal of Informetrics, 12(4), 2018, 1182-1193
10.1016/j.joi.2018.09.001
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study investigates the convergence of two bibliometric approaches to the measurement of interdisciplinary research: one based on analyzing disciplinary diversity in the reference list of publications, the other based on the disciplinary diversity of authors of publications. In particular we measure the variety, ...
[ { "created": "Sat, 27 Mar 2021 09:34:53 GMT", "version": "v1" } ]
2021-03-30
[ [ "Abramo", "Giovanni", "" ], [ "D'Angelo", "Ciriaco Andrea", "" ], [ "Zhang", "Lin", "" ] ]
This study investigates the convergence of two bibliometric approaches to the measurement of interdisciplinary research: one based on analyzing disciplinary diversity in the reference list of publications, the other based on the disciplinary diversity of authors of publications. In particular we measure the variety, ba...
1910.12435
Marcel Keller
Anders Dalskov and Daniel Escudero and Marcel Keller
Secure Evaluation of Quantized Neural Networks
22 pages
Proceedings on Privacy Enhancing Technologies 4 (2020): 355-375
10.2478/popets-2020-0077
null
cs.CR cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
We investigate two questions in this paper: First, we ask to what extent "MPC friendly" models are already supported by major Machine Learning frameworks such as TensorFlow or PyTorch. Prior works provide protocols that only work on fixed-point integers and specialized activation functions, two aspects that are not s...
[ { "created": "Mon, 28 Oct 2019 04:17:33 GMT", "version": "v1" }, { "created": "Mon, 1 Mar 2021 04:22:07 GMT", "version": "v2" } ]
2021-03-02
[ [ "Dalskov", "Anders", "" ], [ "Escudero", "Daniel", "" ], [ "Keller", "Marcel", "" ] ]
We investigate two questions in this paper: First, we ask to what extent "MPC friendly" models are already supported by major Machine Learning frameworks such as TensorFlow or PyTorch. Prior works provide protocols that only work on fixed-point integers and specialized activation functions, two aspects that are not sup...
2407.06855
Arnab Sharma
Sourabh Kapoor, Arnab Sharma, Michael R\"oder, Caglar Demir, Axel-Cyrille Ngonga Ngomo
Performance Evaluation of Knowledge Graph Embedding Approaches under Non-adversarial Attacks
null
null
null
null
cs.LG cs.CR
http://creativecommons.org/licenses/by/4.0/
Knowledge Graph Embedding (KGE) transforms a discrete Knowledge Graph (KG) into a continuous vector space facilitating its use in various AI-driven applications like Semantic Search, Question Answering, or Recommenders. While KGE approaches are effective in these applications, most existing approaches assume that all...
[ { "created": "Tue, 9 Jul 2024 13:42:14 GMT", "version": "v1" } ]
2024-07-10
[ [ "Kapoor", "Sourabh", "" ], [ "Sharma", "Arnab", "" ], [ "Röder", "Michael", "" ], [ "Demir", "Caglar", "" ], [ "Ngomo", "Axel-Cyrille Ngonga", "" ] ]
Knowledge Graph Embedding (KGE) transforms a discrete Knowledge Graph (KG) into a continuous vector space facilitating its use in various AI-driven applications like Semantic Search, Question Answering, or Recommenders. While KGE approaches are effective in these applications, most existing approaches assume that all i...
1211.1861
Mohamed Firdhous
Mohamed Firdhous
Automating Legal Research through Data Mining
8 pages, 11 figures, published in (IJACSA) International Journal of Advanced Computer Science and Applications. arXiv admin note: text overlap with wikipedia entry on text mining
International Journal of Advanced Computer Science and Applications (IJACSA) Vol. 1, No 6, December 2010, pp. 9-16
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The term legal research generally refers to the process of identifying and retrieving appropriate information necessary to support legal decision making from past case records. At present, the process is mostly manual, but some traditional technologies such as keyword searching are commonly used to speed the process ...
[ { "created": "Thu, 8 Nov 2012 14:19:49 GMT", "version": "v1" } ]
2012-11-09
[ [ "Firdhous", "Mohamed", "" ] ]
The term legal research generally refers to the process of identifying and retrieving appropriate information necessary to support legal decision making from past case records. At present, the process is mostly manual, but some traditional technologies such as keyword searching are commonly used to speed the process up...
1602.00810
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Erich Kaltofen (NCSU), Emmanuel Thom\'e (CARAMBA), Gilles Villard (ARIC, LIP)
Linear Time Interactive Certificates for the Minimal Polynomial and the Determinant of a Sparse Matrix
null
International Symposium on Symbolic and Algebraic Computation, Jul 2016, Waterloo, Canada. pp.199-206, \&\#x27E8;10.1145/2930889.2930908\&\#x27E9
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computational problem certificates are additional data structures for each output, which can be used by a-possibly randomized-verification algorithm that proves the correctness of each output. In this paper, we give an algorithm that computes a certificate for the minimal polynomial of sparse or structured nxn matric...
[ { "created": "Tue, 2 Feb 2016 07:29:28 GMT", "version": "v1" }, { "created": "Mon, 2 Dec 2019 13:02:25 GMT", "version": "v2" } ]
2019-12-03
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Kaltofen", "Erich", "", "NCSU" ], [ "Thomé", "Emmanuel", "", "CARAMBA" ], [ "Villard", "Gilles", "", "ARIC, LIP" ] ]
Computational problem certificates are additional data structures for each output, which can be used by a-possibly randomized-verification algorithm that proves the correctness of each output. In this paper, we give an algorithm that computes a certificate for the minimal polynomial of sparse or structured nxn matrices...
1912.07976
Heng Yang
Heng Yang, Biqing Zeng, JianHao Yang, Youwei Song and Ruyang Xu
A Multi-task Learning Model for Chinese-oriented Aspect Polarity Classification and Aspect Term Extraction
Submitted to Elsevier
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aspect-based sentiment analysis (ABSA) task is a multi-grained task of natural language processing and consists of two subtasks: aspect term extraction (ATE) and aspect polarity classification (APC). Most of the existing work focuses on the subtask of aspect term polarity inferring and ignores the significance of asp...
[ { "created": "Tue, 17 Dec 2019 12:47:33 GMT", "version": "v1" }, { "created": "Thu, 19 Dec 2019 01:38:38 GMT", "version": "v2" }, { "created": "Wed, 12 Feb 2020 09:20:28 GMT", "version": "v3" } ]
2020-02-13
[ [ "Yang", "Heng", "" ], [ "Zeng", "Biqing", "" ], [ "Yang", "JianHao", "" ], [ "Song", "Youwei", "" ], [ "Xu", "Ruyang", "" ] ]
Aspect-based sentiment analysis (ABSA) task is a multi-grained task of natural language processing and consists of two subtasks: aspect term extraction (ATE) and aspect polarity classification (APC). Most of the existing work focuses on the subtask of aspect term polarity inferring and ignores the significance of aspec...
2007.00584
Guillaume Jaume
Pushpak Pati, Guillaume Jaume, Lauren Alisha Fernandes, Antonio Foncubierta, Florinda Feroce, Anna Maria Anniciello, Giosue Scognamiglio, Nadia Brancati, Daniel Riccio, Maurizio Do Bonito, Giuseppe De Pietro, Gerardo Botti, Orcun Goksel, Jean-Philippe Thiran, Maria Frucci, Maria Gabrani
HACT-Net: A Hierarchical Cell-to-Tissue Graph Neural Network for Histopathological Image Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cancer diagnosis, prognosis, and therapeutic response prediction are heavily influenced by the relationship between the histopathological structures and the function of the tissue. Recent approaches acknowledging the structure-function relationship, have linked the structural and spatial patterns of cell organization...
[ { "created": "Wed, 1 Jul 2020 16:22:48 GMT", "version": "v1" } ]
2020-07-02
[ [ "Pati", "Pushpak", "" ], [ "Jaume", "Guillaume", "" ], [ "Fernandes", "Lauren Alisha", "" ], [ "Foncubierta", "Antonio", "" ], [ "Feroce", "Florinda", "" ], [ "Anniciello", "Anna Maria", "" ], [ "Scognamiglio", ...
Cancer diagnosis, prognosis, and therapeutic response prediction are heavily influenced by the relationship between the histopathological structures and the function of the tissue. Recent approaches acknowledging the structure-function relationship, have linked the structural and spatial patterns of cell organization i...
0810.5057
Patricia Gautier
Claire Fran\c{c}ois (INIST), Jean-Charles Lamirel (INRIA Lorraine - LORIA), Shadi Al Shehabi (INRIA Lorraine - LORIA)
Combining Advanced Visualization and Automatized Reasoning for Webometrics: A Test Study
null
COLLNET 2006, France (2006)
null
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a first attempt at performing a precise and automatic identification of the linking behaviour in a scientific domain through the analysis of the communication of the related academic institutions on the web. The proposed approach is based on the paradigm of multiple viewpoint data analysis (MVDA) ...
[ { "created": "Tue, 28 Oct 2008 15:43:45 GMT", "version": "v1" }, { "created": "Tue, 20 Oct 2009 15:27:41 GMT", "version": "v2" } ]
2009-10-20
[ [ "François", "Claire", "", "INIST" ], [ "Lamirel", "Jean-Charles", "", "INRIA Lorraine -\n LORIA" ], [ "Shehabi", "Shadi Al", "", "INRIA Lorraine - LORIA" ] ]
This paper presents a first attempt at performing a precise and automatic identification of the linking behaviour in a scientific domain through the analysis of the communication of the related academic institutions on the web. The proposed approach is based on the paradigm of multiple viewpoint data analysis (MVDA) th...
0808.3651
Lijun Zhang
Lijun Zhang, Holger Hermanns, Friedrich Eisenbrand and David N. Jansen
Flow Faster: Efficient Decision Algorithms for Probabilistic Simulations
LMCS
Logical Methods in Computer Science, Volume 4, Issue 4 (November 11, 2008) lmcs:989
10.2168/LMCS-4(4:6)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Strong and weak simulation relations have been proposed for Markov chains, while strong simulation and strong probabilistic simulation relations have been proposed for probabilistic automata. However, decision algorithms for strong and weak simulation over Markov chains, and for strong simulation over probabilistic a...
[ { "created": "Wed, 27 Aug 2008 08:35:44 GMT", "version": "v1" }, { "created": "Mon, 10 Nov 2008 23:56:01 GMT", "version": "v2" }, { "created": "Tue, 18 Nov 2008 17:00:30 GMT", "version": "v3" } ]
2015-07-01
[ [ "Zhang", "Lijun", "" ], [ "Hermanns", "Holger", "" ], [ "Eisenbrand", "Friedrich", "" ], [ "Jansen", "David N.", "" ] ]
Strong and weak simulation relations have been proposed for Markov chains, while strong simulation and strong probabilistic simulation relations have been proposed for probabilistic automata. However, decision algorithms for strong and weak simulation over Markov chains, and for strong simulation over probabilistic aut...
2403.06757
Anthony Frion
Anthony Frion, Lucas Drumetz, Guillaume Tochon, Mauro Dalla Mura, Albdeldjalil A\"issa El Bey
Koopman Ensembles for Probabilistic Time Series Forecasting
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
In the context of an increasing popularity of data-driven models to represent dynamical systems, many machine learning-based implementations of the Koopman operator have recently been proposed. However, the vast majority of those works are limited to deterministic predictions, while the knowledge of uncertainty is cr...
[ { "created": "Mon, 11 Mar 2024 14:29:56 GMT", "version": "v1" }, { "created": "Wed, 13 Mar 2024 13:57:42 GMT", "version": "v2" } ]
2024-03-14
[ [ "Frion", "Anthony", "" ], [ "Drumetz", "Lucas", "" ], [ "Tochon", "Guillaume", "" ], [ "Mura", "Mauro Dalla", "" ], [ "Bey", "Albdeldjalil Aïssa El", "" ] ]
In the context of an increasing popularity of data-driven models to represent dynamical systems, many machine learning-based implementations of the Koopman operator have recently been proposed. However, the vast majority of those works are limited to deterministic predictions, while the knowledge of uncertainty is crit...
1702.06968
Arthur-Jozsef Molnar
Arthur-Jozsef Molnar
A Heuristic Process for GUI Widget Matching Across Application Versions
null
Annales Universitatis Scientiarum Budapest, Sectio Computatorica Vol 36, pages 255 - 275 (2012)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces an automated heuristic process able to achieve high accuracy when matching graphical user interface widgets across multiple versions of a target application. The proposed implementation is flexible as it allows full customization of the process and easy integration with existing tools for long t...
[ { "created": "Wed, 22 Feb 2017 19:08:11 GMT", "version": "v1" } ]
2017-02-24
[ [ "Molnar", "Arthur-Jozsef", "" ] ]
This paper introduces an automated heuristic process able to achieve high accuracy when matching graphical user interface widgets across multiple versions of a target application. The proposed implementation is flexible as it allows full customization of the process and easy integration with existing tools for long ter...
2307.10936
Raphael Boige
Raphael Boige and Yannis Flet-Berliac and Arthur Flajolet and Guillaume Richard and Thomas Pierrot
PASTA: Pretrained Action-State Transformer Agents
null
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-supervised learning has brought about a revolutionary paradigm shift in various computing domains, including NLP, vision, and biology. Recent approaches involve pre-training transformer models on vast amounts of unlabeled data, serving as a starting point for efficiently solving downstream tasks. In reinforcemen...
[ { "created": "Thu, 20 Jul 2023 15:09:06 GMT", "version": "v1" }, { "created": "Mon, 4 Dec 2023 10:15:26 GMT", "version": "v2" } ]
2023-12-05
[ [ "Boige", "Raphael", "" ], [ "Flet-Berliac", "Yannis", "" ], [ "Flajolet", "Arthur", "" ], [ "Richard", "Guillaume", "" ], [ "Pierrot", "Thomas", "" ] ]
Self-supervised learning has brought about a revolutionary paradigm shift in various computing domains, including NLP, vision, and biology. Recent approaches involve pre-training transformer models on vast amounts of unlabeled data, serving as a starting point for efficiently solving downstream tasks. In reinforcement ...
1612.00604
Andrii Maksai
Andrii Maksai, Xinchao Wang, Francois Fleuret, and Pascal Fua
Globally Consistent Multi-People Tracking using Motion Patterns
8 pages, 7 figures. 11 pages supplementary
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many state-of-the-art approaches to people tracking rely on detecting them in each frame independently, grouping detections into short but reliable trajectory segments, and then further grouping them into full trajectories. This grouping typically relies on imposing local smoothness constraints but almost never on en...
[ { "created": "Fri, 2 Dec 2016 09:24:30 GMT", "version": "v1" } ]
2016-12-05
[ [ "Maksai", "Andrii", "" ], [ "Wang", "Xinchao", "" ], [ "Fleuret", "Francois", "" ], [ "Fua", "Pascal", "" ] ]
Many state-of-the-art approaches to people tracking rely on detecting them in each frame independently, grouping detections into short but reliable trajectory segments, and then further grouping them into full trajectories. This grouping typically relies on imposing local smoothness constraints but almost never on enfo...
2311.11532
Gustavo Silva
Gustavo Silva, Paul Rodriguez
Optimal Hyperparameter $\epsilon$ for Adaptive Stochastic Optimizers through Gradient Histograms
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
Optimizers are essential components for successfully training deep neural network models. In order to achieve the best performance from such models, designers need to carefully choose the optimizer hyperparameters. However, this can be a computationally expensive and time-consuming process. Although it is known that ...
[ { "created": "Mon, 20 Nov 2023 04:34:19 GMT", "version": "v1" } ]
2023-11-21
[ [ "Silva", "Gustavo", "" ], [ "Rodriguez", "Paul", "" ] ]
Optimizers are essential components for successfully training deep neural network models. In order to achieve the best performance from such models, designers need to carefully choose the optimizer hyperparameters. However, this can be a computationally expensive and time-consuming process. Although it is known that al...
2302.02187
Niklas K\"uhl Prof Dr
Max Schemmer, Niklas K\"uhl, Carina Benz, Andrea Bartos, Gerhard Satzger
Appropriate Reliance on AI Advice: Conceptualization and the Effect of Explanations
arXiv admin note: text overlap with arXiv:2204.06916
ACM 28th International Conference on Intelligent User Interfaces (IUI), 2023
10.1145/3581641.3584066
null
cs.AI cs.HC
http://creativecommons.org/licenses/by-nc-nd/4.0/
AI advice is becoming increasingly popular, e.g., in investment and medical treatment decisions. As this advice is typically imperfect, decision-makers have to exert discretion as to whether actually follow that advice: they have to "appropriately" rely on correct and turn down incorrect advice. However, current rese...
[ { "created": "Sat, 4 Feb 2023 15:48:24 GMT", "version": "v1" }, { "created": "Tue, 7 Feb 2023 07:47:43 GMT", "version": "v2" }, { "created": "Thu, 13 Apr 2023 08:50:16 GMT", "version": "v3" } ]
2023-04-14
[ [ "Schemmer", "Max", "" ], [ "Kühl", "Niklas", "" ], [ "Benz", "Carina", "" ], [ "Bartos", "Andrea", "" ], [ "Satzger", "Gerhard", "" ] ]
AI advice is becoming increasingly popular, e.g., in investment and medical treatment decisions. As this advice is typically imperfect, decision-makers have to exert discretion as to whether actually follow that advice: they have to "appropriately" rely on correct and turn down incorrect advice. However, current resear...
1101.1815
Suvansh Lal Mr.
Suvansh Lal, Mohit Jain, Vikrant Chaplot
Approaches to Formal Verification of Security Protocols
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/3.0/
In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliabilit...
[ { "created": "Mon, 10 Jan 2011 13:53:25 GMT", "version": "v1" } ]
2011-01-11
[ [ "Lal", "Suvansh", "" ], [ "Jain", "Mohit", "" ], [ "Chaplot", "Vikrant", "" ] ]
In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability ...
2405.11530
Sejik Park
Sejik Park
Learning More Generalized Experts by Merging Experts in Mixture-of-Experts
12 pages, 3 figures
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
We observe that incorporating a shared layer in a mixture-of-experts can lead to performance degradation. This leads us to hypothesize that learning shared features poses challenges in deep learning, potentially caused by the same feature being learned as various different features. To address this issue, we track ea...
[ { "created": "Sun, 19 May 2024 11:55:48 GMT", "version": "v1" } ]
2024-05-21
[ [ "Park", "Sejik", "" ] ]
We observe that incorporating a shared layer in a mixture-of-experts can lead to performance degradation. This leads us to hypothesize that learning shared features poses challenges in deep learning, potentially caused by the same feature being learned as various different features. To address this issue, we track each...
1701.01216
Tony T. Luo
T. Luo, S. S. Kanhere, H-P. Tan, F. Wu, and H. Wu
Crowdsourcing with Tullock contests: A new perspective
9 pages, 4 figures, 3 tables
Proc. IEEE INFOCOM, 2015, pp. 2515-2523
10.1109/INFOCOM.2015.7218641
null
cs.GT cs.HC cs.MA cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracti...
[ { "created": "Thu, 5 Jan 2017 05:44:25 GMT", "version": "v1" } ]
2017-01-06
[ [ "Luo", "T.", "" ], [ "Kanhere", "S. S.", "" ], [ "Tan", "H-P.", "" ], [ "Wu", "F.", "" ], [ "Wu", "H.", "" ] ]
Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracting...
1704.00355
Neha Gupta
Moses Charikar, Neha Gupta, Roy Schwartz
Local Guarantees in Graph Cuts and Clustering
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Correlation Clustering is an elegant model that captures fundamental graph cut problems such as Min $s-t$ Cut, Multiway Cut, and Multicut, extensively studied in combinatorial optimization. Here, we are given a graph with edges labeled $+$ or $-$ and the goal is to produce a clustering that agrees with the labels as ...
[ { "created": "Sun, 2 Apr 2017 19:34:22 GMT", "version": "v1" } ]
2017-04-04
[ [ "Charikar", "Moses", "" ], [ "Gupta", "Neha", "" ], [ "Schwartz", "Roy", "" ] ]
Correlation Clustering is an elegant model that captures fundamental graph cut problems such as Min $s-t$ Cut, Multiway Cut, and Multicut, extensively studied in combinatorial optimization. Here, we are given a graph with edges labeled $+$ or $-$ and the goal is to produce a clustering that agrees with the labels as mu...
1502.03358
Farshad Naghibi
Farshad Naghibi, Somayeh Salimi, Mikael Skoglund
The CEO Problem with Secrecy Constraints
Accepted for publication in IEEE Transactions on Information Forensics and Security, 17 pages, 4 figures
null
10.1109/TIFS.2015.2404134
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to ...
[ { "created": "Wed, 11 Feb 2015 16:19:21 GMT", "version": "v1" } ]
2015-02-19
[ [ "Naghibi", "Farshad", "" ], [ "Salimi", "Somayeh", "" ], [ "Skoglund", "Mikael", "" ] ]
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to th...
2007.00236
Cunxiang Wang
Cunxiang Wang, Shuailong Liang, Yili Jin, Yilong Wang, Xiaodan Zhu and Yue Zhang
SemEval-2020 Task 4: Commonsense Validation and Explanation
Task description paper of SemEval-2020 Task 4: Commonsense Validation and Explanation
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present SemEval-2020 Task 4, Commonsense Validation and Explanation (ComVE), which includes three subtasks, aiming to evaluate whether a system can distinguish a natural language statement that makes sense to humans from one that does not, and provide the reasons. Specifically, in our first subtask,...
[ { "created": "Wed, 1 Jul 2020 04:41:05 GMT", "version": "v1" }, { "created": "Mon, 3 Aug 2020 15:13:40 GMT", "version": "v2" } ]
2020-08-04
[ [ "Wang", "Cunxiang", "" ], [ "Liang", "Shuailong", "" ], [ "Jin", "Yili", "" ], [ "Wang", "Yilong", "" ], [ "Zhu", "Xiaodan", "" ], [ "Zhang", "Yue", "" ] ]
In this paper, we present SemEval-2020 Task 4, Commonsense Validation and Explanation (ComVE), which includes three subtasks, aiming to evaluate whether a system can distinguish a natural language statement that makes sense to humans from one that does not, and provide the reasons. Specifically, in our first subtask, t...
2304.13518
Yuqi Han
Yuqi Han and Tao Yu and Xiaohang Yu and Yuwang Wang and Qionghai Dai
Super-NeRF: View-consistent Detail Generation for NeRF super-resolution
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
The neural radiance field (NeRF) achieved remarkable success in modeling 3D scenes and synthesizing high-fidelity novel views. However, existing NeRF-based methods focus more on the make full use of the image resolution to generate novel views, but less considering the generation of details under the limited input re...
[ { "created": "Wed, 26 Apr 2023 12:54:40 GMT", "version": "v1" } ]
2023-04-27
[ [ "Han", "Yuqi", "" ], [ "Yu", "Tao", "" ], [ "Yu", "Xiaohang", "" ], [ "Wang", "Yuwang", "" ], [ "Dai", "Qionghai", "" ] ]
The neural radiance field (NeRF) achieved remarkable success in modeling 3D scenes and synthesizing high-fidelity novel views. However, existing NeRF-based methods focus more on the make full use of the image resolution to generate novel views, but less considering the generation of details under the limited input reso...
1809.05606
Yimin Yang
Yimin Yang, Q.M.Jonathan Wu, Xiexing Feng, Thangarajah Akilan
Non-iterative recomputation of dense layers for performance improvement of DCNN
11
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An iterative method of learning has become a paradigm for training deep convolutional neural networks (DCNN). However, utilizing a non-iterative learning strategy can accelerate the training process of the DCNN and surprisingly such approach has been rarely explored by the deep learning (DL) community. It motivates t...
[ { "created": "Fri, 14 Sep 2018 22:24:52 GMT", "version": "v1" } ]
2018-09-18
[ [ "Yang", "Yimin", "" ], [ "Wu", "Q. M. Jonathan", "" ], [ "Feng", "Xiexing", "" ], [ "Akilan", "Thangarajah", "" ] ]
An iterative method of learning has become a paradigm for training deep convolutional neural networks (DCNN). However, utilizing a non-iterative learning strategy can accelerate the training process of the DCNN and surprisingly such approach has been rarely explored by the deep learning (DL) community. It motivates thi...
1309.0871
EPTCS
Oded Maler (CNRS-VERIMAG, University of Grenoble), \'Ad\'am M. Hal\'asz (Department of Methematics, West Virginia University), Olivier Lebeltel (CNRS-VERIMAG, University of Grenoble), Ouri Maler (Grenoble)
Exploring the Dynamics of Mass Action Systems
In Proceedings HSB 2013, arXiv:1308.5724
EPTCS 125, 2013, pp. 84-91
10.4204/EPTCS.125.6
null
cs.CE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the Populus toolkit for exploring the dynamics of mass action systems under different assumptions.
[ { "created": "Tue, 3 Sep 2013 23:41:36 GMT", "version": "v1" } ]
2013-09-05
[ [ "Maler", "Oded", "", "CNRS-VERIMAG, University of Grenoble" ], [ "Halász", "Ádám M.", "", "Department of Methematics, West Virginia University" ], [ "Lebeltel", "Olivier", "", "CNRS-VERIMAG, University of Grenoble" ], [ "Maler", "Ouri", "", ...
We present the Populus toolkit for exploring the dynamics of mass action systems under different assumptions.
2403.05193
Martina Benini
Martina Benini, Silvia Gallucci, Marta Bonato, Marta Parazzini, Gabriella Tognola
Evaluation of Road User Radio-Frequency Exposure Levels in an Urban Environment from Vehicular Antennas and the Infrastructure in ITS-G5 5.9 GHz Communication
null
null
null
null
cs.NI
http://creativecommons.org/licenses/by/4.0/
This study aims to investigate the variability of exposure levels among road users generated in a realistic urban scenario by Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication technologies operating at 5.9 GHz. The exposure levels were evaluated in terms of whole-body Specific Absorption Rate...
[ { "created": "Fri, 8 Mar 2024 10:14:40 GMT", "version": "v1" } ]
2024-03-11
[ [ "Benini", "Martina", "" ], [ "Gallucci", "Silvia", "" ], [ "Bonato", "Marta", "" ], [ "Parazzini", "Marta", "" ], [ "Tognola", "Gabriella", "" ] ]
This study aims to investigate the variability of exposure levels among road users generated in a realistic urban scenario by Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication technologies operating at 5.9 GHz. The exposure levels were evaluated in terms of whole-body Specific Absorption Rate (...
2408.03945
Kristina Schaaff
Kristina Schaaff and Marc-Andr\'e Heidelmann
Impacts of Anthropomorphizing Large Language Models in Learning Environments
Presented at Affective Computing Pre-Conference at ISRE 2024
null
null
null
cs.CL cs.AI cs.CY cs.HC
http://creativecommons.org/licenses/by/4.0/
Large Language Models (LLMs) are increasingly being used in learning environments to support teaching-be it as learning companions or as tutors. With our contribution, we aim to discuss the implications of the anthropomorphization of LLMs in learning environments on educational theory to build a foundation for more e...
[ { "created": "Mon, 22 Jul 2024 06:28:54 GMT", "version": "v1" } ]
2024-08-09
[ [ "Schaaff", "Kristina", "" ], [ "Heidelmann", "Marc-André", "" ] ]
Large Language Models (LLMs) are increasingly being used in learning environments to support teaching-be it as learning companions or as tutors. With our contribution, we aim to discuss the implications of the anthropomorphization of LLMs in learning environments on educational theory to build a foundation for more eff...
2310.04197
Angel Casanova
\'Angel Casanova Bienzobas, Alfonso S\'anchez-Maci\'an
Threat Trekker: An Approach to Cyber Threat Hunting
I am disseminating this outcome to all of you, despite the fact that the results may appear somewhat idealistic, given that certain datasets utilized for the training of the machine learning model comprise simulated data
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
Threat hunting is a proactive methodology for exploring, detecting and mitigating cyberattacks within complex environments. As opposed to conventional detection systems, threat hunting strategies assume adversaries have infiltrated the system; as a result they proactively search out any unusual patterns or activities...
[ { "created": "Fri, 6 Oct 2023 12:29:41 GMT", "version": "v1" } ]
2023-10-09
[ [ "Bienzobas", "Ángel Casanova", "" ], [ "Sánchez-Macián", "Alfonso", "" ] ]
Threat hunting is a proactive methodology for exploring, detecting and mitigating cyberattacks within complex environments. As opposed to conventional detection systems, threat hunting strategies assume adversaries have infiltrated the system; as a result they proactively search out any unusual patterns or activities w...
2205.06255
Qianqian Wang
Qianqian Wang, Zhengqi Li, David Salesin, Noah Snavely, Brian Curless, Janne Kontkanen
3D Moments from Near-Duplicate Photos
CVPR 2022
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
We introduce 3D Moments, a new computational photography effect. As input we take a pair of near-duplicate photos, i.e., photos of moving subjects from similar viewpoints, common in people's photo collections. As output, we produce a video that smoothly interpolates the scene motion from the first photo to the second...
[ { "created": "Thu, 12 May 2022 17:56:18 GMT", "version": "v1" } ]
2022-05-13
[ [ "Wang", "Qianqian", "" ], [ "Li", "Zhengqi", "" ], [ "Salesin", "David", "" ], [ "Snavely", "Noah", "" ], [ "Curless", "Brian", "" ], [ "Kontkanen", "Janne", "" ] ]
We introduce 3D Moments, a new computational photography effect. As input we take a pair of near-duplicate photos, i.e., photos of moving subjects from similar viewpoints, common in people's photo collections. As output, we produce a video that smoothly interpolates the scene motion from the first photo to the second, ...
2407.15373
Dizhi Ma
Dizhi Ma, Xiyun Hu, Jingyu Shi, Mayank Patel, Rahul Jain, Ziyi Liu, Zhengzhe Zhu and Karthik Ramani
avaTTAR: Table Tennis Stroke Training with On-body and Detached Visualization in Augmented Reality
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
Table tennis stroke training is a critical aspect of player development. We designed a new augmented reality (AR) system, avaTTAR, for table tennis stroke training. The system provides both "on-body" (first-person view) and "detached" (third-person view) visual cues, enabling users to visualize target strokes and cor...
[ { "created": "Mon, 22 Jul 2024 04:47:16 GMT", "version": "v1" }, { "created": "Fri, 26 Jul 2024 15:13:46 GMT", "version": "v2" } ]
2024-07-29
[ [ "Ma", "Dizhi", "" ], [ "Hu", "Xiyun", "" ], [ "Shi", "Jingyu", "" ], [ "Patel", "Mayank", "" ], [ "Jain", "Rahul", "" ], [ "Liu", "Ziyi", "" ], [ "Zhu", "Zhengzhe", "" ], [ "Ramani", "Karthik", ...
Table tennis stroke training is a critical aspect of player development. We designed a new augmented reality (AR) system, avaTTAR, for table tennis stroke training. The system provides both "on-body" (first-person view) and "detached" (third-person view) visual cues, enabling users to visualize target strokes and corre...
2005.13102
Bangalore Ravi Kiran
Leonardo Gigli, B Ravi Kiran, Thomas Paul, Andres Serna, Nagarjuna Vemuri, Beatriz Marcotegui, Santiago Velasco-Forero
Road Segmentation on low resolution Lidar point clouds for autonomous vehicles
ISPRS 2020
null
null
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Point cloud datasets for perception tasks in the context of autonomous driving often rely on high resolution 64-layer Light Detection and Ranging (LIDAR) scanners. They are expensive to deploy on real-world autonomous driving sensor architectures which usually employ 16/32 layer LIDARs. We evaluate the effect of subs...
[ { "created": "Wed, 27 May 2020 00:38:39 GMT", "version": "v1" } ]
2020-05-28
[ [ "Gigli", "Leonardo", "" ], [ "Kiran", "B Ravi", "" ], [ "Paul", "Thomas", "" ], [ "Serna", "Andres", "" ], [ "Vemuri", "Nagarjuna", "" ], [ "Marcotegui", "Beatriz", "" ], [ "Velasco-Forero", "Santiago", "" ...
Point cloud datasets for perception tasks in the context of autonomous driving often rely on high resolution 64-layer Light Detection and Ranging (LIDAR) scanners. They are expensive to deploy on real-world autonomous driving sensor architectures which usually employ 16/32 layer LIDARs. We evaluate the effect of subsam...
2105.05026
Chongxuan Li
Guoqiang Wu, Chongxuan Li, Kun Xu, Jun Zhu
Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
(Partial) ranking loss is a commonly used evaluation measure for multi-label classification, which is usually optimized with convex surrogates for computational efficiency. Prior theoretical work on multi-label ranking mainly focuses on (Fisher) consistency analyses. However, there is a gap between existing theory an...
[ { "created": "Mon, 10 May 2021 09:23:27 GMT", "version": "v1" } ]
2021-05-12
[ [ "Wu", "Guoqiang", "" ], [ "Li", "Chongxuan", "" ], [ "Xu", "Kun", "" ], [ "Zhu", "Jun", "" ] ]
(Partial) ranking loss is a commonly used evaluation measure for multi-label classification, which is usually optimized with convex surrogates for computational efficiency. Prior theoretical work on multi-label ranking mainly focuses on (Fisher) consistency analyses. However, there is a gap between existing theory and ...
2403.14623
Zhicong Tang
Zhicong Tang, Tiankai Hang, Shuyang Gu, Dong Chen, Baining Guo
Simplified Diffusion Schr\"odinger Bridge
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a novel theoretical simplification of the Diffusion Schr\"odinger Bridge (DSB) that facilitates its unification with Score-based Generative Models (SGMs), addressing the limitations of DSB in complex data generation and enabling faster convergence and enhanced performance. By employing SGMs as a...
[ { "created": "Thu, 21 Mar 2024 17:59:41 GMT", "version": "v1" }, { "created": "Wed, 27 Mar 2024 16:49:35 GMT", "version": "v2" }, { "created": "Mon, 27 May 2024 04:44:22 GMT", "version": "v3" }, { "created": "Tue, 13 Aug 2024 04:34:58 GMT", "version": "v4" } ]
2024-08-14
[ [ "Tang", "Zhicong", "" ], [ "Hang", "Tiankai", "" ], [ "Gu", "Shuyang", "" ], [ "Chen", "Dong", "" ], [ "Guo", "Baining", "" ] ]
This paper introduces a novel theoretical simplification of the Diffusion Schr\"odinger Bridge (DSB) that facilitates its unification with Score-based Generative Models (SGMs), addressing the limitations of DSB in complex data generation and enabling faster convergence and enhanced performance. By employing SGMs as an ...
1511.04376
Martin Reisslein
Akhilesh Thyagaturu, Anu Mercian, Michael P. McGarry, Martin Reisslein, Wolfgang Kellerer
Software Defined Optical Networks (SDONs): A Comprehensive Survey
null
IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 2738-2786, 4th Qu. 2016
10.1109/COMST.2016.2586999
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emerging Software Defined Networking (SDN) paradigm separates the data plane from the control plane and centralizes network control in an SDN controller. Applications interact with controllers to implement network services, such as network transport with Quality of Service (QoS). SDN facilitates the virtualizatio...
[ { "created": "Fri, 13 Nov 2015 17:31:10 GMT", "version": "v1" }, { "created": "Thu, 26 May 2016 10:19:58 GMT", "version": "v2" }, { "created": "Sun, 17 Jul 2016 07:46:47 GMT", "version": "v3" } ]
2016-11-29
[ [ "Thyagaturu", "Akhilesh", "" ], [ "Mercian", "Anu", "" ], [ "McGarry", "Michael P.", "" ], [ "Reisslein", "Martin", "" ], [ "Kellerer", "Wolfgang", "" ] ]
The emerging Software Defined Networking (SDN) paradigm separates the data plane from the control plane and centralizes network control in an SDN controller. Applications interact with controllers to implement network services, such as network transport with Quality of Service (QoS). SDN facilitates the virtualization ...
2306.02346
Shuo Ye
Shuo Ye and Yufeng Shi and Ruxin Wang and Yu Wang and Jiamiao Xu and Chuanwu Yang and Xinge You
CDLT: A Dataset with Concept Drift and Long-Tailed Distribution for Fine-Grained Visual Categorization
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data is the foundation for the development of computer vision, and the establishment of datasets plays an important role in advancing the techniques of fine-grained visual categorization~(FGVC). In the existing FGVC datasets used in computer vision, it is generally assumed that each collected instance has fixed chara...
[ { "created": "Sun, 4 Jun 2023 12:42:45 GMT", "version": "v1" } ]
2023-06-06
[ [ "Ye", "Shuo", "" ], [ "Shi", "Yufeng", "" ], [ "Wang", "Ruxin", "" ], [ "Wang", "Yu", "" ], [ "Xu", "Jiamiao", "" ], [ "Yang", "Chuanwu", "" ], [ "You", "Xinge", "" ] ]
Data is the foundation for the development of computer vision, and the establishment of datasets plays an important role in advancing the techniques of fine-grained visual categorization~(FGVC). In the existing FGVC datasets used in computer vision, it is generally assumed that each collected instance has fixed charact...
2303.06545
Hao Zhou
Hao Zhou, Chongyang Zhang, Yanjun Chen, Chuanping Hu
Towards Diverse Temporal Grounding under Single Positive Labels
The source codes are available at https://github.com/zhouhaocv/DTG-SPL
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Temporal grounding aims to retrieve moments of the described event within an untrimmed video by a language query. Typically, existing methods assume annotations are precise and unique, yet one query may describe multiple moments in many cases. Hence, simply taking it as a one-vs-one mapping task and striving to match...
[ { "created": "Sun, 12 Mar 2023 02:54:18 GMT", "version": "v1" } ]
2023-03-14
[ [ "Zhou", "Hao", "" ], [ "Zhang", "Chongyang", "" ], [ "Chen", "Yanjun", "" ], [ "Hu", "Chuanping", "" ] ]
Temporal grounding aims to retrieve moments of the described event within an untrimmed video by a language query. Typically, existing methods assume annotations are precise and unique, yet one query may describe multiple moments in many cases. Hence, simply taking it as a one-vs-one mapping task and striving to match s...
2110.15919
Pranay Bhardwaj
Vinay U. Pai, Pranay Bhardwaj, and S. M. Zafaruddin
Performance Analysis of Dual-Hop THz Wireless Transmission for Backhaul Applications
This paper has been accepted for presentation in 2021 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Hyderabad, India
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
THz transmissions suffer from pointing errors due to antenna misalignment and incur higher path loss from the molecular absorption in addition to the channel fading. In this paper, we employ an amplify-and-forward (AF) dual-hop relaying to mitigate the effect of pointing errors and extend the range of the THz wireles...
[ { "created": "Fri, 29 Oct 2021 17:15:38 GMT", "version": "v1" }, { "created": "Sun, 21 Nov 2021 19:24:23 GMT", "version": "v2" } ]
2021-11-23
[ [ "Pai", "Vinay U.", "" ], [ "Bhardwaj", "Pranay", "" ], [ "Zafaruddin", "S. M.", "" ] ]
THz transmissions suffer from pointing errors due to antenna misalignment and incur higher path loss from the molecular absorption in addition to the channel fading. In this paper, we employ an amplify-and-forward (AF) dual-hop relaying to mitigate the effect of pointing errors and extend the range of the THz wireless ...
2202.02071
Henrique Moniz
Afonso Oliveira, Henrique Moniz, Rodrigo Rodrigues
Alea-BFT: Practical Asynchronous Byzantine Fault Tolerance
null
null
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
Traditional Byzantine Fault Tolerance (BFT) state machine replication protocols assume a partial synchrony model, leading to a design where a leader replica drives the protocol and is replaced after a timeout. Recently, we witnessed a surge of asynchronous BFT protocols that use randomization to remove the assumption...
[ { "created": "Fri, 4 Feb 2022 10:53:37 GMT", "version": "v1" } ]
2022-02-07
[ [ "Oliveira", "Afonso", "" ], [ "Moniz", "Henrique", "" ], [ "Rodrigues", "Rodrigo", "" ] ]
Traditional Byzantine Fault Tolerance (BFT) state machine replication protocols assume a partial synchrony model, leading to a design where a leader replica drives the protocol and is replaced after a timeout. Recently, we witnessed a surge of asynchronous BFT protocols that use randomization to remove the assumptions ...
1405.2066
Jehad Al Dallal Prof.
Jehad Al Dallal
How and When to Flatten Java Classes?
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Improving modularity and reusability are two key objectives in object-oriented programming. These objectives are achieved by applying several key concepts, such as data encapsulation and inheritance. A class in an object-oriented system is the basic unit of design. Assessing the quality of an object-oriented class ma...
[ { "created": "Thu, 8 May 2014 19:48:33 GMT", "version": "v1" } ]
2014-05-09
[ [ "Dallal", "Jehad Al", "" ] ]
Improving modularity and reusability are two key objectives in object-oriented programming. These objectives are achieved by applying several key concepts, such as data encapsulation and inheritance. A class in an object-oriented system is the basic unit of design. Assessing the quality of an object-oriented class may ...
1406.3583
Aaron D. Jaggard
Aaron D. Jaggard, Aaron Johnson, Paul Syverson, and Joan Feigenbaum
Representing Network Trust and Using It to Improve Anonymous Communication
24 pages; talk to be presented at HotPETs 2014
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular sy...
[ { "created": "Fri, 13 Jun 2014 16:23:12 GMT", "version": "v1" } ]
2014-06-16
[ [ "Jaggard", "Aaron D.", "" ], [ "Johnson", "Aaron", "" ], [ "Syverson", "Paul", "" ], [ "Feigenbaum", "Joan", "" ] ]
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular syst...
1702.06235
Will Radford
Andrew Chisholm, Will Radford, Ben Hachey
Learning to generate one-sentence biographies from Wikidata
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
We investigate the generation of one-sentence Wikipedia biographies from facts derived from Wikidata slot-value pairs. We train a recurrent neural network sequence-to-sequence model with attention to select facts and generate textual summaries. Our model incorporates a novel secondary objective that helps ensure it g...
[ { "created": "Tue, 21 Feb 2017 01:30:59 GMT", "version": "v1" } ]
2017-02-22
[ [ "Chisholm", "Andrew", "" ], [ "Radford", "Will", "" ], [ "Hachey", "Ben", "" ] ]
We investigate the generation of one-sentence Wikipedia biographies from facts derived from Wikidata slot-value pairs. We train a recurrent neural network sequence-to-sequence model with attention to select facts and generate textual summaries. Our model incorporates a novel secondary objective that helps ensure it gen...
2402.11173
Andrew Lowy
Andrew Lowy, Jonathan Ullman, Stephen J. Wright
How to Make the Gradients Small Privately: Improved Rates for Differentially Private Non-Convex Optimization
null
null
null
null
cs.LG cs.CR math.OC
http://creativecommons.org/licenses/by/4.0/
We provide a simple and flexible framework for designing differentially private algorithms to find approximate stationary points of non-convex loss functions. Our framework is based on using a private approximate risk minimizer to "warm start" another private algorithm for finding stationary points. We use this frame...
[ { "created": "Sat, 17 Feb 2024 02:42:56 GMT", "version": "v1" } ]
2024-02-20
[ [ "Lowy", "Andrew", "" ], [ "Ullman", "Jonathan", "" ], [ "Wright", "Stephen J.", "" ] ]
We provide a simple and flexible framework for designing differentially private algorithms to find approximate stationary points of non-convex loss functions. Our framework is based on using a private approximate risk minimizer to "warm start" another private algorithm for finding stationary points. We use this framewo...
2401.11946
Jiajun Liu
Jiajun Liu, Lina Tan, Zhili Zhou, Yi Li, Peng Chen
A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data. There exists an issue that the number of images stored in the database grows exponentially as the steganographic capacity rises. The need for a high steganographic capacity makes it challenging to buil...
[ { "created": "Mon, 22 Jan 2024 13:35:27 GMT", "version": "v1" } ]
2024-01-23
[ [ "Liu", "Jiajun", "" ], [ "Tan", "Lina", "" ], [ "Zhou", "Zhili", "" ], [ "Li", "Yi", "" ], [ "Chen", "Peng", "" ] ]
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data. There exists an issue that the number of images stored in the database grows exponentially as the steganographic capacity rises. The need for a high steganographic capacity makes it challenging to build ...
2203.10837
Marcos Faundez-Zanuy
K. L\'opez-de-Ipi\~na, Marcos Faundez-Zanuy, Jordi Sol\'e-Casals, Fernando Zelarin, Pilar Calvo
Multi-class versus One-class classifier in spontaneous speech analysis oriented to Alzheimer Disease diagnosis
10 pages, published in International Conference on NONLINEAR SPEECH PROCESSING, NOLISP 2015 jointly organized with the 25th Italian Workshop on Neural Networks, WIRN 2015, held at May 2015, Vietri sul Mare, Salerno, Italy
Recent Advances in Nonlinear Speech Processing. Smart Innovation, Systems and Technologies, vol 48. Springer, Cham 2015
10.1007/978-3-319-28109-4_7
null
cs.SD cs.LG eess.AS
http://creativecommons.org/licenses/by-nc-nd/4.0/
Most of medical developments require the ability to identify samples that are anomalous with respect to a target group or control group, in the sense they could belong to a new, previously unseen class or are not class data. In this case when there are not enough data to train two-class One-class classification appea...
[ { "created": "Mon, 21 Mar 2022 09:57:20 GMT", "version": "v1" } ]
2022-03-22
[ [ "López-de-Ipiña", "K.", "" ], [ "Faundez-Zanuy", "Marcos", "" ], [ "Solé-Casals", "Jordi", "" ], [ "Zelarin", "Fernando", "" ], [ "Calvo", "Pilar", "" ] ]
Most of medical developments require the ability to identify samples that are anomalous with respect to a target group or control group, in the sense they could belong to a new, previously unseen class or are not class data. In this case when there are not enough data to train two-class One-class classification appear ...
2408.06047
Xuanpu Zhang
Xuanpu Zhang and Dan Song and Pengxin Zhan and Qingguo Chen and Zhao Xu and Weihua Luo and Kaifu Zhang and Anan Liu
BooW-VTON: Boosting In-the-Wild Virtual Try-On via Mask-Free Pseudo Data Training
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image-based virtual try-on is an increasingly popular and important task to generate realistic try-on images of specific person. Existing methods always employ an accurate mask to remove the original garment in the source image, thus achieving realistic synthesized images in simple and conventional try-on scenarios b...
[ { "created": "Mon, 12 Aug 2024 10:39:59 GMT", "version": "v1" } ]
2024-08-13
[ [ "Zhang", "Xuanpu", "" ], [ "Song", "Dan", "" ], [ "Zhan", "Pengxin", "" ], [ "Chen", "Qingguo", "" ], [ "Xu", "Zhao", "" ], [ "Luo", "Weihua", "" ], [ "Zhang", "Kaifu", "" ], [ "Liu", "Anan", ...
Image-based virtual try-on is an increasingly popular and important task to generate realistic try-on images of specific person. Existing methods always employ an accurate mask to remove the original garment in the source image, thus achieving realistic synthesized images in simple and conventional try-on scenarios bas...
1604.01186
EPTCS
Denis Firsov, Tarmo Uustalu, Niccol\`o Veltri
Variations on Noetherianness
In Proceedings MSFP 2016, arXiv:1604.00384
EPTCS 207, 2016, pp. 76-88
10.4204/EPTCS.207.4
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In constructive mathematics, several nonequivalent notions of finiteness exist. In this paper, we continue the study of Noetherian sets in the dependently typed setting of the Agda programming language. We want to say that a set is Noetherian, if, when we are shown elements from it one after another, we will sooner o...
[ { "created": "Tue, 5 Apr 2016 09:04:13 GMT", "version": "v1" } ]
2016-04-06
[ [ "Firsov", "Denis", "" ], [ "Uustalu", "Tarmo", "" ], [ "Veltri", "Niccolò", "" ] ]
In constructive mathematics, several nonequivalent notions of finiteness exist. In this paper, we continue the study of Noetherian sets in the dependently typed setting of the Agda programming language. We want to say that a set is Noetherian, if, when we are shown elements from it one after another, we will sooner or ...
2109.06612
Johanna Schmidt
Raphael Sahann, Torsten M\"oller, Johanna Schmidt
Histogram binning revisited with a focus on human perception
Accepted as short paper at VIS 2021. Supplemental material can be found at https://github.com/johanna-schmidt/histogram-binning-revisited
Proceedings of VIS short papers 2021
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper presents a quantitative user study to evaluate how well users can visually perceive the underlying data distribution from a histogram representation. We used different sample and bin sizes and four different distributions (uniform, normal, bimodal, and gamma). The study results confirm that, in general, mo...
[ { "created": "Tue, 14 Sep 2021 12:08:27 GMT", "version": "v1" } ]
2021-09-15
[ [ "Sahann", "Raphael", "" ], [ "Möller", "Torsten", "" ], [ "Schmidt", "Johanna", "" ] ]
This paper presents a quantitative user study to evaluate how well users can visually perceive the underlying data distribution from a histogram representation. We used different sample and bin sizes and four different distributions (uniform, normal, bimodal, and gamma). The study results confirm that, in general, more...
1802.09657
Dipankar Maity
Dipankar Maity, John S. Baras
Event-Triggered Controller Synthesis for Dynamical Systems with Temporal Logic Constraints
null
null
null
null
cs.RO math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose an event-triggered con- trol framework for dynamical systems with temporal logical constraints. Event-triggered control methodologies have proven to be very efficient in reducing sensing, communication and computation costs. When a continuous feedback control is re- placed with an event-trigg...
[ { "created": "Tue, 27 Feb 2018 00:17:41 GMT", "version": "v1" } ]
2018-02-28
[ [ "Maity", "Dipankar", "" ], [ "Baras", "John S.", "" ] ]
In this work, we propose an event-triggered con- trol framework for dynamical systems with temporal logical constraints. Event-triggered control methodologies have proven to be very efficient in reducing sensing, communication and computation costs. When a continuous feedback control is re- placed with an event-trigger...
1911.03059
Chowdhury Rahman
Afra Anika, Md. Hasibur Rahman, Salekul Islam, Abu Shafin Mohammad Mahdee Jameel and Chowdhury Rafeed Rahman
A Comprehensive Comparison of Machine Learning Based Methods Used in Bengali Question Classification
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and com...
[ { "created": "Fri, 8 Nov 2019 05:30:33 GMT", "version": "v1" }, { "created": "Tue, 19 Nov 2019 16:37:41 GMT", "version": "v2" } ]
2019-11-20
[ [ "Anika", "Afra", "" ], [ "Rahman", "Md. Hasibur", "" ], [ "Islam", "Salekul", "" ], [ "Jameel", "Abu Shafin Mohammad Mahdee", "" ], [ "Rahman", "Chowdhury Rafeed", "" ] ]
QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and compu...
2212.09448
Senem Tanberk PhD
Senem Tanberk, Mustafa Can
Smart Journey in Istanbul: A Mobile Application in Smart Cities for Traffic Estimation by Harnessing Time Series
null
null
10.1109/ASYU58738.2023.10296669
null
cs.AI cs.IR
http://creativecommons.org/licenses/by/4.0/
In recent decades, mobile applications (apps) have gained enormous popularity. Smart services for smart cities increasingly gain attention. The main goal of the proposed research is to present a new AI-powered mobile application on Istanbul's traffic congestion forecast by using traffic density data. It addresses the...
[ { "created": "Tue, 13 Dec 2022 12:10:52 GMT", "version": "v1" } ]
2023-11-09
[ [ "Tanberk", "Senem", "" ], [ "Can", "Mustafa", "" ] ]
In recent decades, mobile applications (apps) have gained enormous popularity. Smart services for smart cities increasingly gain attention. The main goal of the proposed research is to present a new AI-powered mobile application on Istanbul's traffic congestion forecast by using traffic density data. It addresses the r...
2401.11150
Junxiao Shen Mr
Junxiao Shen, Xuhai Xu, Ran Tan, Amy Karlson, Evan Strasnick
Simultaneous Gesture Classification and Localization with an Automatic Gesture Annotation Model
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Training a real-time gesture recognition model heavily relies on annotated data. However, manual data annotation is costly and demands substantial human effort. In order to address this challenge, we propose a novel annotation model that can automatically annotate gesture classes and identify their temporal ranges. O...
[ { "created": "Sat, 20 Jan 2024 07:11:03 GMT", "version": "v1" } ]
2024-01-23
[ [ "Shen", "Junxiao", "" ], [ "Xu", "Xuhai", "" ], [ "Tan", "Ran", "" ], [ "Karlson", "Amy", "" ], [ "Strasnick", "Evan", "" ] ]
Training a real-time gesture recognition model heavily relies on annotated data. However, manual data annotation is costly and demands substantial human effort. In order to address this challenge, we propose a novel annotation model that can automatically annotate gesture classes and identify their temporal ranges. Our...
1005.0907
Rdv Ijcsis
Yasser M. Alginaih, Abdul Ahad Siddiqi
Multistage Hybrid Arabic/Indian Numeral OCR System
IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
The use of OCR in postal services is not yet universal and there are still many countries that process mail sorting manually. Automated Arabic/Indian numeral Optical Character Recognition (OCR) systems for Postal services are being used in some countries, but still there are errors during the mail sorting process, th...
[ { "created": "Thu, 6 May 2010 07:25:23 GMT", "version": "v1" } ]
2010-05-07
[ [ "Alginaih", "Yasser M.", "" ], [ "Siddiqi", "Abdul Ahad", "" ] ]
The use of OCR in postal services is not yet universal and there are still many countries that process mail sorting manually. Automated Arabic/Indian numeral Optical Character Recognition (OCR) systems for Postal services are being used in some countries, but still there are errors during the mail sorting process, thus...
2405.13937
Xingtong Yu
Xingtong Yu, Zhenghao Liu, Yuan Fang, Xinming Zhang
DyGPrompt: Learning Feature and Time Prompts on Dynamic Graphs
Under review
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic graphs are pervasive in the real world, modeling dynamic relations between objects across various fields. For dynamic graph modeling, dynamic graph neural networks (DGNNs) have emerged as a mainstream technique, which are generally pre-trained on the link prediction task, leaving a significant gap from the ob...
[ { "created": "Wed, 22 May 2024 19:10:24 GMT", "version": "v1" }, { "created": "Sun, 26 May 2024 01:46:11 GMT", "version": "v2" }, { "created": "Tue, 28 May 2024 10:07:29 GMT", "version": "v3" }, { "created": "Tue, 2 Jul 2024 05:14:10 GMT", "version": "v4" }, { "cr...
2024-07-04
[ [ "Yu", "Xingtong", "" ], [ "Liu", "Zhenghao", "" ], [ "Fang", "Yuan", "" ], [ "Zhang", "Xinming", "" ] ]
Dynamic graphs are pervasive in the real world, modeling dynamic relations between objects across various fields. For dynamic graph modeling, dynamic graph neural networks (DGNNs) have emerged as a mainstream technique, which are generally pre-trained on the link prediction task, leaving a significant gap from the obje...
2208.02884
Nicolaas Kaashoek
Nicolaas Kaashoek and Robert Morris
CheckSync: Using Runtime-Integrated Checkpoints to Achieve High Availability}
14 pages, 6 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
CheckSync provides applications with high availability via runtime-integrated checkpointing. This allows CheckSync to take checkpoints of a process running in a memory-managed language (Go, for now), which can be resumed on another machine after a failure. CheckSync uses the runtime to checkpoint only the process' li...
[ { "created": "Thu, 4 Aug 2022 20:53:50 GMT", "version": "v1" } ]
2022-08-08
[ [ "Kaashoek", "Nicolaas", "" ], [ "Morris", "Robert", "" ] ]
CheckSync provides applications with high availability via runtime-integrated checkpointing. This allows CheckSync to take checkpoints of a process running in a memory-managed language (Go, for now), which can be resumed on another machine after a failure. CheckSync uses the runtime to checkpoint only the process' live...
2303.13299
Avi Schwarzschild
Avi Schwarzschild, Max Cembalest, Karthik Rao, Keegan Hines, John Dickerson
Reckoning with the Disagreement Problem: Explanation Consensus as a Training Objective
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
As neural networks increasingly make critical decisions in high-stakes settings, monitoring and explaining their behavior in an understandable and trustworthy manner is a necessity. One commonly used type of explainer is post hoc feature attribution, a family of methods for giving each feature in an input a score cor...
[ { "created": "Thu, 23 Mar 2023 14:35:37 GMT", "version": "v1" } ]
2023-03-24
[ [ "Schwarzschild", "Avi", "" ], [ "Cembalest", "Max", "" ], [ "Rao", "Karthik", "" ], [ "Hines", "Keegan", "" ], [ "Dickerson", "John", "" ] ]
As neural networks increasingly make critical decisions in high-stakes settings, monitoring and explaining their behavior in an understandable and trustworthy manner is a necessity. One commonly used type of explainer is post hoc feature attribution, a family of methods for giving each feature in an input a score corre...
2311.11596
Yining Miao
Yining Miao, Nanlin Shi, Changxing Huang, Yonghao Song, Xiaogang Chen, Yijun Wang, Xiaorong Gao
High-performance cVEP-BCI under minimal calibration
35 pages, 5 figures
null
null
null
cs.HC cs.IT eess.SP math.IT q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ultimate goal of brain-computer interfaces (BCIs) based on visual modulation paradigms is to achieve high-speed performance without the burden of extensive calibration. Code-modulated visual evoked potential-based BCIs (cVEP-BCIs) modulated by broadband white noise (WN) offer various advantages, including increas...
[ { "created": "Mon, 20 Nov 2023 08:20:51 GMT", "version": "v1" } ]
2023-11-21
[ [ "Miao", "Yining", "" ], [ "Shi", "Nanlin", "" ], [ "Huang", "Changxing", "" ], [ "Song", "Yonghao", "" ], [ "Chen", "Xiaogang", "" ], [ "Wang", "Yijun", "" ], [ "Gao", "Xiaorong", "" ] ]
The ultimate goal of brain-computer interfaces (BCIs) based on visual modulation paradigms is to achieve high-speed performance without the burden of extensive calibration. Code-modulated visual evoked potential-based BCIs (cVEP-BCIs) modulated by broadband white noise (WN) offer various advantages, including increased...
2204.08970
Zhihao Li
Zhihao Li, Si Yi, Zhan Ma
Rendering Nighttime Image Via Cascaded Color and Brightness Compensation
Accepted by NTIRE 2022 (CVPR Workshop)
null
null
null
cs.CV eess.IV
http://creativecommons.org/licenses/by/4.0/
Image signal processing (ISP) is crucial for camera imaging, and neural networks (NN) solutions are extensively deployed for daytime scenes. The lack of sufficient nighttime image dataset and insights on nighttime illumination characteristics poses a great challenge for high-quality rendering using existing NN ISPs. ...
[ { "created": "Tue, 19 Apr 2022 16:15:31 GMT", "version": "v1" }, { "created": "Thu, 21 Apr 2022 17:23:11 GMT", "version": "v2" } ]
2022-04-22
[ [ "Li", "Zhihao", "" ], [ "Yi", "Si", "" ], [ "Ma", "Zhan", "" ] ]
Image signal processing (ISP) is crucial for camera imaging, and neural networks (NN) solutions are extensively deployed for daytime scenes. The lack of sufficient nighttime image dataset and insights on nighttime illumination characteristics poses a great challenge for high-quality rendering using existing NN ISPs. To...
1702.05724
Daniel M\'endez Fern\'andez
Marco Kuhrmann and Daniel M\'endez Fern\'andez and Thomas Ternit\'e
On the Use of Variability Operations in the V-Modell XT Software Process Line
Journal of Software: Evolution and Process, 2015
null
10.1002/smr.1751
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software process lines provide a systematic approach to develop and manage software processes. It defines a reference process containing general process assets, whereas a well-defined customization approach allows process engineers to create new process variants, e.g., by extending or modifying process assets. Variab...
[ { "created": "Sun, 19 Feb 2017 08:58:12 GMT", "version": "v1" } ]
2017-02-21
[ [ "Kuhrmann", "Marco", "" ], [ "Fernández", "Daniel Méndez", "" ], [ "Ternité", "Thomas", "" ] ]
Software process lines provide a systematic approach to develop and manage software processes. It defines a reference process containing general process assets, whereas a well-defined customization approach allows process engineers to create new process variants, e.g., by extending or modifying process assets. Variabil...
1711.11017
Ethan Perez
Simon Brodeur, Ethan Perez, Ankesh Anand, Florian Golemo, Luca Celotti, Florian Strub, Jean Rouat, Hugo Larochelle, Aaron Courville
HoME: a Household Multimodal Environment
Presented at NIPS 2017's Visually-Grounded Interaction and Language Workshop
null
null
null
cs.AI cs.CL cs.CV cs.RO cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce HoME: a Household Multimodal Environment for artificial agents to learn from vision, audio, semantics, physics, and interaction with objects and other agents, all within a realistic context. HoME integrates over 45,000 diverse 3D house layouts based on the SUNCG dataset, a scale which may facilitate lear...
[ { "created": "Wed, 29 Nov 2017 18:45:59 GMT", "version": "v1" } ]
2017-11-30
[ [ "Brodeur", "Simon", "" ], [ "Perez", "Ethan", "" ], [ "Anand", "Ankesh", "" ], [ "Golemo", "Florian", "" ], [ "Celotti", "Luca", "" ], [ "Strub", "Florian", "" ], [ "Rouat", "Jean", "" ], [ "Laroche...
We introduce HoME: a Household Multimodal Environment for artificial agents to learn from vision, audio, semantics, physics, and interaction with objects and other agents, all within a realistic context. HoME integrates over 45,000 diverse 3D house layouts based on the SUNCG dataset, a scale which may facilitate learni...
1709.03421
Riccardo Sven Risuleo
Riccardo Sven Risuleo, Giulio Bottegal, H{\aa}kan Hjalmarsson
Modeling and identification of uncertain-input systems
27 Pages, submitted to Automatica
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present a new class of models, called uncertain-input models, that allows us to treat system-identification problems in which a linear system is subject to a partially unknown input signal. To encode prior information about the input or the linear system, we use Gaussian-process models. We estimate t...
[ { "created": "Mon, 11 Sep 2017 14:53:38 GMT", "version": "v1" } ]
2017-09-12
[ [ "Risuleo", "Riccardo Sven", "" ], [ "Bottegal", "Giulio", "" ], [ "Hjalmarsson", "Håkan", "" ] ]
In this work, we present a new class of models, called uncertain-input models, that allows us to treat system-identification problems in which a linear system is subject to a partially unknown input signal. To encode prior information about the input or the linear system, we use Gaussian-process models. We estimate the...
2110.04678
Ankit Parag Shah
Rita Singh, Ankit Shah, Hira Dhamyal
An Overview of Techniques for Biomarker Discovery in Voice Signal
Last two authors contributed equally to the paper
null
null
null
cs.SD cs.AI eess.AS
http://creativecommons.org/licenses/by-nc-nd/4.0/
This paper reflects on the effect of several categories of medical conditions on human voice, focusing on those that may be hypothesized to have effects on voice, but for which the changes themselves may be subtle enough to have eluded observation in standard analytical examinations of the voice signal. It presents t...
[ { "created": "Sun, 10 Oct 2021 01:39:28 GMT", "version": "v1" } ]
2021-10-12
[ [ "Singh", "Rita", "" ], [ "Shah", "Ankit", "" ], [ "Dhamyal", "Hira", "" ] ]
This paper reflects on the effect of several categories of medical conditions on human voice, focusing on those that may be hypothesized to have effects on voice, but for which the changes themselves may be subtle enough to have eluded observation in standard analytical examinations of the voice signal. It presents thr...
2308.01286
Diptapriyo Majumdar
Diptapriyo Majumdar
Enumeration Kernels of Polynomial Size for Cuts of Bounded Degree
There have been major revision in the technicalities and proofs of the paper
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Enumeration kernelization was first proposed by Creignou et al. [TOCS 2017] and was later refined by Golovach et al. [JCSS 2022] into two different variants: fully-polynomial enumeration kernelization and polynomial-delay enumeration kernelization. In this paper, we consider the DEGREE-d-CUT problem from the perspect...
[ { "created": "Wed, 2 Aug 2023 17:18:19 GMT", "version": "v1" }, { "created": "Thu, 30 Nov 2023 09:14:39 GMT", "version": "v2" }, { "created": "Fri, 1 Dec 2023 07:32:28 GMT", "version": "v3" }, { "created": "Fri, 2 Feb 2024 18:15:47 GMT", "version": "v4" }, { "crea...
2024-04-30
[ [ "Majumdar", "Diptapriyo", "" ] ]
Enumeration kernelization was first proposed by Creignou et al. [TOCS 2017] and was later refined by Golovach et al. [JCSS 2022] into two different variants: fully-polynomial enumeration kernelization and polynomial-delay enumeration kernelization. In this paper, we consider the DEGREE-d-CUT problem from the perspectiv...
0810.2529
Alireza Bayesteh
Jamshid Abouei, Alireza Bayesteh, Masoud Ebrahimi, and Amir K. Khandani
On the Throughput Maximization in Dencentralized Wireless Networks
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed single-hop wireless network with $K$ links is considered, where the links are partitioned into a fixed number ($M$) of clusters each operating in a subchannel with bandwidth $\frac{W}{M}$. The subchannels are assumed to be orthogonal to each other. A general shadow-fading model, described by parameters ...
[ { "created": "Tue, 14 Oct 2008 19:40:22 GMT", "version": "v1" } ]
2008-10-15
[ [ "Abouei", "Jamshid", "" ], [ "Bayesteh", "Alireza", "" ], [ "Ebrahimi", "Masoud", "" ], [ "Khandani", "Amir K.", "" ] ]
A distributed single-hop wireless network with $K$ links is considered, where the links are partitioned into a fixed number ($M$) of clusters each operating in a subchannel with bandwidth $\frac{W}{M}$. The subchannels are assumed to be orthogonal to each other. A general shadow-fading model, described by parameters $(...
2010.08660
Manas Gaur
Manas Gaur, Keyur Faldu, Amit Sheth
Semantics of the Black-Box: Can knowledge graphs help make deep learning systems more interpretable and explainable?
6 pages + references, 4 figures, Accepted to IEEE internet computing 2020
null
null
null
cs.AI
http://creativecommons.org/licenses/by/4.0/
The recent series of innovations in deep learning (DL) have shown enormous potential to impact individuals and society, both positively and negatively. The DL models utilizing massive computing power and enormous datasets have significantly outperformed prior historical benchmarks on increasingly difficult, well-defi...
[ { "created": "Fri, 16 Oct 2020 22:55:23 GMT", "version": "v1" }, { "created": "Sun, 1 Nov 2020 02:28:43 GMT", "version": "v2" }, { "created": "Tue, 3 Nov 2020 15:52:55 GMT", "version": "v3" }, { "created": "Fri, 11 Dec 2020 23:03:11 GMT", "version": "v4" } ]
2020-12-15
[ [ "Gaur", "Manas", "" ], [ "Faldu", "Keyur", "" ], [ "Sheth", "Amit", "" ] ]
The recent series of innovations in deep learning (DL) have shown enormous potential to impact individuals and society, both positively and negatively. The DL models utilizing massive computing power and enormous datasets have significantly outperformed prior historical benchmarks on increasingly difficult, well-define...
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
3

Collection including LLMsForHepth/cs_primary_200k