id
stringlengths
9
10
submitter
stringlengths
1
64
authors
stringlengths
4
20.7k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
404
doi
stringlengths
11
153
report-no
stringlengths
2
254
categories
stringlengths
5
98
license
stringclasses
9 values
orig_abstract
stringlengths
14
3.35k
versions
listlengths
1
60
update_date
stringlengths
10
10
authors_parsed
listlengths
1
1.35k
abstract
stringlengths
11
3.34k
1906.10370
Miguel Sepulcre
Rafael Molina-Masegosa, Miguel Sepulcre and Javier Gozalvez
Geo-Based Scheduling for C-V2X Networks
null
IEEE Transactions on Vehicular Technology, Volume 68, Issue 9, pp. 8397 - 8407, September 2019
10.1109/TVT.2019.2924698
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cellular Vehicle-to-Everything (C-V2X) networks can operate without cellular infrastructure support. Vehicles can autonomously select their radio resources using the sensing-based Semi-Persistent Scheduling (SPS) algorithm specified by the Third Generation Partnership Project (3GPP). The sensing nature of the SPS sch...
[ { "created": "Tue, 25 Jun 2019 08:12:28 GMT", "version": "v1" } ]
2019-09-20
[ [ "Molina-Masegosa", "Rafael", "" ], [ "Sepulcre", "Miguel", "" ], [ "Gozalvez", "Javier", "" ] ]
Cellular Vehicle-to-Everything (C-V2X) networks can operate without cellular infrastructure support. Vehicles can autonomously select their radio resources using the sensing-based Semi-Persistent Scheduling (SPS) algorithm specified by the Third Generation Partnership Project (3GPP). The sensing nature of the SPS schem...
2312.07340
Yusen Feng
Yusen Feng, Xiyan Xu, Libin Liu
MuscleVAE: Model-Based Controllers of Muscle-Actuated Characters
null
null
null
null
cs.GR
http://creativecommons.org/licenses/by/4.0/
In this paper, we present a simulation and control framework for generating biomechanically plausible motion for muscle-actuated characters. We incorporate a fatigue dynamics model, the 3CC-r model, into the widely-adopted Hill-type muscle model to simulate the development and recovery of fatigue in muscles, which cr...
[ { "created": "Tue, 12 Dec 2023 15:01:17 GMT", "version": "v1" } ]
2023-12-13
[ [ "Feng", "Yusen", "" ], [ "Xu", "Xiyan", "" ], [ "Liu", "Libin", "" ] ]
In this paper, we present a simulation and control framework for generating biomechanically plausible motion for muscle-actuated characters. We incorporate a fatigue dynamics model, the 3CC-r model, into the widely-adopted Hill-type muscle model to simulate the development and recovery of fatigue in muscles, which crea...
2211.08292
Jennifer Andreoli-Fang
Jennifer Andreoli-Fang, John T Chapman
Mobile-Aware Scheduling for Low Latency Backhaul over DOCSIS
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2017
null
10.1109/PIMRC.2017.8292173
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we discuss latency reduction techniques for mobile backhaul over Data Over Cable Service Interface Specifications (DOCSIS) networks. When the latencies from both the wireless and the DOCSIS networks are added together, it can result in noticeable end-to-end system latency, particularly under network co...
[ { "created": "Tue, 15 Nov 2022 16:45:26 GMT", "version": "v1" }, { "created": "Wed, 16 Nov 2022 16:38:44 GMT", "version": "v2" } ]
2022-11-17
[ [ "Andreoli-Fang", "Jennifer", "" ], [ "Chapman", "John T", "" ] ]
In this paper, we discuss latency reduction techniques for mobile backhaul over Data Over Cable Service Interface Specifications (DOCSIS) networks. When the latencies from both the wireless and the DOCSIS networks are added together, it can result in noticeable end-to-end system latency, particularly under network cong...
2103.14856
Ciriaco Andrea D'Angelo
Giovanni Abramo, Ciriaco Andrea D'Angelo, Lin Zhang
A comparison of two approaches for measuring interdisciplinary research output: the disciplinary diversity of authors vs the disciplinary diversity of the reference list
null
Journal of Informetrics, 12(4), 2018, 1182-1193
10.1016/j.joi.2018.09.001
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study investigates the convergence of two bibliometric approaches to the measurement of interdisciplinary research: one based on analyzing disciplinary diversity in the reference list of publications, the other based on the disciplinary diversity of authors of publications. In particular we measure the variety, ...
[ { "created": "Sat, 27 Mar 2021 09:34:53 GMT", "version": "v1" } ]
2021-03-30
[ [ "Abramo", "Giovanni", "" ], [ "D'Angelo", "Ciriaco Andrea", "" ], [ "Zhang", "Lin", "" ] ]
This study investigates the convergence of two bibliometric approaches to the measurement of interdisciplinary research: one based on analyzing disciplinary diversity in the reference list of publications, the other based on the disciplinary diversity of authors of publications. In particular we measure the variety, ba...
1910.12435
Marcel Keller
Anders Dalskov and Daniel Escudero and Marcel Keller
Secure Evaluation of Quantized Neural Networks
22 pages
Proceedings on Privacy Enhancing Technologies 4 (2020): 355-375
10.2478/popets-2020-0077
null
cs.CR cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
We investigate two questions in this paper: First, we ask to what extent "MPC friendly" models are already supported by major Machine Learning frameworks such as TensorFlow or PyTorch. Prior works provide protocols that only work on fixed-point integers and specialized activation functions, two aspects that are not s...
[ { "created": "Mon, 28 Oct 2019 04:17:33 GMT", "version": "v1" }, { "created": "Mon, 1 Mar 2021 04:22:07 GMT", "version": "v2" } ]
2021-03-02
[ [ "Dalskov", "Anders", "" ], [ "Escudero", "Daniel", "" ], [ "Keller", "Marcel", "" ] ]
We investigate two questions in this paper: First, we ask to what extent "MPC friendly" models are already supported by major Machine Learning frameworks such as TensorFlow or PyTorch. Prior works provide protocols that only work on fixed-point integers and specialized activation functions, two aspects that are not sup...
2407.06855
Arnab Sharma
Sourabh Kapoor, Arnab Sharma, Michael R\"oder, Caglar Demir, Axel-Cyrille Ngonga Ngomo
Performance Evaluation of Knowledge Graph Embedding Approaches under Non-adversarial Attacks
null
null
null
null
cs.LG cs.CR
http://creativecommons.org/licenses/by/4.0/
Knowledge Graph Embedding (KGE) transforms a discrete Knowledge Graph (KG) into a continuous vector space facilitating its use in various AI-driven applications like Semantic Search, Question Answering, or Recommenders. While KGE approaches are effective in these applications, most existing approaches assume that all...
[ { "created": "Tue, 9 Jul 2024 13:42:14 GMT", "version": "v1" } ]
2024-07-10
[ [ "Kapoor", "Sourabh", "" ], [ "Sharma", "Arnab", "" ], [ "Röder", "Michael", "" ], [ "Demir", "Caglar", "" ], [ "Ngomo", "Axel-Cyrille Ngonga", "" ] ]
Knowledge Graph Embedding (KGE) transforms a discrete Knowledge Graph (KG) into a continuous vector space facilitating its use in various AI-driven applications like Semantic Search, Question Answering, or Recommenders. While KGE approaches are effective in these applications, most existing approaches assume that all i...
1211.1861
Mohamed Firdhous
Mohamed Firdhous
Automating Legal Research through Data Mining
8 pages, 11 figures, published in (IJACSA) International Journal of Advanced Computer Science and Applications. arXiv admin note: text overlap with wikipedia entry on text mining
International Journal of Advanced Computer Science and Applications (IJACSA) Vol. 1, No 6, December 2010, pp. 9-16
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The term legal research generally refers to the process of identifying and retrieving appropriate information necessary to support legal decision making from past case records. At present, the process is mostly manual, but some traditional technologies such as keyword searching are commonly used to speed the process ...
[ { "created": "Thu, 8 Nov 2012 14:19:49 GMT", "version": "v1" } ]
2012-11-09
[ [ "Firdhous", "Mohamed", "" ] ]
The term legal research generally refers to the process of identifying and retrieving appropriate information necessary to support legal decision making from past case records. At present, the process is mostly manual, but some traditional technologies such as keyword searching are commonly used to speed the process up...
1602.00810
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Erich Kaltofen (NCSU), Emmanuel Thom\'e (CARAMBA), Gilles Villard (ARIC, LIP)
Linear Time Interactive Certificates for the Minimal Polynomial and the Determinant of a Sparse Matrix
null
International Symposium on Symbolic and Algebraic Computation, Jul 2016, Waterloo, Canada. pp.199-206, \&\#x27E8;10.1145/2930889.2930908\&\#x27E9
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computational problem certificates are additional data structures for each output, which can be used by a-possibly randomized-verification algorithm that proves the correctness of each output. In this paper, we give an algorithm that computes a certificate for the minimal polynomial of sparse or structured nxn matric...
[ { "created": "Tue, 2 Feb 2016 07:29:28 GMT", "version": "v1" }, { "created": "Mon, 2 Dec 2019 13:02:25 GMT", "version": "v2" } ]
2019-12-03
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Kaltofen", "Erich", "", "NCSU" ], [ "Thomé", "Emmanuel", "", "CARAMBA" ], [ "Villard", "Gilles", "", "ARIC, LIP" ] ]
Computational problem certificates are additional data structures for each output, which can be used by a-possibly randomized-verification algorithm that proves the correctness of each output. In this paper, we give an algorithm that computes a certificate for the minimal polynomial of sparse or structured nxn matrices...
1912.07976
Heng Yang
Heng Yang, Biqing Zeng, JianHao Yang, Youwei Song and Ruyang Xu
A Multi-task Learning Model for Chinese-oriented Aspect Polarity Classification and Aspect Term Extraction
Submitted to Elsevier
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aspect-based sentiment analysis (ABSA) task is a multi-grained task of natural language processing and consists of two subtasks: aspect term extraction (ATE) and aspect polarity classification (APC). Most of the existing work focuses on the subtask of aspect term polarity inferring and ignores the significance of asp...
[ { "created": "Tue, 17 Dec 2019 12:47:33 GMT", "version": "v1" }, { "created": "Thu, 19 Dec 2019 01:38:38 GMT", "version": "v2" }, { "created": "Wed, 12 Feb 2020 09:20:28 GMT", "version": "v3" } ]
2020-02-13
[ [ "Yang", "Heng", "" ], [ "Zeng", "Biqing", "" ], [ "Yang", "JianHao", "" ], [ "Song", "Youwei", "" ], [ "Xu", "Ruyang", "" ] ]
Aspect-based sentiment analysis (ABSA) task is a multi-grained task of natural language processing and consists of two subtasks: aspect term extraction (ATE) and aspect polarity classification (APC). Most of the existing work focuses on the subtask of aspect term polarity inferring and ignores the significance of aspec...
2007.00584
Guillaume Jaume
Pushpak Pati, Guillaume Jaume, Lauren Alisha Fernandes, Antonio Foncubierta, Florinda Feroce, Anna Maria Anniciello, Giosue Scognamiglio, Nadia Brancati, Daniel Riccio, Maurizio Do Bonito, Giuseppe De Pietro, Gerardo Botti, Orcun Goksel, Jean-Philippe Thiran, Maria Frucci, Maria Gabrani
HACT-Net: A Hierarchical Cell-to-Tissue Graph Neural Network for Histopathological Image Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cancer diagnosis, prognosis, and therapeutic response prediction are heavily influenced by the relationship between the histopathological structures and the function of the tissue. Recent approaches acknowledging the structure-function relationship, have linked the structural and spatial patterns of cell organization...
[ { "created": "Wed, 1 Jul 2020 16:22:48 GMT", "version": "v1" } ]
2020-07-02
[ [ "Pati", "Pushpak", "" ], [ "Jaume", "Guillaume", "" ], [ "Fernandes", "Lauren Alisha", "" ], [ "Foncubierta", "Antonio", "" ], [ "Feroce", "Florinda", "" ], [ "Anniciello", "Anna Maria", "" ], [ "Scognamiglio", ...
Cancer diagnosis, prognosis, and therapeutic response prediction are heavily influenced by the relationship between the histopathological structures and the function of the tissue. Recent approaches acknowledging the structure-function relationship, have linked the structural and spatial patterns of cell organization i...
0810.5057
Patricia Gautier
Claire Fran\c{c}ois (INIST), Jean-Charles Lamirel (INRIA Lorraine - LORIA), Shadi Al Shehabi (INRIA Lorraine - LORIA)
Combining Advanced Visualization and Automatized Reasoning for Webometrics: A Test Study
null
COLLNET 2006, France (2006)
null
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a first attempt at performing a precise and automatic identification of the linking behaviour in a scientific domain through the analysis of the communication of the related academic institutions on the web. The proposed approach is based on the paradigm of multiple viewpoint data analysis (MVDA) ...
[ { "created": "Tue, 28 Oct 2008 15:43:45 GMT", "version": "v1" }, { "created": "Tue, 20 Oct 2009 15:27:41 GMT", "version": "v2" } ]
2009-10-20
[ [ "François", "Claire", "", "INIST" ], [ "Lamirel", "Jean-Charles", "", "INRIA Lorraine -\n LORIA" ], [ "Shehabi", "Shadi Al", "", "INRIA Lorraine - LORIA" ] ]
This paper presents a first attempt at performing a precise and automatic identification of the linking behaviour in a scientific domain through the analysis of the communication of the related academic institutions on the web. The proposed approach is based on the paradigm of multiple viewpoint data analysis (MVDA) th...
0808.3651
Lijun Zhang
Lijun Zhang, Holger Hermanns, Friedrich Eisenbrand and David N. Jansen
Flow Faster: Efficient Decision Algorithms for Probabilistic Simulations
LMCS
Logical Methods in Computer Science, Volume 4, Issue 4 (November 11, 2008) lmcs:989
10.2168/LMCS-4(4:6)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Strong and weak simulation relations have been proposed for Markov chains, while strong simulation and strong probabilistic simulation relations have been proposed for probabilistic automata. However, decision algorithms for strong and weak simulation over Markov chains, and for strong simulation over probabilistic a...
[ { "created": "Wed, 27 Aug 2008 08:35:44 GMT", "version": "v1" }, { "created": "Mon, 10 Nov 2008 23:56:01 GMT", "version": "v2" }, { "created": "Tue, 18 Nov 2008 17:00:30 GMT", "version": "v3" } ]
2015-07-01
[ [ "Zhang", "Lijun", "" ], [ "Hermanns", "Holger", "" ], [ "Eisenbrand", "Friedrich", "" ], [ "Jansen", "David N.", "" ] ]
Strong and weak simulation relations have been proposed for Markov chains, while strong simulation and strong probabilistic simulation relations have been proposed for probabilistic automata. However, decision algorithms for strong and weak simulation over Markov chains, and for strong simulation over probabilistic aut...
2403.06757
Anthony Frion
Anthony Frion, Lucas Drumetz, Guillaume Tochon, Mauro Dalla Mura, Albdeldjalil A\"issa El Bey
Koopman Ensembles for Probabilistic Time Series Forecasting
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
In the context of an increasing popularity of data-driven models to represent dynamical systems, many machine learning-based implementations of the Koopman operator have recently been proposed. However, the vast majority of those works are limited to deterministic predictions, while the knowledge of uncertainty is cr...
[ { "created": "Mon, 11 Mar 2024 14:29:56 GMT", "version": "v1" }, { "created": "Wed, 13 Mar 2024 13:57:42 GMT", "version": "v2" } ]
2024-03-14
[ [ "Frion", "Anthony", "" ], [ "Drumetz", "Lucas", "" ], [ "Tochon", "Guillaume", "" ], [ "Mura", "Mauro Dalla", "" ], [ "Bey", "Albdeldjalil Aïssa El", "" ] ]
In the context of an increasing popularity of data-driven models to represent dynamical systems, many machine learning-based implementations of the Koopman operator have recently been proposed. However, the vast majority of those works are limited to deterministic predictions, while the knowledge of uncertainty is crit...
1702.06968
Arthur-Jozsef Molnar
Arthur-Jozsef Molnar
A Heuristic Process for GUI Widget Matching Across Application Versions
null
Annales Universitatis Scientiarum Budapest, Sectio Computatorica Vol 36, pages 255 - 275 (2012)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces an automated heuristic process able to achieve high accuracy when matching graphical user interface widgets across multiple versions of a target application. The proposed implementation is flexible as it allows full customization of the process and easy integration with existing tools for long t...
[ { "created": "Wed, 22 Feb 2017 19:08:11 GMT", "version": "v1" } ]
2017-02-24
[ [ "Molnar", "Arthur-Jozsef", "" ] ]
This paper introduces an automated heuristic process able to achieve high accuracy when matching graphical user interface widgets across multiple versions of a target application. The proposed implementation is flexible as it allows full customization of the process and easy integration with existing tools for long ter...
2307.10936
Raphael Boige
Raphael Boige and Yannis Flet-Berliac and Arthur Flajolet and Guillaume Richard and Thomas Pierrot
PASTA: Pretrained Action-State Transformer Agents
null
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-supervised learning has brought about a revolutionary paradigm shift in various computing domains, including NLP, vision, and biology. Recent approaches involve pre-training transformer models on vast amounts of unlabeled data, serving as a starting point for efficiently solving downstream tasks. In reinforcemen...
[ { "created": "Thu, 20 Jul 2023 15:09:06 GMT", "version": "v1" }, { "created": "Mon, 4 Dec 2023 10:15:26 GMT", "version": "v2" } ]
2023-12-05
[ [ "Boige", "Raphael", "" ], [ "Flet-Berliac", "Yannis", "" ], [ "Flajolet", "Arthur", "" ], [ "Richard", "Guillaume", "" ], [ "Pierrot", "Thomas", "" ] ]
Self-supervised learning has brought about a revolutionary paradigm shift in various computing domains, including NLP, vision, and biology. Recent approaches involve pre-training transformer models on vast amounts of unlabeled data, serving as a starting point for efficiently solving downstream tasks. In reinforcement ...
1612.00604
Andrii Maksai
Andrii Maksai, Xinchao Wang, Francois Fleuret, and Pascal Fua
Globally Consistent Multi-People Tracking using Motion Patterns
8 pages, 7 figures. 11 pages supplementary
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many state-of-the-art approaches to people tracking rely on detecting them in each frame independently, grouping detections into short but reliable trajectory segments, and then further grouping them into full trajectories. This grouping typically relies on imposing local smoothness constraints but almost never on en...
[ { "created": "Fri, 2 Dec 2016 09:24:30 GMT", "version": "v1" } ]
2016-12-05
[ [ "Maksai", "Andrii", "" ], [ "Wang", "Xinchao", "" ], [ "Fleuret", "Francois", "" ], [ "Fua", "Pascal", "" ] ]
Many state-of-the-art approaches to people tracking rely on detecting them in each frame independently, grouping detections into short but reliable trajectory segments, and then further grouping them into full trajectories. This grouping typically relies on imposing local smoothness constraints but almost never on enfo...
2311.11532
Gustavo Silva
Gustavo Silva, Paul Rodriguez
Optimal Hyperparameter $\epsilon$ for Adaptive Stochastic Optimizers through Gradient Histograms
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
Optimizers are essential components for successfully training deep neural network models. In order to achieve the best performance from such models, designers need to carefully choose the optimizer hyperparameters. However, this can be a computationally expensive and time-consuming process. Although it is known that ...
[ { "created": "Mon, 20 Nov 2023 04:34:19 GMT", "version": "v1" } ]
2023-11-21
[ [ "Silva", "Gustavo", "" ], [ "Rodriguez", "Paul", "" ] ]
Optimizers are essential components for successfully training deep neural network models. In order to achieve the best performance from such models, designers need to carefully choose the optimizer hyperparameters. However, this can be a computationally expensive and time-consuming process. Although it is known that al...
2302.02187
Niklas K\"uhl Prof Dr
Max Schemmer, Niklas K\"uhl, Carina Benz, Andrea Bartos, Gerhard Satzger
Appropriate Reliance on AI Advice: Conceptualization and the Effect of Explanations
arXiv admin note: text overlap with arXiv:2204.06916
ACM 28th International Conference on Intelligent User Interfaces (IUI), 2023
10.1145/3581641.3584066
null
cs.AI cs.HC
http://creativecommons.org/licenses/by-nc-nd/4.0/
AI advice is becoming increasingly popular, e.g., in investment and medical treatment decisions. As this advice is typically imperfect, decision-makers have to exert discretion as to whether actually follow that advice: they have to "appropriately" rely on correct and turn down incorrect advice. However, current rese...
[ { "created": "Sat, 4 Feb 2023 15:48:24 GMT", "version": "v1" }, { "created": "Tue, 7 Feb 2023 07:47:43 GMT", "version": "v2" }, { "created": "Thu, 13 Apr 2023 08:50:16 GMT", "version": "v3" } ]
2023-04-14
[ [ "Schemmer", "Max", "" ], [ "Kühl", "Niklas", "" ], [ "Benz", "Carina", "" ], [ "Bartos", "Andrea", "" ], [ "Satzger", "Gerhard", "" ] ]
AI advice is becoming increasingly popular, e.g., in investment and medical treatment decisions. As this advice is typically imperfect, decision-makers have to exert discretion as to whether actually follow that advice: they have to "appropriately" rely on correct and turn down incorrect advice. However, current resear...
1101.1815
Suvansh Lal Mr.
Suvansh Lal, Mohit Jain, Vikrant Chaplot
Approaches to Formal Verification of Security Protocols
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/3.0/
In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliabilit...
[ { "created": "Mon, 10 Jan 2011 13:53:25 GMT", "version": "v1" } ]
2011-01-11
[ [ "Lal", "Suvansh", "" ], [ "Jain", "Mohit", "" ], [ "Chaplot", "Vikrant", "" ] ]
In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability ...
2405.11530
Sejik Park
Sejik Park
Learning More Generalized Experts by Merging Experts in Mixture-of-Experts
12 pages, 3 figures
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
We observe that incorporating a shared layer in a mixture-of-experts can lead to performance degradation. This leads us to hypothesize that learning shared features poses challenges in deep learning, potentially caused by the same feature being learned as various different features. To address this issue, we track ea...
[ { "created": "Sun, 19 May 2024 11:55:48 GMT", "version": "v1" } ]
2024-05-21
[ [ "Park", "Sejik", "" ] ]
We observe that incorporating a shared layer in a mixture-of-experts can lead to performance degradation. This leads us to hypothesize that learning shared features poses challenges in deep learning, potentially caused by the same feature being learned as various different features. To address this issue, we track each...
1701.01216
Tony T. Luo
T. Luo, S. S. Kanhere, H-P. Tan, F. Wu, and H. Wu
Crowdsourcing with Tullock contests: A new perspective
9 pages, 4 figures, 3 tables
Proc. IEEE INFOCOM, 2015, pp. 2515-2523
10.1109/INFOCOM.2015.7218641
null
cs.GT cs.HC cs.MA cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracti...
[ { "created": "Thu, 5 Jan 2017 05:44:25 GMT", "version": "v1" } ]
2017-01-06
[ [ "Luo", "T.", "" ], [ "Kanhere", "S. S.", "" ], [ "Tan", "H-P.", "" ], [ "Wu", "F.", "" ], [ "Wu", "H.", "" ] ]
Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracting...
1704.00355
Neha Gupta
Moses Charikar, Neha Gupta, Roy Schwartz
Local Guarantees in Graph Cuts and Clustering
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Correlation Clustering is an elegant model that captures fundamental graph cut problems such as Min $s-t$ Cut, Multiway Cut, and Multicut, extensively studied in combinatorial optimization. Here, we are given a graph with edges labeled $+$ or $-$ and the goal is to produce a clustering that agrees with the labels as ...
[ { "created": "Sun, 2 Apr 2017 19:34:22 GMT", "version": "v1" } ]
2017-04-04
[ [ "Charikar", "Moses", "" ], [ "Gupta", "Neha", "" ], [ "Schwartz", "Roy", "" ] ]
Correlation Clustering is an elegant model that captures fundamental graph cut problems such as Min $s-t$ Cut, Multiway Cut, and Multicut, extensively studied in combinatorial optimization. Here, we are given a graph with edges labeled $+$ or $-$ and the goal is to produce a clustering that agrees with the labels as mu...
1502.03358
Farshad Naghibi
Farshad Naghibi, Somayeh Salimi, Mikael Skoglund
The CEO Problem with Secrecy Constraints
Accepted for publication in IEEE Transactions on Information Forensics and Security, 17 pages, 4 figures
null
10.1109/TIFS.2015.2404134
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to ...
[ { "created": "Wed, 11 Feb 2015 16:19:21 GMT", "version": "v1" } ]
2015-02-19
[ [ "Naghibi", "Farshad", "" ], [ "Salimi", "Somayeh", "" ], [ "Skoglund", "Mikael", "" ] ]
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to th...
2007.00236
Cunxiang Wang
Cunxiang Wang, Shuailong Liang, Yili Jin, Yilong Wang, Xiaodan Zhu and Yue Zhang
SemEval-2020 Task 4: Commonsense Validation and Explanation
Task description paper of SemEval-2020 Task 4: Commonsense Validation and Explanation
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present SemEval-2020 Task 4, Commonsense Validation and Explanation (ComVE), which includes three subtasks, aiming to evaluate whether a system can distinguish a natural language statement that makes sense to humans from one that does not, and provide the reasons. Specifically, in our first subtask,...
[ { "created": "Wed, 1 Jul 2020 04:41:05 GMT", "version": "v1" }, { "created": "Mon, 3 Aug 2020 15:13:40 GMT", "version": "v2" } ]
2020-08-04
[ [ "Wang", "Cunxiang", "" ], [ "Liang", "Shuailong", "" ], [ "Jin", "Yili", "" ], [ "Wang", "Yilong", "" ], [ "Zhu", "Xiaodan", "" ], [ "Zhang", "Yue", "" ] ]
In this paper, we present SemEval-2020 Task 4, Commonsense Validation and Explanation (ComVE), which includes three subtasks, aiming to evaluate whether a system can distinguish a natural language statement that makes sense to humans from one that does not, and provide the reasons. Specifically, in our first subtask, t...
2304.13518
Yuqi Han
Yuqi Han and Tao Yu and Xiaohang Yu and Yuwang Wang and Qionghai Dai
Super-NeRF: View-consistent Detail Generation for NeRF super-resolution
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
The neural radiance field (NeRF) achieved remarkable success in modeling 3D scenes and synthesizing high-fidelity novel views. However, existing NeRF-based methods focus more on the make full use of the image resolution to generate novel views, but less considering the generation of details under the limited input re...
[ { "created": "Wed, 26 Apr 2023 12:54:40 GMT", "version": "v1" } ]
2023-04-27
[ [ "Han", "Yuqi", "" ], [ "Yu", "Tao", "" ], [ "Yu", "Xiaohang", "" ], [ "Wang", "Yuwang", "" ], [ "Dai", "Qionghai", "" ] ]
The neural radiance field (NeRF) achieved remarkable success in modeling 3D scenes and synthesizing high-fidelity novel views. However, existing NeRF-based methods focus more on the make full use of the image resolution to generate novel views, but less considering the generation of details under the limited input reso...
1809.05606
Yimin Yang
Yimin Yang, Q.M.Jonathan Wu, Xiexing Feng, Thangarajah Akilan
Non-iterative recomputation of dense layers for performance improvement of DCNN
11
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An iterative method of learning has become a paradigm for training deep convolutional neural networks (DCNN). However, utilizing a non-iterative learning strategy can accelerate the training process of the DCNN and surprisingly such approach has been rarely explored by the deep learning (DL) community. It motivates t...
[ { "created": "Fri, 14 Sep 2018 22:24:52 GMT", "version": "v1" } ]
2018-09-18
[ [ "Yang", "Yimin", "" ], [ "Wu", "Q. M. Jonathan", "" ], [ "Feng", "Xiexing", "" ], [ "Akilan", "Thangarajah", "" ] ]
An iterative method of learning has become a paradigm for training deep convolutional neural networks (DCNN). However, utilizing a non-iterative learning strategy can accelerate the training process of the DCNN and surprisingly such approach has been rarely explored by the deep learning (DL) community. It motivates thi...
1309.0871
EPTCS
Oded Maler (CNRS-VERIMAG, University of Grenoble), \'Ad\'am M. Hal\'asz (Department of Methematics, West Virginia University), Olivier Lebeltel (CNRS-VERIMAG, University of Grenoble), Ouri Maler (Grenoble)
Exploring the Dynamics of Mass Action Systems
In Proceedings HSB 2013, arXiv:1308.5724
EPTCS 125, 2013, pp. 84-91
10.4204/EPTCS.125.6
null
cs.CE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the Populus toolkit for exploring the dynamics of mass action systems under different assumptions.
[ { "created": "Tue, 3 Sep 2013 23:41:36 GMT", "version": "v1" } ]
2013-09-05
[ [ "Maler", "Oded", "", "CNRS-VERIMAG, University of Grenoble" ], [ "Halász", "Ádám M.", "", "Department of Methematics, West Virginia University" ], [ "Lebeltel", "Olivier", "", "CNRS-VERIMAG, University of Grenoble" ], [ "Maler", "Ouri", "", ...
We present the Populus toolkit for exploring the dynamics of mass action systems under different assumptions.
2403.05193
Martina Benini
Martina Benini, Silvia Gallucci, Marta Bonato, Marta Parazzini, Gabriella Tognola
Evaluation of Road User Radio-Frequency Exposure Levels in an Urban Environment from Vehicular Antennas and the Infrastructure in ITS-G5 5.9 GHz Communication
null
null
null
null
cs.NI
http://creativecommons.org/licenses/by/4.0/
This study aims to investigate the variability of exposure levels among road users generated in a realistic urban scenario by Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication technologies operating at 5.9 GHz. The exposure levels were evaluated in terms of whole-body Specific Absorption Rate...
[ { "created": "Fri, 8 Mar 2024 10:14:40 GMT", "version": "v1" } ]
2024-03-11
[ [ "Benini", "Martina", "" ], [ "Gallucci", "Silvia", "" ], [ "Bonato", "Marta", "" ], [ "Parazzini", "Marta", "" ], [ "Tognola", "Gabriella", "" ] ]
This study aims to investigate the variability of exposure levels among road users generated in a realistic urban scenario by Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication technologies operating at 5.9 GHz. The exposure levels were evaluated in terms of whole-body Specific Absorption Rate (...
2408.03945
Kristina Schaaff
Kristina Schaaff and Marc-Andr\'e Heidelmann
Impacts of Anthropomorphizing Large Language Models in Learning Environments
Presented at Affective Computing Pre-Conference at ISRE 2024
null
null
null
cs.CL cs.AI cs.CY cs.HC
http://creativecommons.org/licenses/by/4.0/
Large Language Models (LLMs) are increasingly being used in learning environments to support teaching-be it as learning companions or as tutors. With our contribution, we aim to discuss the implications of the anthropomorphization of LLMs in learning environments on educational theory to build a foundation for more e...
[ { "created": "Mon, 22 Jul 2024 06:28:54 GMT", "version": "v1" } ]
2024-08-09
[ [ "Schaaff", "Kristina", "" ], [ "Heidelmann", "Marc-André", "" ] ]
Large Language Models (LLMs) are increasingly being used in learning environments to support teaching-be it as learning companions or as tutors. With our contribution, we aim to discuss the implications of the anthropomorphization of LLMs in learning environments on educational theory to build a foundation for more eff...
2310.04197
Angel Casanova
\'Angel Casanova Bienzobas, Alfonso S\'anchez-Maci\'an
Threat Trekker: An Approach to Cyber Threat Hunting
I am disseminating this outcome to all of you, despite the fact that the results may appear somewhat idealistic, given that certain datasets utilized for the training of the machine learning model comprise simulated data
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
Threat hunting is a proactive methodology for exploring, detecting and mitigating cyberattacks within complex environments. As opposed to conventional detection systems, threat hunting strategies assume adversaries have infiltrated the system; as a result they proactively search out any unusual patterns or activities...
[ { "created": "Fri, 6 Oct 2023 12:29:41 GMT", "version": "v1" } ]
2023-10-09
[ [ "Bienzobas", "Ángel Casanova", "" ], [ "Sánchez-Macián", "Alfonso", "" ] ]
Threat hunting is a proactive methodology for exploring, detecting and mitigating cyberattacks within complex environments. As opposed to conventional detection systems, threat hunting strategies assume adversaries have infiltrated the system; as a result they proactively search out any unusual patterns or activities w...
2205.06255
Qianqian Wang
Qianqian Wang, Zhengqi Li, David Salesin, Noah Snavely, Brian Curless, Janne Kontkanen
3D Moments from Near-Duplicate Photos
CVPR 2022
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
We introduce 3D Moments, a new computational photography effect. As input we take a pair of near-duplicate photos, i.e., photos of moving subjects from similar viewpoints, common in people's photo collections. As output, we produce a video that smoothly interpolates the scene motion from the first photo to the second...
[ { "created": "Thu, 12 May 2022 17:56:18 GMT", "version": "v1" } ]
2022-05-13
[ [ "Wang", "Qianqian", "" ], [ "Li", "Zhengqi", "" ], [ "Salesin", "David", "" ], [ "Snavely", "Noah", "" ], [ "Curless", "Brian", "" ], [ "Kontkanen", "Janne", "" ] ]
We introduce 3D Moments, a new computational photography effect. As input we take a pair of near-duplicate photos, i.e., photos of moving subjects from similar viewpoints, common in people's photo collections. As output, we produce a video that smoothly interpolates the scene motion from the first photo to the second, ...
2407.15373
Dizhi Ma
Dizhi Ma, Xiyun Hu, Jingyu Shi, Mayank Patel, Rahul Jain, Ziyi Liu, Zhengzhe Zhu and Karthik Ramani
avaTTAR: Table Tennis Stroke Training with On-body and Detached Visualization in Augmented Reality
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
Table tennis stroke training is a critical aspect of player development. We designed a new augmented reality (AR) system, avaTTAR, for table tennis stroke training. The system provides both "on-body" (first-person view) and "detached" (third-person view) visual cues, enabling users to visualize target strokes and cor...
[ { "created": "Mon, 22 Jul 2024 04:47:16 GMT", "version": "v1" }, { "created": "Fri, 26 Jul 2024 15:13:46 GMT", "version": "v2" } ]
2024-07-29
[ [ "Ma", "Dizhi", "" ], [ "Hu", "Xiyun", "" ], [ "Shi", "Jingyu", "" ], [ "Patel", "Mayank", "" ], [ "Jain", "Rahul", "" ], [ "Liu", "Ziyi", "" ], [ "Zhu", "Zhengzhe", "" ], [ "Ramani", "Karthik", ...
Table tennis stroke training is a critical aspect of player development. We designed a new augmented reality (AR) system, avaTTAR, for table tennis stroke training. The system provides both "on-body" (first-person view) and "detached" (third-person view) visual cues, enabling users to visualize target strokes and corre...
2005.13102
Bangalore Ravi Kiran
Leonardo Gigli, B Ravi Kiran, Thomas Paul, Andres Serna, Nagarjuna Vemuri, Beatriz Marcotegui, Santiago Velasco-Forero
Road Segmentation on low resolution Lidar point clouds for autonomous vehicles
ISPRS 2020
null
null
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Point cloud datasets for perception tasks in the context of autonomous driving often rely on high resolution 64-layer Light Detection and Ranging (LIDAR) scanners. They are expensive to deploy on real-world autonomous driving sensor architectures which usually employ 16/32 layer LIDARs. We evaluate the effect of subs...
[ { "created": "Wed, 27 May 2020 00:38:39 GMT", "version": "v1" } ]
2020-05-28
[ [ "Gigli", "Leonardo", "" ], [ "Kiran", "B Ravi", "" ], [ "Paul", "Thomas", "" ], [ "Serna", "Andres", "" ], [ "Vemuri", "Nagarjuna", "" ], [ "Marcotegui", "Beatriz", "" ], [ "Velasco-Forero", "Santiago", "" ...
Point cloud datasets for perception tasks in the context of autonomous driving often rely on high resolution 64-layer Light Detection and Ranging (LIDAR) scanners. They are expensive to deploy on real-world autonomous driving sensor architectures which usually employ 16/32 layer LIDARs. We evaluate the effect of subsam...
2105.05026
Chongxuan Li
Guoqiang Wu, Chongxuan Li, Kun Xu, Jun Zhu
Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
(Partial) ranking loss is a commonly used evaluation measure for multi-label classification, which is usually optimized with convex surrogates for computational efficiency. Prior theoretical work on multi-label ranking mainly focuses on (Fisher) consistency analyses. However, there is a gap between existing theory an...
[ { "created": "Mon, 10 May 2021 09:23:27 GMT", "version": "v1" } ]
2021-05-12
[ [ "Wu", "Guoqiang", "" ], [ "Li", "Chongxuan", "" ], [ "Xu", "Kun", "" ], [ "Zhu", "Jun", "" ] ]
(Partial) ranking loss is a commonly used evaluation measure for multi-label classification, which is usually optimized with convex surrogates for computational efficiency. Prior theoretical work on multi-label ranking mainly focuses on (Fisher) consistency analyses. However, there is a gap between existing theory and ...
2403.14623
Zhicong Tang
Zhicong Tang, Tiankai Hang, Shuyang Gu, Dong Chen, Baining Guo
Simplified Diffusion Schr\"odinger Bridge
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a novel theoretical simplification of the Diffusion Schr\"odinger Bridge (DSB) that facilitates its unification with Score-based Generative Models (SGMs), addressing the limitations of DSB in complex data generation and enabling faster convergence and enhanced performance. By employing SGMs as a...
[ { "created": "Thu, 21 Mar 2024 17:59:41 GMT", "version": "v1" }, { "created": "Wed, 27 Mar 2024 16:49:35 GMT", "version": "v2" }, { "created": "Mon, 27 May 2024 04:44:22 GMT", "version": "v3" }, { "created": "Tue, 13 Aug 2024 04:34:58 GMT", "version": "v4" } ]
2024-08-14
[ [ "Tang", "Zhicong", "" ], [ "Hang", "Tiankai", "" ], [ "Gu", "Shuyang", "" ], [ "Chen", "Dong", "" ], [ "Guo", "Baining", "" ] ]
This paper introduces a novel theoretical simplification of the Diffusion Schr\"odinger Bridge (DSB) that facilitates its unification with Score-based Generative Models (SGMs), addressing the limitations of DSB in complex data generation and enabling faster convergence and enhanced performance. By employing SGMs as an ...
1511.04376
Martin Reisslein
Akhilesh Thyagaturu, Anu Mercian, Michael P. McGarry, Martin Reisslein, Wolfgang Kellerer
Software Defined Optical Networks (SDONs): A Comprehensive Survey
null
IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 2738-2786, 4th Qu. 2016
10.1109/COMST.2016.2586999
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emerging Software Defined Networking (SDN) paradigm separates the data plane from the control plane and centralizes network control in an SDN controller. Applications interact with controllers to implement network services, such as network transport with Quality of Service (QoS). SDN facilitates the virtualizatio...
[ { "created": "Fri, 13 Nov 2015 17:31:10 GMT", "version": "v1" }, { "created": "Thu, 26 May 2016 10:19:58 GMT", "version": "v2" }, { "created": "Sun, 17 Jul 2016 07:46:47 GMT", "version": "v3" } ]
2016-11-29
[ [ "Thyagaturu", "Akhilesh", "" ], [ "Mercian", "Anu", "" ], [ "McGarry", "Michael P.", "" ], [ "Reisslein", "Martin", "" ], [ "Kellerer", "Wolfgang", "" ] ]
The emerging Software Defined Networking (SDN) paradigm separates the data plane from the control plane and centralizes network control in an SDN controller. Applications interact with controllers to implement network services, such as network transport with Quality of Service (QoS). SDN facilitates the virtualization ...
2306.02346
Shuo Ye
Shuo Ye and Yufeng Shi and Ruxin Wang and Yu Wang and Jiamiao Xu and Chuanwu Yang and Xinge You
CDLT: A Dataset with Concept Drift and Long-Tailed Distribution for Fine-Grained Visual Categorization
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data is the foundation for the development of computer vision, and the establishment of datasets plays an important role in advancing the techniques of fine-grained visual categorization~(FGVC). In the existing FGVC datasets used in computer vision, it is generally assumed that each collected instance has fixed chara...
[ { "created": "Sun, 4 Jun 2023 12:42:45 GMT", "version": "v1" } ]
2023-06-06
[ [ "Ye", "Shuo", "" ], [ "Shi", "Yufeng", "" ], [ "Wang", "Ruxin", "" ], [ "Wang", "Yu", "" ], [ "Xu", "Jiamiao", "" ], [ "Yang", "Chuanwu", "" ], [ "You", "Xinge", "" ] ]
Data is the foundation for the development of computer vision, and the establishment of datasets plays an important role in advancing the techniques of fine-grained visual categorization~(FGVC). In the existing FGVC datasets used in computer vision, it is generally assumed that each collected instance has fixed charact...
2303.06545
Hao Zhou
Hao Zhou, Chongyang Zhang, Yanjun Chen, Chuanping Hu
Towards Diverse Temporal Grounding under Single Positive Labels
The source codes are available at https://github.com/zhouhaocv/DTG-SPL
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Temporal grounding aims to retrieve moments of the described event within an untrimmed video by a language query. Typically, existing methods assume annotations are precise and unique, yet one query may describe multiple moments in many cases. Hence, simply taking it as a one-vs-one mapping task and striving to match...
[ { "created": "Sun, 12 Mar 2023 02:54:18 GMT", "version": "v1" } ]
2023-03-14
[ [ "Zhou", "Hao", "" ], [ "Zhang", "Chongyang", "" ], [ "Chen", "Yanjun", "" ], [ "Hu", "Chuanping", "" ] ]
Temporal grounding aims to retrieve moments of the described event within an untrimmed video by a language query. Typically, existing methods assume annotations are precise and unique, yet one query may describe multiple moments in many cases. Hence, simply taking it as a one-vs-one mapping task and striving to match s...
2110.15919
Pranay Bhardwaj
Vinay U. Pai, Pranay Bhardwaj, and S. M. Zafaruddin
Performance Analysis of Dual-Hop THz Wireless Transmission for Backhaul Applications
This paper has been accepted for presentation in 2021 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Hyderabad, India
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
THz transmissions suffer from pointing errors due to antenna misalignment and incur higher path loss from the molecular absorption in addition to the channel fading. In this paper, we employ an amplify-and-forward (AF) dual-hop relaying to mitigate the effect of pointing errors and extend the range of the THz wireles...
[ { "created": "Fri, 29 Oct 2021 17:15:38 GMT", "version": "v1" }, { "created": "Sun, 21 Nov 2021 19:24:23 GMT", "version": "v2" } ]
2021-11-23
[ [ "Pai", "Vinay U.", "" ], [ "Bhardwaj", "Pranay", "" ], [ "Zafaruddin", "S. M.", "" ] ]
THz transmissions suffer from pointing errors due to antenna misalignment and incur higher path loss from the molecular absorption in addition to the channel fading. In this paper, we employ an amplify-and-forward (AF) dual-hop relaying to mitigate the effect of pointing errors and extend the range of the THz wireless ...
2202.02071
Henrique Moniz
Afonso Oliveira, Henrique Moniz, Rodrigo Rodrigues
Alea-BFT: Practical Asynchronous Byzantine Fault Tolerance
null
null
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
Traditional Byzantine Fault Tolerance (BFT) state machine replication protocols assume a partial synchrony model, leading to a design where a leader replica drives the protocol and is replaced after a timeout. Recently, we witnessed a surge of asynchronous BFT protocols that use randomization to remove the assumption...
[ { "created": "Fri, 4 Feb 2022 10:53:37 GMT", "version": "v1" } ]
2022-02-07
[ [ "Oliveira", "Afonso", "" ], [ "Moniz", "Henrique", "" ], [ "Rodrigues", "Rodrigo", "" ] ]
Traditional Byzantine Fault Tolerance (BFT) state machine replication protocols assume a partial synchrony model, leading to a design where a leader replica drives the protocol and is replaced after a timeout. Recently, we witnessed a surge of asynchronous BFT protocols that use randomization to remove the assumptions ...
1405.2066
Jehad Al Dallal Prof.
Jehad Al Dallal
How and When to Flatten Java Classes?
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Improving modularity and reusability are two key objectives in object-oriented programming. These objectives are achieved by applying several key concepts, such as data encapsulation and inheritance. A class in an object-oriented system is the basic unit of design. Assessing the quality of an object-oriented class ma...
[ { "created": "Thu, 8 May 2014 19:48:33 GMT", "version": "v1" } ]
2014-05-09
[ [ "Dallal", "Jehad Al", "" ] ]
Improving modularity and reusability are two key objectives in object-oriented programming. These objectives are achieved by applying several key concepts, such as data encapsulation and inheritance. A class in an object-oriented system is the basic unit of design. Assessing the quality of an object-oriented class may ...
1406.3583
Aaron D. Jaggard
Aaron D. Jaggard, Aaron Johnson, Paul Syverson, and Joan Feigenbaum
Representing Network Trust and Using It to Improve Anonymous Communication
24 pages; talk to be presented at HotPETs 2014
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular sy...
[ { "created": "Fri, 13 Jun 2014 16:23:12 GMT", "version": "v1" } ]
2014-06-16
[ [ "Jaggard", "Aaron D.", "" ], [ "Johnson", "Aaron", "" ], [ "Syverson", "Paul", "" ], [ "Feigenbaum", "Joan", "" ] ]
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular syst...
1702.06235
Will Radford
Andrew Chisholm, Will Radford, Ben Hachey
Learning to generate one-sentence biographies from Wikidata
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
We investigate the generation of one-sentence Wikipedia biographies from facts derived from Wikidata slot-value pairs. We train a recurrent neural network sequence-to-sequence model with attention to select facts and generate textual summaries. Our model incorporates a novel secondary objective that helps ensure it g...
[ { "created": "Tue, 21 Feb 2017 01:30:59 GMT", "version": "v1" } ]
2017-02-22
[ [ "Chisholm", "Andrew", "" ], [ "Radford", "Will", "" ], [ "Hachey", "Ben", "" ] ]
We investigate the generation of one-sentence Wikipedia biographies from facts derived from Wikidata slot-value pairs. We train a recurrent neural network sequence-to-sequence model with attention to select facts and generate textual summaries. Our model incorporates a novel secondary objective that helps ensure it gen...
2402.11173
Andrew Lowy
Andrew Lowy, Jonathan Ullman, Stephen J. Wright
How to Make the Gradients Small Privately: Improved Rates for Differentially Private Non-Convex Optimization
null
null
null
null
cs.LG cs.CR math.OC
http://creativecommons.org/licenses/by/4.0/
We provide a simple and flexible framework for designing differentially private algorithms to find approximate stationary points of non-convex loss functions. Our framework is based on using a private approximate risk minimizer to "warm start" another private algorithm for finding stationary points. We use this frame...
[ { "created": "Sat, 17 Feb 2024 02:42:56 GMT", "version": "v1" } ]
2024-02-20
[ [ "Lowy", "Andrew", "" ], [ "Ullman", "Jonathan", "" ], [ "Wright", "Stephen J.", "" ] ]
We provide a simple and flexible framework for designing differentially private algorithms to find approximate stationary points of non-convex loss functions. Our framework is based on using a private approximate risk minimizer to "warm start" another private algorithm for finding stationary points. We use this framewo...
2401.11946
Jiajun Liu
Jiajun Liu, Lina Tan, Zhili Zhou, Yi Li, Peng Chen
A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data. There exists an issue that the number of images stored in the database grows exponentially as the steganographic capacity rises. The need for a high steganographic capacity makes it challenging to buil...
[ { "created": "Mon, 22 Jan 2024 13:35:27 GMT", "version": "v1" } ]
2024-01-23
[ [ "Liu", "Jiajun", "" ], [ "Tan", "Lina", "" ], [ "Zhou", "Zhili", "" ], [ "Li", "Yi", "" ], [ "Chen", "Peng", "" ] ]
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data. There exists an issue that the number of images stored in the database grows exponentially as the steganographic capacity rises. The need for a high steganographic capacity makes it challenging to build ...
2203.10837
Marcos Faundez-Zanuy
K. L\'opez-de-Ipi\~na, Marcos Faundez-Zanuy, Jordi Sol\'e-Casals, Fernando Zelarin, Pilar Calvo
Multi-class versus One-class classifier in spontaneous speech analysis oriented to Alzheimer Disease diagnosis
10 pages, published in International Conference on NONLINEAR SPEECH PROCESSING, NOLISP 2015 jointly organized with the 25th Italian Workshop on Neural Networks, WIRN 2015, held at May 2015, Vietri sul Mare, Salerno, Italy
Recent Advances in Nonlinear Speech Processing. Smart Innovation, Systems and Technologies, vol 48. Springer, Cham 2015
10.1007/978-3-319-28109-4_7
null
cs.SD cs.LG eess.AS
http://creativecommons.org/licenses/by-nc-nd/4.0/
Most of medical developments require the ability to identify samples that are anomalous with respect to a target group or control group, in the sense they could belong to a new, previously unseen class or are not class data. In this case when there are not enough data to train two-class One-class classification appea...
[ { "created": "Mon, 21 Mar 2022 09:57:20 GMT", "version": "v1" } ]
2022-03-22
[ [ "López-de-Ipiña", "K.", "" ], [ "Faundez-Zanuy", "Marcos", "" ], [ "Solé-Casals", "Jordi", "" ], [ "Zelarin", "Fernando", "" ], [ "Calvo", "Pilar", "" ] ]
Most of medical developments require the ability to identify samples that are anomalous with respect to a target group or control group, in the sense they could belong to a new, previously unseen class or are not class data. In this case when there are not enough data to train two-class One-class classification appear ...
2408.06047
Xuanpu Zhang
Xuanpu Zhang and Dan Song and Pengxin Zhan and Qingguo Chen and Zhao Xu and Weihua Luo and Kaifu Zhang and Anan Liu
BooW-VTON: Boosting In-the-Wild Virtual Try-On via Mask-Free Pseudo Data Training
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image-based virtual try-on is an increasingly popular and important task to generate realistic try-on images of specific person. Existing methods always employ an accurate mask to remove the original garment in the source image, thus achieving realistic synthesized images in simple and conventional try-on scenarios b...
[ { "created": "Mon, 12 Aug 2024 10:39:59 GMT", "version": "v1" } ]
2024-08-13
[ [ "Zhang", "Xuanpu", "" ], [ "Song", "Dan", "" ], [ "Zhan", "Pengxin", "" ], [ "Chen", "Qingguo", "" ], [ "Xu", "Zhao", "" ], [ "Luo", "Weihua", "" ], [ "Zhang", "Kaifu", "" ], [ "Liu", "Anan", ...
Image-based virtual try-on is an increasingly popular and important task to generate realistic try-on images of specific person. Existing methods always employ an accurate mask to remove the original garment in the source image, thus achieving realistic synthesized images in simple and conventional try-on scenarios bas...
1604.01186
EPTCS
Denis Firsov, Tarmo Uustalu, Niccol\`o Veltri
Variations on Noetherianness
In Proceedings MSFP 2016, arXiv:1604.00384
EPTCS 207, 2016, pp. 76-88
10.4204/EPTCS.207.4
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In constructive mathematics, several nonequivalent notions of finiteness exist. In this paper, we continue the study of Noetherian sets in the dependently typed setting of the Agda programming language. We want to say that a set is Noetherian, if, when we are shown elements from it one after another, we will sooner o...
[ { "created": "Tue, 5 Apr 2016 09:04:13 GMT", "version": "v1" } ]
2016-04-06
[ [ "Firsov", "Denis", "" ], [ "Uustalu", "Tarmo", "" ], [ "Veltri", "Niccolò", "" ] ]
In constructive mathematics, several nonequivalent notions of finiteness exist. In this paper, we continue the study of Noetherian sets in the dependently typed setting of the Agda programming language. We want to say that a set is Noetherian, if, when we are shown elements from it one after another, we will sooner or ...
2109.06612
Johanna Schmidt
Raphael Sahann, Torsten M\"oller, Johanna Schmidt
Histogram binning revisited with a focus on human perception
Accepted as short paper at VIS 2021. Supplemental material can be found at https://github.com/johanna-schmidt/histogram-binning-revisited
Proceedings of VIS short papers 2021
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper presents a quantitative user study to evaluate how well users can visually perceive the underlying data distribution from a histogram representation. We used different sample and bin sizes and four different distributions (uniform, normal, bimodal, and gamma). The study results confirm that, in general, mo...
[ { "created": "Tue, 14 Sep 2021 12:08:27 GMT", "version": "v1" } ]
2021-09-15
[ [ "Sahann", "Raphael", "" ], [ "Möller", "Torsten", "" ], [ "Schmidt", "Johanna", "" ] ]
This paper presents a quantitative user study to evaluate how well users can visually perceive the underlying data distribution from a histogram representation. We used different sample and bin sizes and four different distributions (uniform, normal, bimodal, and gamma). The study results confirm that, in general, more...
1802.09657
Dipankar Maity
Dipankar Maity, John S. Baras
Event-Triggered Controller Synthesis for Dynamical Systems with Temporal Logic Constraints
null
null
null
null
cs.RO math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose an event-triggered con- trol framework for dynamical systems with temporal logical constraints. Event-triggered control methodologies have proven to be very efficient in reducing sensing, communication and computation costs. When a continuous feedback control is re- placed with an event-trigg...
[ { "created": "Tue, 27 Feb 2018 00:17:41 GMT", "version": "v1" } ]
2018-02-28
[ [ "Maity", "Dipankar", "" ], [ "Baras", "John S.", "" ] ]
In this work, we propose an event-triggered con- trol framework for dynamical systems with temporal logical constraints. Event-triggered control methodologies have proven to be very efficient in reducing sensing, communication and computation costs. When a continuous feedback control is re- placed with an event-trigger...
1911.03059
Chowdhury Rahman
Afra Anika, Md. Hasibur Rahman, Salekul Islam, Abu Shafin Mohammad Mahdee Jameel and Chowdhury Rafeed Rahman
A Comprehensive Comparison of Machine Learning Based Methods Used in Bengali Question Classification
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and com...
[ { "created": "Fri, 8 Nov 2019 05:30:33 GMT", "version": "v1" }, { "created": "Tue, 19 Nov 2019 16:37:41 GMT", "version": "v2" } ]
2019-11-20
[ [ "Anika", "Afra", "" ], [ "Rahman", "Md. Hasibur", "" ], [ "Islam", "Salekul", "" ], [ "Jameel", "Abu Shafin Mohammad Mahdee", "" ], [ "Rahman", "Chowdhury Rafeed", "" ] ]
QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and compu...
2212.09448
Senem Tanberk PhD
Senem Tanberk, Mustafa Can
Smart Journey in Istanbul: A Mobile Application in Smart Cities for Traffic Estimation by Harnessing Time Series
null
null
10.1109/ASYU58738.2023.10296669
null
cs.AI cs.IR
http://creativecommons.org/licenses/by/4.0/
In recent decades, mobile applications (apps) have gained enormous popularity. Smart services for smart cities increasingly gain attention. The main goal of the proposed research is to present a new AI-powered mobile application on Istanbul's traffic congestion forecast by using traffic density data. It addresses the...
[ { "created": "Tue, 13 Dec 2022 12:10:52 GMT", "version": "v1" } ]
2023-11-09
[ [ "Tanberk", "Senem", "" ], [ "Can", "Mustafa", "" ] ]
In recent decades, mobile applications (apps) have gained enormous popularity. Smart services for smart cities increasingly gain attention. The main goal of the proposed research is to present a new AI-powered mobile application on Istanbul's traffic congestion forecast by using traffic density data. It addresses the r...
2401.11150
Junxiao Shen Mr
Junxiao Shen, Xuhai Xu, Ran Tan, Amy Karlson, Evan Strasnick
Simultaneous Gesture Classification and Localization with an Automatic Gesture Annotation Model
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Training a real-time gesture recognition model heavily relies on annotated data. However, manual data annotation is costly and demands substantial human effort. In order to address this challenge, we propose a novel annotation model that can automatically annotate gesture classes and identify their temporal ranges. O...
[ { "created": "Sat, 20 Jan 2024 07:11:03 GMT", "version": "v1" } ]
2024-01-23
[ [ "Shen", "Junxiao", "" ], [ "Xu", "Xuhai", "" ], [ "Tan", "Ran", "" ], [ "Karlson", "Amy", "" ], [ "Strasnick", "Evan", "" ] ]
Training a real-time gesture recognition model heavily relies on annotated data. However, manual data annotation is costly and demands substantial human effort. In order to address this challenge, we propose a novel annotation model that can automatically annotate gesture classes and identify their temporal ranges. Our...
1005.0907
Rdv Ijcsis
Yasser M. Alginaih, Abdul Ahad Siddiqi
Multistage Hybrid Arabic/Indian Numeral OCR System
IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
The use of OCR in postal services is not yet universal and there are still many countries that process mail sorting manually. Automated Arabic/Indian numeral Optical Character Recognition (OCR) systems for Postal services are being used in some countries, but still there are errors during the mail sorting process, th...
[ { "created": "Thu, 6 May 2010 07:25:23 GMT", "version": "v1" } ]
2010-05-07
[ [ "Alginaih", "Yasser M.", "" ], [ "Siddiqi", "Abdul Ahad", "" ] ]
The use of OCR in postal services is not yet universal and there are still many countries that process mail sorting manually. Automated Arabic/Indian numeral Optical Character Recognition (OCR) systems for Postal services are being used in some countries, but still there are errors during the mail sorting process, thus...
2405.13937
Xingtong Yu
Xingtong Yu, Zhenghao Liu, Yuan Fang, Xinming Zhang
DyGPrompt: Learning Feature and Time Prompts on Dynamic Graphs
Under review
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic graphs are pervasive in the real world, modeling dynamic relations between objects across various fields. For dynamic graph modeling, dynamic graph neural networks (DGNNs) have emerged as a mainstream technique, which are generally pre-trained on the link prediction task, leaving a significant gap from the ob...
[ { "created": "Wed, 22 May 2024 19:10:24 GMT", "version": "v1" }, { "created": "Sun, 26 May 2024 01:46:11 GMT", "version": "v2" }, { "created": "Tue, 28 May 2024 10:07:29 GMT", "version": "v3" }, { "created": "Tue, 2 Jul 2024 05:14:10 GMT", "version": "v4" }, { "cr...
2024-07-04
[ [ "Yu", "Xingtong", "" ], [ "Liu", "Zhenghao", "" ], [ "Fang", "Yuan", "" ], [ "Zhang", "Xinming", "" ] ]
Dynamic graphs are pervasive in the real world, modeling dynamic relations between objects across various fields. For dynamic graph modeling, dynamic graph neural networks (DGNNs) have emerged as a mainstream technique, which are generally pre-trained on the link prediction task, leaving a significant gap from the obje...
2208.02884
Nicolaas Kaashoek
Nicolaas Kaashoek and Robert Morris
CheckSync: Using Runtime-Integrated Checkpoints to Achieve High Availability}
14 pages, 6 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
CheckSync provides applications with high availability via runtime-integrated checkpointing. This allows CheckSync to take checkpoints of a process running in a memory-managed language (Go, for now), which can be resumed on another machine after a failure. CheckSync uses the runtime to checkpoint only the process' li...
[ { "created": "Thu, 4 Aug 2022 20:53:50 GMT", "version": "v1" } ]
2022-08-08
[ [ "Kaashoek", "Nicolaas", "" ], [ "Morris", "Robert", "" ] ]
CheckSync provides applications with high availability via runtime-integrated checkpointing. This allows CheckSync to take checkpoints of a process running in a memory-managed language (Go, for now), which can be resumed on another machine after a failure. CheckSync uses the runtime to checkpoint only the process' live...
2303.13299
Avi Schwarzschild
Avi Schwarzschild, Max Cembalest, Karthik Rao, Keegan Hines, John Dickerson
Reckoning with the Disagreement Problem: Explanation Consensus as a Training Objective
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
As neural networks increasingly make critical decisions in high-stakes settings, monitoring and explaining their behavior in an understandable and trustworthy manner is a necessity. One commonly used type of explainer is post hoc feature attribution, a family of methods for giving each feature in an input a score cor...
[ { "created": "Thu, 23 Mar 2023 14:35:37 GMT", "version": "v1" } ]
2023-03-24
[ [ "Schwarzschild", "Avi", "" ], [ "Cembalest", "Max", "" ], [ "Rao", "Karthik", "" ], [ "Hines", "Keegan", "" ], [ "Dickerson", "John", "" ] ]
As neural networks increasingly make critical decisions in high-stakes settings, monitoring and explaining their behavior in an understandable and trustworthy manner is a necessity. One commonly used type of explainer is post hoc feature attribution, a family of methods for giving each feature in an input a score corre...
2311.11596
Yining Miao
Yining Miao, Nanlin Shi, Changxing Huang, Yonghao Song, Xiaogang Chen, Yijun Wang, Xiaorong Gao
High-performance cVEP-BCI under minimal calibration
35 pages, 5 figures
null
null
null
cs.HC cs.IT eess.SP math.IT q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ultimate goal of brain-computer interfaces (BCIs) based on visual modulation paradigms is to achieve high-speed performance without the burden of extensive calibration. Code-modulated visual evoked potential-based BCIs (cVEP-BCIs) modulated by broadband white noise (WN) offer various advantages, including increas...
[ { "created": "Mon, 20 Nov 2023 08:20:51 GMT", "version": "v1" } ]
2023-11-21
[ [ "Miao", "Yining", "" ], [ "Shi", "Nanlin", "" ], [ "Huang", "Changxing", "" ], [ "Song", "Yonghao", "" ], [ "Chen", "Xiaogang", "" ], [ "Wang", "Yijun", "" ], [ "Gao", "Xiaorong", "" ] ]
The ultimate goal of brain-computer interfaces (BCIs) based on visual modulation paradigms is to achieve high-speed performance without the burden of extensive calibration. Code-modulated visual evoked potential-based BCIs (cVEP-BCIs) modulated by broadband white noise (WN) offer various advantages, including increased...
2204.08970
Zhihao Li
Zhihao Li, Si Yi, Zhan Ma
Rendering Nighttime Image Via Cascaded Color and Brightness Compensation
Accepted by NTIRE 2022 (CVPR Workshop)
null
null
null
cs.CV eess.IV
http://creativecommons.org/licenses/by/4.0/
Image signal processing (ISP) is crucial for camera imaging, and neural networks (NN) solutions are extensively deployed for daytime scenes. The lack of sufficient nighttime image dataset and insights on nighttime illumination characteristics poses a great challenge for high-quality rendering using existing NN ISPs. ...
[ { "created": "Tue, 19 Apr 2022 16:15:31 GMT", "version": "v1" }, { "created": "Thu, 21 Apr 2022 17:23:11 GMT", "version": "v2" } ]
2022-04-22
[ [ "Li", "Zhihao", "" ], [ "Yi", "Si", "" ], [ "Ma", "Zhan", "" ] ]
Image signal processing (ISP) is crucial for camera imaging, and neural networks (NN) solutions are extensively deployed for daytime scenes. The lack of sufficient nighttime image dataset and insights on nighttime illumination characteristics poses a great challenge for high-quality rendering using existing NN ISPs. To...
1702.05724
Daniel M\'endez Fern\'andez
Marco Kuhrmann and Daniel M\'endez Fern\'andez and Thomas Ternit\'e
On the Use of Variability Operations in the V-Modell XT Software Process Line
Journal of Software: Evolution and Process, 2015
null
10.1002/smr.1751
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software process lines provide a systematic approach to develop and manage software processes. It defines a reference process containing general process assets, whereas a well-defined customization approach allows process engineers to create new process variants, e.g., by extending or modifying process assets. Variab...
[ { "created": "Sun, 19 Feb 2017 08:58:12 GMT", "version": "v1" } ]
2017-02-21
[ [ "Kuhrmann", "Marco", "" ], [ "Fernández", "Daniel Méndez", "" ], [ "Ternité", "Thomas", "" ] ]
Software process lines provide a systematic approach to develop and manage software processes. It defines a reference process containing general process assets, whereas a well-defined customization approach allows process engineers to create new process variants, e.g., by extending or modifying process assets. Variabil...
1711.11017
Ethan Perez
Simon Brodeur, Ethan Perez, Ankesh Anand, Florian Golemo, Luca Celotti, Florian Strub, Jean Rouat, Hugo Larochelle, Aaron Courville
HoME: a Household Multimodal Environment
Presented at NIPS 2017's Visually-Grounded Interaction and Language Workshop
null
null
null
cs.AI cs.CL cs.CV cs.RO cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce HoME: a Household Multimodal Environment for artificial agents to learn from vision, audio, semantics, physics, and interaction with objects and other agents, all within a realistic context. HoME integrates over 45,000 diverse 3D house layouts based on the SUNCG dataset, a scale which may facilitate lear...
[ { "created": "Wed, 29 Nov 2017 18:45:59 GMT", "version": "v1" } ]
2017-11-30
[ [ "Brodeur", "Simon", "" ], [ "Perez", "Ethan", "" ], [ "Anand", "Ankesh", "" ], [ "Golemo", "Florian", "" ], [ "Celotti", "Luca", "" ], [ "Strub", "Florian", "" ], [ "Rouat", "Jean", "" ], [ "Laroche...
We introduce HoME: a Household Multimodal Environment for artificial agents to learn from vision, audio, semantics, physics, and interaction with objects and other agents, all within a realistic context. HoME integrates over 45,000 diverse 3D house layouts based on the SUNCG dataset, a scale which may facilitate learni...
1709.03421
Riccardo Sven Risuleo
Riccardo Sven Risuleo, Giulio Bottegal, H{\aa}kan Hjalmarsson
Modeling and identification of uncertain-input systems
27 Pages, submitted to Automatica
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present a new class of models, called uncertain-input models, that allows us to treat system-identification problems in which a linear system is subject to a partially unknown input signal. To encode prior information about the input or the linear system, we use Gaussian-process models. We estimate t...
[ { "created": "Mon, 11 Sep 2017 14:53:38 GMT", "version": "v1" } ]
2017-09-12
[ [ "Risuleo", "Riccardo Sven", "" ], [ "Bottegal", "Giulio", "" ], [ "Hjalmarsson", "Håkan", "" ] ]
In this work, we present a new class of models, called uncertain-input models, that allows us to treat system-identification problems in which a linear system is subject to a partially unknown input signal. To encode prior information about the input or the linear system, we use Gaussian-process models. We estimate the...
2110.04678
Ankit Parag Shah
Rita Singh, Ankit Shah, Hira Dhamyal
An Overview of Techniques for Biomarker Discovery in Voice Signal
Last two authors contributed equally to the paper
null
null
null
cs.SD cs.AI eess.AS
http://creativecommons.org/licenses/by-nc-nd/4.0/
This paper reflects on the effect of several categories of medical conditions on human voice, focusing on those that may be hypothesized to have effects on voice, but for which the changes themselves may be subtle enough to have eluded observation in standard analytical examinations of the voice signal. It presents t...
[ { "created": "Sun, 10 Oct 2021 01:39:28 GMT", "version": "v1" } ]
2021-10-12
[ [ "Singh", "Rita", "" ], [ "Shah", "Ankit", "" ], [ "Dhamyal", "Hira", "" ] ]
This paper reflects on the effect of several categories of medical conditions on human voice, focusing on those that may be hypothesized to have effects on voice, but for which the changes themselves may be subtle enough to have eluded observation in standard analytical examinations of the voice signal. It presents thr...
2308.01286
Diptapriyo Majumdar
Diptapriyo Majumdar
Enumeration Kernels of Polynomial Size for Cuts of Bounded Degree
There have been major revision in the technicalities and proofs of the paper
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Enumeration kernelization was first proposed by Creignou et al. [TOCS 2017] and was later refined by Golovach et al. [JCSS 2022] into two different variants: fully-polynomial enumeration kernelization and polynomial-delay enumeration kernelization. In this paper, we consider the DEGREE-d-CUT problem from the perspect...
[ { "created": "Wed, 2 Aug 2023 17:18:19 GMT", "version": "v1" }, { "created": "Thu, 30 Nov 2023 09:14:39 GMT", "version": "v2" }, { "created": "Fri, 1 Dec 2023 07:32:28 GMT", "version": "v3" }, { "created": "Fri, 2 Feb 2024 18:15:47 GMT", "version": "v4" }, { "crea...
2024-04-30
[ [ "Majumdar", "Diptapriyo", "" ] ]
Enumeration kernelization was first proposed by Creignou et al. [TOCS 2017] and was later refined by Golovach et al. [JCSS 2022] into two different variants: fully-polynomial enumeration kernelization and polynomial-delay enumeration kernelization. In this paper, we consider the DEGREE-d-CUT problem from the perspectiv...
0810.2529
Alireza Bayesteh
Jamshid Abouei, Alireza Bayesteh, Masoud Ebrahimi, and Amir K. Khandani
On the Throughput Maximization in Dencentralized Wireless Networks
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed single-hop wireless network with $K$ links is considered, where the links are partitioned into a fixed number ($M$) of clusters each operating in a subchannel with bandwidth $\frac{W}{M}$. The subchannels are assumed to be orthogonal to each other. A general shadow-fading model, described by parameters ...
[ { "created": "Tue, 14 Oct 2008 19:40:22 GMT", "version": "v1" } ]
2008-10-15
[ [ "Abouei", "Jamshid", "" ], [ "Bayesteh", "Alireza", "" ], [ "Ebrahimi", "Masoud", "" ], [ "Khandani", "Amir K.", "" ] ]
A distributed single-hop wireless network with $K$ links is considered, where the links are partitioned into a fixed number ($M$) of clusters each operating in a subchannel with bandwidth $\frac{W}{M}$. The subchannels are assumed to be orthogonal to each other. A general shadow-fading model, described by parameters $(...
2010.08660
Manas Gaur
Manas Gaur, Keyur Faldu, Amit Sheth
Semantics of the Black-Box: Can knowledge graphs help make deep learning systems more interpretable and explainable?
6 pages + references, 4 figures, Accepted to IEEE internet computing 2020
null
null
null
cs.AI
http://creativecommons.org/licenses/by/4.0/
The recent series of innovations in deep learning (DL) have shown enormous potential to impact individuals and society, both positively and negatively. The DL models utilizing massive computing power and enormous datasets have significantly outperformed prior historical benchmarks on increasingly difficult, well-defi...
[ { "created": "Fri, 16 Oct 2020 22:55:23 GMT", "version": "v1" }, { "created": "Sun, 1 Nov 2020 02:28:43 GMT", "version": "v2" }, { "created": "Tue, 3 Nov 2020 15:52:55 GMT", "version": "v3" }, { "created": "Fri, 11 Dec 2020 23:03:11 GMT", "version": "v4" } ]
2020-12-15
[ [ "Gaur", "Manas", "" ], [ "Faldu", "Keyur", "" ], [ "Sheth", "Amit", "" ] ]
The recent series of innovations in deep learning (DL) have shown enormous potential to impact individuals and society, both positively and negatively. The DL models utilizing massive computing power and enormous datasets have significantly outperformed prior historical benchmarks on increasingly difficult, well-define...
2307.11357
Arthur M\"uller
Arthur M\"uller, Matthia Sabatelli
Bridging the Reality Gap of Reinforcement Learning based Traffic Signal Control using Domain Randomization and Meta Learning
Paper was accepted by the ITSC 2023 (26th IEEE International Conference on Intelligent Transportation Systems)
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reinforcement Learning (RL) has been widely explored in Traffic Signal Control (TSC) applications, however, still no such system has been deployed in practice. A key barrier to progress in this area is the reality gap, the discrepancy that results from differences between simulation models and their real-world equiva...
[ { "created": "Fri, 21 Jul 2023 05:17:21 GMT", "version": "v1" } ]
2023-07-24
[ [ "Müller", "Arthur", "" ], [ "Sabatelli", "Matthia", "" ] ]
Reinforcement Learning (RL) has been widely explored in Traffic Signal Control (TSC) applications, however, still no such system has been deployed in practice. A key barrier to progress in this area is the reality gap, the discrepancy that results from differences between simulation models and their real-world equivale...
2101.04244
Mohammed Bahutair Mr.
Mohammed Bahutair, Athman Bouguettaya, and Azadeh Ghari Neiat
Multi-Perspective Trust Management Framework for Crowdsourced IoT Services
14 pages, accepted and to appear in IEEE Ttransactions on Services Computing
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel generic trust management framework for crowdsourced IoT services. The framework exploits a multi-perspective trust model that captures the inherent characteristics of crowdsourced IoT services. Each perspective is defined by a set of attributes that contribute to the perspective's influence on trus...
[ { "created": "Tue, 12 Jan 2021 00:43:12 GMT", "version": "v1" } ]
2021-01-13
[ [ "Bahutair", "Mohammed", "" ], [ "Bouguettaya", "Athman", "" ], [ "Neiat", "Azadeh Ghari", "" ] ]
We propose a novel generic trust management framework for crowdsourced IoT services. The framework exploits a multi-perspective trust model that captures the inherent characteristics of crowdsourced IoT services. Each perspective is defined by a set of attributes that contribute to the perspective's influence on trust....
2008.07862
David Baum
David Baum
Exploring the Design Space of Aesthetics with the Repertory Grid Technique
Appears in the Proceedings of the 28th International Symposium on Graph Drawing and Network Visualization (GD 2020)
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By optimizing aesthetics, graph diagrams can be generated that are easier to read and understand. However, the challenge lies in identifying suitable aesthetics. We present a novel approach based on repertory grids to explore the design space of aesthetics systematically. We applied our approach with three independen...
[ { "created": "Tue, 18 Aug 2020 11:25:26 GMT", "version": "v1" } ]
2020-08-19
[ [ "Baum", "David", "" ] ]
By optimizing aesthetics, graph diagrams can be generated that are easier to read and understand. However, the challenge lies in identifying suitable aesthetics. We present a novel approach based on repertory grids to explore the design space of aesthetics systematically. We applied our approach with three independent ...
2407.05850
Minghao Yang
Minghao Yang, Jingjing Zhang, Shengyun Liu
DFedSat: Communication-Efficient and Robust Decentralized Federated Learning for LEO Satellite Constellations
13 pages, 10 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low Earth Orbit (LEO) satellites play a crucial role in the development of 6G mobile networks and space-air-ground integrated systems. Recent advancements in space technology have empowered LEO satellites with the capability to run AI applications. However, centralized approaches, where ground stations (GSs) act as s...
[ { "created": "Mon, 8 Jul 2024 12:00:49 GMT", "version": "v1" } ]
2024-07-09
[ [ "Yang", "Minghao", "" ], [ "Zhang", "Jingjing", "" ], [ "Liu", "Shengyun", "" ] ]
Low Earth Orbit (LEO) satellites play a crucial role in the development of 6G mobile networks and space-air-ground integrated systems. Recent advancements in space technology have empowered LEO satellites with the capability to run AI applications. However, centralized approaches, where ground stations (GSs) act as ser...
2306.14834
Zheqing Zhu
Zheqing Zhu, Benjamin Van Roy
Scalable Neural Contextual Bandit for Recommender Systems
null
ACM International Conference on Information and Knowledge Management (CIKM 2023) 32nd ACM International Conference on Information and Knowledge Management (CIKM 2023)
null
null
cs.IR cs.AI
http://creativecommons.org/licenses/by/4.0/
High-quality recommender systems ought to deliver both innovative and relevant content through effective and exploratory interactions with users. Yet, supervised learning-based neural networks, which form the backbone of many existing recommender systems, only leverage recognized user interests, falling short when it...
[ { "created": "Mon, 26 Jun 2023 16:39:39 GMT", "version": "v1" }, { "created": "Sun, 30 Jul 2023 09:01:01 GMT", "version": "v2" }, { "created": "Sat, 19 Aug 2023 03:32:53 GMT", "version": "v3" } ]
2023-08-22
[ [ "Zhu", "Zheqing", "" ], [ "Van Roy", "Benjamin", "" ] ]
High-quality recommender systems ought to deliver both innovative and relevant content through effective and exploratory interactions with users. Yet, supervised learning-based neural networks, which form the backbone of many existing recommender systems, only leverage recognized user interests, falling short when it c...
1603.05095
Navid Azizan Ruhi
Navid Azizan Ruhi, Christos Thrampoulidis and Babak Hassibi
Improved Bounds on the Epidemic Threshold of Exact SIS Models on Complex Networks
Submitted to CDC 2016
null
10.1109/CDC.2016.7798804
null
cs.SI math.DS physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The SIS (susceptible-infected-susceptible) epidemic model on an arbitrary network, without making approximations, is a $2^n$-state Markov chain with a unique absorbing state (the all-healthy state). This makes analysis of the SIS model and, in particular, determining the threshold of epidemic spread quite challenging...
[ { "created": "Wed, 16 Mar 2016 13:44:04 GMT", "version": "v1" } ]
2019-01-21
[ [ "Ruhi", "Navid Azizan", "" ], [ "Thrampoulidis", "Christos", "" ], [ "Hassibi", "Babak", "" ] ]
The SIS (susceptible-infected-susceptible) epidemic model on an arbitrary network, without making approximations, is a $2^n$-state Markov chain with a unique absorbing state (the all-healthy state). This makes analysis of the SIS model and, in particular, determining the threshold of epidemic spread quite challenging. ...
2310.11301
Marvin Wyrich
Marvin Wyrich
Source Code Comprehension: A Contemporary Definition and Conceptual Model for Empirical Investigation
Submission under review
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Be it in debugging, testing, code review or, more recently, pair programming with AI assistance: in all these activities, software engineers need to understand source code. Accordingly, plenty of research is taking place in the field to find out, for example, what makes code easy to understand and which tools can bes...
[ { "created": "Tue, 17 Oct 2023 14:23:46 GMT", "version": "v1" } ]
2023-10-18
[ [ "Wyrich", "Marvin", "" ] ]
Be it in debugging, testing, code review or, more recently, pair programming with AI assistance: in all these activities, software engineers need to understand source code. Accordingly, plenty of research is taking place in the field to find out, for example, what makes code easy to understand and which tools can best ...
1301.3230
Easwar Vivek Mangipudi
Easwar Vivek Mangipudi, Venkatesh Ramaiyan
A Framework for Quality of Service with a Multiple Access Strategy
6 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a problem of scheduling real-time traffic with hard delay constraints in an unreliable wireless channel. Packets arrive at a constant rate to the network and have to be delivered within a fixed number of slots in a fading wireless channel. For an infrastructure mode of traffic with a centralized scheduler, w...
[ { "created": "Tue, 15 Jan 2013 06:05:42 GMT", "version": "v1" }, { "created": "Thu, 29 Aug 2013 19:56:21 GMT", "version": "v2" }, { "created": "Wed, 18 Dec 2013 20:47:03 GMT", "version": "v3" } ]
2013-12-19
[ [ "Mangipudi", "Easwar Vivek", "" ], [ "Ramaiyan", "Venkatesh", "" ] ]
We study a problem of scheduling real-time traffic with hard delay constraints in an unreliable wireless channel. Packets arrive at a constant rate to the network and have to be delivered within a fixed number of slots in a fading wireless channel. For an infrastructure mode of traffic with a centralized scheduler, we ...
1302.1555
Alexander V. Kozlov
Alexander V. Kozlov, Daphne Koller
Nonuniform Dynamic Discretization in Hybrid Networks
Appears in Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence (UAI1997)
null
null
UAI-P-1997-PG-314-325
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider probabilistic inference in general hybrid networks, which include continuous and discrete variables in an arbitrary topology. We reexamine the question of variable discretization in a hybrid network aiming at minimizing the information loss induced by the discretization. We show that a nonuniform partitio...
[ { "created": "Wed, 6 Feb 2013 15:57:46 GMT", "version": "v1" } ]
2013-02-08
[ [ "Kozlov", "Alexander V.", "" ], [ "Koller", "Daphne", "" ] ]
We consider probabilistic inference in general hybrid networks, which include continuous and discrete variables in an arbitrary topology. We reexamine the question of variable discretization in a hybrid network aiming at minimizing the information loss induced by the discretization. We show that a nonuniform partition ...
1811.01811
Kemal Davaslioglu
Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, and Jason H. Li
Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls
Presented at 2018 IEEE International Symposium on Technologies for Homeland Security (HST) on October 23 2018. Received the Best Paper Award in Cyber Security Track
null
null
null
cs.LG cs.CR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine learning has been applied to a broad range of applications and some of them are available online as application programming interfaces (APIs) with either free (trial) or paid subscriptions. In this paper, we study adversarial machine learning in the form of back-box attacks on online classifier APIs. We start...
[ { "created": "Mon, 5 Nov 2018 15:50:30 GMT", "version": "v1" } ]
2018-11-06
[ [ "Shi", "Yi", "" ], [ "Sagduyu", "Yalin E.", "" ], [ "Davaslioglu", "Kemal", "" ], [ "Li", "Jason H.", "" ] ]
Machine learning has been applied to a broad range of applications and some of them are available online as application programming interfaces (APIs) with either free (trial) or paid subscriptions. In this paper, we study adversarial machine learning in the form of back-box attacks on online classifier APIs. We start w...
1905.12541
Susan Stepney
Penelope Faulkner Rainford, Angelika Sebald, Susan Stepney
MetaChem: An Algebraic Framework for Artificial Chemistries
39 pages, 19 figures; minor typos corrected
Artificial Life 26(2):153-195 2020
10.1162/artl_a_00315
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce MetaChem, a language for representing and implementing Artificial Chemistries. We motivate the need for modularisation and standardisation in representation of artificial chemistries. We describe a mathematical formalism for Static Graph MetaChem, a static graph based system. MetaChem supports different ...
[ { "created": "Wed, 29 May 2019 15:42:24 GMT", "version": "v1" }, { "created": "Mon, 30 Sep 2019 16:44:18 GMT", "version": "v2" }, { "created": "Sun, 14 Jun 2020 19:36:09 GMT", "version": "v3" } ]
2020-06-16
[ [ "Rainford", "Penelope Faulkner", "" ], [ "Sebald", "Angelika", "" ], [ "Stepney", "Susan", "" ] ]
We introduce MetaChem, a language for representing and implementing Artificial Chemistries. We motivate the need for modularisation and standardisation in representation of artificial chemistries. We describe a mathematical formalism for Static Graph MetaChem, a static graph based system. MetaChem supports different le...
2011.03829
Raman Goyal
Raman Goyal and Manoranjan Majji and Robert E. Skelton
Robust Shape Control of Gyroscopic Tensegrity Robotic Arm
null
null
null
null
cs.RO cs.SY eess.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a model-based approach to control the shape of a tensegrity system by driving its node position locations. The nonlinear dynamics of the tensegrity system is used to regulate position, velocity, and acceleration to the specified reference trajectory. State feedback control design is used to obtain...
[ { "created": "Sat, 7 Nov 2020 18:41:01 GMT", "version": "v1" }, { "created": "Thu, 19 Nov 2020 21:51:05 GMT", "version": "v2" } ]
2020-11-23
[ [ "Goyal", "Raman", "" ], [ "Majji", "Manoranjan", "" ], [ "Skelton", "Robert E.", "" ] ]
This paper proposes a model-based approach to control the shape of a tensegrity system by driving its node position locations. The nonlinear dynamics of the tensegrity system is used to regulate position, velocity, and acceleration to the specified reference trajectory. State feedback control design is used to obtain t...
0709.1056
Stephane Norte
Stephane Norte
A Sudoku Game for People with Motor Impairments
7 pages, 5 figures
null
null
null
cs.HC cs.CY
null
Computer games are motivating and beneficial in learning different educational skills. Most people use their fingers, hands, and arms when using a computer game. However, for people with motor disabilities this task can be a barrier. We present a new Sudoku game for people whose motion is impaired, called Sudoku 4ALL...
[ { "created": "Fri, 7 Sep 2007 11:59:22 GMT", "version": "v1" }, { "created": "Thu, 13 Sep 2007 13:26:17 GMT", "version": "v2" }, { "created": "Mon, 17 Sep 2007 21:08:35 GMT", "version": "v3" } ]
2007-09-18
[ [ "Norte", "Stephane", "" ] ]
Computer games are motivating and beneficial in learning different educational skills. Most people use their fingers, hands, and arms when using a computer game. However, for people with motor disabilities this task can be a barrier. We present a new Sudoku game for people whose motion is impaired, called Sudoku 4ALL. ...
2204.13892
Ziming Chen
Chang Shu, Ziming Chen, Lei Chen, Kuan Ma, Minghui Wang and Haibing Ren
SideRT: A Real-time Pure Transformer Architecture for Single Image Depth Estimation
7 pages, 5 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since context modeling is critical for estimating depth from a single image, researchers put tremendous effort into obtaining global context. Many global manipulations are designed for traditional CNN-based architectures to overcome the locality of convolutions. Attention mechanisms or transformers originally designe...
[ { "created": "Fri, 29 Apr 2022 05:46:20 GMT", "version": "v1" } ]
2022-05-02
[ [ "Shu", "Chang", "" ], [ "Chen", "Ziming", "" ], [ "Chen", "Lei", "" ], [ "Ma", "Kuan", "" ], [ "Wang", "Minghui", "" ], [ "Ren", "Haibing", "" ] ]
Since context modeling is critical for estimating depth from a single image, researchers put tremendous effort into obtaining global context. Many global manipulations are designed for traditional CNN-based architectures to overcome the locality of convolutions. Attention mechanisms or transformers originally designed ...
0909.0122
Sanjiang Li
Sanjiang Li, Anthony G. Cohn
Reasoning with Topological and Directional Spatial Information
null
Computational Intelligence, 2012, 28(4):579-616
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current research on qualitative spatial representation and reasoning mainly focuses on one single aspect of space. In real world applications, however, multiple spatial aspects are often involved simultaneously. This paper investigates problems arising in reasoning with combined topological and directional informat...
[ { "created": "Tue, 1 Sep 2009 08:31:22 GMT", "version": "v1" } ]
2013-10-21
[ [ "Li", "Sanjiang", "" ], [ "Cohn", "Anthony G.", "" ] ]
Current research on qualitative spatial representation and reasoning mainly focuses on one single aspect of space. In real world applications, however, multiple spatial aspects are often involved simultaneously. This paper investigates problems arising in reasoning with combined topological and directional information....
1908.03361
Bj\"orn Barz
Bj\"orn Barz, Kai Schr\"oter, Moritz M\"unch, Bin Yang, Andrea Unger, Doris Dransch, Joachim Denzler
Enhancing Flood Impact Analysis using Interactive Retrieval of Social Media Images
null
Archives of Data Science, Series A, 5.1, 2018
10.5445/KSP/1000087327/06
null
cs.IR cs.CV cs.MM eess.IV
http://creativecommons.org/licenses/by-sa/4.0/
The analysis of natural disasters such as floods in a timely manner often suffers from limited data due to a coarse distribution of sensors or sensor failures. This limitation could be alleviated by leveraging information contained in images of the event posted on social media platforms, so-called "Volunteered Geogra...
[ { "created": "Fri, 9 Aug 2019 08:29:57 GMT", "version": "v1" } ]
2020-03-24
[ [ "Barz", "Björn", "" ], [ "Schröter", "Kai", "" ], [ "Münch", "Moritz", "" ], [ "Yang", "Bin", "" ], [ "Unger", "Andrea", "" ], [ "Dransch", "Doris", "" ], [ "Denzler", "Joachim", "" ] ]
The analysis of natural disasters such as floods in a timely manner often suffers from limited data due to a coarse distribution of sensors or sensor failures. This limitation could be alleviated by leveraging information contained in images of the event posted on social media platforms, so-called "Volunteered Geograph...
1405.2736
Elisa Gorla
Elisa Gorla, Alberto Ravagnani
Subspace codes from Ferrers diagrams
minor edits
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we give new constructions of Ferrer diagram rank metric codes, which achieve the largest possible dimension. In particular, we prove several cases of a conjecture by T. Etzion and N. Silberstein. We also establish a sharp lower bound on the dimension of linear rank metric anticodes with a given profile....
[ { "created": "Mon, 12 May 2014 13:01:37 GMT", "version": "v1" }, { "created": "Fri, 13 Jun 2014 09:03:54 GMT", "version": "v2" } ]
2014-06-16
[ [ "Gorla", "Elisa", "" ], [ "Ravagnani", "Alberto", "" ] ]
In this paper we give new constructions of Ferrer diagram rank metric codes, which achieve the largest possible dimension. In particular, we prove several cases of a conjecture by T. Etzion and N. Silberstein. We also establish a sharp lower bound on the dimension of linear rank metric anticodes with a given profile. C...
1611.09010
Francesc Moreno-Noguer
Francesc Moreno-Noguer
3D Human Pose Estimation from a Single Image via Distance Matrix Regression
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of 3D human pose estimation from a single image. We follow a standard two-step pipeline by first detecting the 2D position of the $N$ body joints, and then using these observations to infer 3D pose. For the first step, we use a recent CNN-based detector. For the second step, most exis...
[ { "created": "Mon, 28 Nov 2016 07:36:31 GMT", "version": "v1" } ]
2016-11-29
[ [ "Moreno-Noguer", "Francesc", "" ] ]
This paper addresses the problem of 3D human pose estimation from a single image. We follow a standard two-step pipeline by first detecting the 2D position of the $N$ body joints, and then using these observations to infer 3D pose. For the first step, we use a recent CNN-based detector. For the second step, most existi...
1305.3021
Ijaz Bukhari ijaz bukhari
Ijaz Bukhari, Nuhman-ul-Haq and Khizar Hyat
Wave Atom Based Watermarking
I want to withdraw the paper due to serious error
null
null
null
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Watermarking helps in ensuring originality, ownership and copyrights of a digital image. This paper aims at embedding a Watermark in an image using Wave Atom Transform. Preference of Wave Atoms on other transformations has been due to its sparser expansion, adaptability to the direction of local pattern, and sharp fr...
[ { "created": "Tue, 14 May 2013 05:27:52 GMT", "version": "v1" }, { "created": "Fri, 7 Aug 2015 13:06:09 GMT", "version": "v2" } ]
2015-08-10
[ [ "Bukhari", "Ijaz", "" ], [ "Nuhman-ul-Haq", "", "" ], [ "Hyat", "Khizar", "" ] ]
Watermarking helps in ensuring originality, ownership and copyrights of a digital image. This paper aims at embedding a Watermark in an image using Wave Atom Transform. Preference of Wave Atoms on other transformations has been due to its sparser expansion, adaptability to the direction of local pattern, and sharp freq...
2203.07605
Hanna Sumita
Hanna Sumita, Shinji Ito, Kei Takemura, Daisuke Hatano, Takuro Fukunaga, Naonori Kakimura, Ken-ichi Kawarabayashi
Online Task Assignment Problems with Reusable Resources
Appeared in AAAI-22
null
null
null
cs.DS cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study online task assignment problem with reusable resources, motivated by practical applications such as ridesharing, crowdsourcing and job hiring. In the problem, we are given a set of offline vertices (agents), and, at each time, an online vertex (task) arrives randomly according to a known time-dependent distr...
[ { "created": "Tue, 15 Mar 2022 02:48:13 GMT", "version": "v1" } ]
2022-03-16
[ [ "Sumita", "Hanna", "" ], [ "Ito", "Shinji", "" ], [ "Takemura", "Kei", "" ], [ "Hatano", "Daisuke", "" ], [ "Fukunaga", "Takuro", "" ], [ "Kakimura", "Naonori", "" ], [ "Kawarabayashi", "Ken-ichi", "" ] ]
We study online task assignment problem with reusable resources, motivated by practical applications such as ridesharing, crowdsourcing and job hiring. In the problem, we are given a set of offline vertices (agents), and, at each time, an online vertex (task) arrives randomly according to a known time-dependent distrib...
2106.08671
Waddah Saeed
Waddah Saeed
Comparison of Automated Machine Learning Tools for SMS Spam Message Filtering
10 pages, 3 figures
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Short Message Service (SMS) is a very popular service used for communication by mobile users. However, this popular service can be abused by executing illegal activities and influencing security risks. Nowadays, many automatic machine learning (AutoML) tools exist which can help domain experts and lay users to build ...
[ { "created": "Wed, 16 Jun 2021 10:16:07 GMT", "version": "v1" }, { "created": "Mon, 28 Jun 2021 11:37:35 GMT", "version": "v2" } ]
2021-06-29
[ [ "Saeed", "Waddah", "" ] ]
Short Message Service (SMS) is a very popular service used for communication by mobile users. However, this popular service can be abused by executing illegal activities and influencing security risks. Nowadays, many automatic machine learning (AutoML) tools exist which can help domain experts and lay users to build hi...
1709.00551
Yong Xu Dr
Yong Xu, Qiuqiang Kong, Wenwu Wang, Mark D. Plumbley
Surrey-cvssp system for DCASE2017 challenge task4
DCASE2017 challenge ranked 1st system, task4, tech report
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this technique report, we present a bunch of methods for the task 4 of Detection and Classification of Acoustic Scenes and Events 2017 (DCASE2017) challenge. This task evaluates systems for the large-scale detection of sound events using weakly labeled training data. The data are YouTube video excerpts focusing on...
[ { "created": "Sat, 2 Sep 2017 09:40:06 GMT", "version": "v1" }, { "created": "Sat, 25 Nov 2017 20:21:32 GMT", "version": "v2" } ]
2017-11-28
[ [ "Xu", "Yong", "" ], [ "Kong", "Qiuqiang", "" ], [ "Wang", "Wenwu", "" ], [ "Plumbley", "Mark D.", "" ] ]
In this technique report, we present a bunch of methods for the task 4 of Detection and Classification of Acoustic Scenes and Events 2017 (DCASE2017) challenge. This task evaluates systems for the large-scale detection of sound events using weakly labeled training data. The data are YouTube video excerpts focusing on t...
1404.3165
Gozde Ozcan
Gozde Ozcan, M. Cenk Gursoy
Energy-Efficient Power Adaptation for Cognitive Radio Systems under Imperfect Channel Sensing
To Appear at 2014 IEEE INFOCOM Workshop on Green Cognitive Communications and Computing Networks. Some typos are fixed
null
10.1109/INFCOMW.2014.6849317
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, energy efficient power adaptation is considered in sensing-based spectrum sharing cognitive radio systems in which secondary users first perform channel sensing and then initiate data transmission with two power levels based on the sensing decisions (e.g., idle or busy). It is assumed that spectrum sen...
[ { "created": "Fri, 11 Apr 2014 17:42:00 GMT", "version": "v1" }, { "created": "Mon, 28 Apr 2014 05:22:43 GMT", "version": "v2" } ]
2016-11-17
[ [ "Ozcan", "Gozde", "" ], [ "Gursoy", "M. Cenk", "" ] ]
In this paper, energy efficient power adaptation is considered in sensing-based spectrum sharing cognitive radio systems in which secondary users first perform channel sensing and then initiate data transmission with two power levels based on the sensing decisions (e.g., idle or busy). It is assumed that spectrum sensi...
2407.11271
Charlotte Shahlaei
Charlotte A. Shahlaei and Nicholas Berente
An Analysis of European Data and AI Regulations for Automotive Organizations
null
null
null
null
cs.CY
http://creativecommons.org/licenses/by/4.0/
This report summarizes the European Union's series of data and AI regulations and analyzes them for managers in automotive vehicle manufacturing organizations. In particular, we highlight the relevant ideas of the regulations, including how they find their roots in earlier legislation, how they contradict and complem...
[ { "created": "Mon, 15 Jul 2024 22:38:37 GMT", "version": "v1" }, { "created": "Thu, 18 Jul 2024 14:38:13 GMT", "version": "v2" }, { "created": "Fri, 19 Jul 2024 02:59:18 GMT", "version": "v3" } ]
2024-07-22
[ [ "Shahlaei", "Charlotte A.", "" ], [ "Berente", "Nicholas", "" ] ]
This report summarizes the European Union's series of data and AI regulations and analyzes them for managers in automotive vehicle manufacturing organizations. In particular, we highlight the relevant ideas of the regulations, including how they find their roots in earlier legislation, how they contradict and complemen...
1812.06705
Wu Xing
Xing Wu, Shangwen Lv, Liangjun Zang, Jizhong Han, Songlin Hu
Conditional BERT Contextual Augmentation
9 pages, 1 figure
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel data augmentation method for labeled sentences called conditional BERT contextual augmentation. Data augmentation methods are often applied to prevent overfitting and improve generalization of deep neural network models. Recently proposed contextual augmentation augments labeled sentences by random...
[ { "created": "Mon, 17 Dec 2018 11:26:42 GMT", "version": "v1" } ]
2018-12-18
[ [ "Wu", "Xing", "" ], [ "Lv", "Shangwen", "" ], [ "Zang", "Liangjun", "" ], [ "Han", "Jizhong", "" ], [ "Hu", "Songlin", "" ] ]
We propose a novel data augmentation method for labeled sentences called conditional BERT contextual augmentation. Data augmentation methods are often applied to prevent overfitting and improve generalization of deep neural network models. Recently proposed contextual augmentation augments labeled sentences by randomly...
2005.11735
Marcin Plata
Marcin Plata and Piotr Syga
Robust Spatial-spread Deep Neural Image Watermarking
The article was accepted on TrustCom 2020: The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
null
10.1109/TrustCom50675.2020.00022
null
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Watermarking is an operation of embedding an information into an image in a way that allows to identify ownership of the image despite applying some distortions on it. In this paper, we presented a novel end-to-end solution for embedding and recovering the watermark in the digital image using convolutional neural net...
[ { "created": "Sun, 24 May 2020 12:51:25 GMT", "version": "v1" }, { "created": "Wed, 4 Nov 2020 13:14:42 GMT", "version": "v2" } ]
2022-01-11
[ [ "Plata", "Marcin", "" ], [ "Syga", "Piotr", "" ] ]
Watermarking is an operation of embedding an information into an image in a way that allows to identify ownership of the image despite applying some distortions on it. In this paper, we presented a novel end-to-end solution for embedding and recovering the watermark in the digital image using convolutional neural netwo...
1212.3873
EPTCS
Hua Mao (AAU), Yingke Chen (AAU), Manfred Jaeger (AAU), Thomas D. Nielsen (AAU), Kim G. Larsen (AAU), Brian Nielsen (AAU)
Learning Markov Decision Processes for Model Checking
In Proceedings QFM 2012, arXiv:1212.3454
EPTCS 103, 2012, pp. 49-63
10.4204/EPTCS.103.6
null
cs.LG cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constructing an accurate system model for formal model verification can be both resource demanding and time-consuming. To alleviate this shortcoming, algorithms have been proposed for automatically learning system models based on observed system behaviors. In this paper we extend the algorithm on learning probabilist...
[ { "created": "Mon, 17 Dec 2012 03:40:47 GMT", "version": "v1" } ]
2012-12-18
[ [ "Mao", "Hua", "", "AAU" ], [ "Chen", "Yingke", "", "AAU" ], [ "Jaeger", "Manfred", "", "AAU" ], [ "Nielsen", "Thomas D.", "", "AAU" ], [ "Larsen", "Kim G.", "", "AAU" ], [ "Nielsen", "Brian", "", "A...
Constructing an accurate system model for formal model verification can be both resource demanding and time-consuming. To alleviate this shortcoming, algorithms have been proposed for automatically learning system models based on observed system behaviors. In this paper we extend the algorithm on learning probabilistic...
2312.05092
Romain Robbes
Anjan Karmakar, Romain Robbes
INSPECT: Intrinsic and Systematic Probing Evaluation for Code Transformers
Accepted to IEEE Transactions on Software Engineering. Extension of our previous paper "What do pre-trained code models know about code?" (ASE 2021, arXiv:2108.11308). 21 pages
null
null
null
cs.SE cs.LG
http://creativecommons.org/licenses/by/4.0/
Pre-trained models of source code have recently been successfully applied to a wide variety of Software Engineering tasks; they have also seen some practical adoption in practice, e.g. for code completion. Yet, we still know very little about what these pre-trained models learn about source code. In this article, we ...
[ { "created": "Fri, 8 Dec 2023 15:21:54 GMT", "version": "v1" } ]
2023-12-11
[ [ "Karmakar", "Anjan", "" ], [ "Robbes", "Romain", "" ] ]
Pre-trained models of source code have recently been successfully applied to a wide variety of Software Engineering tasks; they have also seen some practical adoption in practice, e.g. for code completion. Yet, we still know very little about what these pre-trained models learn about source code. In this article, we us...
cs/0109096
Tony Christensen
Tony Christensen, Peter McCormick
CyberCampaigns and Canadian Politics: Still Waiting?
29th TPRC Conference, 2001
null
null
TPRC-2001-058
cs.CY
null
The early election call in the fall of 2000 provided the perfect opportunity to study the impact the Internet has had on election campaigning in Canada. With the explosion of use the Net has seen since the 1997 general election, Canadian federal parties stood at the threshold of a new age in election campaigning. Pun...
[ { "created": "Mon, 24 Sep 2001 22:42:52 GMT", "version": "v1" } ]
2007-05-23
[ [ "Christensen", "Tony", "" ], [ "McCormick", "Peter", "" ] ]
The early election call in the fall of 2000 provided the perfect opportunity to study the impact the Internet has had on election campaigning in Canada. With the explosion of use the Net has seen since the 1997 general election, Canadian federal parties stood at the threshold of a new age in election campaigning. Pundi...
1707.09411
Ding Zhao
Ding Zhao, Huei Peng, Kazutoshi Nobukawa, Shan Bao, David J LeBlanc, Christopher S Pan
Analysis of mandatory and discretionary lane change behaviors for heavy trucks
Published in the 12th International Symposium on Advanced Vehicle Control, AVEC'14
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The behaviors of heavy vehicles drivers in mandatory and discretionary lane changes are analyzed in this paper. 640 mandatory and 2,035 discretionary lane change events were extracted from a naturalistic driving database. Variations in gap acceptance and lane change duration were investigated. Statistical analysis sh...
[ { "created": "Fri, 28 Jul 2017 20:45:02 GMT", "version": "v1" } ]
2017-08-01
[ [ "Zhao", "Ding", "" ], [ "Peng", "Huei", "" ], [ "Nobukawa", "Kazutoshi", "" ], [ "Bao", "Shan", "" ], [ "LeBlanc", "David J", "" ], [ "Pan", "Christopher S", "" ] ]
The behaviors of heavy vehicles drivers in mandatory and discretionary lane changes are analyzed in this paper. 640 mandatory and 2,035 discretionary lane change events were extracted from a naturalistic driving database. Variations in gap acceptance and lane change duration were investigated. Statistical analysis show...
2005.12517
Makoto Naruse
Daijiro Koyama, Yunzhuo Wang, Nobuyasu Shiga, Satoshi Yasuda, Nicolas Chauvet, Makoto Naruse
Information transfer based on precision time synchronization via wireless interferometry
null
null
null
null
cs.NI nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The growing demand of high-bandwidth and low-latency information transfer in information and communication technologies such as data centres and in-vehicle networks has increased the importance of optical communication networks in recent years. However, complicated arbitration schemes can impose significant overheads...
[ { "created": "Tue, 26 May 2020 05:20:52 GMT", "version": "v1" } ]
2020-05-27
[ [ "Koyama", "Daijiro", "" ], [ "Wang", "Yunzhuo", "" ], [ "Shiga", "Nobuyasu", "" ], [ "Yasuda", "Satoshi", "" ], [ "Chauvet", "Nicolas", "" ], [ "Naruse", "Makoto", "" ] ]
The growing demand of high-bandwidth and low-latency information transfer in information and communication technologies such as data centres and in-vehicle networks has increased the importance of optical communication networks in recent years. However, complicated arbitration schemes can impose significant overheads i...
2308.15684
Kanata Suzuki
Kazuki Hori, Kanata Suzuki, Tetsuya Ogata
Interactively Robot Action Planning with Uncertainty Analysis and Active Questioning by Large Language Model
7 pages, 6 figures, accepted at SII 2024
null
null
null
cs.RO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The application of the Large Language Model (LLM) to robot action planning has been actively studied. The instructions given to the LLM by natural language may include ambiguity and lack of information depending on the task context. It is possible to adjust the output of LLM by making the instruction input more detai...
[ { "created": "Wed, 30 Aug 2023 00:54:44 GMT", "version": "v1" }, { "created": "Wed, 18 Oct 2023 13:31:49 GMT", "version": "v2" } ]
2023-10-19
[ [ "Hori", "Kazuki", "" ], [ "Suzuki", "Kanata", "" ], [ "Ogata", "Tetsuya", "" ] ]
The application of the Large Language Model (LLM) to robot action planning has been actively studied. The instructions given to the LLM by natural language may include ambiguity and lack of information depending on the task context. It is possible to adjust the output of LLM by making the instruction input more detaile...
2206.15025
Hongchang Gao
Hongchang Gao, Bin Gu, My T. Thai
On the Convergence of Distributed Stochastic Bilevel Optimization Algorithms over a Network
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bilevel optimization has been applied to a wide variety of machine learning models, and numerous stochastic bilevel optimization algorithms have been developed in recent years. However, most existing algorithms restrict their focus on the single-machine setting so that they are incapable of handling the distributed d...
[ { "created": "Thu, 30 Jun 2022 05:29:52 GMT", "version": "v1" }, { "created": "Mon, 27 Mar 2023 16:09:27 GMT", "version": "v2" } ]
2023-03-28
[ [ "Gao", "Hongchang", "" ], [ "Gu", "Bin", "" ], [ "Thai", "My T.", "" ] ]
Bilevel optimization has been applied to a wide variety of machine learning models, and numerous stochastic bilevel optimization algorithms have been developed in recent years. However, most existing algorithms restrict their focus on the single-machine setting so that they are incapable of handling the distributed dat...
2406.13922
Feng Ye
Feng Ye, Xiaohu You, Jiamin Li, Chuan Zhang, Chen Ji
Explicit Performance Bound of Finite Blocklength Coded MIMO: Time-Domain versus Spatiotemporal Channel Coding
9 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the sixth generation (6G), ultra-reliable low-latency communications (URLLC) will further develop to achieve TKu extreme connectivity, and multiple-input multiple-output (MIMO) is expected to be a key enabler for its realization. Since the latency constraint can be represented by the blocklength of a codeword, it ...
[ { "created": "Thu, 20 Jun 2024 01:41:57 GMT", "version": "v1" } ]
2024-06-21
[ [ "Ye", "Feng", "" ], [ "You", "Xiaohu", "" ], [ "Li", "Jiamin", "" ], [ "Zhang", "Chuan", "" ], [ "Ji", "Chen", "" ] ]
In the sixth generation (6G), ultra-reliable low-latency communications (URLLC) will further develop to achieve TKu extreme connectivity, and multiple-input multiple-output (MIMO) is expected to be a key enabler for its realization. Since the latency constraint can be represented by the blocklength of a codeword, it is...