id stringlengths 9 10 | submitter stringlengths 1 64 ⌀ | authors stringlengths 4 20.7k | title stringlengths 4 246 | comments stringlengths 1 523 ⌀ | journal-ref stringlengths 4 404 ⌀ | doi stringlengths 11 153 ⌀ | report-no stringlengths 2 254 ⌀ | categories stringlengths 5 98 | license stringclasses 9
values | orig_abstract stringlengths 14 3.35k | versions listlengths 1 60 | update_date stringlengths 10 10 | authors_parsed listlengths 1 1.35k | abstract stringlengths 11 3.34k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1906.10370 | Miguel Sepulcre | Rafael Molina-Masegosa, Miguel Sepulcre and Javier Gozalvez | Geo-Based Scheduling for C-V2X Networks | null | IEEE Transactions on Vehicular Technology, Volume 68, Issue 9, pp.
8397 - 8407, September 2019 | 10.1109/TVT.2019.2924698 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cellular Vehicle-to-Everything (C-V2X) networks can operate without cellular
infrastructure support. Vehicles can autonomously select their radio resources
using the sensing-based Semi-Persistent Scheduling (SPS) algorithm specified by
the Third Generation Partnership Project (3GPP). The sensing nature of the SPS
sch... | [
{
"created": "Tue, 25 Jun 2019 08:12:28 GMT",
"version": "v1"
}
] | 2019-09-20 | [
[
"Molina-Masegosa",
"Rafael",
""
],
[
"Sepulcre",
"Miguel",
""
],
[
"Gozalvez",
"Javier",
""
]
] | Cellular Vehicle-to-Everything (C-V2X) networks can operate without cellular infrastructure support. Vehicles can autonomously select their radio resources using the sensing-based Semi-Persistent Scheduling (SPS) algorithm specified by the Third Generation Partnership Project (3GPP). The sensing nature of the SPS schem... |
2312.07340 | Yusen Feng | Yusen Feng, Xiyan Xu, Libin Liu | MuscleVAE: Model-Based Controllers of Muscle-Actuated Characters | null | null | null | null | cs.GR | http://creativecommons.org/licenses/by/4.0/ | In this paper, we present a simulation and control framework for generating
biomechanically plausible motion for muscle-actuated characters. We incorporate
a fatigue dynamics model, the 3CC-r model, into the widely-adopted Hill-type
muscle model to simulate the development and recovery of fatigue in muscles,
which cr... | [
{
"created": "Tue, 12 Dec 2023 15:01:17 GMT",
"version": "v1"
}
] | 2023-12-13 | [
[
"Feng",
"Yusen",
""
],
[
"Xu",
"Xiyan",
""
],
[
"Liu",
"Libin",
""
]
] | In this paper, we present a simulation and control framework for generating biomechanically plausible motion for muscle-actuated characters. We incorporate a fatigue dynamics model, the 3CC-r model, into the widely-adopted Hill-type muscle model to simulate the development and recovery of fatigue in muscles, which crea... |
2211.08292 | Jennifer Andreoli-Fang | Jennifer Andreoli-Fang, John T Chapman | Mobile-Aware Scheduling for Low Latency Backhaul over DOCSIS | IEEE International Symposium on Personal, Indoor and Mobile Radio
Communications (PIMRC), 2017 | null | 10.1109/PIMRC.2017.8292173 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we discuss latency reduction techniques for mobile backhaul
over Data Over Cable Service Interface Specifications (DOCSIS) networks. When
the latencies from both the wireless and the DOCSIS networks are added
together, it can result in noticeable end-to-end system latency, particularly
under network co... | [
{
"created": "Tue, 15 Nov 2022 16:45:26 GMT",
"version": "v1"
},
{
"created": "Wed, 16 Nov 2022 16:38:44 GMT",
"version": "v2"
}
] | 2022-11-17 | [
[
"Andreoli-Fang",
"Jennifer",
""
],
[
"Chapman",
"John T",
""
]
] | In this paper, we discuss latency reduction techniques for mobile backhaul over Data Over Cable Service Interface Specifications (DOCSIS) networks. When the latencies from both the wireless and the DOCSIS networks are added together, it can result in noticeable end-to-end system latency, particularly under network cong... |
2103.14856 | Ciriaco Andrea D'Angelo | Giovanni Abramo, Ciriaco Andrea D'Angelo, Lin Zhang | A comparison of two approaches for measuring interdisciplinary research
output: the disciplinary diversity of authors vs the disciplinary diversity
of the reference list | null | Journal of Informetrics, 12(4), 2018, 1182-1193 | 10.1016/j.joi.2018.09.001 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study investigates the convergence of two bibliometric approaches to the
measurement of interdisciplinary research: one based on analyzing disciplinary
diversity in the reference list of publications, the other based on the
disciplinary diversity of authors of publications. In particular we measure the
variety, ... | [
{
"created": "Sat, 27 Mar 2021 09:34:53 GMT",
"version": "v1"
}
] | 2021-03-30 | [
[
"Abramo",
"Giovanni",
""
],
[
"D'Angelo",
"Ciriaco Andrea",
""
],
[
"Zhang",
"Lin",
""
]
] | This study investigates the convergence of two bibliometric approaches to the measurement of interdisciplinary research: one based on analyzing disciplinary diversity in the reference list of publications, the other based on the disciplinary diversity of authors of publications. In particular we measure the variety, ba... |
1910.12435 | Marcel Keller | Anders Dalskov and Daniel Escudero and Marcel Keller | Secure Evaluation of Quantized Neural Networks | 22 pages | Proceedings on Privacy Enhancing Technologies 4 (2020): 355-375 | 10.2478/popets-2020-0077 | null | cs.CR cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We investigate two questions in this paper: First, we ask to what extent "MPC
friendly" models are already supported by major Machine Learning frameworks
such as TensorFlow or PyTorch. Prior works provide protocols that only work on
fixed-point integers and specialized activation functions, two aspects that are
not s... | [
{
"created": "Mon, 28 Oct 2019 04:17:33 GMT",
"version": "v1"
},
{
"created": "Mon, 1 Mar 2021 04:22:07 GMT",
"version": "v2"
}
] | 2021-03-02 | [
[
"Dalskov",
"Anders",
""
],
[
"Escudero",
"Daniel",
""
],
[
"Keller",
"Marcel",
""
]
] | We investigate two questions in this paper: First, we ask to what extent "MPC friendly" models are already supported by major Machine Learning frameworks such as TensorFlow or PyTorch. Prior works provide protocols that only work on fixed-point integers and specialized activation functions, two aspects that are not sup... |
2407.06855 | Arnab Sharma | Sourabh Kapoor, Arnab Sharma, Michael R\"oder, Caglar Demir,
Axel-Cyrille Ngonga Ngomo | Performance Evaluation of Knowledge Graph Embedding Approaches under
Non-adversarial Attacks | null | null | null | null | cs.LG cs.CR | http://creativecommons.org/licenses/by/4.0/ | Knowledge Graph Embedding (KGE) transforms a discrete Knowledge Graph (KG)
into a continuous vector space facilitating its use in various AI-driven
applications like Semantic Search, Question Answering, or Recommenders. While
KGE approaches are effective in these applications, most existing approaches
assume that all... | [
{
"created": "Tue, 9 Jul 2024 13:42:14 GMT",
"version": "v1"
}
] | 2024-07-10 | [
[
"Kapoor",
"Sourabh",
""
],
[
"Sharma",
"Arnab",
""
],
[
"Röder",
"Michael",
""
],
[
"Demir",
"Caglar",
""
],
[
"Ngomo",
"Axel-Cyrille Ngonga",
""
]
] | Knowledge Graph Embedding (KGE) transforms a discrete Knowledge Graph (KG) into a continuous vector space facilitating its use in various AI-driven applications like Semantic Search, Question Answering, or Recommenders. While KGE approaches are effective in these applications, most existing approaches assume that all i... |
1211.1861 | Mohamed Firdhous | Mohamed Firdhous | Automating Legal Research through Data Mining | 8 pages, 11 figures, published in (IJACSA) International Journal of
Advanced Computer Science and Applications. arXiv admin note: text overlap
with wikipedia entry on text mining | International Journal of Advanced Computer Science and
Applications (IJACSA) Vol. 1, No 6, December 2010, pp. 9-16 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The term legal research generally refers to the process of identifying and
retrieving appropriate information necessary to support legal decision making
from past case records. At present, the process is mostly manual, but some
traditional technologies such as keyword searching are commonly used to speed
the process ... | [
{
"created": "Thu, 8 Nov 2012 14:19:49 GMT",
"version": "v1"
}
] | 2012-11-09 | [
[
"Firdhous",
"Mohamed",
""
]
] | The term legal research generally refers to the process of identifying and retrieving appropriate information necessary to support legal decision making from past case records. At present, the process is mostly manual, but some traditional technologies such as keyword searching are commonly used to speed the process up... |
1602.00810 | Jean-Guillaume Dumas | Jean-Guillaume Dumas (LJK), Erich Kaltofen (NCSU), Emmanuel Thom\'e
(CARAMBA), Gilles Villard (ARIC, LIP) | Linear Time Interactive Certificates for the Minimal Polynomial and the
Determinant of a Sparse Matrix | null | International Symposium on Symbolic and Algebraic Computation, Jul
2016, Waterloo, Canada. pp.199-206,
\&\#x27E8;10.1145/2930889.2930908\&\#x27E9 | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computational problem certificates are additional data structures for each
output, which can be used by a-possibly randomized-verification algorithm that
proves the correctness of each output. In this paper, we give an algorithm that
computes a certificate for the minimal polynomial of sparse or structured nxn
matric... | [
{
"created": "Tue, 2 Feb 2016 07:29:28 GMT",
"version": "v1"
},
{
"created": "Mon, 2 Dec 2019 13:02:25 GMT",
"version": "v2"
}
] | 2019-12-03 | [
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Kaltofen",
"Erich",
"",
"NCSU"
],
[
"Thomé",
"Emmanuel",
"",
"CARAMBA"
],
[
"Villard",
"Gilles",
"",
"ARIC, LIP"
]
] | Computational problem certificates are additional data structures for each output, which can be used by a-possibly randomized-verification algorithm that proves the correctness of each output. In this paper, we give an algorithm that computes a certificate for the minimal polynomial of sparse or structured nxn matrices... |
1912.07976 | Heng Yang | Heng Yang, Biqing Zeng, JianHao Yang, Youwei Song and Ruyang Xu | A Multi-task Learning Model for Chinese-oriented Aspect Polarity
Classification and Aspect Term Extraction | Submitted to Elsevier | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aspect-based sentiment analysis (ABSA) task is a multi-grained task of
natural language processing and consists of two subtasks: aspect term
extraction (ATE) and aspect polarity classification (APC). Most of the existing
work focuses on the subtask of aspect term polarity inferring and ignores the
significance of asp... | [
{
"created": "Tue, 17 Dec 2019 12:47:33 GMT",
"version": "v1"
},
{
"created": "Thu, 19 Dec 2019 01:38:38 GMT",
"version": "v2"
},
{
"created": "Wed, 12 Feb 2020 09:20:28 GMT",
"version": "v3"
}
] | 2020-02-13 | [
[
"Yang",
"Heng",
""
],
[
"Zeng",
"Biqing",
""
],
[
"Yang",
"JianHao",
""
],
[
"Song",
"Youwei",
""
],
[
"Xu",
"Ruyang",
""
]
] | Aspect-based sentiment analysis (ABSA) task is a multi-grained task of natural language processing and consists of two subtasks: aspect term extraction (ATE) and aspect polarity classification (APC). Most of the existing work focuses on the subtask of aspect term polarity inferring and ignores the significance of aspec... |
2007.00584 | Guillaume Jaume | Pushpak Pati, Guillaume Jaume, Lauren Alisha Fernandes, Antonio
Foncubierta, Florinda Feroce, Anna Maria Anniciello, Giosue Scognamiglio,
Nadia Brancati, Daniel Riccio, Maurizio Do Bonito, Giuseppe De Pietro,
Gerardo Botti, Orcun Goksel, Jean-Philippe Thiran, Maria Frucci, Maria
Gabrani | HACT-Net: A Hierarchical Cell-to-Tissue Graph Neural Network for
Histopathological Image Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cancer diagnosis, prognosis, and therapeutic response prediction are heavily
influenced by the relationship between the histopathological structures and the
function of the tissue. Recent approaches acknowledging the structure-function
relationship, have linked the structural and spatial patterns of cell
organization... | [
{
"created": "Wed, 1 Jul 2020 16:22:48 GMT",
"version": "v1"
}
] | 2020-07-02 | [
[
"Pati",
"Pushpak",
""
],
[
"Jaume",
"Guillaume",
""
],
[
"Fernandes",
"Lauren Alisha",
""
],
[
"Foncubierta",
"Antonio",
""
],
[
"Feroce",
"Florinda",
""
],
[
"Anniciello",
"Anna Maria",
""
],
[
"Scognamiglio",
... | Cancer diagnosis, prognosis, and therapeutic response prediction are heavily influenced by the relationship between the histopathological structures and the function of the tissue. Recent approaches acknowledging the structure-function relationship, have linked the structural and spatial patterns of cell organization i... |
0810.5057 | Patricia Gautier | Claire Fran\c{c}ois (INIST), Jean-Charles Lamirel (INRIA Lorraine -
LORIA), Shadi Al Shehabi (INRIA Lorraine - LORIA) | Combining Advanced Visualization and Automatized Reasoning for
Webometrics: A Test Study | null | COLLNET 2006, France (2006) | null | null | cs.IR cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a first attempt at performing a precise and automatic
identification of the linking behaviour in a scientific domain through the
analysis of the communication of the related academic institutions on the web.
The proposed approach is based on the paradigm of multiple viewpoint data
analysis (MVDA) ... | [
{
"created": "Tue, 28 Oct 2008 15:43:45 GMT",
"version": "v1"
},
{
"created": "Tue, 20 Oct 2009 15:27:41 GMT",
"version": "v2"
}
] | 2009-10-20 | [
[
"François",
"Claire",
"",
"INIST"
],
[
"Lamirel",
"Jean-Charles",
"",
"INRIA Lorraine -\n LORIA"
],
[
"Shehabi",
"Shadi Al",
"",
"INRIA Lorraine - LORIA"
]
] | This paper presents a first attempt at performing a precise and automatic identification of the linking behaviour in a scientific domain through the analysis of the communication of the related academic institutions on the web. The proposed approach is based on the paradigm of multiple viewpoint data analysis (MVDA) th... |
0808.3651 | Lijun Zhang | Lijun Zhang, Holger Hermanns, Friedrich Eisenbrand and David N. Jansen | Flow Faster: Efficient Decision Algorithms for Probabilistic Simulations | LMCS | Logical Methods in Computer Science, Volume 4, Issue 4 (November
11, 2008) lmcs:989 | 10.2168/LMCS-4(4:6)2008 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Strong and weak simulation relations have been proposed for Markov chains,
while strong simulation and strong probabilistic simulation relations have been
proposed for probabilistic automata. However, decision algorithms for strong
and weak simulation over Markov chains, and for strong simulation over
probabilistic a... | [
{
"created": "Wed, 27 Aug 2008 08:35:44 GMT",
"version": "v1"
},
{
"created": "Mon, 10 Nov 2008 23:56:01 GMT",
"version": "v2"
},
{
"created": "Tue, 18 Nov 2008 17:00:30 GMT",
"version": "v3"
}
] | 2015-07-01 | [
[
"Zhang",
"Lijun",
""
],
[
"Hermanns",
"Holger",
""
],
[
"Eisenbrand",
"Friedrich",
""
],
[
"Jansen",
"David N.",
""
]
] | Strong and weak simulation relations have been proposed for Markov chains, while strong simulation and strong probabilistic simulation relations have been proposed for probabilistic automata. However, decision algorithms for strong and weak simulation over Markov chains, and for strong simulation over probabilistic aut... |
2403.06757 | Anthony Frion | Anthony Frion, Lucas Drumetz, Guillaume Tochon, Mauro Dalla Mura,
Albdeldjalil A\"issa El Bey | Koopman Ensembles for Probabilistic Time Series Forecasting | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | In the context of an increasing popularity of data-driven models to represent
dynamical systems, many machine learning-based implementations of the Koopman
operator have recently been proposed. However, the vast majority of those works
are limited to deterministic predictions, while the knowledge of uncertainty is
cr... | [
{
"created": "Mon, 11 Mar 2024 14:29:56 GMT",
"version": "v1"
},
{
"created": "Wed, 13 Mar 2024 13:57:42 GMT",
"version": "v2"
}
] | 2024-03-14 | [
[
"Frion",
"Anthony",
""
],
[
"Drumetz",
"Lucas",
""
],
[
"Tochon",
"Guillaume",
""
],
[
"Mura",
"Mauro Dalla",
""
],
[
"Bey",
"Albdeldjalil Aïssa El",
""
]
] | In the context of an increasing popularity of data-driven models to represent dynamical systems, many machine learning-based implementations of the Koopman operator have recently been proposed. However, the vast majority of those works are limited to deterministic predictions, while the knowledge of uncertainty is crit... |
1702.06968 | Arthur-Jozsef Molnar | Arthur-Jozsef Molnar | A Heuristic Process for GUI Widget Matching Across Application Versions | null | Annales Universitatis Scientiarum Budapest, Sectio Computatorica
Vol 36, pages 255 - 275 (2012) | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces an automated heuristic process able to achieve high
accuracy when matching graphical user interface widgets across multiple
versions of a target application. The proposed implementation is flexible as it
allows full customization of the process and easy integration with existing
tools for long t... | [
{
"created": "Wed, 22 Feb 2017 19:08:11 GMT",
"version": "v1"
}
] | 2017-02-24 | [
[
"Molnar",
"Arthur-Jozsef",
""
]
] | This paper introduces an automated heuristic process able to achieve high accuracy when matching graphical user interface widgets across multiple versions of a target application. The proposed implementation is flexible as it allows full customization of the process and easy integration with existing tools for long ter... |
2307.10936 | Raphael Boige | Raphael Boige and Yannis Flet-Berliac and Arthur Flajolet and
Guillaume Richard and Thomas Pierrot | PASTA: Pretrained Action-State Transformer Agents | null | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-supervised learning has brought about a revolutionary paradigm shift in
various computing domains, including NLP, vision, and biology. Recent
approaches involve pre-training transformer models on vast amounts of unlabeled
data, serving as a starting point for efficiently solving downstream tasks. In
reinforcemen... | [
{
"created": "Thu, 20 Jul 2023 15:09:06 GMT",
"version": "v1"
},
{
"created": "Mon, 4 Dec 2023 10:15:26 GMT",
"version": "v2"
}
] | 2023-12-05 | [
[
"Boige",
"Raphael",
""
],
[
"Flet-Berliac",
"Yannis",
""
],
[
"Flajolet",
"Arthur",
""
],
[
"Richard",
"Guillaume",
""
],
[
"Pierrot",
"Thomas",
""
]
] | Self-supervised learning has brought about a revolutionary paradigm shift in various computing domains, including NLP, vision, and biology. Recent approaches involve pre-training transformer models on vast amounts of unlabeled data, serving as a starting point for efficiently solving downstream tasks. In reinforcement ... |
1612.00604 | Andrii Maksai | Andrii Maksai, Xinchao Wang, Francois Fleuret, and Pascal Fua | Globally Consistent Multi-People Tracking using Motion Patterns | 8 pages, 7 figures. 11 pages supplementary | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many state-of-the-art approaches to people tracking rely on detecting them in
each frame independently, grouping detections into short but reliable
trajectory segments, and then further grouping them into full trajectories.
This grouping typically relies on imposing local smoothness constraints but
almost never on en... | [
{
"created": "Fri, 2 Dec 2016 09:24:30 GMT",
"version": "v1"
}
] | 2016-12-05 | [
[
"Maksai",
"Andrii",
""
],
[
"Wang",
"Xinchao",
""
],
[
"Fleuret",
"Francois",
""
],
[
"Fua",
"Pascal",
""
]
] | Many state-of-the-art approaches to people tracking rely on detecting them in each frame independently, grouping detections into short but reliable trajectory segments, and then further grouping them into full trajectories. This grouping typically relies on imposing local smoothness constraints but almost never on enfo... |
2311.11532 | Gustavo Silva | Gustavo Silva, Paul Rodriguez | Optimal Hyperparameter $\epsilon$ for Adaptive Stochastic Optimizers
through Gradient Histograms | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Optimizers are essential components for successfully training deep neural
network models. In order to achieve the best performance from such models,
designers need to carefully choose the optimizer hyperparameters. However, this
can be a computationally expensive and time-consuming process. Although it is
known that ... | [
{
"created": "Mon, 20 Nov 2023 04:34:19 GMT",
"version": "v1"
}
] | 2023-11-21 | [
[
"Silva",
"Gustavo",
""
],
[
"Rodriguez",
"Paul",
""
]
] | Optimizers are essential components for successfully training deep neural network models. In order to achieve the best performance from such models, designers need to carefully choose the optimizer hyperparameters. However, this can be a computationally expensive and time-consuming process. Although it is known that al... |
2302.02187 | Niklas K\"uhl Prof Dr | Max Schemmer, Niklas K\"uhl, Carina Benz, Andrea Bartos, Gerhard
Satzger | Appropriate Reliance on AI Advice: Conceptualization and the Effect of
Explanations | arXiv admin note: text overlap with arXiv:2204.06916 | ACM 28th International Conference on Intelligent User Interfaces
(IUI), 2023 | 10.1145/3581641.3584066 | null | cs.AI cs.HC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | AI advice is becoming increasingly popular, e.g., in investment and medical
treatment decisions. As this advice is typically imperfect, decision-makers
have to exert discretion as to whether actually follow that advice: they have
to "appropriately" rely on correct and turn down incorrect advice. However,
current rese... | [
{
"created": "Sat, 4 Feb 2023 15:48:24 GMT",
"version": "v1"
},
{
"created": "Tue, 7 Feb 2023 07:47:43 GMT",
"version": "v2"
},
{
"created": "Thu, 13 Apr 2023 08:50:16 GMT",
"version": "v3"
}
] | 2023-04-14 | [
[
"Schemmer",
"Max",
""
],
[
"Kühl",
"Niklas",
""
],
[
"Benz",
"Carina",
""
],
[
"Bartos",
"Andrea",
""
],
[
"Satzger",
"Gerhard",
""
]
] | AI advice is becoming increasingly popular, e.g., in investment and medical treatment decisions. As this advice is typically imperfect, decision-makers have to exert discretion as to whether actually follow that advice: they have to "appropriately" rely on correct and turn down incorrect advice. However, current resear... |
1101.1815 | Suvansh Lal Mr. | Suvansh Lal, Mohit Jain, Vikrant Chaplot | Approaches to Formal Verification of Security Protocols | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/3.0/ | In recent times, many protocols have been proposed to provide security for
various information and communication systems. Such protocols must be tested
for their functional correctness before they are used in practice. Application
of formal methods for verification of security protocols would enhance their
reliabilit... | [
{
"created": "Mon, 10 Jan 2011 13:53:25 GMT",
"version": "v1"
}
] | 2011-01-11 | [
[
"Lal",
"Suvansh",
""
],
[
"Jain",
"Mohit",
""
],
[
"Chaplot",
"Vikrant",
""
]
] | In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability ... |
2405.11530 | Sejik Park | Sejik Park | Learning More Generalized Experts by Merging Experts in
Mixture-of-Experts | 12 pages, 3 figures | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | We observe that incorporating a shared layer in a mixture-of-experts can lead
to performance degradation. This leads us to hypothesize that learning shared
features poses challenges in deep learning, potentially caused by the same
feature being learned as various different features. To address this issue, we
track ea... | [
{
"created": "Sun, 19 May 2024 11:55:48 GMT",
"version": "v1"
}
] | 2024-05-21 | [
[
"Park",
"Sejik",
""
]
] | We observe that incorporating a shared layer in a mixture-of-experts can lead to performance degradation. This leads us to hypothesize that learning shared features poses challenges in deep learning, potentially caused by the same feature being learned as various different features. To address this issue, we track each... |
1701.01216 | Tony T. Luo | T. Luo, S. S. Kanhere, H-P. Tan, F. Wu, and H. Wu | Crowdsourcing with Tullock contests: A new perspective | 9 pages, 4 figures, 3 tables | Proc. IEEE INFOCOM, 2015, pp. 2515-2523 | 10.1109/INFOCOM.2015.7218641 | null | cs.GT cs.HC cs.MA cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Incentive mechanisms for crowdsourcing have been extensively studied under
the framework of all-pay auctions. Along a distinct line, this paper proposes
to use Tullock contests as an alternative tool to design incentive mechanisms
for crowdsourcing. We are inspired by the conduciveness of Tullock contests to
attracti... | [
{
"created": "Thu, 5 Jan 2017 05:44:25 GMT",
"version": "v1"
}
] | 2017-01-06 | [
[
"Luo",
"T.",
""
],
[
"Kanhere",
"S. S.",
""
],
[
"Tan",
"H-P.",
""
],
[
"Wu",
"F.",
""
],
[
"Wu",
"H.",
""
]
] | Incentive mechanisms for crowdsourcing have been extensively studied under the framework of all-pay auctions. Along a distinct line, this paper proposes to use Tullock contests as an alternative tool to design incentive mechanisms for crowdsourcing. We are inspired by the conduciveness of Tullock contests to attracting... |
1704.00355 | Neha Gupta | Moses Charikar, Neha Gupta, Roy Schwartz | Local Guarantees in Graph Cuts and Clustering | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Correlation Clustering is an elegant model that captures fundamental graph
cut problems such as Min $s-t$ Cut, Multiway Cut, and Multicut, extensively
studied in combinatorial optimization. Here, we are given a graph with edges
labeled $+$ or $-$ and the goal is to produce a clustering that agrees with the
labels as ... | [
{
"created": "Sun, 2 Apr 2017 19:34:22 GMT",
"version": "v1"
}
] | 2017-04-04 | [
[
"Charikar",
"Moses",
""
],
[
"Gupta",
"Neha",
""
],
[
"Schwartz",
"Roy",
""
]
] | Correlation Clustering is an elegant model that captures fundamental graph cut problems such as Min $s-t$ Cut, Multiway Cut, and Multicut, extensively studied in combinatorial optimization. Here, we are given a graph with edges labeled $+$ or $-$ and the goal is to produce a clustering that agrees with the labels as mu... |
1502.03358 | Farshad Naghibi | Farshad Naghibi, Somayeh Salimi, Mikael Skoglund | The CEO Problem with Secrecy Constraints | Accepted for publication in IEEE Transactions on Information
Forensics and Security, 17 pages, 4 figures | null | 10.1109/TIFS.2015.2404134 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a lossy source coding problem with secrecy constraints in which a
remote information source should be transmitted to a single destination via
multiple agents in the presence of a passive eavesdropper. The agents observe
noisy versions of the source and independently encode and transmit their
observations to ... | [
{
"created": "Wed, 11 Feb 2015 16:19:21 GMT",
"version": "v1"
}
] | 2015-02-19 | [
[
"Naghibi",
"Farshad",
""
],
[
"Salimi",
"Somayeh",
""
],
[
"Skoglund",
"Mikael",
""
]
] | We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to th... |
2007.00236 | Cunxiang Wang | Cunxiang Wang, Shuailong Liang, Yili Jin, Yilong Wang, Xiaodan Zhu and
Yue Zhang | SemEval-2020 Task 4: Commonsense Validation and Explanation | Task description paper of SemEval-2020 Task 4: Commonsense Validation
and Explanation | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present SemEval-2020 Task 4, Commonsense Validation and
Explanation (ComVE), which includes three subtasks, aiming to evaluate whether
a system can distinguish a natural language statement that makes sense to
humans from one that does not, and provide the reasons. Specifically, in our
first subtask,... | [
{
"created": "Wed, 1 Jul 2020 04:41:05 GMT",
"version": "v1"
},
{
"created": "Mon, 3 Aug 2020 15:13:40 GMT",
"version": "v2"
}
] | 2020-08-04 | [
[
"Wang",
"Cunxiang",
""
],
[
"Liang",
"Shuailong",
""
],
[
"Jin",
"Yili",
""
],
[
"Wang",
"Yilong",
""
],
[
"Zhu",
"Xiaodan",
""
],
[
"Zhang",
"Yue",
""
]
] | In this paper, we present SemEval-2020 Task 4, Commonsense Validation and Explanation (ComVE), which includes three subtasks, aiming to evaluate whether a system can distinguish a natural language statement that makes sense to humans from one that does not, and provide the reasons. Specifically, in our first subtask, t... |
2304.13518 | Yuqi Han | Yuqi Han and Tao Yu and Xiaohang Yu and Yuwang Wang and Qionghai Dai | Super-NeRF: View-consistent Detail Generation for NeRF super-resolution | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The neural radiance field (NeRF) achieved remarkable success in modeling 3D
scenes and synthesizing high-fidelity novel views. However, existing NeRF-based
methods focus more on the make full use of the image resolution to generate
novel views, but less considering the generation of details under the limited
input re... | [
{
"created": "Wed, 26 Apr 2023 12:54:40 GMT",
"version": "v1"
}
] | 2023-04-27 | [
[
"Han",
"Yuqi",
""
],
[
"Yu",
"Tao",
""
],
[
"Yu",
"Xiaohang",
""
],
[
"Wang",
"Yuwang",
""
],
[
"Dai",
"Qionghai",
""
]
] | The neural radiance field (NeRF) achieved remarkable success in modeling 3D scenes and synthesizing high-fidelity novel views. However, existing NeRF-based methods focus more on the make full use of the image resolution to generate novel views, but less considering the generation of details under the limited input reso... |
1809.05606 | Yimin Yang | Yimin Yang, Q.M.Jonathan Wu, Xiexing Feng, Thangarajah Akilan | Non-iterative recomputation of dense layers for performance improvement
of DCNN | 11 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An iterative method of learning has become a paradigm for training deep
convolutional neural networks (DCNN). However, utilizing a non-iterative
learning strategy can accelerate the training process of the DCNN and
surprisingly such approach has been rarely explored by the deep learning (DL)
community. It motivates t... | [
{
"created": "Fri, 14 Sep 2018 22:24:52 GMT",
"version": "v1"
}
] | 2018-09-18 | [
[
"Yang",
"Yimin",
""
],
[
"Wu",
"Q. M. Jonathan",
""
],
[
"Feng",
"Xiexing",
""
],
[
"Akilan",
"Thangarajah",
""
]
] | An iterative method of learning has become a paradigm for training deep convolutional neural networks (DCNN). However, utilizing a non-iterative learning strategy can accelerate the training process of the DCNN and surprisingly such approach has been rarely explored by the deep learning (DL) community. It motivates thi... |
1309.0871 | EPTCS | Oded Maler (CNRS-VERIMAG, University of Grenoble), \'Ad\'am M.
Hal\'asz (Department of Methematics, West Virginia University), Olivier
Lebeltel (CNRS-VERIMAG, University of Grenoble), Ouri Maler (Grenoble) | Exploring the Dynamics of Mass Action Systems | In Proceedings HSB 2013, arXiv:1308.5724 | EPTCS 125, 2013, pp. 84-91 | 10.4204/EPTCS.125.6 | null | cs.CE cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the Populus toolkit for exploring the dynamics of mass action
systems under different assumptions.
| [
{
"created": "Tue, 3 Sep 2013 23:41:36 GMT",
"version": "v1"
}
] | 2013-09-05 | [
[
"Maler",
"Oded",
"",
"CNRS-VERIMAG, University of Grenoble"
],
[
"Halász",
"Ádám M.",
"",
"Department of Methematics, West Virginia University"
],
[
"Lebeltel",
"Olivier",
"",
"CNRS-VERIMAG, University of Grenoble"
],
[
"Maler",
"Ouri",
"",
... | We present the Populus toolkit for exploring the dynamics of mass action systems under different assumptions. |
2403.05193 | Martina Benini | Martina Benini, Silvia Gallucci, Marta Bonato, Marta Parazzini,
Gabriella Tognola | Evaluation of Road User Radio-Frequency Exposure Levels in an Urban
Environment from Vehicular Antennas and the Infrastructure in ITS-G5 5.9 GHz
Communication | null | null | null | null | cs.NI | http://creativecommons.org/licenses/by/4.0/ | This study aims to investigate the variability of exposure levels among road
users generated in a realistic urban scenario by Vehicle-to-Vehicle (V2V) and
Vehicle-to-Infrastructure (V2I) communication technologies operating at 5.9
GHz. The exposure levels were evaluated in terms of whole-body Specific
Absorption Rate... | [
{
"created": "Fri, 8 Mar 2024 10:14:40 GMT",
"version": "v1"
}
] | 2024-03-11 | [
[
"Benini",
"Martina",
""
],
[
"Gallucci",
"Silvia",
""
],
[
"Bonato",
"Marta",
""
],
[
"Parazzini",
"Marta",
""
],
[
"Tognola",
"Gabriella",
""
]
] | This study aims to investigate the variability of exposure levels among road users generated in a realistic urban scenario by Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication technologies operating at 5.9 GHz. The exposure levels were evaluated in terms of whole-body Specific Absorption Rate (... |
2408.03945 | Kristina Schaaff | Kristina Schaaff and Marc-Andr\'e Heidelmann | Impacts of Anthropomorphizing Large Language Models in Learning
Environments | Presented at Affective Computing Pre-Conference at ISRE 2024 | null | null | null | cs.CL cs.AI cs.CY cs.HC | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) are increasingly being used in learning
environments to support teaching-be it as learning companions or as tutors.
With our contribution, we aim to discuss the implications of the
anthropomorphization of LLMs in learning environments on educational theory to
build a foundation for more e... | [
{
"created": "Mon, 22 Jul 2024 06:28:54 GMT",
"version": "v1"
}
] | 2024-08-09 | [
[
"Schaaff",
"Kristina",
""
],
[
"Heidelmann",
"Marc-André",
""
]
] | Large Language Models (LLMs) are increasingly being used in learning environments to support teaching-be it as learning companions or as tutors. With our contribution, we aim to discuss the implications of the anthropomorphization of LLMs in learning environments on educational theory to build a foundation for more eff... |
2310.04197 | Angel Casanova | \'Angel Casanova Bienzobas, Alfonso S\'anchez-Maci\'an | Threat Trekker: An Approach to Cyber Threat Hunting | I am disseminating this outcome to all of you, despite the fact that
the results may appear somewhat idealistic, given that certain datasets
utilized for the training of the machine learning model comprise simulated
data | null | null | null | cs.CR | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Threat hunting is a proactive methodology for exploring, detecting and
mitigating cyberattacks within complex environments. As opposed to conventional
detection systems, threat hunting strategies assume adversaries have
infiltrated the system; as a result they proactively search out any unusual
patterns or activities... | [
{
"created": "Fri, 6 Oct 2023 12:29:41 GMT",
"version": "v1"
}
] | 2023-10-09 | [
[
"Bienzobas",
"Ángel Casanova",
""
],
[
"Sánchez-Macián",
"Alfonso",
""
]
] | Threat hunting is a proactive methodology for exploring, detecting and mitigating cyberattacks within complex environments. As opposed to conventional detection systems, threat hunting strategies assume adversaries have infiltrated the system; as a result they proactively search out any unusual patterns or activities w... |
2205.06255 | Qianqian Wang | Qianqian Wang, Zhengqi Li, David Salesin, Noah Snavely, Brian Curless,
Janne Kontkanen | 3D Moments from Near-Duplicate Photos | CVPR 2022 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | We introduce 3D Moments, a new computational photography effect. As input we
take a pair of near-duplicate photos, i.e., photos of moving subjects from
similar viewpoints, common in people's photo collections. As output, we produce
a video that smoothly interpolates the scene motion from the first photo to the
second... | [
{
"created": "Thu, 12 May 2022 17:56:18 GMT",
"version": "v1"
}
] | 2022-05-13 | [
[
"Wang",
"Qianqian",
""
],
[
"Li",
"Zhengqi",
""
],
[
"Salesin",
"David",
""
],
[
"Snavely",
"Noah",
""
],
[
"Curless",
"Brian",
""
],
[
"Kontkanen",
"Janne",
""
]
] | We introduce 3D Moments, a new computational photography effect. As input we take a pair of near-duplicate photos, i.e., photos of moving subjects from similar viewpoints, common in people's photo collections. As output, we produce a video that smoothly interpolates the scene motion from the first photo to the second, ... |
2407.15373 | Dizhi Ma | Dizhi Ma, Xiyun Hu, Jingyu Shi, Mayank Patel, Rahul Jain, Ziyi Liu,
Zhengzhe Zhu and Karthik Ramani | avaTTAR: Table Tennis Stroke Training with On-body and Detached
Visualization in Augmented Reality | null | null | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | Table tennis stroke training is a critical aspect of player development. We
designed a new augmented reality (AR) system, avaTTAR, for table tennis stroke
training. The system provides both "on-body" (first-person view) and "detached"
(third-person view) visual cues, enabling users to visualize target strokes and
cor... | [
{
"created": "Mon, 22 Jul 2024 04:47:16 GMT",
"version": "v1"
},
{
"created": "Fri, 26 Jul 2024 15:13:46 GMT",
"version": "v2"
}
] | 2024-07-29 | [
[
"Ma",
"Dizhi",
""
],
[
"Hu",
"Xiyun",
""
],
[
"Shi",
"Jingyu",
""
],
[
"Patel",
"Mayank",
""
],
[
"Jain",
"Rahul",
""
],
[
"Liu",
"Ziyi",
""
],
[
"Zhu",
"Zhengzhe",
""
],
[
"Ramani",
"Karthik",
... | Table tennis stroke training is a critical aspect of player development. We designed a new augmented reality (AR) system, avaTTAR, for table tennis stroke training. The system provides both "on-body" (first-person view) and "detached" (third-person view) visual cues, enabling users to visualize target strokes and corre... |
2005.13102 | Bangalore Ravi Kiran | Leonardo Gigli, B Ravi Kiran, Thomas Paul, Andres Serna, Nagarjuna
Vemuri, Beatriz Marcotegui, Santiago Velasco-Forero | Road Segmentation on low resolution Lidar point clouds for autonomous
vehicles | ISPRS 2020 | null | null | null | cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Point cloud datasets for perception tasks in the context of autonomous
driving often rely on high resolution 64-layer Light Detection and Ranging
(LIDAR) scanners. They are expensive to deploy on real-world autonomous driving
sensor architectures which usually employ 16/32 layer LIDARs. We evaluate the
effect of subs... | [
{
"created": "Wed, 27 May 2020 00:38:39 GMT",
"version": "v1"
}
] | 2020-05-28 | [
[
"Gigli",
"Leonardo",
""
],
[
"Kiran",
"B Ravi",
""
],
[
"Paul",
"Thomas",
""
],
[
"Serna",
"Andres",
""
],
[
"Vemuri",
"Nagarjuna",
""
],
[
"Marcotegui",
"Beatriz",
""
],
[
"Velasco-Forero",
"Santiago",
""
... | Point cloud datasets for perception tasks in the context of autonomous driving often rely on high resolution 64-layer Light Detection and Ranging (LIDAR) scanners. They are expensive to deploy on real-world autonomous driving sensor architectures which usually employ 16/32 layer LIDARs. We evaluate the effect of subsam... |
2105.05026 | Chongxuan Li | Guoqiang Wu, Chongxuan Li, Kun Xu, Jun Zhu | Rethinking and Reweighting the Univariate Losses for Multi-Label
Ranking: Consistency and Generalization | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | (Partial) ranking loss is a commonly used evaluation measure for multi-label
classification, which is usually optimized with convex surrogates for
computational efficiency. Prior theoretical work on multi-label ranking mainly
focuses on (Fisher) consistency analyses. However, there is a gap between
existing theory an... | [
{
"created": "Mon, 10 May 2021 09:23:27 GMT",
"version": "v1"
}
] | 2021-05-12 | [
[
"Wu",
"Guoqiang",
""
],
[
"Li",
"Chongxuan",
""
],
[
"Xu",
"Kun",
""
],
[
"Zhu",
"Jun",
""
]
] | (Partial) ranking loss is a commonly used evaluation measure for multi-label classification, which is usually optimized with convex surrogates for computational efficiency. Prior theoretical work on multi-label ranking mainly focuses on (Fisher) consistency analyses. However, there is a gap between existing theory and ... |
2403.14623 | Zhicong Tang | Zhicong Tang, Tiankai Hang, Shuyang Gu, Dong Chen, Baining Guo | Simplified Diffusion Schr\"odinger Bridge | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a novel theoretical simplification of the Diffusion
Schr\"odinger Bridge (DSB) that facilitates its unification with Score-based
Generative Models (SGMs), addressing the limitations of DSB in complex data
generation and enabling faster convergence and enhanced performance. By
employing SGMs as a... | [
{
"created": "Thu, 21 Mar 2024 17:59:41 GMT",
"version": "v1"
},
{
"created": "Wed, 27 Mar 2024 16:49:35 GMT",
"version": "v2"
},
{
"created": "Mon, 27 May 2024 04:44:22 GMT",
"version": "v3"
},
{
"created": "Tue, 13 Aug 2024 04:34:58 GMT",
"version": "v4"
}
] | 2024-08-14 | [
[
"Tang",
"Zhicong",
""
],
[
"Hang",
"Tiankai",
""
],
[
"Gu",
"Shuyang",
""
],
[
"Chen",
"Dong",
""
],
[
"Guo",
"Baining",
""
]
] | This paper introduces a novel theoretical simplification of the Diffusion Schr\"odinger Bridge (DSB) that facilitates its unification with Score-based Generative Models (SGMs), addressing the limitations of DSB in complex data generation and enabling faster convergence and enhanced performance. By employing SGMs as an ... |
1511.04376 | Martin Reisslein | Akhilesh Thyagaturu, Anu Mercian, Michael P. McGarry, Martin
Reisslein, Wolfgang Kellerer | Software Defined Optical Networks (SDONs): A Comprehensive Survey | null | IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp.
2738-2786, 4th Qu. 2016 | 10.1109/COMST.2016.2586999 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The emerging Software Defined Networking (SDN) paradigm separates the data
plane from the control plane and centralizes network control in an SDN
controller. Applications interact with controllers to implement network
services, such as network transport with Quality of Service (QoS). SDN
facilitates the virtualizatio... | [
{
"created": "Fri, 13 Nov 2015 17:31:10 GMT",
"version": "v1"
},
{
"created": "Thu, 26 May 2016 10:19:58 GMT",
"version": "v2"
},
{
"created": "Sun, 17 Jul 2016 07:46:47 GMT",
"version": "v3"
}
] | 2016-11-29 | [
[
"Thyagaturu",
"Akhilesh",
""
],
[
"Mercian",
"Anu",
""
],
[
"McGarry",
"Michael P.",
""
],
[
"Reisslein",
"Martin",
""
],
[
"Kellerer",
"Wolfgang",
""
]
] | The emerging Software Defined Networking (SDN) paradigm separates the data plane from the control plane and centralizes network control in an SDN controller. Applications interact with controllers to implement network services, such as network transport with Quality of Service (QoS). SDN facilitates the virtualization ... |
2306.02346 | Shuo Ye | Shuo Ye and Yufeng Shi and Ruxin Wang and Yu Wang and Jiamiao Xu and
Chuanwu Yang and Xinge You | CDLT: A Dataset with Concept Drift and Long-Tailed Distribution for
Fine-Grained Visual Categorization | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data is the foundation for the development of computer vision, and the
establishment of datasets plays an important role in advancing the techniques
of fine-grained visual categorization~(FGVC). In the existing FGVC datasets
used in computer vision, it is generally assumed that each collected instance
has fixed chara... | [
{
"created": "Sun, 4 Jun 2023 12:42:45 GMT",
"version": "v1"
}
] | 2023-06-06 | [
[
"Ye",
"Shuo",
""
],
[
"Shi",
"Yufeng",
""
],
[
"Wang",
"Ruxin",
""
],
[
"Wang",
"Yu",
""
],
[
"Xu",
"Jiamiao",
""
],
[
"Yang",
"Chuanwu",
""
],
[
"You",
"Xinge",
""
]
] | Data is the foundation for the development of computer vision, and the establishment of datasets plays an important role in advancing the techniques of fine-grained visual categorization~(FGVC). In the existing FGVC datasets used in computer vision, it is generally assumed that each collected instance has fixed charact... |
2303.06545 | Hao Zhou | Hao Zhou, Chongyang Zhang, Yanjun Chen, Chuanping Hu | Towards Diverse Temporal Grounding under Single Positive Labels | The source codes are available at
https://github.com/zhouhaocv/DTG-SPL | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Temporal grounding aims to retrieve moments of the described event within an
untrimmed video by a language query. Typically, existing methods assume
annotations are precise and unique, yet one query may describe multiple moments
in many cases. Hence, simply taking it as a one-vs-one mapping task and
striving to match... | [
{
"created": "Sun, 12 Mar 2023 02:54:18 GMT",
"version": "v1"
}
] | 2023-03-14 | [
[
"Zhou",
"Hao",
""
],
[
"Zhang",
"Chongyang",
""
],
[
"Chen",
"Yanjun",
""
],
[
"Hu",
"Chuanping",
""
]
] | Temporal grounding aims to retrieve moments of the described event within an untrimmed video by a language query. Typically, existing methods assume annotations are precise and unique, yet one query may describe multiple moments in many cases. Hence, simply taking it as a one-vs-one mapping task and striving to match s... |
2110.15919 | Pranay Bhardwaj | Vinay U. Pai, Pranay Bhardwaj, and S. M. Zafaruddin | Performance Analysis of Dual-Hop THz Wireless Transmission for Backhaul
Applications | This paper has been accepted for presentation in 2021 IEEE
International Conference on Advanced Networks and Telecommunications Systems
(ANTS), Hyderabad, India | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | THz transmissions suffer from pointing errors due to antenna misalignment and
incur higher path loss from the molecular absorption in addition to the channel
fading. In this paper, we employ an amplify-and-forward (AF) dual-hop relaying
to mitigate the effect of pointing errors and extend the range of the THz
wireles... | [
{
"created": "Fri, 29 Oct 2021 17:15:38 GMT",
"version": "v1"
},
{
"created": "Sun, 21 Nov 2021 19:24:23 GMT",
"version": "v2"
}
] | 2021-11-23 | [
[
"Pai",
"Vinay U.",
""
],
[
"Bhardwaj",
"Pranay",
""
],
[
"Zafaruddin",
"S. M.",
""
]
] | THz transmissions suffer from pointing errors due to antenna misalignment and incur higher path loss from the molecular absorption in addition to the channel fading. In this paper, we employ an amplify-and-forward (AF) dual-hop relaying to mitigate the effect of pointing errors and extend the range of the THz wireless ... |
2202.02071 | Henrique Moniz | Afonso Oliveira, Henrique Moniz, Rodrigo Rodrigues | Alea-BFT: Practical Asynchronous Byzantine Fault Tolerance | null | null | null | null | cs.DC | http://creativecommons.org/licenses/by/4.0/ | Traditional Byzantine Fault Tolerance (BFT) state machine replication
protocols assume a partial synchrony model, leading to a design where a leader
replica drives the protocol and is replaced after a timeout. Recently, we
witnessed a surge of asynchronous BFT protocols that use randomization to
remove the assumption... | [
{
"created": "Fri, 4 Feb 2022 10:53:37 GMT",
"version": "v1"
}
] | 2022-02-07 | [
[
"Oliveira",
"Afonso",
""
],
[
"Moniz",
"Henrique",
""
],
[
"Rodrigues",
"Rodrigo",
""
]
] | Traditional Byzantine Fault Tolerance (BFT) state machine replication protocols assume a partial synchrony model, leading to a design where a leader replica drives the protocol and is replaced after a timeout. Recently, we witnessed a surge of asynchronous BFT protocols that use randomization to remove the assumptions ... |
1405.2066 | Jehad Al Dallal Prof. | Jehad Al Dallal | How and When to Flatten Java Classes? | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Improving modularity and reusability are two key objectives in
object-oriented programming. These objectives are achieved by applying several
key concepts, such as data encapsulation and inheritance. A class in an
object-oriented system is the basic unit of design. Assessing the quality of an
object-oriented class ma... | [
{
"created": "Thu, 8 May 2014 19:48:33 GMT",
"version": "v1"
}
] | 2014-05-09 | [
[
"Dallal",
"Jehad Al",
""
]
] | Improving modularity and reusability are two key objectives in object-oriented programming. These objectives are achieved by applying several key concepts, such as data encapsulation and inheritance. A class in an object-oriented system is the basic unit of design. Assessing the quality of an object-oriented class may ... |
1406.3583 | Aaron D. Jaggard | Aaron D. Jaggard, Aaron Johnson, Paul Syverson, and Joan Feigenbaum | Representing Network Trust and Using It to Improve Anonymous
Communication | 24 pages; talk to be presented at HotPETs 2014 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by the effectiveness of correlation attacks against Tor, the
censorship arms race, and observations of malicious relays in Tor, we propose
that Tor users capture their trust in network elements using probability
distributions over the sets of elements observed by network adversaries. We
present a modular sy... | [
{
"created": "Fri, 13 Jun 2014 16:23:12 GMT",
"version": "v1"
}
] | 2014-06-16 | [
[
"Jaggard",
"Aaron D.",
""
],
[
"Johnson",
"Aaron",
""
],
[
"Syverson",
"Paul",
""
],
[
"Feigenbaum",
"Joan",
""
]
] | Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular syst... |
1702.06235 | Will Radford | Andrew Chisholm, Will Radford, Ben Hachey | Learning to generate one-sentence biographies from Wikidata | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | We investigate the generation of one-sentence Wikipedia biographies from
facts derived from Wikidata slot-value pairs. We train a recurrent neural
network sequence-to-sequence model with attention to select facts and generate
textual summaries. Our model incorporates a novel secondary objective that
helps ensure it g... | [
{
"created": "Tue, 21 Feb 2017 01:30:59 GMT",
"version": "v1"
}
] | 2017-02-22 | [
[
"Chisholm",
"Andrew",
""
],
[
"Radford",
"Will",
""
],
[
"Hachey",
"Ben",
""
]
] | We investigate the generation of one-sentence Wikipedia biographies from facts derived from Wikidata slot-value pairs. We train a recurrent neural network sequence-to-sequence model with attention to select facts and generate textual summaries. Our model incorporates a novel secondary objective that helps ensure it gen... |
2402.11173 | Andrew Lowy | Andrew Lowy, Jonathan Ullman, Stephen J. Wright | How to Make the Gradients Small Privately: Improved Rates for
Differentially Private Non-Convex Optimization | null | null | null | null | cs.LG cs.CR math.OC | http://creativecommons.org/licenses/by/4.0/ | We provide a simple and flexible framework for designing differentially
private algorithms to find approximate stationary points of non-convex loss
functions. Our framework is based on using a private approximate risk minimizer
to "warm start" another private algorithm for finding stationary points. We use
this frame... | [
{
"created": "Sat, 17 Feb 2024 02:42:56 GMT",
"version": "v1"
}
] | 2024-02-20 | [
[
"Lowy",
"Andrew",
""
],
[
"Ullman",
"Jonathan",
""
],
[
"Wright",
"Stephen J.",
""
]
] | We provide a simple and flexible framework for designing differentially private algorithms to find approximate stationary points of non-convex loss functions. Our framework is based on using a private approximate risk minimizer to "warm start" another private algorithm for finding stationary points. We use this framewo... |
2401.11946 | Jiajun Liu | Jiajun Liu, Lina Tan, Zhili Zhou, Yi Li, Peng Chen | A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless
Image Steganography | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Many existing coverless steganography methods establish a mapping
relationship between cover images and hidden data. There exists an issue that
the number of images stored in the database grows exponentially as the
steganographic capacity rises. The need for a high steganographic capacity
makes it challenging to buil... | [
{
"created": "Mon, 22 Jan 2024 13:35:27 GMT",
"version": "v1"
}
] | 2024-01-23 | [
[
"Liu",
"Jiajun",
""
],
[
"Tan",
"Lina",
""
],
[
"Zhou",
"Zhili",
""
],
[
"Li",
"Yi",
""
],
[
"Chen",
"Peng",
""
]
] | Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data. There exists an issue that the number of images stored in the database grows exponentially as the steganographic capacity rises. The need for a high steganographic capacity makes it challenging to build ... |
2203.10837 | Marcos Faundez-Zanuy | K. L\'opez-de-Ipi\~na, Marcos Faundez-Zanuy, Jordi Sol\'e-Casals,
Fernando Zelarin, Pilar Calvo | Multi-class versus One-class classifier in spontaneous speech analysis
oriented to Alzheimer Disease diagnosis | 10 pages, published in International Conference on NONLINEAR SPEECH
PROCESSING, NOLISP 2015 jointly organized with the 25th Italian Workshop on
Neural Networks, WIRN 2015, held at May 2015, Vietri sul Mare, Salerno, Italy | Recent Advances in Nonlinear Speech Processing. Smart Innovation,
Systems and Technologies, vol 48. Springer, Cham 2015 | 10.1007/978-3-319-28109-4_7 | null | cs.SD cs.LG eess.AS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Most of medical developments require the ability to identify samples that are
anomalous with respect to a target group or control group, in the sense they
could belong to a new, previously unseen class or are not class data. In this
case when there are not enough data to train two-class One-class classification
appea... | [
{
"created": "Mon, 21 Mar 2022 09:57:20 GMT",
"version": "v1"
}
] | 2022-03-22 | [
[
"López-de-Ipiña",
"K.",
""
],
[
"Faundez-Zanuy",
"Marcos",
""
],
[
"Solé-Casals",
"Jordi",
""
],
[
"Zelarin",
"Fernando",
""
],
[
"Calvo",
"Pilar",
""
]
] | Most of medical developments require the ability to identify samples that are anomalous with respect to a target group or control group, in the sense they could belong to a new, previously unseen class or are not class data. In this case when there are not enough data to train two-class One-class classification appear ... |
2408.06047 | Xuanpu Zhang | Xuanpu Zhang and Dan Song and Pengxin Zhan and Qingguo Chen and Zhao
Xu and Weihua Luo and Kaifu Zhang and Anan Liu | BooW-VTON: Boosting In-the-Wild Virtual Try-On via Mask-Free Pseudo Data
Training | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image-based virtual try-on is an increasingly popular and important task to
generate realistic try-on images of specific person. Existing methods always
employ an accurate mask to remove the original garment in the source image,
thus achieving realistic synthesized images in simple and conventional try-on
scenarios b... | [
{
"created": "Mon, 12 Aug 2024 10:39:59 GMT",
"version": "v1"
}
] | 2024-08-13 | [
[
"Zhang",
"Xuanpu",
""
],
[
"Song",
"Dan",
""
],
[
"Zhan",
"Pengxin",
""
],
[
"Chen",
"Qingguo",
""
],
[
"Xu",
"Zhao",
""
],
[
"Luo",
"Weihua",
""
],
[
"Zhang",
"Kaifu",
""
],
[
"Liu",
"Anan",
... | Image-based virtual try-on is an increasingly popular and important task to generate realistic try-on images of specific person. Existing methods always employ an accurate mask to remove the original garment in the source image, thus achieving realistic synthesized images in simple and conventional try-on scenarios bas... |
1604.01186 | EPTCS | Denis Firsov, Tarmo Uustalu, Niccol\`o Veltri | Variations on Noetherianness | In Proceedings MSFP 2016, arXiv:1604.00384 | EPTCS 207, 2016, pp. 76-88 | 10.4204/EPTCS.207.4 | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In constructive mathematics, several nonequivalent notions of finiteness
exist. In this paper, we continue the study of Noetherian sets in the
dependently typed setting of the Agda programming language. We want to say that
a set is Noetherian, if, when we are shown elements from it one after another,
we will sooner o... | [
{
"created": "Tue, 5 Apr 2016 09:04:13 GMT",
"version": "v1"
}
] | 2016-04-06 | [
[
"Firsov",
"Denis",
""
],
[
"Uustalu",
"Tarmo",
""
],
[
"Veltri",
"Niccolò",
""
]
] | In constructive mathematics, several nonequivalent notions of finiteness exist. In this paper, we continue the study of Noetherian sets in the dependently typed setting of the Agda programming language. We want to say that a set is Noetherian, if, when we are shown elements from it one after another, we will sooner or ... |
2109.06612 | Johanna Schmidt | Raphael Sahann, Torsten M\"oller, Johanna Schmidt | Histogram binning revisited with a focus on human perception | Accepted as short paper at VIS 2021. Supplemental material can be
found at https://github.com/johanna-schmidt/histogram-binning-revisited | Proceedings of VIS short papers 2021 | null | null | cs.HC | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This paper presents a quantitative user study to evaluate how well users can
visually perceive the underlying data distribution from a histogram
representation. We used different sample and bin sizes and four different
distributions (uniform, normal, bimodal, and gamma). The study results confirm
that, in general, mo... | [
{
"created": "Tue, 14 Sep 2021 12:08:27 GMT",
"version": "v1"
}
] | 2021-09-15 | [
[
"Sahann",
"Raphael",
""
],
[
"Möller",
"Torsten",
""
],
[
"Schmidt",
"Johanna",
""
]
] | This paper presents a quantitative user study to evaluate how well users can visually perceive the underlying data distribution from a histogram representation. We used different sample and bin sizes and four different distributions (uniform, normal, bimodal, and gamma). The study results confirm that, in general, more... |
1802.09657 | Dipankar Maity | Dipankar Maity, John S. Baras | Event-Triggered Controller Synthesis for Dynamical Systems with Temporal
Logic Constraints | null | null | null | null | cs.RO math.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we propose an event-triggered con- trol framework for dynamical
systems with temporal logical constraints. Event-triggered control
methodologies have proven to be very efficient in reducing sensing,
communication and computation costs. When a continuous feedback control is re-
placed with an event-trigg... | [
{
"created": "Tue, 27 Feb 2018 00:17:41 GMT",
"version": "v1"
}
] | 2018-02-28 | [
[
"Maity",
"Dipankar",
""
],
[
"Baras",
"John S.",
""
]
] | In this work, we propose an event-triggered con- trol framework for dynamical systems with temporal logical constraints. Event-triggered control methodologies have proven to be very efficient in reducing sensing, communication and computation costs. When a continuous feedback control is re- placed with an event-trigger... |
1911.03059 | Chowdhury Rahman | Afra Anika, Md. Hasibur Rahman, Salekul Islam, Abu Shafin Mohammad
Mahdee Jameel and Chowdhury Rafeed Rahman | A Comprehensive Comparison of Machine Learning Based Methods Used in
Bengali Question Classification | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | QA classification system maps questions asked by humans to an appropriate
answer category. A sound question classification (QC) system model is the
pre-requisite of a sound QA system. This work demonstrates phases of assembling
a QA type classification model. We present a comprehensive comparison
(performance and com... | [
{
"created": "Fri, 8 Nov 2019 05:30:33 GMT",
"version": "v1"
},
{
"created": "Tue, 19 Nov 2019 16:37:41 GMT",
"version": "v2"
}
] | 2019-11-20 | [
[
"Anika",
"Afra",
""
],
[
"Rahman",
"Md. Hasibur",
""
],
[
"Islam",
"Salekul",
""
],
[
"Jameel",
"Abu Shafin Mohammad Mahdee",
""
],
[
"Rahman",
"Chowdhury Rafeed",
""
]
] | QA classification system maps questions asked by humans to an appropriate answer category. A sound question classification (QC) system model is the pre-requisite of a sound QA system. This work demonstrates phases of assembling a QA type classification model. We present a comprehensive comparison (performance and compu... |
2212.09448 | Senem Tanberk PhD | Senem Tanberk, Mustafa Can | Smart Journey in Istanbul: A Mobile Application in Smart Cities for
Traffic Estimation by Harnessing Time Series | null | null | 10.1109/ASYU58738.2023.10296669 | null | cs.AI cs.IR | http://creativecommons.org/licenses/by/4.0/ | In recent decades, mobile applications (apps) have gained enormous
popularity. Smart services for smart cities increasingly gain attention. The
main goal of the proposed research is to present a new AI-powered mobile
application on Istanbul's traffic congestion forecast by using traffic density
data. It addresses the... | [
{
"created": "Tue, 13 Dec 2022 12:10:52 GMT",
"version": "v1"
}
] | 2023-11-09 | [
[
"Tanberk",
"Senem",
""
],
[
"Can",
"Mustafa",
""
]
] | In recent decades, mobile applications (apps) have gained enormous popularity. Smart services for smart cities increasingly gain attention. The main goal of the proposed research is to present a new AI-powered mobile application on Istanbul's traffic congestion forecast by using traffic density data. It addresses the r... |
2401.11150 | Junxiao Shen Mr | Junxiao Shen, Xuhai Xu, Ran Tan, Amy Karlson, Evan Strasnick | Simultaneous Gesture Classification and Localization with an Automatic
Gesture Annotation Model | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Training a real-time gesture recognition model heavily relies on annotated
data. However, manual data annotation is costly and demands substantial human
effort. In order to address this challenge, we propose a novel annotation model
that can automatically annotate gesture classes and identify their temporal
ranges. O... | [
{
"created": "Sat, 20 Jan 2024 07:11:03 GMT",
"version": "v1"
}
] | 2024-01-23 | [
[
"Shen",
"Junxiao",
""
],
[
"Xu",
"Xuhai",
""
],
[
"Tan",
"Ran",
""
],
[
"Karlson",
"Amy",
""
],
[
"Strasnick",
"Evan",
""
]
] | Training a real-time gesture recognition model heavily relies on annotated data. However, manual data annotation is costly and demands substantial human effort. In order to address this challenge, we propose a novel annotation model that can automatically annotate gesture classes and identify their temporal ranges. Our... |
1005.0907 | Rdv Ijcsis | Yasser M. Alginaih, Abdul Ahad Siddiqi | Multistage Hybrid Arabic/Indian Numeral OCR System | IEEE Publication format, International Journal of Computer Science
and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/ | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The use of OCR in postal services is not yet universal and there are still
many countries that process mail sorting manually. Automated Arabic/Indian
numeral Optical Character Recognition (OCR) systems for Postal services are
being used in some countries, but still there are errors during the mail
sorting process, th... | [
{
"created": "Thu, 6 May 2010 07:25:23 GMT",
"version": "v1"
}
] | 2010-05-07 | [
[
"Alginaih",
"Yasser M.",
""
],
[
"Siddiqi",
"Abdul Ahad",
""
]
] | The use of OCR in postal services is not yet universal and there are still many countries that process mail sorting manually. Automated Arabic/Indian numeral Optical Character Recognition (OCR) systems for Postal services are being used in some countries, but still there are errors during the mail sorting process, thus... |
2405.13937 | Xingtong Yu | Xingtong Yu, Zhenghao Liu, Yuan Fang, Xinming Zhang | DyGPrompt: Learning Feature and Time Prompts on Dynamic Graphs | Under review | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic graphs are pervasive in the real world, modeling dynamic relations
between objects across various fields. For dynamic graph modeling, dynamic
graph neural networks (DGNNs) have emerged as a mainstream technique, which are
generally pre-trained on the link prediction task, leaving a significant gap
from the ob... | [
{
"created": "Wed, 22 May 2024 19:10:24 GMT",
"version": "v1"
},
{
"created": "Sun, 26 May 2024 01:46:11 GMT",
"version": "v2"
},
{
"created": "Tue, 28 May 2024 10:07:29 GMT",
"version": "v3"
},
{
"created": "Tue, 2 Jul 2024 05:14:10 GMT",
"version": "v4"
},
{
"cr... | 2024-07-04 | [
[
"Yu",
"Xingtong",
""
],
[
"Liu",
"Zhenghao",
""
],
[
"Fang",
"Yuan",
""
],
[
"Zhang",
"Xinming",
""
]
] | Dynamic graphs are pervasive in the real world, modeling dynamic relations between objects across various fields. For dynamic graph modeling, dynamic graph neural networks (DGNNs) have emerged as a mainstream technique, which are generally pre-trained on the link prediction task, leaving a significant gap from the obje... |
2208.02884 | Nicolaas Kaashoek | Nicolaas Kaashoek and Robert Morris | CheckSync: Using Runtime-Integrated Checkpoints to Achieve High
Availability} | 14 pages, 6 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | CheckSync provides applications with high availability via runtime-integrated
checkpointing. This allows CheckSync to take checkpoints of a process running
in a memory-managed language (Go, for now), which can be resumed on another
machine after a failure. CheckSync uses the runtime to checkpoint only the
process' li... | [
{
"created": "Thu, 4 Aug 2022 20:53:50 GMT",
"version": "v1"
}
] | 2022-08-08 | [
[
"Kaashoek",
"Nicolaas",
""
],
[
"Morris",
"Robert",
""
]
] | CheckSync provides applications with high availability via runtime-integrated checkpointing. This allows CheckSync to take checkpoints of a process running in a memory-managed language (Go, for now), which can be resumed on another machine after a failure. CheckSync uses the runtime to checkpoint only the process' live... |
2303.13299 | Avi Schwarzschild | Avi Schwarzschild, Max Cembalest, Karthik Rao, Keegan Hines, John
Dickerson | Reckoning with the Disagreement Problem: Explanation Consensus as a
Training Objective | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | As neural networks increasingly make critical decisions in high-stakes
settings, monitoring and explaining their behavior in an understandable and
trustworthy manner is a necessity. One commonly used type of explainer is post
hoc feature attribution, a family of methods for giving each feature in an
input a score cor... | [
{
"created": "Thu, 23 Mar 2023 14:35:37 GMT",
"version": "v1"
}
] | 2023-03-24 | [
[
"Schwarzschild",
"Avi",
""
],
[
"Cembalest",
"Max",
""
],
[
"Rao",
"Karthik",
""
],
[
"Hines",
"Keegan",
""
],
[
"Dickerson",
"John",
""
]
] | As neural networks increasingly make critical decisions in high-stakes settings, monitoring and explaining their behavior in an understandable and trustworthy manner is a necessity. One commonly used type of explainer is post hoc feature attribution, a family of methods for giving each feature in an input a score corre... |
2311.11596 | Yining Miao | Yining Miao, Nanlin Shi, Changxing Huang, Yonghao Song, Xiaogang Chen,
Yijun Wang, Xiaorong Gao | High-performance cVEP-BCI under minimal calibration | 35 pages, 5 figures | null | null | null | cs.HC cs.IT eess.SP math.IT q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ultimate goal of brain-computer interfaces (BCIs) based on visual
modulation paradigms is to achieve high-speed performance without the burden of
extensive calibration. Code-modulated visual evoked potential-based BCIs
(cVEP-BCIs) modulated by broadband white noise (WN) offer various advantages,
including increas... | [
{
"created": "Mon, 20 Nov 2023 08:20:51 GMT",
"version": "v1"
}
] | 2023-11-21 | [
[
"Miao",
"Yining",
""
],
[
"Shi",
"Nanlin",
""
],
[
"Huang",
"Changxing",
""
],
[
"Song",
"Yonghao",
""
],
[
"Chen",
"Xiaogang",
""
],
[
"Wang",
"Yijun",
""
],
[
"Gao",
"Xiaorong",
""
]
] | The ultimate goal of brain-computer interfaces (BCIs) based on visual modulation paradigms is to achieve high-speed performance without the burden of extensive calibration. Code-modulated visual evoked potential-based BCIs (cVEP-BCIs) modulated by broadband white noise (WN) offer various advantages, including increased... |
2204.08970 | Zhihao Li | Zhihao Li, Si Yi, Zhan Ma | Rendering Nighttime Image Via Cascaded Color and Brightness Compensation | Accepted by NTIRE 2022 (CVPR Workshop) | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by/4.0/ | Image signal processing (ISP) is crucial for camera imaging, and neural
networks (NN) solutions are extensively deployed for daytime scenes. The lack
of sufficient nighttime image dataset and insights on nighttime illumination
characteristics poses a great challenge for high-quality rendering using
existing NN ISPs. ... | [
{
"created": "Tue, 19 Apr 2022 16:15:31 GMT",
"version": "v1"
},
{
"created": "Thu, 21 Apr 2022 17:23:11 GMT",
"version": "v2"
}
] | 2022-04-22 | [
[
"Li",
"Zhihao",
""
],
[
"Yi",
"Si",
""
],
[
"Ma",
"Zhan",
""
]
] | Image signal processing (ISP) is crucial for camera imaging, and neural networks (NN) solutions are extensively deployed for daytime scenes. The lack of sufficient nighttime image dataset and insights on nighttime illumination characteristics poses a great challenge for high-quality rendering using existing NN ISPs. To... |
1702.05724 | Daniel M\'endez Fern\'andez | Marco Kuhrmann and Daniel M\'endez Fern\'andez and Thomas Ternit\'e | On the Use of Variability Operations in the V-Modell XT Software Process
Line | Journal of Software: Evolution and Process, 2015 | null | 10.1002/smr.1751 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Software process lines provide a systematic approach to develop and manage
software processes. It defines a reference process containing general process
assets, whereas a well-defined customization approach allows process engineers
to create new process variants, e.g., by extending or modifying process assets.
Variab... | [
{
"created": "Sun, 19 Feb 2017 08:58:12 GMT",
"version": "v1"
}
] | 2017-02-21 | [
[
"Kuhrmann",
"Marco",
""
],
[
"Fernández",
"Daniel Méndez",
""
],
[
"Ternité",
"Thomas",
""
]
] | Software process lines provide a systematic approach to develop and manage software processes. It defines a reference process containing general process assets, whereas a well-defined customization approach allows process engineers to create new process variants, e.g., by extending or modifying process assets. Variabil... |
1711.11017 | Ethan Perez | Simon Brodeur, Ethan Perez, Ankesh Anand, Florian Golemo, Luca
Celotti, Florian Strub, Jean Rouat, Hugo Larochelle, Aaron Courville | HoME: a Household Multimodal Environment | Presented at NIPS 2017's Visually-Grounded Interaction and Language
Workshop | null | null | null | cs.AI cs.CL cs.CV cs.RO cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce HoME: a Household Multimodal Environment for artificial agents
to learn from vision, audio, semantics, physics, and interaction with objects
and other agents, all within a realistic context. HoME integrates over 45,000
diverse 3D house layouts based on the SUNCG dataset, a scale which may
facilitate lear... | [
{
"created": "Wed, 29 Nov 2017 18:45:59 GMT",
"version": "v1"
}
] | 2017-11-30 | [
[
"Brodeur",
"Simon",
""
],
[
"Perez",
"Ethan",
""
],
[
"Anand",
"Ankesh",
""
],
[
"Golemo",
"Florian",
""
],
[
"Celotti",
"Luca",
""
],
[
"Strub",
"Florian",
""
],
[
"Rouat",
"Jean",
""
],
[
"Laroche... | We introduce HoME: a Household Multimodal Environment for artificial agents to learn from vision, audio, semantics, physics, and interaction with objects and other agents, all within a realistic context. HoME integrates over 45,000 diverse 3D house layouts based on the SUNCG dataset, a scale which may facilitate learni... |
1709.03421 | Riccardo Sven Risuleo | Riccardo Sven Risuleo, Giulio Bottegal, H{\aa}kan Hjalmarsson | Modeling and identification of uncertain-input systems | 27 Pages, submitted to Automatica | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we present a new class of models, called uncertain-input
models, that allows us to treat system-identification problems in which a
linear system is subject to a partially unknown input signal. To encode prior
information about the input or the linear system, we use Gaussian-process
models. We estimate t... | [
{
"created": "Mon, 11 Sep 2017 14:53:38 GMT",
"version": "v1"
}
] | 2017-09-12 | [
[
"Risuleo",
"Riccardo Sven",
""
],
[
"Bottegal",
"Giulio",
""
],
[
"Hjalmarsson",
"Håkan",
""
]
] | In this work, we present a new class of models, called uncertain-input models, that allows us to treat system-identification problems in which a linear system is subject to a partially unknown input signal. To encode prior information about the input or the linear system, we use Gaussian-process models. We estimate the... |
2110.04678 | Ankit Parag Shah | Rita Singh, Ankit Shah, Hira Dhamyal | An Overview of Techniques for Biomarker Discovery in Voice Signal | Last two authors contributed equally to the paper | null | null | null | cs.SD cs.AI eess.AS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper reflects on the effect of several categories of medical conditions
on human voice, focusing on those that may be hypothesized to have effects on
voice, but for which the changes themselves may be subtle enough to have eluded
observation in standard analytical examinations of the voice signal. It
presents t... | [
{
"created": "Sun, 10 Oct 2021 01:39:28 GMT",
"version": "v1"
}
] | 2021-10-12 | [
[
"Singh",
"Rita",
""
],
[
"Shah",
"Ankit",
""
],
[
"Dhamyal",
"Hira",
""
]
] | This paper reflects on the effect of several categories of medical conditions on human voice, focusing on those that may be hypothesized to have effects on voice, but for which the changes themselves may be subtle enough to have eluded observation in standard analytical examinations of the voice signal. It presents thr... |
2308.01286 | Diptapriyo Majumdar | Diptapriyo Majumdar | Enumeration Kernels of Polynomial Size for Cuts of Bounded Degree | There have been major revision in the technicalities and proofs of
the paper | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Enumeration kernelization was first proposed by Creignou et al. [TOCS 2017]
and was later refined by Golovach et al. [JCSS 2022] into two different
variants: fully-polynomial enumeration kernelization and polynomial-delay
enumeration kernelization. In this paper, we consider the DEGREE-d-CUT problem
from the perspect... | [
{
"created": "Wed, 2 Aug 2023 17:18:19 GMT",
"version": "v1"
},
{
"created": "Thu, 30 Nov 2023 09:14:39 GMT",
"version": "v2"
},
{
"created": "Fri, 1 Dec 2023 07:32:28 GMT",
"version": "v3"
},
{
"created": "Fri, 2 Feb 2024 18:15:47 GMT",
"version": "v4"
},
{
"crea... | 2024-04-30 | [
[
"Majumdar",
"Diptapriyo",
""
]
] | Enumeration kernelization was first proposed by Creignou et al. [TOCS 2017] and was later refined by Golovach et al. [JCSS 2022] into two different variants: fully-polynomial enumeration kernelization and polynomial-delay enumeration kernelization. In this paper, we consider the DEGREE-d-CUT problem from the perspectiv... |
0810.2529 | Alireza Bayesteh | Jamshid Abouei, Alireza Bayesteh, Masoud Ebrahimi, and Amir K.
Khandani | On the Throughput Maximization in Dencentralized Wireless Networks | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A distributed single-hop wireless network with $K$ links is considered, where
the links are partitioned into a fixed number ($M$) of clusters each operating
in a subchannel with bandwidth $\frac{W}{M}$. The subchannels are assumed to be
orthogonal to each other. A general shadow-fading model, described by
parameters ... | [
{
"created": "Tue, 14 Oct 2008 19:40:22 GMT",
"version": "v1"
}
] | 2008-10-15 | [
[
"Abouei",
"Jamshid",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Ebrahimi",
"Masoud",
""
],
[
"Khandani",
"Amir K.",
""
]
] | A distributed single-hop wireless network with $K$ links is considered, where the links are partitioned into a fixed number ($M$) of clusters each operating in a subchannel with bandwidth $\frac{W}{M}$. The subchannels are assumed to be orthogonal to each other. A general shadow-fading model, described by parameters $(... |
2010.08660 | Manas Gaur | Manas Gaur, Keyur Faldu, Amit Sheth | Semantics of the Black-Box: Can knowledge graphs help make deep learning
systems more interpretable and explainable? | 6 pages + references, 4 figures, Accepted to IEEE internet computing
2020 | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | The recent series of innovations in deep learning (DL) have shown enormous
potential to impact individuals and society, both positively and negatively.
The DL models utilizing massive computing power and enormous datasets have
significantly outperformed prior historical benchmarks on increasingly
difficult, well-defi... | [
{
"created": "Fri, 16 Oct 2020 22:55:23 GMT",
"version": "v1"
},
{
"created": "Sun, 1 Nov 2020 02:28:43 GMT",
"version": "v2"
},
{
"created": "Tue, 3 Nov 2020 15:52:55 GMT",
"version": "v3"
},
{
"created": "Fri, 11 Dec 2020 23:03:11 GMT",
"version": "v4"
}
] | 2020-12-15 | [
[
"Gaur",
"Manas",
""
],
[
"Faldu",
"Keyur",
""
],
[
"Sheth",
"Amit",
""
]
] | The recent series of innovations in deep learning (DL) have shown enormous potential to impact individuals and society, both positively and negatively. The DL models utilizing massive computing power and enormous datasets have significantly outperformed prior historical benchmarks on increasingly difficult, well-define... |
2307.11357 | Arthur M\"uller | Arthur M\"uller, Matthia Sabatelli | Bridging the Reality Gap of Reinforcement Learning based Traffic Signal
Control using Domain Randomization and Meta Learning | Paper was accepted by the ITSC 2023 (26th IEEE International
Conference on Intelligent Transportation Systems) | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reinforcement Learning (RL) has been widely explored in Traffic Signal
Control (TSC) applications, however, still no such system has been deployed in
practice. A key barrier to progress in this area is the reality gap, the
discrepancy that results from differences between simulation models and their
real-world equiva... | [
{
"created": "Fri, 21 Jul 2023 05:17:21 GMT",
"version": "v1"
}
] | 2023-07-24 | [
[
"Müller",
"Arthur",
""
],
[
"Sabatelli",
"Matthia",
""
]
] | Reinforcement Learning (RL) has been widely explored in Traffic Signal Control (TSC) applications, however, still no such system has been deployed in practice. A key barrier to progress in this area is the reality gap, the discrepancy that results from differences between simulation models and their real-world equivale... |
2101.04244 | Mohammed Bahutair Mr. | Mohammed Bahutair, Athman Bouguettaya, and Azadeh Ghari Neiat | Multi-Perspective Trust Management Framework for Crowdsourced IoT
Services | 14 pages, accepted and to appear in IEEE Ttransactions on Services
Computing | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel generic trust management framework for crowdsourced IoT
services. The framework exploits a multi-perspective trust model that captures
the inherent characteristics of crowdsourced IoT services. Each perspective is
defined by a set of attributes that contribute to the perspective's influence
on trus... | [
{
"created": "Tue, 12 Jan 2021 00:43:12 GMT",
"version": "v1"
}
] | 2021-01-13 | [
[
"Bahutair",
"Mohammed",
""
],
[
"Bouguettaya",
"Athman",
""
],
[
"Neiat",
"Azadeh Ghari",
""
]
] | We propose a novel generic trust management framework for crowdsourced IoT services. The framework exploits a multi-perspective trust model that captures the inherent characteristics of crowdsourced IoT services. Each perspective is defined by a set of attributes that contribute to the perspective's influence on trust.... |
2008.07862 | David Baum | David Baum | Exploring the Design Space of Aesthetics with the Repertory Grid
Technique | Appears in the Proceedings of the 28th International Symposium on
Graph Drawing and Network Visualization (GD 2020) | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | By optimizing aesthetics, graph diagrams can be generated that are easier to
read and understand. However, the challenge lies in identifying suitable
aesthetics. We present a novel approach based on repertory grids to explore the
design space of aesthetics systematically. We applied our approach with three
independen... | [
{
"created": "Tue, 18 Aug 2020 11:25:26 GMT",
"version": "v1"
}
] | 2020-08-19 | [
[
"Baum",
"David",
""
]
] | By optimizing aesthetics, graph diagrams can be generated that are easier to read and understand. However, the challenge lies in identifying suitable aesthetics. We present a novel approach based on repertory grids to explore the design space of aesthetics systematically. We applied our approach with three independent ... |
2407.05850 | Minghao Yang | Minghao Yang, Jingjing Zhang, Shengyun Liu | DFedSat: Communication-Efficient and Robust Decentralized Federated
Learning for LEO Satellite Constellations | 13 pages, 10 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low Earth Orbit (LEO) satellites play a crucial role in the development of 6G
mobile networks and space-air-ground integrated systems. Recent advancements in
space technology have empowered LEO satellites with the capability to run AI
applications. However, centralized approaches, where ground stations (GSs) act
as s... | [
{
"created": "Mon, 8 Jul 2024 12:00:49 GMT",
"version": "v1"
}
] | 2024-07-09 | [
[
"Yang",
"Minghao",
""
],
[
"Zhang",
"Jingjing",
""
],
[
"Liu",
"Shengyun",
""
]
] | Low Earth Orbit (LEO) satellites play a crucial role in the development of 6G mobile networks and space-air-ground integrated systems. Recent advancements in space technology have empowered LEO satellites with the capability to run AI applications. However, centralized approaches, where ground stations (GSs) act as ser... |
2306.14834 | Zheqing Zhu | Zheqing Zhu, Benjamin Van Roy | Scalable Neural Contextual Bandit for Recommender Systems | null | ACM International Conference on Information and Knowledge
Management (CIKM 2023) 32nd ACM International Conference on Information and
Knowledge Management (CIKM 2023) | null | null | cs.IR cs.AI | http://creativecommons.org/licenses/by/4.0/ | High-quality recommender systems ought to deliver both innovative and
relevant content through effective and exploratory interactions with users.
Yet, supervised learning-based neural networks, which form the backbone of many
existing recommender systems, only leverage recognized user interests, falling
short when it... | [
{
"created": "Mon, 26 Jun 2023 16:39:39 GMT",
"version": "v1"
},
{
"created": "Sun, 30 Jul 2023 09:01:01 GMT",
"version": "v2"
},
{
"created": "Sat, 19 Aug 2023 03:32:53 GMT",
"version": "v3"
}
] | 2023-08-22 | [
[
"Zhu",
"Zheqing",
""
],
[
"Van Roy",
"Benjamin",
""
]
] | High-quality recommender systems ought to deliver both innovative and relevant content through effective and exploratory interactions with users. Yet, supervised learning-based neural networks, which form the backbone of many existing recommender systems, only leverage recognized user interests, falling short when it c... |
1603.05095 | Navid Azizan Ruhi | Navid Azizan Ruhi, Christos Thrampoulidis and Babak Hassibi | Improved Bounds on the Epidemic Threshold of Exact SIS Models on Complex
Networks | Submitted to CDC 2016 | null | 10.1109/CDC.2016.7798804 | null | cs.SI math.DS physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The SIS (susceptible-infected-susceptible) epidemic model on an arbitrary
network, without making approximations, is a $2^n$-state Markov chain with a
unique absorbing state (the all-healthy state). This makes analysis of the SIS
model and, in particular, determining the threshold of epidemic spread quite
challenging... | [
{
"created": "Wed, 16 Mar 2016 13:44:04 GMT",
"version": "v1"
}
] | 2019-01-21 | [
[
"Ruhi",
"Navid Azizan",
""
],
[
"Thrampoulidis",
"Christos",
""
],
[
"Hassibi",
"Babak",
""
]
] | The SIS (susceptible-infected-susceptible) epidemic model on an arbitrary network, without making approximations, is a $2^n$-state Markov chain with a unique absorbing state (the all-healthy state). This makes analysis of the SIS model and, in particular, determining the threshold of epidemic spread quite challenging. ... |
2310.11301 | Marvin Wyrich | Marvin Wyrich | Source Code Comprehension: A Contemporary Definition and Conceptual
Model for Empirical Investigation | Submission under review | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Be it in debugging, testing, code review or, more recently, pair programming
with AI assistance: in all these activities, software engineers need to
understand source code. Accordingly, plenty of research is taking place in the
field to find out, for example, what makes code easy to understand and which
tools can bes... | [
{
"created": "Tue, 17 Oct 2023 14:23:46 GMT",
"version": "v1"
}
] | 2023-10-18 | [
[
"Wyrich",
"Marvin",
""
]
] | Be it in debugging, testing, code review or, more recently, pair programming with AI assistance: in all these activities, software engineers need to understand source code. Accordingly, plenty of research is taking place in the field to find out, for example, what makes code easy to understand and which tools can best ... |
1301.3230 | Easwar Vivek Mangipudi | Easwar Vivek Mangipudi, Venkatesh Ramaiyan | A Framework for Quality of Service with a Multiple Access Strategy | 6 pages | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a problem of scheduling real-time traffic with hard delay
constraints in an unreliable wireless channel. Packets arrive at a constant
rate to the network and have to be delivered within a fixed number of slots in
a fading wireless channel. For an infrastructure mode of traffic with a
centralized scheduler, w... | [
{
"created": "Tue, 15 Jan 2013 06:05:42 GMT",
"version": "v1"
},
{
"created": "Thu, 29 Aug 2013 19:56:21 GMT",
"version": "v2"
},
{
"created": "Wed, 18 Dec 2013 20:47:03 GMT",
"version": "v3"
}
] | 2013-12-19 | [
[
"Mangipudi",
"Easwar Vivek",
""
],
[
"Ramaiyan",
"Venkatesh",
""
]
] | We study a problem of scheduling real-time traffic with hard delay constraints in an unreliable wireless channel. Packets arrive at a constant rate to the network and have to be delivered within a fixed number of slots in a fading wireless channel. For an infrastructure mode of traffic with a centralized scheduler, we ... |
1302.1555 | Alexander V. Kozlov | Alexander V. Kozlov, Daphne Koller | Nonuniform Dynamic Discretization in Hybrid Networks | Appears in Proceedings of the Thirteenth Conference on Uncertainty in
Artificial Intelligence (UAI1997) | null | null | UAI-P-1997-PG-314-325 | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider probabilistic inference in general hybrid networks, which include
continuous and discrete variables in an arbitrary topology. We reexamine the
question of variable discretization in a hybrid network aiming at minimizing
the information loss induced by the discretization. We show that a nonuniform
partitio... | [
{
"created": "Wed, 6 Feb 2013 15:57:46 GMT",
"version": "v1"
}
] | 2013-02-08 | [
[
"Kozlov",
"Alexander V.",
""
],
[
"Koller",
"Daphne",
""
]
] | We consider probabilistic inference in general hybrid networks, which include continuous and discrete variables in an arbitrary topology. We reexamine the question of variable discretization in a hybrid network aiming at minimizing the information loss induced by the discretization. We show that a nonuniform partition ... |
1811.01811 | Kemal Davaslioglu | Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, and Jason H. Li | Active Deep Learning Attacks under Strict Rate Limitations for Online
API Calls | Presented at 2018 IEEE International Symposium on Technologies for
Homeland Security (HST) on October 23 2018. Received the Best Paper Award in
Cyber Security Track | null | null | null | cs.LG cs.CR stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine learning has been applied to a broad range of applications and some
of them are available online as application programming interfaces (APIs) with
either free (trial) or paid subscriptions. In this paper, we study adversarial
machine learning in the form of back-box attacks on online classifier APIs. We
start... | [
{
"created": "Mon, 5 Nov 2018 15:50:30 GMT",
"version": "v1"
}
] | 2018-11-06 | [
[
"Shi",
"Yi",
""
],
[
"Sagduyu",
"Yalin E.",
""
],
[
"Davaslioglu",
"Kemal",
""
],
[
"Li",
"Jason H.",
""
]
] | Machine learning has been applied to a broad range of applications and some of them are available online as application programming interfaces (APIs) with either free (trial) or paid subscriptions. In this paper, we study adversarial machine learning in the form of back-box attacks on online classifier APIs. We start w... |
1905.12541 | Susan Stepney | Penelope Faulkner Rainford, Angelika Sebald, Susan Stepney | MetaChem: An Algebraic Framework for Artificial Chemistries | 39 pages, 19 figures; minor typos corrected | Artificial Life 26(2):153-195 2020 | 10.1162/artl_a_00315 | null | cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce MetaChem, a language for representing and implementing
Artificial Chemistries. We motivate the need for modularisation and
standardisation in representation of artificial chemistries. We describe a
mathematical formalism for Static Graph MetaChem, a static graph based system.
MetaChem supports different ... | [
{
"created": "Wed, 29 May 2019 15:42:24 GMT",
"version": "v1"
},
{
"created": "Mon, 30 Sep 2019 16:44:18 GMT",
"version": "v2"
},
{
"created": "Sun, 14 Jun 2020 19:36:09 GMT",
"version": "v3"
}
] | 2020-06-16 | [
[
"Rainford",
"Penelope Faulkner",
""
],
[
"Sebald",
"Angelika",
""
],
[
"Stepney",
"Susan",
""
]
] | We introduce MetaChem, a language for representing and implementing Artificial Chemistries. We motivate the need for modularisation and standardisation in representation of artificial chemistries. We describe a mathematical formalism for Static Graph MetaChem, a static graph based system. MetaChem supports different le... |
2011.03829 | Raman Goyal | Raman Goyal and Manoranjan Majji and Robert E. Skelton | Robust Shape Control of Gyroscopic Tensegrity Robotic Arm | null | null | null | null | cs.RO cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a model-based approach to control the shape of a
tensegrity system by driving its node position locations. The nonlinear
dynamics of the tensegrity system is used to regulate position, velocity, and
acceleration to the specified reference trajectory. State feedback control
design is used to obtain... | [
{
"created": "Sat, 7 Nov 2020 18:41:01 GMT",
"version": "v1"
},
{
"created": "Thu, 19 Nov 2020 21:51:05 GMT",
"version": "v2"
}
] | 2020-11-23 | [
[
"Goyal",
"Raman",
""
],
[
"Majji",
"Manoranjan",
""
],
[
"Skelton",
"Robert E.",
""
]
] | This paper proposes a model-based approach to control the shape of a tensegrity system by driving its node position locations. The nonlinear dynamics of the tensegrity system is used to regulate position, velocity, and acceleration to the specified reference trajectory. State feedback control design is used to obtain t... |
0709.1056 | Stephane Norte | Stephane Norte | A Sudoku Game for People with Motor Impairments | 7 pages, 5 figures | null | null | null | cs.HC cs.CY | null | Computer games are motivating and beneficial in learning different
educational skills. Most people use their fingers, hands, and arms when using a
computer game. However, for people with motor disabilities this task can be a
barrier. We present a new Sudoku game for people whose motion is impaired,
called Sudoku 4ALL... | [
{
"created": "Fri, 7 Sep 2007 11:59:22 GMT",
"version": "v1"
},
{
"created": "Thu, 13 Sep 2007 13:26:17 GMT",
"version": "v2"
},
{
"created": "Mon, 17 Sep 2007 21:08:35 GMT",
"version": "v3"
}
] | 2007-09-18 | [
[
"Norte",
"Stephane",
""
]
] | Computer games are motivating and beneficial in learning different educational skills. Most people use their fingers, hands, and arms when using a computer game. However, for people with motor disabilities this task can be a barrier. We present a new Sudoku game for people whose motion is impaired, called Sudoku 4ALL. ... |
2204.13892 | Ziming Chen | Chang Shu, Ziming Chen, Lei Chen, Kuan Ma, Minghui Wang and Haibing
Ren | SideRT: A Real-time Pure Transformer Architecture for Single Image Depth
Estimation | 7 pages, 5 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since context modeling is critical for estimating depth from a single image,
researchers put tremendous effort into obtaining global context. Many global
manipulations are designed for traditional CNN-based architectures to overcome
the locality of convolutions. Attention mechanisms or transformers originally
designe... | [
{
"created": "Fri, 29 Apr 2022 05:46:20 GMT",
"version": "v1"
}
] | 2022-05-02 | [
[
"Shu",
"Chang",
""
],
[
"Chen",
"Ziming",
""
],
[
"Chen",
"Lei",
""
],
[
"Ma",
"Kuan",
""
],
[
"Wang",
"Minghui",
""
],
[
"Ren",
"Haibing",
""
]
] | Since context modeling is critical for estimating depth from a single image, researchers put tremendous effort into obtaining global context. Many global manipulations are designed for traditional CNN-based architectures to overcome the locality of convolutions. Attention mechanisms or transformers originally designed ... |
0909.0122 | Sanjiang Li | Sanjiang Li, Anthony G. Cohn | Reasoning with Topological and Directional Spatial Information | null | Computational Intelligence, 2012, 28(4):579-616 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current research on qualitative spatial representation and reasoning mainly
focuses on one single aspect of space. In real world applications, however,
multiple spatial aspects are often involved simultaneously.
This paper investigates problems arising in reasoning with combined
topological and directional informat... | [
{
"created": "Tue, 1 Sep 2009 08:31:22 GMT",
"version": "v1"
}
] | 2013-10-21 | [
[
"Li",
"Sanjiang",
""
],
[
"Cohn",
"Anthony G.",
""
]
] | Current research on qualitative spatial representation and reasoning mainly focuses on one single aspect of space. In real world applications, however, multiple spatial aspects are often involved simultaneously. This paper investigates problems arising in reasoning with combined topological and directional information.... |
1908.03361 | Bj\"orn Barz | Bj\"orn Barz, Kai Schr\"oter, Moritz M\"unch, Bin Yang, Andrea Unger,
Doris Dransch, Joachim Denzler | Enhancing Flood Impact Analysis using Interactive Retrieval of Social
Media Images | null | Archives of Data Science, Series A, 5.1, 2018 | 10.5445/KSP/1000087327/06 | null | cs.IR cs.CV cs.MM eess.IV | http://creativecommons.org/licenses/by-sa/4.0/ | The analysis of natural disasters such as floods in a timely manner often
suffers from limited data due to a coarse distribution of sensors or sensor
failures. This limitation could be alleviated by leveraging information
contained in images of the event posted on social media platforms, so-called
"Volunteered Geogra... | [
{
"created": "Fri, 9 Aug 2019 08:29:57 GMT",
"version": "v1"
}
] | 2020-03-24 | [
[
"Barz",
"Björn",
""
],
[
"Schröter",
"Kai",
""
],
[
"Münch",
"Moritz",
""
],
[
"Yang",
"Bin",
""
],
[
"Unger",
"Andrea",
""
],
[
"Dransch",
"Doris",
""
],
[
"Denzler",
"Joachim",
""
]
] | The analysis of natural disasters such as floods in a timely manner often suffers from limited data due to a coarse distribution of sensors or sensor failures. This limitation could be alleviated by leveraging information contained in images of the event posted on social media platforms, so-called "Volunteered Geograph... |
1405.2736 | Elisa Gorla | Elisa Gorla, Alberto Ravagnani | Subspace codes from Ferrers diagrams | minor edits | null | null | null | cs.IT math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we give new constructions of Ferrer diagram rank metric codes,
which achieve the largest possible dimension. In particular, we prove several
cases of a conjecture by T. Etzion and N. Silberstein. We also establish a
sharp lower bound on the dimension of linear rank metric anticodes with a given
profile.... | [
{
"created": "Mon, 12 May 2014 13:01:37 GMT",
"version": "v1"
},
{
"created": "Fri, 13 Jun 2014 09:03:54 GMT",
"version": "v2"
}
] | 2014-06-16 | [
[
"Gorla",
"Elisa",
""
],
[
"Ravagnani",
"Alberto",
""
]
] | In this paper we give new constructions of Ferrer diagram rank metric codes, which achieve the largest possible dimension. In particular, we prove several cases of a conjecture by T. Etzion and N. Silberstein. We also establish a sharp lower bound on the dimension of linear rank metric anticodes with a given profile. C... |
1611.09010 | Francesc Moreno-Noguer | Francesc Moreno-Noguer | 3D Human Pose Estimation from a Single Image via Distance Matrix
Regression | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of 3D human pose estimation from a single
image. We follow a standard two-step pipeline by first detecting the 2D
position of the $N$ body joints, and then using these observations to infer 3D
pose. For the first step, we use a recent CNN-based detector. For the second
step, most exis... | [
{
"created": "Mon, 28 Nov 2016 07:36:31 GMT",
"version": "v1"
}
] | 2016-11-29 | [
[
"Moreno-Noguer",
"Francesc",
""
]
] | This paper addresses the problem of 3D human pose estimation from a single image. We follow a standard two-step pipeline by first detecting the 2D position of the $N$ body joints, and then using these observations to infer 3D pose. For the first step, we use a recent CNN-based detector. For the second step, most existi... |
1305.3021 | Ijaz Bukhari ijaz bukhari | Ijaz Bukhari, Nuhman-ul-Haq and Khizar Hyat | Wave Atom Based Watermarking | I want to withdraw the paper due to serious error | null | null | null | cs.MM cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Watermarking helps in ensuring originality, ownership and copyrights of a
digital image. This paper aims at embedding a Watermark in an image using Wave
Atom Transform. Preference of Wave Atoms on other transformations has been due
to its sparser expansion, adaptability to the direction of local pattern, and
sharp fr... | [
{
"created": "Tue, 14 May 2013 05:27:52 GMT",
"version": "v1"
},
{
"created": "Fri, 7 Aug 2015 13:06:09 GMT",
"version": "v2"
}
] | 2015-08-10 | [
[
"Bukhari",
"Ijaz",
""
],
[
"Nuhman-ul-Haq",
"",
""
],
[
"Hyat",
"Khizar",
""
]
] | Watermarking helps in ensuring originality, ownership and copyrights of a digital image. This paper aims at embedding a Watermark in an image using Wave Atom Transform. Preference of Wave Atoms on other transformations has been due to its sparser expansion, adaptability to the direction of local pattern, and sharp freq... |
2203.07605 | Hanna Sumita | Hanna Sumita, Shinji Ito, Kei Takemura, Daisuke Hatano, Takuro
Fukunaga, Naonori Kakimura, Ken-ichi Kawarabayashi | Online Task Assignment Problems with Reusable Resources | Appeared in AAAI-22 | null | null | null | cs.DS cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study online task assignment problem with reusable resources, motivated by
practical applications such as ridesharing, crowdsourcing and job hiring. In
the problem, we are given a set of offline vertices (agents), and, at each
time, an online vertex (task) arrives randomly according to a known
time-dependent distr... | [
{
"created": "Tue, 15 Mar 2022 02:48:13 GMT",
"version": "v1"
}
] | 2022-03-16 | [
[
"Sumita",
"Hanna",
""
],
[
"Ito",
"Shinji",
""
],
[
"Takemura",
"Kei",
""
],
[
"Hatano",
"Daisuke",
""
],
[
"Fukunaga",
"Takuro",
""
],
[
"Kakimura",
"Naonori",
""
],
[
"Kawarabayashi",
"Ken-ichi",
""
]
] | We study online task assignment problem with reusable resources, motivated by practical applications such as ridesharing, crowdsourcing and job hiring. In the problem, we are given a set of offline vertices (agents), and, at each time, an online vertex (task) arrives randomly according to a known time-dependent distrib... |
2106.08671 | Waddah Saeed | Waddah Saeed | Comparison of Automated Machine Learning Tools for SMS Spam Message
Filtering | 10 pages, 3 figures | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Short Message Service (SMS) is a very popular service used for communication
by mobile users. However, this popular service can be abused by executing
illegal activities and influencing security risks. Nowadays, many automatic
machine learning (AutoML) tools exist which can help domain experts and lay
users to build ... | [
{
"created": "Wed, 16 Jun 2021 10:16:07 GMT",
"version": "v1"
},
{
"created": "Mon, 28 Jun 2021 11:37:35 GMT",
"version": "v2"
}
] | 2021-06-29 | [
[
"Saeed",
"Waddah",
""
]
] | Short Message Service (SMS) is a very popular service used for communication by mobile users. However, this popular service can be abused by executing illegal activities and influencing security risks. Nowadays, many automatic machine learning (AutoML) tools exist which can help domain experts and lay users to build hi... |
1709.00551 | Yong Xu Dr | Yong Xu, Qiuqiang Kong, Wenwu Wang, Mark D. Plumbley | Surrey-cvssp system for DCASE2017 challenge task4 | DCASE2017 challenge ranked 1st system, task4, tech report | null | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this technique report, we present a bunch of methods for the task 4 of
Detection and Classification of Acoustic Scenes and Events 2017 (DCASE2017)
challenge. This task evaluates systems for the large-scale detection of sound
events using weakly labeled training data. The data are YouTube video excerpts
focusing on... | [
{
"created": "Sat, 2 Sep 2017 09:40:06 GMT",
"version": "v1"
},
{
"created": "Sat, 25 Nov 2017 20:21:32 GMT",
"version": "v2"
}
] | 2017-11-28 | [
[
"Xu",
"Yong",
""
],
[
"Kong",
"Qiuqiang",
""
],
[
"Wang",
"Wenwu",
""
],
[
"Plumbley",
"Mark D.",
""
]
] | In this technique report, we present a bunch of methods for the task 4 of Detection and Classification of Acoustic Scenes and Events 2017 (DCASE2017) challenge. This task evaluates systems for the large-scale detection of sound events using weakly labeled training data. The data are YouTube video excerpts focusing on t... |
1404.3165 | Gozde Ozcan | Gozde Ozcan, M. Cenk Gursoy | Energy-Efficient Power Adaptation for Cognitive Radio Systems under
Imperfect Channel Sensing | To Appear at 2014 IEEE INFOCOM Workshop on Green Cognitive
Communications and Computing Networks. Some typos are fixed | null | 10.1109/INFCOMW.2014.6849317 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, energy efficient power adaptation is considered in
sensing-based spectrum sharing cognitive radio systems in which secondary users
first perform channel sensing and then initiate data transmission with two
power levels based on the sensing decisions (e.g., idle or busy). It is assumed
that spectrum sen... | [
{
"created": "Fri, 11 Apr 2014 17:42:00 GMT",
"version": "v1"
},
{
"created": "Mon, 28 Apr 2014 05:22:43 GMT",
"version": "v2"
}
] | 2016-11-17 | [
[
"Ozcan",
"Gozde",
""
],
[
"Gursoy",
"M. Cenk",
""
]
] | In this paper, energy efficient power adaptation is considered in sensing-based spectrum sharing cognitive radio systems in which secondary users first perform channel sensing and then initiate data transmission with two power levels based on the sensing decisions (e.g., idle or busy). It is assumed that spectrum sensi... |
2407.11271 | Charlotte Shahlaei | Charlotte A. Shahlaei and Nicholas Berente | An Analysis of European Data and AI Regulations for Automotive
Organizations | null | null | null | null | cs.CY | http://creativecommons.org/licenses/by/4.0/ | This report summarizes the European Union's series of data and AI regulations
and analyzes them for managers in automotive vehicle manufacturing
organizations. In particular, we highlight the relevant ideas of the
regulations, including how they find their roots in earlier legislation, how
they contradict and complem... | [
{
"created": "Mon, 15 Jul 2024 22:38:37 GMT",
"version": "v1"
},
{
"created": "Thu, 18 Jul 2024 14:38:13 GMT",
"version": "v2"
},
{
"created": "Fri, 19 Jul 2024 02:59:18 GMT",
"version": "v3"
}
] | 2024-07-22 | [
[
"Shahlaei",
"Charlotte A.",
""
],
[
"Berente",
"Nicholas",
""
]
] | This report summarizes the European Union's series of data and AI regulations and analyzes them for managers in automotive vehicle manufacturing organizations. In particular, we highlight the relevant ideas of the regulations, including how they find their roots in earlier legislation, how they contradict and complemen... |
1812.06705 | Wu Xing | Xing Wu, Shangwen Lv, Liangjun Zang, Jizhong Han, Songlin Hu | Conditional BERT Contextual Augmentation | 9 pages, 1 figure | null | null | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel data augmentation method for labeled sentences called
conditional BERT contextual augmentation. Data augmentation methods are often
applied to prevent overfitting and improve generalization of deep neural
network models. Recently proposed contextual augmentation augments labeled
sentences by random... | [
{
"created": "Mon, 17 Dec 2018 11:26:42 GMT",
"version": "v1"
}
] | 2018-12-18 | [
[
"Wu",
"Xing",
""
],
[
"Lv",
"Shangwen",
""
],
[
"Zang",
"Liangjun",
""
],
[
"Han",
"Jizhong",
""
],
[
"Hu",
"Songlin",
""
]
] | We propose a novel data augmentation method for labeled sentences called conditional BERT contextual augmentation. Data augmentation methods are often applied to prevent overfitting and improve generalization of deep neural network models. Recently proposed contextual augmentation augments labeled sentences by randomly... |
2005.11735 | Marcin Plata | Marcin Plata and Piotr Syga | Robust Spatial-spread Deep Neural Image Watermarking | The article was accepted on TrustCom 2020: The 19th IEEE
International Conference on Trust, Security and Privacy in Computing and
Communications | null | 10.1109/TrustCom50675.2020.00022 | null | cs.MM cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Watermarking is an operation of embedding an information into an image in a
way that allows to identify ownership of the image despite applying some
distortions on it. In this paper, we presented a novel end-to-end solution for
embedding and recovering the watermark in the digital image using convolutional
neural net... | [
{
"created": "Sun, 24 May 2020 12:51:25 GMT",
"version": "v1"
},
{
"created": "Wed, 4 Nov 2020 13:14:42 GMT",
"version": "v2"
}
] | 2022-01-11 | [
[
"Plata",
"Marcin",
""
],
[
"Syga",
"Piotr",
""
]
] | Watermarking is an operation of embedding an information into an image in a way that allows to identify ownership of the image despite applying some distortions on it. In this paper, we presented a novel end-to-end solution for embedding and recovering the watermark in the digital image using convolutional neural netwo... |
1212.3873 | EPTCS | Hua Mao (AAU), Yingke Chen (AAU), Manfred Jaeger (AAU), Thomas D.
Nielsen (AAU), Kim G. Larsen (AAU), Brian Nielsen (AAU) | Learning Markov Decision Processes for Model Checking | In Proceedings QFM 2012, arXiv:1212.3454 | EPTCS 103, 2012, pp. 49-63 | 10.4204/EPTCS.103.6 | null | cs.LG cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constructing an accurate system model for formal model verification can be
both resource demanding and time-consuming. To alleviate this shortcoming,
algorithms have been proposed for automatically learning system models based on
observed system behaviors. In this paper we extend the algorithm on learning
probabilist... | [
{
"created": "Mon, 17 Dec 2012 03:40:47 GMT",
"version": "v1"
}
] | 2012-12-18 | [
[
"Mao",
"Hua",
"",
"AAU"
],
[
"Chen",
"Yingke",
"",
"AAU"
],
[
"Jaeger",
"Manfred",
"",
"AAU"
],
[
"Nielsen",
"Thomas D.",
"",
"AAU"
],
[
"Larsen",
"Kim G.",
"",
"AAU"
],
[
"Nielsen",
"Brian",
"",
"A... | Constructing an accurate system model for formal model verification can be both resource demanding and time-consuming. To alleviate this shortcoming, algorithms have been proposed for automatically learning system models based on observed system behaviors. In this paper we extend the algorithm on learning probabilistic... |
2312.05092 | Romain Robbes | Anjan Karmakar, Romain Robbes | INSPECT: Intrinsic and Systematic Probing Evaluation for Code
Transformers | Accepted to IEEE Transactions on Software Engineering. Extension of
our previous paper "What do pre-trained code models know about code?" (ASE
2021, arXiv:2108.11308). 21 pages | null | null | null | cs.SE cs.LG | http://creativecommons.org/licenses/by/4.0/ | Pre-trained models of source code have recently been successfully applied to
a wide variety of Software Engineering tasks; they have also seen some
practical adoption in practice, e.g. for code completion. Yet, we still know
very little about what these pre-trained models learn about source code. In
this article, we ... | [
{
"created": "Fri, 8 Dec 2023 15:21:54 GMT",
"version": "v1"
}
] | 2023-12-11 | [
[
"Karmakar",
"Anjan",
""
],
[
"Robbes",
"Romain",
""
]
] | Pre-trained models of source code have recently been successfully applied to a wide variety of Software Engineering tasks; they have also seen some practical adoption in practice, e.g. for code completion. Yet, we still know very little about what these pre-trained models learn about source code. In this article, we us... |
cs/0109096 | Tony Christensen | Tony Christensen, Peter McCormick | CyberCampaigns and Canadian Politics: Still Waiting? | 29th TPRC Conference, 2001 | null | null | TPRC-2001-058 | cs.CY | null | The early election call in the fall of 2000 provided the perfect opportunity
to study the impact the Internet has had on election campaigning in Canada.
With the explosion of use the Net has seen since the 1997 general election,
Canadian federal parties stood at the threshold of a new age in election
campaigning. Pun... | [
{
"created": "Mon, 24 Sep 2001 22:42:52 GMT",
"version": "v1"
}
] | 2007-05-23 | [
[
"Christensen",
"Tony",
""
],
[
"McCormick",
"Peter",
""
]
] | The early election call in the fall of 2000 provided the perfect opportunity to study the impact the Internet has had on election campaigning in Canada. With the explosion of use the Net has seen since the 1997 general election, Canadian federal parties stood at the threshold of a new age in election campaigning. Pundi... |
1707.09411 | Ding Zhao | Ding Zhao, Huei Peng, Kazutoshi Nobukawa, Shan Bao, David J LeBlanc,
Christopher S Pan | Analysis of mandatory and discretionary lane change behaviors for heavy
trucks | Published in the 12th International Symposium on Advanced Vehicle
Control, AVEC'14 | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The behaviors of heavy vehicles drivers in mandatory and discretionary lane
changes are analyzed in this paper. 640 mandatory and 2,035 discretionary lane
change events were extracted from a naturalistic driving database. Variations
in gap acceptance and lane change duration were investigated. Statistical
analysis sh... | [
{
"created": "Fri, 28 Jul 2017 20:45:02 GMT",
"version": "v1"
}
] | 2017-08-01 | [
[
"Zhao",
"Ding",
""
],
[
"Peng",
"Huei",
""
],
[
"Nobukawa",
"Kazutoshi",
""
],
[
"Bao",
"Shan",
""
],
[
"LeBlanc",
"David J",
""
],
[
"Pan",
"Christopher S",
""
]
] | The behaviors of heavy vehicles drivers in mandatory and discretionary lane changes are analyzed in this paper. 640 mandatory and 2,035 discretionary lane change events were extracted from a naturalistic driving database. Variations in gap acceptance and lane change duration were investigated. Statistical analysis show... |
2005.12517 | Makoto Naruse | Daijiro Koyama, Yunzhuo Wang, Nobuyasu Shiga, Satoshi Yasuda, Nicolas
Chauvet, Makoto Naruse | Information transfer based on precision time synchronization via
wireless interferometry | null | null | null | null | cs.NI nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The growing demand of high-bandwidth and low-latency information transfer in
information and communication technologies such as data centres and in-vehicle
networks has increased the importance of optical communication networks in
recent years. However, complicated arbitration schemes can impose significant
overheads... | [
{
"created": "Tue, 26 May 2020 05:20:52 GMT",
"version": "v1"
}
] | 2020-05-27 | [
[
"Koyama",
"Daijiro",
""
],
[
"Wang",
"Yunzhuo",
""
],
[
"Shiga",
"Nobuyasu",
""
],
[
"Yasuda",
"Satoshi",
""
],
[
"Chauvet",
"Nicolas",
""
],
[
"Naruse",
"Makoto",
""
]
] | The growing demand of high-bandwidth and low-latency information transfer in information and communication technologies such as data centres and in-vehicle networks has increased the importance of optical communication networks in recent years. However, complicated arbitration schemes can impose significant overheads i... |
2308.15684 | Kanata Suzuki | Kazuki Hori, Kanata Suzuki, Tetsuya Ogata | Interactively Robot Action Planning with Uncertainty Analysis and Active
Questioning by Large Language Model | 7 pages, 6 figures, accepted at SII 2024 | null | null | null | cs.RO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The application of the Large Language Model (LLM) to robot action planning
has been actively studied. The instructions given to the LLM by natural
language may include ambiguity and lack of information depending on the task
context. It is possible to adjust the output of LLM by making the instruction
input more detai... | [
{
"created": "Wed, 30 Aug 2023 00:54:44 GMT",
"version": "v1"
},
{
"created": "Wed, 18 Oct 2023 13:31:49 GMT",
"version": "v2"
}
] | 2023-10-19 | [
[
"Hori",
"Kazuki",
""
],
[
"Suzuki",
"Kanata",
""
],
[
"Ogata",
"Tetsuya",
""
]
] | The application of the Large Language Model (LLM) to robot action planning has been actively studied. The instructions given to the LLM by natural language may include ambiguity and lack of information depending on the task context. It is possible to adjust the output of LLM by making the instruction input more detaile... |
2206.15025 | Hongchang Gao | Hongchang Gao, Bin Gu, My T. Thai | On the Convergence of Distributed Stochastic Bilevel Optimization
Algorithms over a Network | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bilevel optimization has been applied to a wide variety of machine learning
models, and numerous stochastic bilevel optimization algorithms have been
developed in recent years. However, most existing algorithms restrict their
focus on the single-machine setting so that they are incapable of handling the
distributed d... | [
{
"created": "Thu, 30 Jun 2022 05:29:52 GMT",
"version": "v1"
},
{
"created": "Mon, 27 Mar 2023 16:09:27 GMT",
"version": "v2"
}
] | 2023-03-28 | [
[
"Gao",
"Hongchang",
""
],
[
"Gu",
"Bin",
""
],
[
"Thai",
"My T.",
""
]
] | Bilevel optimization has been applied to a wide variety of machine learning models, and numerous stochastic bilevel optimization algorithms have been developed in recent years. However, most existing algorithms restrict their focus on the single-machine setting so that they are incapable of handling the distributed dat... |
2406.13922 | Feng Ye | Feng Ye, Xiaohu You, Jiamin Li, Chuan Zhang, Chen Ji | Explicit Performance Bound of Finite Blocklength Coded MIMO: Time-Domain
versus Spatiotemporal Channel Coding | 9 pages, 5 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the sixth generation (6G), ultra-reliable low-latency communications
(URLLC) will further develop to achieve TKu extreme connectivity, and
multiple-input multiple-output (MIMO) is expected to be a key enabler for its
realization. Since the latency constraint can be represented by the blocklength
of a codeword, it ... | [
{
"created": "Thu, 20 Jun 2024 01:41:57 GMT",
"version": "v1"
}
] | 2024-06-21 | [
[
"Ye",
"Feng",
""
],
[
"You",
"Xiaohu",
""
],
[
"Li",
"Jiamin",
""
],
[
"Zhang",
"Chuan",
""
],
[
"Ji",
"Chen",
""
]
] | In the sixth generation (6G), ultra-reliable low-latency communications (URLLC) will further develop to achieve TKu extreme connectivity, and multiple-input multiple-output (MIMO) is expected to be a key enabler for its realization. Since the latency constraint can be represented by the blocklength of a codeword, it is... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.