id
stringlengths
9
10
submitter
stringlengths
1
64
authors
stringlengths
4
20.7k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
404
doi
stringlengths
11
153
report-no
stringlengths
2
254
categories
stringlengths
5
98
license
stringclasses
9 values
orig_abstract
stringlengths
14
3.35k
versions
listlengths
1
60
update_date
stringlengths
10
10
authors_parsed
listlengths
1
1.35k
abstract
stringlengths
11
3.34k
2210.15731
Domenico Tortorella
Domenico Tortorella, Alessio Micheli
Beyond Homophily with Graph Echo State Networks
Accepted for oral presentation at ESANN 2022
Proceedings of the 30th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2022), pp. 491-496
10.14428/esann/2022.ES2022-58
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph Echo State Networks (GESN) have already demonstrated their efficacy and efficiency in graph classification tasks. However, semi-supervised node classification brought out the problem of over-smoothing in end-to-end trained deep models, which causes a bias towards high homophily graphs. We evaluate for the first...
[ { "created": "Thu, 27 Oct 2022 19:25:56 GMT", "version": "v1" } ]
2022-10-31
[ [ "Tortorella", "Domenico", "" ], [ "Micheli", "Alessio", "" ] ]
Graph Echo State Networks (GESN) have already demonstrated their efficacy and efficiency in graph classification tasks. However, semi-supervised node classification brought out the problem of over-smoothing in end-to-end trained deep models, which causes a bias towards high homophily graphs. We evaluate for the first t...
2404.00494
Nathaniel Dennler
Nathaniel S. Dennler, Mina Kian, Stefanos Nikolaidis, and Maja Matari\'c
Designing Robot Identity: The Role of Voice, Clothing, and Task on Robot Gender Perception
null
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
Perceptions of gender are a significant aspect of human-human interaction, and gender has wide-reaching social implications for robots deployed in contexts where they are expected to interact with humans. This work explored two flexible modalities for communicating gender in robots--voice and appearance--and we studi...
[ { "created": "Sat, 30 Mar 2024 23:27:39 GMT", "version": "v1" } ]
2024-04-02
[ [ "Dennler", "Nathaniel S.", "" ], [ "Kian", "Mina", "" ], [ "Nikolaidis", "Stefanos", "" ], [ "Matarić", "Maja", "" ] ]
Perceptions of gender are a significant aspect of human-human interaction, and gender has wide-reaching social implications for robots deployed in contexts where they are expected to interact with humans. This work explored two flexible modalities for communicating gender in robots--voice and appearance--and we studied...
2002.03736
Yaozu Ye
Yaozu Ye, Kailun Yang, Kaite Xiang, Juan Wang and Kaiwei Wang
Universal Semantic Segmentation for Fisheye Urban Driving Images
SMC2020 recieved
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Semantic segmentation is a critical method in the field of autonomous driving. When performing semantic image segmentation, a wider field of view (FoV) helps to obtain more information about the surrounding environment, making automatic driving safer and more reliable, which could be offered by fisheye cameras. Howev...
[ { "created": "Fri, 31 Jan 2020 11:19:00 GMT", "version": "v1" }, { "created": "Mon, 24 Aug 2020 13:02:09 GMT", "version": "v2" } ]
2020-08-25
[ [ "Ye", "Yaozu", "" ], [ "Yang", "Kailun", "" ], [ "Xiang", "Kaite", "" ], [ "Wang", "Juan", "" ], [ "Wang", "Kaiwei", "" ] ]
Semantic segmentation is a critical method in the field of autonomous driving. When performing semantic image segmentation, a wider field of view (FoV) helps to obtain more information about the surrounding environment, making automatic driving safer and more reliable, which could be offered by fisheye cameras. However...
2001.01469
Vishwanath D
Shubham Paliwal, Vishwanath D, Rohit Rahul, Monika Sharma, Lovekesh Vig
TableNet: Deep Learning model for end-to-end Table detection and Tabular data extraction from Scanned Document Images
null
null
null
null
cs.CV cs.LG eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the widespread use of mobile phones and scanners to photograph and upload documents, the need for extracting the information trapped in unstructured document images such as retail receipts, insurance claim forms and financial invoices is becoming more acute. A major hurdle to this objective is that these images ...
[ { "created": "Mon, 6 Jan 2020 10:25:32 GMT", "version": "v1" } ]
2020-01-07
[ [ "Paliwal", "Shubham", "" ], [ "D", "Vishwanath", "" ], [ "Rahul", "Rohit", "" ], [ "Sharma", "Monika", "" ], [ "Vig", "Lovekesh", "" ] ]
With the widespread use of mobile phones and scanners to photograph and upload documents, the need for extracting the information trapped in unstructured document images such as retail receipts, insurance claim forms and financial invoices is becoming more acute. A major hurdle to this objective is that these images of...
1912.12214
Tin Huynh Van
Tin Van Huynh, Kiet Van Nguyen, Ngan Luu-Thuy Nguyen, Anh Gia-Tuan Nguyen
Job Prediction: From Deep Neural Network Models to Applications
Accepted by IEEE RIVF 2020 Conference
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
Determining the job is suitable for a student or a person looking for work based on their job's descriptions such as knowledge and skills that are difficult, as well as how employers must find ways to choose the candidates that match the job they require. In this paper, we focus on studying the job prediction using d...
[ { "created": "Fri, 27 Dec 2019 16:13:43 GMT", "version": "v1" }, { "created": "Fri, 31 Jan 2020 09:36:49 GMT", "version": "v2" } ]
2020-02-03
[ [ "Van Huynh", "Tin", "" ], [ "Van Nguyen", "Kiet", "" ], [ "Nguyen", "Ngan Luu-Thuy", "" ], [ "Nguyen", "Anh Gia-Tuan", "" ] ]
Determining the job is suitable for a student or a person looking for work based on their job's descriptions such as knowledge and skills that are difficult, as well as how employers must find ways to choose the candidates that match the job they require. In this paper, we focus on studying the job prediction using dif...
1912.02820
Vikram Sharma
Prashant Batra, Vikram Sharma
Complexity of a Root Clustering Algorithm
52 pages, 1 figure
null
null
null
cs.DS cs.CC cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Approximating the roots of a holomorphic function in an input box is a fundamental problem in many domains. Most algorithms in the literature for solving this problem are conditional, i.e., they make some simplifying assumptions, such as, all the roots are simple or there are no roots on the boundary of the input box...
[ { "created": "Thu, 5 Dec 2019 08:59:16 GMT", "version": "v1" } ]
2019-12-09
[ [ "Batra", "Prashant", "" ], [ "Sharma", "Vikram", "" ] ]
Approximating the roots of a holomorphic function in an input box is a fundamental problem in many domains. Most algorithms in the literature for solving this problem are conditional, i.e., they make some simplifying assumptions, such as, all the roots are simple or there are no roots on the boundary of the input box, ...
2311.04924
Andrej Lucny
Andrej Lucny, Pavel Petrovic
Tuning-less Object Naming with a Foundation Model
This work was funded (or co-funded) by the Horizon-Widera-2021 European Twinning project TERAIS G.A. n. 101079338 World Symposium on Digital Intelligence for Systems and Machines (DISA2023), Kosice, September 21-22, 2023 citations: https://ieeexplore.ieee.org/document/10308905 codes: https://github.com/andylucn...
2023 World Symposium on Digital Intelligence for Systems and Machines (DISA) https://ieeexplore.ieee.org/xpl/conhome/10308901/proceeding pages 154-160
10.1109/DISA59116.2023
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
We implement a real-time object naming system that enables learning a set of named entities never seen. Our approach employs an existing foundation model that we consider ready to see anything before starting. It turns seen images into relatively small feature vectors that we associate with index to a gradually built...
[ { "created": "Fri, 3 Nov 2023 09:11:49 GMT", "version": "v1" }, { "created": "Mon, 26 Feb 2024 13:08:43 GMT", "version": "v2" } ]
2024-02-27
[ [ "Lucny", "Andrej", "" ], [ "Petrovic", "Pavel", "" ] ]
We implement a real-time object naming system that enables learning a set of named entities never seen. Our approach employs an existing foundation model that we consider ready to see anything before starting. It turns seen images into relatively small feature vectors that we associate with index to a gradually built v...
1209.3356
Rajkumar Buyya
Rajkumar Buyya, Rodrigo N. Calheiros, and Xiaorong Li
Autonomic Cloud Computing: Open Challenges and Architectural Elements
8 pages, 6 figures, conference keynote paper
Proceedings of the Third International Conference of Emerging Applications of Information Technology (EAIT 2012, IEEE Press, USA), Kolkata, India, November 29-December 01, 2012
10.1109/EAIT.2012.6407847
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As Clouds are complex, large-scale, and heterogeneous distributed systems, management of their resources is a challenging task. They need automated and integrated intelligent strategies for provisioning of resources to offer services that are secure, reliable, and cost-efficient. Hence, effective management of servic...
[ { "created": "Sat, 15 Sep 2012 04:40:46 GMT", "version": "v1" } ]
2016-11-17
[ [ "Buyya", "Rajkumar", "" ], [ "Calheiros", "Rodrigo N.", "" ], [ "Li", "Xiaorong", "" ] ]
As Clouds are complex, large-scale, and heterogeneous distributed systems, management of their resources is a challenging task. They need automated and integrated intelligent strategies for provisioning of resources to offer services that are secure, reliable, and cost-efficient. Hence, effective management of services...
1706.05476
Zijian Li
Zijian Li, Xun Jian, Xiang Lian, Lei Chen
An Efficient Probabilistic Approach for Graph Similarity Search
null
null
null
null
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph similarity search is a common and fundamental operation in graph databases. One of the most popular graph similarity measures is the Graph Edit Distance (GED) mainly because of its broad applicability and high interpretability. Despite its prevalence, exact GED computation is proved to be NP-hard, which could r...
[ { "created": "Sat, 17 Jun 2017 05:25:10 GMT", "version": "v1" }, { "created": "Tue, 23 Jan 2018 19:42:42 GMT", "version": "v2" } ]
2018-01-25
[ [ "Li", "Zijian", "" ], [ "Jian", "Xun", "" ], [ "Lian", "Xiang", "" ], [ "Chen", "Lei", "" ] ]
Graph similarity search is a common and fundamental operation in graph databases. One of the most popular graph similarity measures is the Graph Edit Distance (GED) mainly because of its broad applicability and high interpretability. Despite its prevalence, exact GED computation is proved to be NP-hard, which could res...
2302.11506
Pranav Kadam
Pranav Kadam, Hardik Prajapati, Min Zhang, Jintang Xue, Shan Liu, C.-C. Jay Kuo
S3I-PointHop: SO(3)-Invariant PointHop for 3D Point Cloud Classification
5 pages, 3 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many point cloud classification methods are developed under the assumption that all point clouds in the dataset are well aligned with the canonical axes so that the 3D Cartesian point coordinates can be employed to learn features. When input point clouds are not aligned, the classification performance drops significa...
[ { "created": "Wed, 22 Feb 2023 17:23:33 GMT", "version": "v1" } ]
2023-02-23
[ [ "Kadam", "Pranav", "" ], [ "Prajapati", "Hardik", "" ], [ "Zhang", "Min", "" ], [ "Xue", "Jintang", "" ], [ "Liu", "Shan", "" ], [ "Kuo", "C. -C. Jay", "" ] ]
Many point cloud classification methods are developed under the assumption that all point clouds in the dataset are well aligned with the canonical axes so that the 3D Cartesian point coordinates can be employed to learn features. When input point clouds are not aligned, the classification performance drops significant...
2203.10789
Junbum Cha
Junbum Cha, Kyungjae Lee, Sungrae Park, Sanghyuk Chun
Domain Generalization by Mutual-Information Regularization with Pre-trained Models
ECCV 2022 camera-ready
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Domain generalization (DG) aims to learn a generalized model to an unseen target domain using only limited source domains. Previous attempts to DG fail to learn domain-invariant representations only from the source domains due to the significant domain shifts between training and test domains. Instead, we re-formulat...
[ { "created": "Mon, 21 Mar 2022 08:07:46 GMT", "version": "v1" }, { "created": "Fri, 22 Jul 2022 06:16:48 GMT", "version": "v2" } ]
2022-07-25
[ [ "Cha", "Junbum", "" ], [ "Lee", "Kyungjae", "" ], [ "Park", "Sungrae", "" ], [ "Chun", "Sanghyuk", "" ] ]
Domain generalization (DG) aims to learn a generalized model to an unseen target domain using only limited source domains. Previous attempts to DG fail to learn domain-invariant representations only from the source domains due to the significant domain shifts between training and test domains. Instead, we re-formulate ...
2012.11153
Xavier Porte
Xavier Porte, Anas Skalli, Nasibeh Haghighi, Stephan Reitzenstein, James A. Lott, Daniel Brunner
A complete, parallel and autonomous photonic neural network in a semiconductor multimode laser
16 pages, 4 figures
null
null
null
cs.NE cs.ET cs.LG physics.optics
http://creativecommons.org/licenses/by/4.0/
Neural networks are one of the disruptive computing concepts of our time. However, they fundamentally differ from classical, algorithmic computing in a number of fundamental aspects. These differences result in equally fundamental, severe and relevant challenges for neural network computing using current computing su...
[ { "created": "Mon, 21 Dec 2020 07:03:43 GMT", "version": "v1" } ]
2020-12-22
[ [ "Porte", "Xavier", "" ], [ "Skalli", "Anas", "" ], [ "Haghighi", "Nasibeh", "" ], [ "Reitzenstein", "Stephan", "" ], [ "Lott", "James A.", "" ], [ "Brunner", "Daniel", "" ] ]
Neural networks are one of the disruptive computing concepts of our time. However, they fundamentally differ from classical, algorithmic computing in a number of fundamental aspects. These differences result in equally fundamental, severe and relevant challenges for neural network computing using current computing subs...
2204.08332
Luo Ziwei
Ziwei Luo, Youwei Li, Shen Cheng, Lei Yu, Qi Wu, Zhihong Wen, Haoqiang Fan, Jian Sun, Shuaicheng Liu
BSRT: Improving Burst Super-Resolution with Swin Transformer and Flow-Guided Deformable Alignment
CVPRW, Winner method in NTIRE 2022 Burst Super-Resolution Challenge Real-World Track
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work addresses the Burst Super-Resolution (BurstSR) task using a new architecture, which requires restoring a high-quality image from a sequence of noisy, misaligned, and low-resolution RAW bursts. To overcome the challenges in BurstSR, we propose a Burst Super-Resolution Transformer (BSRT), which can significan...
[ { "created": "Mon, 18 Apr 2022 14:23:10 GMT", "version": "v1" }, { "created": "Fri, 22 Apr 2022 15:02:42 GMT", "version": "v2" } ]
2022-04-25
[ [ "Luo", "Ziwei", "" ], [ "Li", "Youwei", "" ], [ "Cheng", "Shen", "" ], [ "Yu", "Lei", "" ], [ "Wu", "Qi", "" ], [ "Wen", "Zhihong", "" ], [ "Fan", "Haoqiang", "" ], [ "Sun", "Jian", "" ], ...
This work addresses the Burst Super-Resolution (BurstSR) task using a new architecture, which requires restoring a high-quality image from a sequence of noisy, misaligned, and low-resolution RAW bursts. To overcome the challenges in BurstSR, we propose a Burst Super-Resolution Transformer (BSRT), which can significantl...
2103.06172
Sam Corbett-Davies
Chlo\'e Bakalar, Renata Barreto, Stevie Bergman, Miranda Bogen, Bobbie Chern, Sam Corbett-Davies, Melissa Hall, Isabel Kloumann, Michelle Lam, Joaquin Qui\~nonero Candela, Manish Raghavan, Joshua Simons, Jonathan Tannen, Edmund Tong, Kate Vredenburgh, Jiejing Zhao
Fairness On The Ground: Applying Algorithmic Fairness Approaches to Production Systems
12 pages, 2 figures
null
null
null
cs.LG cs.CY
http://creativecommons.org/licenses/by/4.0/
Many technical approaches have been proposed for ensuring that decisions made by machine learning systems are fair, but few of these proposals have been stress-tested in real-world systems. This paper presents an example of one team's approach to the challenge of applying algorithmic fairness approaches to complex pr...
[ { "created": "Wed, 10 Mar 2021 16:42:20 GMT", "version": "v1" }, { "created": "Wed, 24 Mar 2021 17:15:40 GMT", "version": "v2" } ]
2021-03-25
[ [ "Bakalar", "Chloé", "" ], [ "Barreto", "Renata", "" ], [ "Bergman", "Stevie", "" ], [ "Bogen", "Miranda", "" ], [ "Chern", "Bobbie", "" ], [ "Corbett-Davies", "Sam", "" ], [ "Hall", "Melissa", "" ], [ ...
Many technical approaches have been proposed for ensuring that decisions made by machine learning systems are fair, but few of these proposals have been stress-tested in real-world systems. This paper presents an example of one team's approach to the challenge of applying algorithmic fairness approaches to complex prod...
1510.06623
Rafael Dowsley
Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors
null
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The bounded storage model restricts the memory of an adversary in a cryptographic protocol, rather than restricting its computational power, making information theoretically secure protocols feasible. We present the first protocols for commitment and oblivious transfer in the bounded storage model with errors, i.e., ...
[ { "created": "Thu, 22 Oct 2015 13:44:12 GMT", "version": "v1" }, { "created": "Tue, 24 Oct 2017 15:36:27 GMT", "version": "v2" } ]
2017-10-25
[ [ "Dowsley", "Rafael", "" ], [ "Lacerda", "Felipe", "" ], [ "Nascimento", "Anderson C. A.", "" ] ]
The bounded storage model restricts the memory of an adversary in a cryptographic protocol, rather than restricting its computational power, making information theoretically secure protocols feasible. We present the first protocols for commitment and oblivious transfer in the bounded storage model with errors, i.e., th...
2010.01423
Merav Parter
Yael Hitron, Cameron Musco and Merav Parter
Spiking Neural Networks Through the Lens of Streaming Algorithms
To appear in DISC'20, shorten abstract
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We initiate the study of biological neural networks from the perspective of streaming algorithms. Like computers, human brains suffer from memory limitations which pose a significant obstacle when processing large scale and dynamically changing data. In computer science, these challenges are captured by the well-know...
[ { "created": "Sat, 3 Oct 2020 20:31:52 GMT", "version": "v1" } ]
2020-10-06
[ [ "Hitron", "Yael", "" ], [ "Musco", "Cameron", "" ], [ "Parter", "Merav", "" ] ]
We initiate the study of biological neural networks from the perspective of streaming algorithms. Like computers, human brains suffer from memory limitations which pose a significant obstacle when processing large scale and dynamically changing data. In computer science, these challenges are captured by the well-known ...
1811.00246
Jinwon An
Jinwon An, Sungwon Lyu, Sungzoon Cho
SARN: Relational Reasoning through Sequential Attention
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes an attention module augmented relational network called SARN(Sequential Attention Relational Network) that can carry out relational reasoning by extracting reference objects and making efficient pairing between objects. SARN greatly reduces the computational and memory requirements of the relation...
[ { "created": "Thu, 1 Nov 2018 05:45:43 GMT", "version": "v1" } ]
2018-11-02
[ [ "An", "Jinwon", "" ], [ "Lyu", "Sungwon", "" ], [ "Cho", "Sungzoon", "" ] ]
This paper proposes an attention module augmented relational network called SARN(Sequential Attention Relational Network) that can carry out relational reasoning by extracting reference objects and making efficient pairing between objects. SARN greatly reduces the computational and memory requirements of the relational...
2311.03016
Andrea Bombarda
Andrea Bombarda and Angelo Gargantini
Design, implementation, and validation of a benchmark generator for combinatorial interaction testing tools
null
null
10.1016/j.jss.2023.111920
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Combinatorial testing is a widely adopted technique for efficiently detecting faults in software. The quality of combinatorial test generators plays a crucial role in achieving effective test coverage. Evaluating combinatorial test generators remains a challenging task that requires diverse and representative benchma...
[ { "created": "Mon, 6 Nov 2023 10:44:48 GMT", "version": "v1" } ]
2023-12-19
[ [ "Bombarda", "Andrea", "" ], [ "Gargantini", "Angelo", "" ] ]
Combinatorial testing is a widely adopted technique for efficiently detecting faults in software. The quality of combinatorial test generators plays a crucial role in achieving effective test coverage. Evaluating combinatorial test generators remains a challenging task that requires diverse and representative benchmark...
1511.06316
Zinelabidine Boulkenafet Mr
Zinelabidine Boulkenafet, Jukka Komulainen, Abdenour Hadid
face anti-spoofing based on color texture analysis
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research on face spoofing detection has mainly been focused on analyzing the luminance of the face images, hence discarding the chrominance information which can be useful for discriminating fake faces from genuine ones. In this work, we propose a new face anti-spoofing method based on color texture analysis. We anal...
[ { "created": "Thu, 19 Nov 2015 19:28:20 GMT", "version": "v1" } ]
2015-11-20
[ [ "Boulkenafet", "Zinelabidine", "" ], [ "Komulainen", "Jukka", "" ], [ "Hadid", "Abdenour", "" ] ]
Research on face spoofing detection has mainly been focused on analyzing the luminance of the face images, hence discarding the chrominance information which can be useful for discriminating fake faces from genuine ones. In this work, we propose a new face anti-spoofing method based on color texture analysis. We analyz...
1405.7520
Gianluca Della Vedova
Paola Bonizzoni, Gianluca Della Vedova, Yuri Pirola, Marco Previtali, Raffaella Rizzi
An External-Memory Algorithm for String Graph Construction
null
null
null
null
cs.DS q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some recent results have introduced external-memory algorithms to compute self-indexes of a set of strings, mainly via computing the Burrows-Wheeler Transform (BWT) of the input strings. The motivations for those results stem from Bioinformatics, where a large number of short strings (called reads) are routinely prod...
[ { "created": "Thu, 29 May 2014 11:09:55 GMT", "version": "v1" }, { "created": "Thu, 11 Jun 2015 15:08:26 GMT", "version": "v2" } ]
2015-06-12
[ [ "Bonizzoni", "Paola", "" ], [ "Della Vedova", "Gianluca", "" ], [ "Pirola", "Yuri", "" ], [ "Previtali", "Marco", "" ], [ "Rizzi", "Raffaella", "" ] ]
Some recent results have introduced external-memory algorithms to compute self-indexes of a set of strings, mainly via computing the Burrows-Wheeler Transform (BWT) of the input strings. The motivations for those results stem from Bioinformatics, where a large number of short strings (called reads) are routinely produc...
2108.12189
Diego Molla Aliod
Diego Moll\'a, Urvashi Khanna, Dima Galat, Vincent Nguyen, Maciej Rybinski
Query-Focused Extractive Summarisation for Finding Ideal Answers to Biomedical and COVID-19 Questions
12 pages, 2 figures, 6 tables. Accepted at BioASQ workshop, CLEF 2021
null
null
null
cs.CL cs.IR
http://creativecommons.org/licenses/by/4.0/
This paper presents Macquarie University's participation to the BioASQ Synergy Task, and BioASQ9b Phase B. In each of these tasks, our participation focused on the use of query-focused extractive summarisation to obtain the ideal answers to medical questions. The Synergy Task is an end-to-end question answering task ...
[ { "created": "Fri, 27 Aug 2021 09:19:42 GMT", "version": "v1" }, { "created": "Tue, 31 Aug 2021 01:31:39 GMT", "version": "v2" } ]
2021-09-01
[ [ "Mollá", "Diego", "" ], [ "Khanna", "Urvashi", "" ], [ "Galat", "Dima", "" ], [ "Nguyen", "Vincent", "" ], [ "Rybinski", "Maciej", "" ] ]
This paper presents Macquarie University's participation to the BioASQ Synergy Task, and BioASQ9b Phase B. In each of these tasks, our participation focused on the use of query-focused extractive summarisation to obtain the ideal answers to medical questions. The Synergy Task is an end-to-end question answering task on...
1202.2465
Jierui Xie
Jierui Xie and Boleslaw K. Szymanski
Towards Linear Time Overlapping Community Detection in Social Networks
PAKDD 2012
Proc. 16th PAKDD Pacific-Asia Conference on Knowledge Discovery and Data Mining, Kuala Lumpur, Malaysia, 2012, Lecture Notes AI vol. 7302, Part II, Springer, Berlin, Germany, 2012, pp. 25-36
null
null
cs.SI cs.CY cs.DS physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Membership diversity is a characteristic aspect of social networks in which a person may belong to more than one social group. For this reason, discovering overlapping structures is necessary for realistic social analysis. In this paper, we present a fast algorithm1, called SLPA, for overlapping community detection i...
[ { "created": "Sat, 11 Feb 2012 20:07:45 GMT", "version": "v1" } ]
2013-05-15
[ [ "Xie", "Jierui", "" ], [ "Szymanski", "Boleslaw K.", "" ] ]
Membership diversity is a characteristic aspect of social networks in which a person may belong to more than one social group. For this reason, discovering overlapping structures is necessary for realistic social analysis. In this paper, we present a fast algorithm1, called SLPA, for overlapping community detection in ...
1807.04868
Suhad Faisal Behadili
Suhad Faisal Behadili, Cyrille Bertelle, Loay E. George
Human Mobility Patterns Modelling using CDRs
null
null
10.5121/iju.2016.7102
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The research objectives are exploring characteristics of human mobility patterns, subsequently modelling them mathematically depending on inter-event time and traveled distances parameters using CDRs (Call Detailed Records). The observations are obtained from Armada festival in France. Understanding, modelling and si...
[ { "created": "Thu, 12 Jul 2018 23:52:05 GMT", "version": "v1" } ]
2018-07-16
[ [ "Behadili", "Suhad Faisal", "" ], [ "Bertelle", "Cyrille", "" ], [ "George", "Loay E.", "" ] ]
The research objectives are exploring characteristics of human mobility patterns, subsequently modelling them mathematically depending on inter-event time and traveled distances parameters using CDRs (Call Detailed Records). The observations are obtained from Armada festival in France. Understanding, modelling and simu...
2406.15742
Alexander Lew
McCoy R. Becker, Alexander K. Lew, Xiaoyan Wang, Matin Ghavami, Mathieu Huot, Martin C. Rinard, Vikash K. Mansinghka
Probabilistic Programming with Programmable Variational Inference
null
PLDI 2024
10.1145/3656463
null
cs.PL cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Compared to the wide array of advanced Monte Carlo methods supported by modern probabilistic programming languages (PPLs), PPL support for variational inference (VI) is less developed: users are typically limited to a predefined selection of variational objectives and gradient estimators, which are implemented monoli...
[ { "created": "Sat, 22 Jun 2024 05:49:37 GMT", "version": "v1" } ]
2024-06-25
[ [ "Becker", "McCoy R.", "" ], [ "Lew", "Alexander K.", "" ], [ "Wang", "Xiaoyan", "" ], [ "Ghavami", "Matin", "" ], [ "Huot", "Mathieu", "" ], [ "Rinard", "Martin C.", "" ], [ "Mansinghka", "Vikash K.", "" ...
Compared to the wide array of advanced Monte Carlo methods supported by modern probabilistic programming languages (PPLs), PPL support for variational inference (VI) is less developed: users are typically limited to a predefined selection of variational objectives and gradient estimators, which are implemented monolith...
1703.04171
Oliver Gutsche
Oliver Gutsche (1), Matteo Cremonesi (1), Peter Elmer (2), Bo Jayatilaka (1), Jim Kowalkowski (1), Jim Pivarski (2), Saba Sehrish (1), Cristina Mantilla Surez (3), Alexey Svyatkovskiy (2), Nhan Tran (1) ((1) Fermi National Accelerator Laboratory, (2) Princeton University, (3) Fermi National Accelerator Laborato...
Big Data in HEP: A comprehensive use case study
Proceedings for 22nd International Conference on Computing in High Energy and Nuclear Physics (CHEP 2016)
null
10.1088/1742-6596/898/7/072012
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Experimental Particle Physics has been at the forefront of analyzing the worlds largest datasets for decades. The HEP community was the first to develop suitable software and computing tools for this task. In recent times, new toolkits and systems collectively called Big Data technologies have emerged to support the ...
[ { "created": "Sun, 12 Mar 2017 20:37:29 GMT", "version": "v1" } ]
2017-11-23
[ [ "Gutsche", "Oliver", "" ], [ "Cremonesi", "Matteo", "" ], [ "Elmer", "Peter", "" ], [ "Jayatilaka", "Bo", "" ], [ "Kowalkowski", "Jim", "" ], [ "Pivarski", "Jim", "" ], [ "Sehrish", "Saba", "" ], [ ...
Experimental Particle Physics has been at the forefront of analyzing the worlds largest datasets for decades. The HEP community was the first to develop suitable software and computing tools for this task. In recent times, new toolkits and systems collectively called Big Data technologies have emerged to support the an...
2404.13130
Jayasri Dontabhaktuni Prof
Sreeraj Rajan Warrier, D Sri Harshavardhan Reddy, Sriya Bada, Rohith Achampeta, Sebastian Uppapalli and Jayasri Dontabhaktuni
On-board classification of underwater images using hybrid classical-quantum CNN based method
null
null
null
null
cs.CV quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Underwater images taken from autonomous underwater vehicles (AUV's) often suffer from low light, high turbidity, poor contrast, motion-blur and excessive light scattering and hence require image enhancement techniques for object recognition. Machine learning methods are being increasingly used for object recognition ...
[ { "created": "Fri, 19 Apr 2024 18:34:52 GMT", "version": "v1" } ]
2024-04-23
[ [ "Warrier", "Sreeraj Rajan", "" ], [ "Reddy", "D Sri Harshavardhan", "" ], [ "Bada", "Sriya", "" ], [ "Achampeta", "Rohith", "" ], [ "Uppapalli", "Sebastian", "" ], [ "Dontabhaktuni", "Jayasri", "" ] ]
Underwater images taken from autonomous underwater vehicles (AUV's) often suffer from low light, high turbidity, poor contrast, motion-blur and excessive light scattering and hence require image enhancement techniques for object recognition. Machine learning methods are being increasingly used for object recognition un...
2404.07976
Zhiqiang Shen
Muxin Zhou and Zeyuan Yin and Shitong Shao and Zhiqiang Shen
Self-supervised Dataset Distillation: A Good Compression Is All You Need
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
Dataset distillation aims to compress information from a large-scale original dataset to a new compact dataset while striving to preserve the utmost degree of the original data informational essence. Previous studies have predominantly concentrated on aligning the intermediate statistics between the original and dist...
[ { "created": "Thu, 11 Apr 2024 17:56:40 GMT", "version": "v1" } ]
2024-04-12
[ [ "Zhou", "Muxin", "" ], [ "Yin", "Zeyuan", "" ], [ "Shao", "Shitong", "" ], [ "Shen", "Zhiqiang", "" ] ]
Dataset distillation aims to compress information from a large-scale original dataset to a new compact dataset while striving to preserve the utmost degree of the original data informational essence. Previous studies have predominantly concentrated on aligning the intermediate statistics between the original and distil...
1906.04034
Sebastien Gros Prof.
Sebastien Gros, Mario Zanon
Towards Safe Reinforcement Learning Using NMPC and Policy Gradients: Part II - Deterministic Case
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a methodology to deploy the deterministic policy gradient method, using actor-critic techniques, when the optimal policy is approximated using a parametric optimization problem, where safety is enforced via hard constraints. For continuous input space, imposing safety restrictions on the exp...
[ { "created": "Mon, 10 Jun 2019 14:45:03 GMT", "version": "v1" } ]
2019-06-11
[ [ "Gros", "Sebastien", "" ], [ "Zanon", "Mario", "" ] ]
In this paper, we present a methodology to deploy the deterministic policy gradient method, using actor-critic techniques, when the optimal policy is approximated using a parametric optimization problem, where safety is enforced via hard constraints. For continuous input space, imposing safety restrictions on the explo...
1509.01938
Katrin Kirchhoff
Katrin Kirchhoff, Bing Zhao, Wen Wang
Exploiting Out-of-Domain Data Sources for Dialectal Arabic Statistical Machine Translation
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Statistical machine translation for dialectal Arabic is characterized by a lack of data since data acquisition involves the transcription and translation of spoken language. In this study we develop techniques for extracting parallel data for one particular dialect of Arabic (Iraqi Arabic) from out-of-domain corpora ...
[ { "created": "Mon, 7 Sep 2015 07:54:17 GMT", "version": "v1" } ]
2015-09-08
[ [ "Kirchhoff", "Katrin", "" ], [ "Zhao", "Bing", "" ], [ "Wang", "Wen", "" ] ]
Statistical machine translation for dialectal Arabic is characterized by a lack of data since data acquisition involves the transcription and translation of spoken language. In this study we develop techniques for extracting parallel data for one particular dialect of Arabic (Iraqi Arabic) from out-of-domain corpora in...
1302.1575
Nevin Lianwen Zhang
Nevin Lianwen Zhang, Weihong Zhang
Fast Value Iteration for Goal-Directed Markov Decision Processes
Appears in Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence (UAI1997)
null
null
UAI-P-1997-PG-489-494
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Planning problems where effects of actions are non-deterministic can be modeled as Markov decision processes. Planning problems are usually goal-directed. This paper proposes several techniques for exploiting the goal-directedness to accelerate value iteration, a standard algorithm for solving Markov decision process...
[ { "created": "Wed, 6 Feb 2013 15:59:41 GMT", "version": "v1" } ]
2013-02-08
[ [ "Zhang", "Nevin Lianwen", "" ], [ "Zhang", "Weihong", "" ] ]
Planning problems where effects of actions are non-deterministic can be modeled as Markov decision processes. Planning problems are usually goal-directed. This paper proposes several techniques for exploiting the goal-directedness to accelerate value iteration, a standard algorithm for solving Markov decision processes...
2402.09113
Aditya Gilra
Reabetswe M. Nkhumise, Debabrota Basu, Tony J. Prescott, Aditya Gilra
Measuring Exploration in Reinforcement Learning via Optimal Transport in Policy Space
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Exploration is the key ingredient of reinforcement learning (RL) that determines the speed and success of learning. Here, we quantify and compare the amount of exploration and learning accomplished by a Reinforcement Learning (RL) algorithm. Specifically, we propose a novel measure, named Exploration Index, that quan...
[ { "created": "Wed, 14 Feb 2024 11:55:50 GMT", "version": "v1" } ]
2024-02-15
[ [ "Nkhumise", "Reabetswe M.", "" ], [ "Basu", "Debabrota", "" ], [ "Prescott", "Tony J.", "" ], [ "Gilra", "Aditya", "" ] ]
Exploration is the key ingredient of reinforcement learning (RL) that determines the speed and success of learning. Here, we quantify and compare the amount of exploration and learning accomplished by a Reinforcement Learning (RL) algorithm. Specifically, we propose a novel measure, named Exploration Index, that quanti...
1712.06302
Jose Oramas
Jose Oramas, Kaili Wang, Tinne Tuytelaars
Visual Explanation by Interpretation: Improving Visual Feedback Capabilities of Deep Neural Networks
Accepted at International Conference on Learning Representations (ICLR) 2019. Project website: http://homes.esat.kuleuven.be/~joramas/projects/visualExplanationByInterpretation
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interpretation and explanation of deep models is critical towards wide adoption of systems that rely on them. In this paper, we propose a novel scheme for both interpretation as well as explanation in which, given a pretrained model, we automatically identify internal features relevant for the set of classes consider...
[ { "created": "Mon, 18 Dec 2017 09:17:44 GMT", "version": "v1" }, { "created": "Tue, 22 May 2018 15:04:25 GMT", "version": "v2" }, { "created": "Fri, 8 Mar 2019 12:11:15 GMT", "version": "v3" } ]
2019-03-11
[ [ "Oramas", "Jose", "" ], [ "Wang", "Kaili", "" ], [ "Tuytelaars", "Tinne", "" ] ]
Interpretation and explanation of deep models is critical towards wide adoption of systems that rely on them. In this paper, we propose a novel scheme for both interpretation as well as explanation in which, given a pretrained model, we automatically identify internal features relevant for the set of classes considered...
2210.03948
Manne Pavan Reddy
Pavan Reddy M. and SaiDhiraj Amuru and Kiran Kuchi
Optimizing the Placement and Beamforming of RIS in Cellular Networks: A System-Level Modeling Perspective
null
null
null
null
cs.IT eess.SP math.IT
http://creativecommons.org/licenses/by/4.0/
In this letter, we present in detail the system-level modeling of reconfigurable intelligent surface (RIS)-assisted cellular systems by considering a 3-dimensional channel model between base station, RIS, and user. We prove that the optimal placement of RIS to achieve wider coverage is exactly opposite to the base st...
[ { "created": "Sat, 8 Oct 2022 07:33:54 GMT", "version": "v1" }, { "created": "Tue, 2 May 2023 17:41:09 GMT", "version": "v2" } ]
2023-05-03
[ [ "M.", "Pavan Reddy", "" ], [ "Amuru", "SaiDhiraj", "" ], [ "Kuchi", "Kiran", "" ] ]
In this letter, we present in detail the system-level modeling of reconfigurable intelligent surface (RIS)-assisted cellular systems by considering a 3-dimensional channel model between base station, RIS, and user. We prove that the optimal placement of RIS to achieve wider coverage is exactly opposite to the base stat...
2106.10464
Stanis{\l}aw Ka\'zmierczak
Stanis{\l}aw Ka\'zmierczak, Zofia Juszka, Piotr Fudalej, Jacek Ma\'ndziuk
Prediction of the facial growth direction with Machine Learning methods
null
null
null
null
cs.LG cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
First attempts of prediction of the facial growth (FG) direction were made over half of a century ago. Despite numerous attempts and elapsed time, a satisfactory method has not been established yet and the problem still poses a challenge for medical experts. To our knowledge, this paper is the first Machine Learning ...
[ { "created": "Sat, 19 Jun 2021 10:12:12 GMT", "version": "v1" } ]
2021-06-22
[ [ "Kaźmierczak", "Stanisław", "" ], [ "Juszka", "Zofia", "" ], [ "Fudalej", "Piotr", "" ], [ "Mańdziuk", "Jacek", "" ] ]
First attempts of prediction of the facial growth (FG) direction were made over half of a century ago. Despite numerous attempts and elapsed time, a satisfactory method has not been established yet and the problem still poses a challenge for medical experts. To our knowledge, this paper is the first Machine Learning ap...
1709.10008
Valentin Touzeau
Valentin Touzeau (1), Claire Ma\"iza (1), David Monniaux (1), Jan Reineke (2) ((1) VERIMAG-IMAG, (2) Saarland University)
Ascertaining Uncertainty for Efficient Exact Cache Analysis
null
Rupak Majumdar; Viktor Kuncak. Computer Aided Verification - 29th International Conference, Jul 2017, Heidelberg, France. Springer, 10427 (2), pp.20 - 40, 2017, Lecture notes in computer science. http://cavconference.org/2017/
10.1007/978-3-319-63390-9_2
null
cs.PL cs.AR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Static cache analysis characterizes a program's cache behavior by determining in a sound but approximate manner which memory accesses result in cache hits and which result in cache misses. Such information is valuable in optimizing compilers, worst-case execution time analysis, and side-channel attack quantification ...
[ { "created": "Thu, 28 Sep 2017 15:05:54 GMT", "version": "v1" }, { "created": "Thu, 20 Dec 2018 08:38:34 GMT", "version": "v2" } ]
2021-08-23
[ [ "Touzeau", "Valentin", "", "VERIMAG-IMAG" ], [ "Maïza", "Claire", "", "VERIMAG-IMAG" ], [ "Monniaux", "David", "", "VERIMAG-IMAG" ], [ "Reineke", "Jan", "", "Saarland University" ] ]
Static cache analysis characterizes a program's cache behavior by determining in a sound but approximate manner which memory accesses result in cache hits and which result in cache misses. Such information is valuable in optimizing compilers, worst-case execution time analysis, and side-channel attack quantification an...
2106.14885
Anastasios Nentidis
Anastasios Nentidis, Georgios Katsimpras, Eirini Vandorou, Anastasia Krithara, Luis Gasco, Martin Krallinger, Georgios Paliouras
Overview of BioASQ 2021: The ninth BioASQ challenge on Large-Scale Biomedical Semantic Indexing and Question Answering
25 pages, 15 tables, 3 figures. arXiv admin note: text overlap with arXiv:2106.14618
Candan K.S. et al. (eds) Experimental IR Meets Multilinguality, Multimodality, and Interaction. CLEF 2021. Lecture Notes in Computer Science, vol 12880. Springer, Cham
10.1007/978-3-030-85251-1_18
null
cs.CL cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advancing the state-of-the-art in large-scale biomedical semantic indexing and question answering is the main focus of the BioASQ challenge. BioASQ organizes respective tasks where different teams develop systems that are evaluated on the same benchmark datasets that represent the real information needs of experts in...
[ { "created": "Mon, 28 Jun 2021 10:03:11 GMT", "version": "v1" } ]
2021-09-16
[ [ "Nentidis", "Anastasios", "" ], [ "Katsimpras", "Georgios", "" ], [ "Vandorou", "Eirini", "" ], [ "Krithara", "Anastasia", "" ], [ "Gasco", "Luis", "" ], [ "Krallinger", "Martin", "" ], [ "Paliouras", "Georgios...
Advancing the state-of-the-art in large-scale biomedical semantic indexing and question answering is the main focus of the BioASQ challenge. BioASQ organizes respective tasks where different teams develop systems that are evaluated on the same benchmark datasets that represent the real information needs of experts in t...
1411.3107
Xiaoqiang Ren
Xiaoqiang Ren, Jiming Chen, Karl H. Johansson and Ling Shi
Quickest Change Detection with a Censoring Sensor in the Minimax Setting
null
null
null
null
cs.SY cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of quickest change detection with a wireless sensor node is studied in this paper. The sensor that is deployed to monitor the environment has limited energy constraint to the classical quickest change detection problem. We consider the "censoring" strategy at the sensor side, i.e., the sensor selectively ...
[ { "created": "Wed, 12 Nov 2014 09:10:01 GMT", "version": "v1" } ]
2014-11-13
[ [ "Ren", "Xiaoqiang", "" ], [ "Chen", "Jiming", "" ], [ "Johansson", "Karl H.", "" ], [ "Shi", "Ling", "" ] ]
The problem of quickest change detection with a wireless sensor node is studied in this paper. The sensor that is deployed to monitor the environment has limited energy constraint to the classical quickest change detection problem. We consider the "censoring" strategy at the sensor side, i.e., the sensor selectively se...
2005.07926
Savvas Zannettou
Savvas Zannettou, Mai ElSherief, Elizabeth Belding, Shirin Nilizadeh, Gianluca Stringhini
Measuring and Characterizing Hate Speech on News Websites
Accepted at WebSci'20
null
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Web has become the main source for news acquisition. At the same time, news discussion has become more social: users can post comments on news articles or discuss news articles on other platforms like Reddit. These features empower and enable discussions among the users; however, they also act as the medium for t...
[ { "created": "Sat, 16 May 2020 09:59:01 GMT", "version": "v1" } ]
2020-05-19
[ [ "Zannettou", "Savvas", "" ], [ "ElSherief", "Mai", "" ], [ "Belding", "Elizabeth", "" ], [ "Nilizadeh", "Shirin", "" ], [ "Stringhini", "Gianluca", "" ] ]
The Web has become the main source for news acquisition. At the same time, news discussion has become more social: users can post comments on news articles or discuss news articles on other platforms like Reddit. These features empower and enable discussions among the users; however, they also act as the medium for the...
0804.1840
Sudhir Singh
Aditya Ramamoorthy, Vwani Roychowdhury, Sudhir Kumar Singh
Selfish Distributed Compression over Networks: Correlation Induces Anarchy
replaced with revised version, 32 pages, 2 figures
null
null
null
cs.GT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the min-cost multicast problem (under network coding) with multiple correlated sources where each terminal wants to losslessly reconstruct all the sources. We study the inefficiency brought forth by the selfish behavior of the terminals in this scenario by modeling it as a noncooperative game among the te...
[ { "created": "Fri, 11 Apr 2008 07:22:39 GMT", "version": "v1" }, { "created": "Sun, 1 Mar 2009 21:23:31 GMT", "version": "v2" } ]
2009-03-01
[ [ "Ramamoorthy", "Aditya", "" ], [ "Roychowdhury", "Vwani", "" ], [ "Singh", "Sudhir Kumar", "" ] ]
We consider the min-cost multicast problem (under network coding) with multiple correlated sources where each terminal wants to losslessly reconstruct all the sources. We study the inefficiency brought forth by the selfish behavior of the terminals in this scenario by modeling it as a noncooperative game among the term...
2401.15071
Zhenfei Yin
Chaochao Lu, Chen Qian, Guodong Zheng, Hongxing Fan, Hongzhi Gao, Jie Zhang, Jing Shao, Jingyi Deng, Jinlan Fu, Kexin Huang, Kunchang Li, Lijun Li, Limin Wang, Lu Sheng, Meiqi Chen, Ming Zhang, Qibing Ren, Sirui Chen, Tao Gui, Wanli Ouyang, Yali Wang, Yan Teng, Yaru Wang, Yi Wang, Yinan He, Yingchun Wang, Yixu ...
From GPT-4 to Gemini and Beyond: Assessing the Landscape of MLLMs on Generalizability, Trustworthiness and Causality through Four Modalities
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-modal Large Language Models (MLLMs) have shown impressive abilities in generating reasonable responses with respect to multi-modal contents. However, there is still a wide gap between the performance of recent MLLM-based applications and the expectation of the broad public, even though the most powerful OpenAI'...
[ { "created": "Fri, 26 Jan 2024 18:53:03 GMT", "version": "v1" }, { "created": "Mon, 29 Jan 2024 15:18:45 GMT", "version": "v2" } ]
2024-01-30
[ [ "Lu", "Chaochao", "" ], [ "Qian", "Chen", "" ], [ "Zheng", "Guodong", "" ], [ "Fan", "Hongxing", "" ], [ "Gao", "Hongzhi", "" ], [ "Zhang", "Jie", "" ], [ "Shao", "Jing", "" ], [ "Deng", "Jingyi...
Multi-modal Large Language Models (MLLMs) have shown impressive abilities in generating reasonable responses with respect to multi-modal contents. However, there is still a wide gap between the performance of recent MLLM-based applications and the expectation of the broad public, even though the most powerful OpenAI's ...
2306.11426
Ioannis Panopoulos
Ioannis Panopoulos, Sokratis Nikolaidis, Stylianos I. Venieris, Iakovos S. Venieris
Exploring the Performance and Efficiency of Transformer Models for NLP on Mobile Devices
Accepted at the 3rd IEEE International Workshop on Distributed Intelligent Systems (DistInSys), 2023
null
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep learning (DL) is characterised by its dynamic nature, with new deep neural network (DNN) architectures and approaches emerging every few years, driving the field's advancement. At the same time, the ever-increasing use of mobile devices (MDs) has resulted in a surge of DNN-based mobile applications. Although tra...
[ { "created": "Tue, 20 Jun 2023 10:15:01 GMT", "version": "v1" } ]
2023-07-25
[ [ "Panopoulos", "Ioannis", "" ], [ "Nikolaidis", "Sokratis", "" ], [ "Venieris", "Stylianos I.", "" ], [ "Venieris", "Iakovos S.", "" ] ]
Deep learning (DL) is characterised by its dynamic nature, with new deep neural network (DNN) architectures and approaches emerging every few years, driving the field's advancement. At the same time, the ever-increasing use of mobile devices (MDs) has resulted in a surge of DNN-based mobile applications. Although tradi...
1801.06267
Kevin Moran P
Mario Linares Vasquez, Kevin Moran, and Denys Poshyvanyk
Continuous, Evolutionary and Large-Scale: A New Perspective for Automated Mobile App Testing
12 pages, accepted to the Proceedings of 33rd IEEE International Conference on Software Maintenance and Evolution (ICSME'17)
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile app development involves a unique set of challenges including device fragmentation and rapidly evolving platforms, making testing a difficult task. The design space for a comprehensive mobile testing strategy includes features, inputs, potential contextual app states, and large combinations of devices and unde...
[ { "created": "Fri, 19 Jan 2018 01:58:56 GMT", "version": "v1" } ]
2018-01-22
[ [ "Vasquez", "Mario Linares", "" ], [ "Moran", "Kevin", "" ], [ "Poshyvanyk", "Denys", "" ] ]
Mobile app development involves a unique set of challenges including device fragmentation and rapidly evolving platforms, making testing a difficult task. The design space for a comprehensive mobile testing strategy includes features, inputs, potential contextual app states, and large combinations of devices and underl...
2106.13306
Dingwen Tao
Chengming Zhang, Sian Jin, Tong Geng, Jiannan Tian, Ang Li, Dingwen Tao
CEAZ: Accelerating Parallel I/O via Hardware-Algorithm Co-Designed Adaptive Lossy Compression
13 pages, 15 figures, 8 tables, accepted by ACM ICS '22
null
10.1145/3524059.3532362
null
cs.DC cs.NI
http://creativecommons.org/licenses/by/4.0/
As HPC systems continue to grow to exascale, the amount of data that needs to be saved or transmitted is exploding. To this end, many previous works have studied using error-bounded lossy compressors to reduce the data size and improve the I/O performance. However, little work has been done for effectively offloading...
[ { "created": "Thu, 24 Jun 2021 20:26:52 GMT", "version": "v1" }, { "created": "Sun, 3 Oct 2021 22:17:53 GMT", "version": "v2" }, { "created": "Fri, 13 May 2022 04:22:58 GMT", "version": "v3" } ]
2022-05-16
[ [ "Zhang", "Chengming", "" ], [ "Jin", "Sian", "" ], [ "Geng", "Tong", "" ], [ "Tian", "Jiannan", "" ], [ "Li", "Ang", "" ], [ "Tao", "Dingwen", "" ] ]
As HPC systems continue to grow to exascale, the amount of data that needs to be saved or transmitted is exploding. To this end, many previous works have studied using error-bounded lossy compressors to reduce the data size and improve the I/O performance. However, little work has been done for effectively offloading l...
1904.09029
Spyros Chatzivasileiadis
Jos\'e-Mar\'ia Hidalgo-Arteaga, Fiodar Hancharou, Florian Thams, Spyros Chatzivasileiadis
Deep Learning for Power System Security Assessment
Accepted at IEEE Powertech 2019, Milan, Italy
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security assessment is among the most fundamental functions of power system operator. The sheer complexity of power systems exceeding a few buses, however, makes it an extremely computationally demanding task. The emergence of deep learning methods that are able to handle immense amounts of data, and infer valuable i...
[ { "created": "Sun, 31 Mar 2019 20:07:44 GMT", "version": "v1" } ]
2019-04-22
[ [ "Hidalgo-Arteaga", "José-María", "" ], [ "Hancharou", "Fiodar", "" ], [ "Thams", "Florian", "" ], [ "Chatzivasileiadis", "Spyros", "" ] ]
Security assessment is among the most fundamental functions of power system operator. The sheer complexity of power systems exceeding a few buses, however, makes it an extremely computationally demanding task. The emergence of deep learning methods that are able to handle immense amounts of data, and infer valuable inf...
2306.16394
Zihan Zhang
Zihan Zhang and Qiaomin Xie
Sharper Model-free Reinforcement Learning for Average-reward Markov Decision Processes
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop several provably efficient model-free reinforcement learning (RL) algorithms for infinite-horizon average-reward Markov Decision Processes (MDPs). We consider both online setting and the setting with access to a simulator. In the online setting, we propose model-free RL algorithms based on reference-advant...
[ { "created": "Wed, 28 Jun 2023 17:43:19 GMT", "version": "v1" } ]
2023-06-29
[ [ "Zhang", "Zihan", "" ], [ "Xie", "Qiaomin", "" ] ]
We develop several provably efficient model-free reinforcement learning (RL) algorithms for infinite-horizon average-reward Markov Decision Processes (MDPs). We consider both online setting and the setting with access to a simulator. In the online setting, we propose model-free RL algorithms based on reference-advantag...
2406.12084
Yebowen Hu
Yebowen Hu, Kaiqiang Song, Sangwoo Cho, Xiaoyang Wang, Wenlin Yao, Hassan Foroosh, Dong Yu, Fei Liu
When Reasoning Meets Information Aggregation: A Case Study with Sports Narratives
null
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reasoning is most powerful when an LLM accurately aggregates relevant information. We examine the critical role of information aggregation in reasoning by requiring the LLM to analyze sports narratives. To succeed at this task, an LLM must infer points from actions, identify related entities, attribute points accurat...
[ { "created": "Mon, 17 Jun 2024 20:49:35 GMT", "version": "v1" } ]
2024-06-19
[ [ "Hu", "Yebowen", "" ], [ "Song", "Kaiqiang", "" ], [ "Cho", "Sangwoo", "" ], [ "Wang", "Xiaoyang", "" ], [ "Yao", "Wenlin", "" ], [ "Foroosh", "Hassan", "" ], [ "Yu", "Dong", "" ], [ "Liu", "Fei...
Reasoning is most powerful when an LLM accurately aggregates relevant information. We examine the critical role of information aggregation in reasoning by requiring the LLM to analyze sports narratives. To succeed at this task, an LLM must infer points from actions, identify related entities, attribute points accuratel...
2109.01254
Krishna Kant
Sanjeev Sondur and Krishna Kant
Performance Health Index for Complex Cyber Infrastructures
27 pages
null
null
null
cs.SE
http://creativecommons.org/licenses/by-nc-nd/4.0/
Most IT systems depend on a set of configuration variables (CVs), expressed as a name/value pair that collectively define the resource allocation for the system. While the ill-effects of misconfiguration or improper resource allocation are well-known, there is no effective a priori metric to quantify the impact of th...
[ { "created": "Fri, 3 Sep 2021 00:37:42 GMT", "version": "v1" } ]
2021-09-06
[ [ "Sondur", "Sanjeev", "" ], [ "Kant", "Krishna", "" ] ]
Most IT systems depend on a set of configuration variables (CVs), expressed as a name/value pair that collectively define the resource allocation for the system. While the ill-effects of misconfiguration or improper resource allocation are well-known, there is no effective a priori metric to quantify the impact of the ...
2010.04985
Marcel Dall'Agnol
Marcel Dall'Agnol, Tom Gur and Oded Lachish
A Structural Theorem for Local Algorithms with Applications to Coding, Testing, and Verification
null
SIAM J. Comput., 52 (2023), pp. 1413-1463
10.1137/21M1422781
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a general structural theorem for a wide family of local algorithms, which includes property testers, local decoders, and PCPs of proximity. Namely, we show that the structure of every algorithm that makes $q$ adaptive queries and satisfies a natural robustness condition admits a sample-based algorithm with $...
[ { "created": "Sat, 10 Oct 2020 12:46:42 GMT", "version": "v1" }, { "created": "Tue, 12 Dec 2023 16:00:36 GMT", "version": "v2" } ]
2023-12-13
[ [ "Dall'Agnol", "Marcel", "" ], [ "Gur", "Tom", "" ], [ "Lachish", "Oded", "" ] ]
We prove a general structural theorem for a wide family of local algorithms, which includes property testers, local decoders, and PCPs of proximity. Namely, we show that the structure of every algorithm that makes $q$ adaptive queries and satisfies a natural robustness condition admits a sample-based algorithm with $n^...
2206.13396
Brandon Trabucco
Brandon Trabucco, Gunnar Sigurdsson, Robinson Piramuthu, Gaurav S. Sukhatme, Ruslan Salakhutdinov
A Simple Approach for Visual Rearrangement: 3D Mapping and Semantic Search
Winner of the Rearrangement Challenge at CVPR 2022
null
null
null
cs.CV cs.AI cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Physically rearranging objects is an important capability for embodied agents. Visual room rearrangement evaluates an agent's ability to rearrange objects in a room to a desired goal based solely on visual input. We propose a simple yet effective method for this problem: (1) search for and map which objects need to b...
[ { "created": "Tue, 21 Jun 2022 02:33:57 GMT", "version": "v1" }, { "created": "Tue, 9 Aug 2022 20:47:35 GMT", "version": "v2" } ]
2022-08-11
[ [ "Trabucco", "Brandon", "" ], [ "Sigurdsson", "Gunnar", "" ], [ "Piramuthu", "Robinson", "" ], [ "Sukhatme", "Gaurav S.", "" ], [ "Salakhutdinov", "Ruslan", "" ] ]
Physically rearranging objects is an important capability for embodied agents. Visual room rearrangement evaluates an agent's ability to rearrange objects in a room to a desired goal based solely on visual input. We propose a simple yet effective method for this problem: (1) search for and map which objects need to be ...
1611.01962
Emmanuel Maggiori
Emmanuel Maggiori, Yuliya Tarabalka, Guillaume Charpiat and Pierre Alliez
High-Resolution Semantic Labeling with Convolutional Neural Networks
null
null
10.1109/TGRS.2017.2740362
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional neural networks (CNNs) have received increasing attention over the last few years. They were initially conceived for image categorization, i.e., the problem of assigning a semantic label to an entire input image. In this paper we address the problem of dense semantic labeling, which consists in assign...
[ { "created": "Mon, 7 Nov 2016 10:02:49 GMT", "version": "v1" } ]
2018-02-14
[ [ "Maggiori", "Emmanuel", "" ], [ "Tarabalka", "Yuliya", "" ], [ "Charpiat", "Guillaume", "" ], [ "Alliez", "Pierre", "" ] ]
Convolutional neural networks (CNNs) have received increasing attention over the last few years. They were initially conceived for image categorization, i.e., the problem of assigning a semantic label to an entire input image. In this paper we address the problem of dense semantic labeling, which consists in assigning ...
2303.09044
Soufiane Belharbi
Soufiane Belharbi, Shakeeb Murtaza, Marco Pedersoli, Ismail Ben Ayed, Luke McCaffrey, Eric Granger
CoLo-CAM: Class Activation Mapping for Object Co-Localization in Weakly-Labeled Unconstrained Videos
18 pages, 6 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Leveraging spatiotemporal information in videos is critical for weakly supervised video object localization (WSVOL) tasks. However, state-of-the-art methods only rely on visual and motion cues, while discarding discriminative information, making them susceptible to inaccurate localizations. Recently, discriminative m...
[ { "created": "Thu, 16 Mar 2023 02:29:53 GMT", "version": "v1" }, { "created": "Sat, 2 Sep 2023 00:01:48 GMT", "version": "v2" }, { "created": "Tue, 27 Feb 2024 06:24:31 GMT", "version": "v3" }, { "created": "Wed, 28 Feb 2024 13:53:28 GMT", "version": "v4" } ]
2024-02-29
[ [ "Belharbi", "Soufiane", "" ], [ "Murtaza", "Shakeeb", "" ], [ "Pedersoli", "Marco", "" ], [ "Ayed", "Ismail Ben", "" ], [ "McCaffrey", "Luke", "" ], [ "Granger", "Eric", "" ] ]
Leveraging spatiotemporal information in videos is critical for weakly supervised video object localization (WSVOL) tasks. However, state-of-the-art methods only rely on visual and motion cues, while discarding discriminative information, making them susceptible to inaccurate localizations. Recently, discriminative mod...
1911.08802
Gangxiang Shen
Shifeng Ding, Kevin X. Pan, Sanjay K. Bose, Qiong Zhang, and Gangxiang Shen
Blockchain-Assisted Spectrum Trading between Elastic Virtual Optical Networks
7 pages, 5 figures
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/4.0/
In communication networks, network virtualization can usually provide better capacity utilization and quality of service (QoS) than what can be achieved otherwise. However, conventional resource allocation for virtualized networks would still follow a fixed pattern based on the predicted capacity needs of the users, ...
[ { "created": "Wed, 20 Nov 2019 10:22:37 GMT", "version": "v1" } ]
2019-11-21
[ [ "Ding", "Shifeng", "" ], [ "Pan", "Kevin X.", "" ], [ "Bose", "Sanjay K.", "" ], [ "Zhang", "Qiong", "" ], [ "Shen", "Gangxiang", "" ] ]
In communication networks, network virtualization can usually provide better capacity utilization and quality of service (QoS) than what can be achieved otherwise. However, conventional resource allocation for virtualized networks would still follow a fixed pattern based on the predicted capacity needs of the users, ev...
2407.09083
Zekai Xu
Zekai Xu, Kang You, Qinghai Guo, Xiang Wang and Zhezhi He
BKDSNN: Enhancing the Performance of Learning-based Spiking Neural Networks Training with Blurred Knowledge Distillation
accepted by European Conference on Computer Vision (ECCV) 2024
null
null
null
cs.NE
http://creativecommons.org/licenses/by/4.0/
Spiking neural networks (SNNs), which mimic biological neural system to convey information via discrete spikes, are well known as brain-inspired models with excellent computing efficiency. By utilizing the surrogate gradient estimation for discrete spikes, learning-based SNN training methods that can achieve ultra-lo...
[ { "created": "Fri, 12 Jul 2024 08:17:24 GMT", "version": "v1" }, { "created": "Mon, 15 Jul 2024 02:19:34 GMT", "version": "v2" } ]
2024-07-16
[ [ "Xu", "Zekai", "" ], [ "You", "Kang", "" ], [ "Guo", "Qinghai", "" ], [ "Wang", "Xiang", "" ], [ "He", "Zhezhi", "" ] ]
Spiking neural networks (SNNs), which mimic biological neural system to convey information via discrete spikes, are well known as brain-inspired models with excellent computing efficiency. By utilizing the surrogate gradient estimation for discrete spikes, learning-based SNN training methods that can achieve ultra-low ...
1607.05447
Stephen Gould
Stephen Gould and Basura Fernando and Anoop Cherian and Peter Anderson and Rodrigo Santa Cruz and Edison Guo
On Differentiating Parameterized Argmin and Argmax Problems with Application to Bi-level Optimization
16 pages, 6 figures
null
null
null
cs.CV math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some recent works in machine learning and computer vision involve the solution of a bi-level optimization problem. Here the solution of a parameterized lower-level problem binds variables that appear in the objective of an upper-level problem. The lower-level problem typically appears as an argmin or argmax optimizat...
[ { "created": "Tue, 19 Jul 2016 08:09:30 GMT", "version": "v1" }, { "created": "Thu, 21 Jul 2016 03:43:35 GMT", "version": "v2" } ]
2016-07-22
[ [ "Gould", "Stephen", "" ], [ "Fernando", "Basura", "" ], [ "Cherian", "Anoop", "" ], [ "Anderson", "Peter", "" ], [ "Cruz", "Rodrigo Santa", "" ], [ "Guo", "Edison", "" ] ]
Some recent works in machine learning and computer vision involve the solution of a bi-level optimization problem. Here the solution of a parameterized lower-level problem binds variables that appear in the objective of an upper-level problem. The lower-level problem typically appears as an argmin or argmax optimizatio...
2306.15612
Peng Xu
Peng Xu, Zhiyu Xiang, Chenyu Qiao, Jingyun Fu, Tianyu Pu
Adaptive Multi-Modal Cross-Entropy Loss for Stereo Matching
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the great success of deep learning in stereo matching, recovering accurate disparity maps is still challenging. Currently, L1 and cross-entropy are the two most widely used losses for stereo network training. Compared with the former, the latter usually performs better thanks to its probability modeling and d...
[ { "created": "Tue, 27 Jun 2023 16:53:35 GMT", "version": "v1" }, { "created": "Fri, 15 Mar 2024 10:04:38 GMT", "version": "v2" } ]
2024-03-18
[ [ "Xu", "Peng", "" ], [ "Xiang", "Zhiyu", "" ], [ "Qiao", "Chenyu", "" ], [ "Fu", "Jingyun", "" ], [ "Pu", "Tianyu", "" ] ]
Despite the great success of deep learning in stereo matching, recovering accurate disparity maps is still challenging. Currently, L1 and cross-entropy are the two most widely used losses for stereo network training. Compared with the former, the latter usually performs better thanks to its probability modeling and dir...
2405.09355
Gary Sarwin
Gary Sarwin, Alessandro Carretta, Victor Staartjes, Matteo Zoli, Diego Mazzatenta, Luca Regli, Carlo Serra, Ender Konukoglu
Vision-Based Neurosurgical Guidance: Unsupervised Localization and Camera-Pose Prediction
Early Accept at MICCAI 2024
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Localizing oneself during endoscopic procedures can be problematic due to the lack of distinguishable textures and landmarks, as well as difficulties due to the endoscopic device such as a limited field of view and challenging lighting conditions. Expert knowledge shaped by years of experience is required for localiz...
[ { "created": "Wed, 15 May 2024 14:09:11 GMT", "version": "v1" } ]
2024-05-16
[ [ "Sarwin", "Gary", "" ], [ "Carretta", "Alessandro", "" ], [ "Staartjes", "Victor", "" ], [ "Zoli", "Matteo", "" ], [ "Mazzatenta", "Diego", "" ], [ "Regli", "Luca", "" ], [ "Serra", "Carlo", "" ], [ ...
Localizing oneself during endoscopic procedures can be problematic due to the lack of distinguishable textures and landmarks, as well as difficulties due to the endoscopic device such as a limited field of view and challenging lighting conditions. Expert knowledge shaped by years of experience is required for localizat...
2006.15904
Hazel Murray
Hazel Murray and David Malone
Multi-armed bandit approach to password guessing
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The multi-armed bandit is a mathematical interpretation of the problem a gambler faces when confronted with a number of different machines (bandits). The gambler wants to explore different machines to discover which machine offers the best rewards, but simultaneously wants to exploit the most profitable machine. A pa...
[ { "created": "Mon, 29 Jun 2020 09:50:55 GMT", "version": "v1" }, { "created": "Wed, 22 Jul 2020 10:43:50 GMT", "version": "v2" }, { "created": "Wed, 5 Aug 2020 16:59:09 GMT", "version": "v3" } ]
2020-08-06
[ [ "Murray", "Hazel", "" ], [ "Malone", "David", "" ] ]
The multi-armed bandit is a mathematical interpretation of the problem a gambler faces when confronted with a number of different machines (bandits). The gambler wants to explore different machines to discover which machine offers the best rewards, but simultaneously wants to exploit the most profitable machine. A pass...
2206.03487
Evgenii Vityaev
E.E. Vityaev, A.G. Kolonin, A.V. Kurpatov A.A. Molchanov
Formalization of the principles of brain Programming (Brain Principles Programming)
28 pages, in Russian, 4 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the monograph "Strong artificial intelligence. On the Approaches to Superintelligence" contains an overview of general artificial intelligence (AGI). As an anthropomorphic research area, it includes Brain Principles Programming (BPP) -- the formalization of universal mechanisms (principles) of the brain work with ...
[ { "created": "Fri, 13 May 2022 13:16:34 GMT", "version": "v1" }, { "created": "Tue, 14 Jun 2022 13:45:08 GMT", "version": "v2" }, { "created": "Wed, 15 Jun 2022 02:26:12 GMT", "version": "v3" } ]
2022-06-16
[ [ "Vityaev", "E. E.", "" ], [ "Kolonin", "A. G.", "" ], [ "Molchanov", "A. V. Kurpatov A. A.", "" ] ]
In the monograph "Strong artificial intelligence. On the Approaches to Superintelligence" contains an overview of general artificial intelligence (AGI). As an anthropomorphic research area, it includes Brain Principles Programming (BPP) -- the formalization of universal mechanisms (principles) of the brain work with in...
2402.01515
Chiwun Yang
Yichuan Deng, Zhao Song, Chiwun Yang
Enhancing Stochastic Gradient Descent: A Unified Framework and Novel Acceleration Methods for Faster Convergence
null
null
null
null
cs.LG cs.AI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on SGD, previous works have proposed many algorithms that have improved convergence speed and generalization in stochastic optimization, such as SGDm, AdaGrad, Adam, etc. However, their convergence analysis under non-convex conditions is challenging. In this work, we propose a unified framework to address this ...
[ { "created": "Fri, 2 Feb 2024 15:55:25 GMT", "version": "v1" } ]
2024-02-05
[ [ "Deng", "Yichuan", "" ], [ "Song", "Zhao", "" ], [ "Yang", "Chiwun", "" ] ]
Based on SGD, previous works have proposed many algorithms that have improved convergence speed and generalization in stochastic optimization, such as SGDm, AdaGrad, Adam, etc. However, their convergence analysis under non-convex conditions is challenging. In this work, we propose a unified framework to address this is...
2108.10565
Sebastian Wolf
Sebastian Wolf and Martin Galis and Carsten Uphoff and Alice-Agnes Gabriel and Peter Moczo and David Gregor and Michael Bader
An Efficient ADER-DG Local Time Stepping Scheme for 3D HPC Simulation of Seismic Waves in Poroelastic Media
37 pages, 18 figures, published in the Journal of Computational Physics
Journal of Computational Physics: Volume 455, 2022
10.1016/j.jcp.2021.110886
null
cs.DC cs.MS physics.comp-ph physics.geo-ph
http://creativecommons.org/licenses/by-nc-nd/4.0/
Many applications from geosciences require simulations of seismic waves in porous media. Biot's theory of poroelasticity describes the coupling between solid and fluid phases and introduces a stiff source term, thereby increasing computational cost and motivating efficient methods utilising High-Performance Computing...
[ { "created": "Tue, 24 Aug 2021 08:04:13 GMT", "version": "v1" }, { "created": "Wed, 25 Aug 2021 07:14:38 GMT", "version": "v2" }, { "created": "Tue, 1 Mar 2022 08:30:49 GMT", "version": "v3" } ]
2022-03-02
[ [ "Wolf", "Sebastian", "" ], [ "Galis", "Martin", "" ], [ "Uphoff", "Carsten", "" ], [ "Gabriel", "Alice-Agnes", "" ], [ "Moczo", "Peter", "" ], [ "Gregor", "David", "" ], [ "Bader", "Michael", "" ] ]
Many applications from geosciences require simulations of seismic waves in porous media. Biot's theory of poroelasticity describes the coupling between solid and fluid phases and introduces a stiff source term, thereby increasing computational cost and motivating efficient methods utilising High-Performance Computing. ...
2107.05049
Attique Ur Rehman
TahirMohammadAli, Attique Ur Rehman, AliNawaz, Wasi Haider Butt
An Adaptive E-Learning System Using Justification Based Truth Maintenance System
null
Pakistan Journal of Engineering and Technology, Vol. 4, no. 2, June 2021, pp. 44-48
null
null
cs.SE
http://creativecommons.org/licenses/by-sa/4.0/
In most E learning systems educational activities are presented in a static way without bearing in mind the particulars or student levels and skills. Personalization and adaptation of an E learning management system are dependent on the flexibility of the system in providing different learning and content models to i...
[ { "created": "Sun, 11 Jul 2021 13:49:45 GMT", "version": "v1" } ]
2021-07-13
[ [ "TahirMohammadAli", "", "" ], [ "Rehman", "Attique Ur", "" ], [ "AliNawaz", "", "" ], [ "Butt", "Wasi Haider", "" ] ]
In most E learning systems educational activities are presented in a static way without bearing in mind the particulars or student levels and skills. Personalization and adaptation of an E learning management system are dependent on the flexibility of the system in providing different learning and content models to ind...
2307.02007
Liu Chenglong
Chenglong Liu
Remote Sensing Image Change Detection with Graph Interaction
null
null
null
null
cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern remote sensing image change detection has witnessed substantial advancements by harnessing the potent feature extraction capabilities of CNNs and Transforms.Yet,prevailing change detection techniques consistently prioritize extracting semantic features related to significant alterations,overlooking the viabili...
[ { "created": "Wed, 5 Jul 2023 03:32:49 GMT", "version": "v1" } ]
2023-07-06
[ [ "Liu", "Chenglong", "" ] ]
Modern remote sensing image change detection has witnessed substantial advancements by harnessing the potent feature extraction capabilities of CNNs and Transforms.Yet,prevailing change detection techniques consistently prioritize extracting semantic features related to significant alterations,overlooking the viability...
1410.0176
David Lillis
David Lillis, Rem Collier, Mauro Dragone, G. M. P. O'Hare
An Agent-Based Approach to Component Management
In Proceedings of the 8th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS '09), Budapest, Hungary, 2009
null
10.1145/1558013.1558086
null
cs.MA cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper details the implementation of a software framework that aids the development of distributed and self-configurable software systems. This framework is an instance of a novel integration strategy called SoSAA (SOcially Situated Agent Architecture), which combines Component-Based Software Engineering and Agen...
[ { "created": "Wed, 1 Oct 2014 10:55:44 GMT", "version": "v1" } ]
2014-10-02
[ [ "Lillis", "David", "" ], [ "Collier", "Rem", "" ], [ "Dragone", "Mauro", "" ], [ "O'Hare", "G. M. P.", "" ] ]
This paper details the implementation of a software framework that aids the development of distributed and self-configurable software systems. This framework is an instance of a novel integration strategy called SoSAA (SOcially Situated Agent Architecture), which combines Component-Based Software Engineering and Agent-...
2310.20425
Marcus Haywood-Alexander
Marcus Haywood-Alexander, Wei Liu, Kiran Bacsa, Zhilu Lai, Eleni Chatzi
Discussing the Spectrum of Physics-Enhanced Machine Learning; a Survey on Structural Mechanics Applications
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
The intersection of physics and machine learning has given rise to the physics-enhanced machine learning (PEML) paradigm, aiming to improve the capabilities and reduce the individual shortcomings of data- or physics-only methods. In this paper, the spectrum of physics-enhanced machine learning methods, expressed acro...
[ { "created": "Tue, 31 Oct 2023 12:50:25 GMT", "version": "v1" }, { "created": "Wed, 1 Nov 2023 08:21:02 GMT", "version": "v2" }, { "created": "Mon, 22 Apr 2024 11:42:02 GMT", "version": "v3" } ]
2024-04-23
[ [ "Haywood-Alexander", "Marcus", "" ], [ "Liu", "Wei", "" ], [ "Bacsa", "Kiran", "" ], [ "Lai", "Zhilu", "" ], [ "Chatzi", "Eleni", "" ] ]
The intersection of physics and machine learning has given rise to the physics-enhanced machine learning (PEML) paradigm, aiming to improve the capabilities and reduce the individual shortcomings of data- or physics-only methods. In this paper, the spectrum of physics-enhanced machine learning methods, expressed across...
2010.13972
Rory Mitchell
Rory Mitchell, Eibe Frank, Geoffrey Holmes
GPUTreeShap: Massively Parallel Exact Calculation of SHAP Scores for Tree Ensembles
null
null
null
null
cs.LG cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SHAP (SHapley Additive exPlanation) values provide a game theoretic interpretation of the predictions of machine learning models based on Shapley values. While exact calculation of SHAP values is computationally intractable in general, a recursive polynomial-time algorithm called TreeShap is available for decision tr...
[ { "created": "Tue, 27 Oct 2020 00:55:07 GMT", "version": "v1" }, { "created": "Mon, 19 Jul 2021 22:54:35 GMT", "version": "v2" }, { "created": "Thu, 3 Feb 2022 11:53:13 GMT", "version": "v3" } ]
2022-02-04
[ [ "Mitchell", "Rory", "" ], [ "Frank", "Eibe", "" ], [ "Holmes", "Geoffrey", "" ] ]
SHAP (SHapley Additive exPlanation) values provide a game theoretic interpretation of the predictions of machine learning models based on Shapley values. While exact calculation of SHAP values is computationally intractable in general, a recursive polynomial-time algorithm called TreeShap is available for decision tree...
1908.11527
Le Fang
Le Fang, Chunyuan Li, Jianfeng Gao, Wen Dong and Changyou Chen
Implicit Deep Latent Variable Models for Text Generation
13 pages, 8 Tables, 1 Figure, Accepted at 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019)
null
null
null
cs.LG cs.CL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep latent variable models (LVM) such as variational auto-encoder (VAE) have recently played an important role in text generation. One key factor is the exploitation of smooth latent structures to guide the generation. However, the representation power of VAEs is limited due to two reasons: (1) the Gaussian assumpti...
[ { "created": "Fri, 30 Aug 2019 04:12:08 GMT", "version": "v1" }, { "created": "Wed, 18 Sep 2019 05:48:05 GMT", "version": "v2" }, { "created": "Wed, 27 Nov 2019 19:53:57 GMT", "version": "v3" } ]
2019-12-02
[ [ "Fang", "Le", "" ], [ "Li", "Chunyuan", "" ], [ "Gao", "Jianfeng", "" ], [ "Dong", "Wen", "" ], [ "Chen", "Changyou", "" ] ]
Deep latent variable models (LVM) such as variational auto-encoder (VAE) have recently played an important role in text generation. One key factor is the exploitation of smooth latent structures to guide the generation. However, the representation power of VAEs is limited due to two reasons: (1) the Gaussian assumption...
2403.01427
Shangquan Sun
Shangquan Sun, Wenqi Ren, Jingzhi Li, Rui Wang and Xiaochun Cao
Logit Standardization in Knowledge Distillation
10 pages, 5 figures, accepted by The The IEEE / CVF Computer Vision and Pattern Recognition Conference (CVPR 2024)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge distillation involves transferring soft labels from a teacher to a student using a shared temperature-based softmax function. However, the assumption of a shared temperature between teacher and student implies a mandatory exact match between their logits in terms of logit range and variance. This side-effec...
[ { "created": "Sun, 3 Mar 2024 07:54:03 GMT", "version": "v1" } ]
2024-03-05
[ [ "Sun", "Shangquan", "" ], [ "Ren", "Wenqi", "" ], [ "Li", "Jingzhi", "" ], [ "Wang", "Rui", "" ], [ "Cao", "Xiaochun", "" ] ]
Knowledge distillation involves transferring soft labels from a teacher to a student using a shared temperature-based softmax function. However, the assumption of a shared temperature between teacher and student implies a mandatory exact match between their logits in terms of logit range and variance. This side-effect ...
1909.07654
Tomaso Fontanini
Tomaso Fontanini, Eleonora Iotti and Andrea Prati
MetalGAN: a Cluster-based Adaptive Training for Few-Shot Adversarial Colorization
null
null
null
null
cs.LG eess.IV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, the majority of works on deep-learning-based image colorization have focused on how to make a good use of the enormous datasets currently available. What about when the data at disposal are scarce? The main objective of this work is to prove that a network can be trained and can provide excellent col...
[ { "created": "Tue, 17 Sep 2019 08:54:12 GMT", "version": "v1" } ]
2019-09-18
[ [ "Fontanini", "Tomaso", "" ], [ "Iotti", "Eleonora", "" ], [ "Prati", "Andrea", "" ] ]
In recent years, the majority of works on deep-learning-based image colorization have focused on how to make a good use of the enormous datasets currently available. What about when the data at disposal are scarce? The main objective of this work is to prove that a network can be trained and can provide excellent color...
1701.01911
Nannan Wang
Nannan Wang and Xinbo Gao and Jie Li
Random Sampling for Fast Face Sketch Synthesis
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Exemplar-based face sketch synthesis plays an important role in both digital entertainment and law enforcement. It generally consists of two parts: neighbor selection and reconstruction weight representation. The most time-consuming or main computation complexity for exemplar-based face sketch synthesis methods lies ...
[ { "created": "Sun, 8 Jan 2017 03:47:59 GMT", "version": "v1" }, { "created": "Fri, 11 Aug 2017 02:43:48 GMT", "version": "v2" } ]
2017-08-14
[ [ "Wang", "Nannan", "" ], [ "Gao", "Xinbo", "" ], [ "Li", "Jie", "" ] ]
Exemplar-based face sketch synthesis plays an important role in both digital entertainment and law enforcement. It generally consists of two parts: neighbor selection and reconstruction weight representation. The most time-consuming or main computation complexity for exemplar-based face sketch synthesis methods lies in...
2008.13284
Weichen Li
Weichen Li and Xiaojia Shelly Zhang
Momentum-based Accelerated Mirror Descent Stochastic Approximation for Robust Topology Optimization under Stochastic Loads
38 pages (including reference)
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robust topology optimization (RTO) improves the robustness of designs with respect to random sources in real-world structures, yet an accurate sensitivity analysis requires the solution of many systems of equations at each optimization step, leading to a high computational cost. To open up the full potential of RTO u...
[ { "created": "Sun, 30 Aug 2020 21:51:51 GMT", "version": "v1" } ]
2020-09-01
[ [ "Li", "Weichen", "" ], [ "Zhang", "Xiaojia Shelly", "" ] ]
Robust topology optimization (RTO) improves the robustness of designs with respect to random sources in real-world structures, yet an accurate sensitivity analysis requires the solution of many systems of equations at each optimization step, leading to a high computational cost. To open up the full potential of RTO und...
1508.01927
Keehang Kwon
Keehang Kwon
Incorporating Inductions and Game Semantics into Logic Programming
11 pages. arXiv admin note: substantial text overlap with arXiv:1507.07228
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inductions and game semantics are two useful extensions to traditional logic programming. To be specific, inductions can capture a wider class of provable formulas in logic programming. Adopting game semantics can make logic programming more interactive. In this paper, we propose an execution model for a logic lang...
[ { "created": "Sat, 8 Aug 2015 17:14:09 GMT", "version": "v1" } ]
2015-08-11
[ [ "Kwon", "Keehang", "" ] ]
Inductions and game semantics are two useful extensions to traditional logic programming. To be specific, inductions can capture a wider class of provable formulas in logic programming. Adopting game semantics can make logic programming more interactive. In this paper, we propose an execution model for a logic language...
2008.00302
Radu Tudor Ionescu
Mihail Burduja, Radu Tudor Ionescu and Nicolae Verga
Accurate and Efficient Intracranial Hemorrhage Detection and Subtype Classification in 3D CT Scans with Convolutional and Long Short-Term Memory Neural Networks
Accepted at Sensors
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
In this paper, we present our system for the RSNA Intracranial Hemorrhage Detection challenge. The proposed system is based on a lightweight deep neural network architecture composed of a convolutional neural network (CNN) that takes as input individual CT slices, and a Long Short-Term Memory (LSTM) network that take...
[ { "created": "Sat, 1 Aug 2020 17:28:25 GMT", "version": "v1" }, { "created": "Sun, 27 Sep 2020 08:05:21 GMT", "version": "v2" }, { "created": "Tue, 29 Sep 2020 14:55:07 GMT", "version": "v3" } ]
2020-09-30
[ [ "Burduja", "Mihail", "" ], [ "Ionescu", "Radu Tudor", "" ], [ "Verga", "Nicolae", "" ] ]
In this paper, we present our system for the RSNA Intracranial Hemorrhage Detection challenge. The proposed system is based on a lightweight deep neural network architecture composed of a convolutional neural network (CNN) that takes as input individual CT slices, and a Long Short-Term Memory (LSTM) network that takes ...
2207.09080
Qun Li
Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott
MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning
13 pages,13 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Federated Learning (FL), a distributed machine learning paradigm, has been adapted to mitigate privacy concerns for customers. Despite their appeal, there are various inference attacks that can exploit shared-plaintext model updates to embed traces of customer private information, leading to serious privacy concerns....
[ { "created": "Tue, 19 Jul 2022 05:30:25 GMT", "version": "v1" } ]
2022-07-20
[ [ "Ma", "Hua", "" ], [ "Li", "Qun", "" ], [ "Zheng", "Yifeng", "" ], [ "Zhang", "Zhi", "" ], [ "Liu", "Xiaoning", "" ], [ "Gao", "Yansong", "" ], [ "Al-Sarawi", "Said F.", "" ], [ "Abbott", "Derek...
Federated Learning (FL), a distributed machine learning paradigm, has been adapted to mitigate privacy concerns for customers. Despite their appeal, there are various inference attacks that can exploit shared-plaintext model updates to embed traces of customer private information, leading to serious privacy concerns. T...
2103.09072
Giulia Belgiovine
Jonas Gonzalez-Billandon, Giulia Belgiovine, Alessandra Sciutti, Giulio Sandini, Francesco Rea
Cognitive architecture aided by working-memory for self-supervised multi-modal humans recognition
Submitted to the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
null
null
null
cs.RO cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to recognize human partners is an important social skill to build personalized and long-term human-robot interactions, especially in scenarios like education, care-giving, and rehabilitation. Faces and voices constitute two important sources of information to enable artificial systems to reliably recogniz...
[ { "created": "Tue, 16 Mar 2021 13:50:24 GMT", "version": "v1" } ]
2021-03-17
[ [ "Gonzalez-Billandon", "Jonas", "" ], [ "Belgiovine", "Giulia", "" ], [ "Sciutti", "Alessandra", "" ], [ "Sandini", "Giulio", "" ], [ "Rea", "Francesco", "" ] ]
The ability to recognize human partners is an important social skill to build personalized and long-term human-robot interactions, especially in scenarios like education, care-giving, and rehabilitation. Faces and voices constitute two important sources of information to enable artificial systems to reliably recognize ...
2407.03922
Antoine Legouhy
Antoine Legouhy, Ross Callaghan, Hojjat Azadbakht and Hui Zhang
POLAFFINI: Efficient feature-based polyaffine initialization for improved non-linear image registration
submitted and accepted to IPMI 2023
Information Processing in Medical Imaging. IPMI 2023. Lecture Notes in Computer Science, vol 13939. Springer, Cham
10.1007/978-3-031-34048-2_47
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
This paper presents an efficient feature-based approach to initialize non-linear image registration. Today, nonlinear image registration is dominated by methods relying on intensity-based similarity measures. A good estimate of the initial transformation is essential, both for traditional iterative algorithms and for...
[ { "created": "Thu, 4 Jul 2024 13:36:29 GMT", "version": "v1" }, { "created": "Tue, 9 Jul 2024 08:47:44 GMT", "version": "v2" } ]
2024-07-10
[ [ "Legouhy", "Antoine", "" ], [ "Callaghan", "Ross", "" ], [ "Azadbakht", "Hojjat", "" ], [ "Zhang", "Hui", "" ] ]
This paper presents an efficient feature-based approach to initialize non-linear image registration. Today, nonlinear image registration is dominated by methods relying on intensity-based similarity measures. A good estimate of the initial transformation is essential, both for traditional iterative algorithms and for r...
1705.08632
J\"urgen Koslowski
Horatiu Cirstea, Serguei Lenglet, Pierre-Etienne Moreau
Faithful (meta-)encodings of programmable strategies into term rewriting systems
null
Logical Methods in Computer Science, Volume 13, Issue 4 (November 28, 2017) lmcs:4096
10.23638/LMCS-13(4:16)2017
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rewriting is a formalism widely used in computer science and mathematical logic. When using rewriting as a programming or modeling paradigm, the rewrite rules describe the transformations one wants to operate and rewriting strategies are used to con- trol their application. The operational semantics of these strategi...
[ { "created": "Wed, 24 May 2017 07:06:41 GMT", "version": "v1" }, { "created": "Mon, 27 Nov 2017 01:07:37 GMT", "version": "v2" } ]
2019-03-14
[ [ "Cirstea", "Horatiu", "" ], [ "Lenglet", "Serguei", "" ], [ "Moreau", "Pierre-Etienne", "" ] ]
Rewriting is a formalism widely used in computer science and mathematical logic. When using rewriting as a programming or modeling paradigm, the rewrite rules describe the transformations one wants to operate and rewriting strategies are used to con- trol their application. The operational semantics of these strategies...
2202.09587
Shiliang Zhang
Shiliang Zhang, Anton Hagermalm, Sanjin Slavnic, Elad Michael Schiller, Magnus Almgren
Evaluation of Open-source Tools for Differential Privacy
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
Differential privacy (DP) defines privacy protection by promising quantified indistinguishability between individuals that consent to share their privacy-sensitive information and the ones that do not. DP aims to deliver this promise by including well-crafted elements of random noise in the published data and thus th...
[ { "created": "Sat, 19 Feb 2022 12:14:13 GMT", "version": "v1" }, { "created": "Fri, 22 Apr 2022 13:19:29 GMT", "version": "v2" }, { "created": "Tue, 24 May 2022 13:08:49 GMT", "version": "v3" } ]
2022-05-25
[ [ "Zhang", "Shiliang", "" ], [ "Hagermalm", "Anton", "" ], [ "Slavnic", "Sanjin", "" ], [ "Schiller", "Elad Michael", "" ], [ "Almgren", "Magnus", "" ] ]
Differential privacy (DP) defines privacy protection by promising quantified indistinguishability between individuals that consent to share their privacy-sensitive information and the ones that do not. DP aims to deliver this promise by including well-crafted elements of random noise in the published data and thus ther...
2303.01091
Gaochao Song
Gaochao Song, Luo Zhang, Ran Su, Jianfeng Shi, Ying He, Qian Sun
OPE-SR: Orthogonal Position Encoding for Designing a Parameter-free Upsampling Module in Arbitrary-scale Image Super-Resolution
Accepted by CVPR 2023. 11 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Implicit neural representation (INR) is a popular approach for arbitrary-scale image super-resolution (SR), as a key component of INR, position encoding improves its representation ability. Motivated by position encoding, we propose orthogonal position encoding (OPE) - an extension of position encoding - and an OPE-U...
[ { "created": "Thu, 2 Mar 2023 09:26:14 GMT", "version": "v1" } ]
2023-03-03
[ [ "Song", "Gaochao", "" ], [ "Zhang", "Luo", "" ], [ "Su", "Ran", "" ], [ "Shi", "Jianfeng", "" ], [ "He", "Ying", "" ], [ "Sun", "Qian", "" ] ]
Implicit neural representation (INR) is a popular approach for arbitrary-scale image super-resolution (SR), as a key component of INR, position encoding improves its representation ability. Motivated by position encoding, we propose orthogonal position encoding (OPE) - an extension of position encoding - and an OPE-Ups...
2404.01730
Ahmad Beirami
Joy Qiping Yang and Salman Salamatian and Ziteng Sun and Ananda Theertha Suresh and Ahmad Beirami
Asymptotics of Language Model Alignment
null
null
null
null
cs.LG cs.IT math.IT stat.ML
http://creativecommons.org/licenses/by/4.0/
Let $p$ denote a generative language model. Let $r$ denote a reward model that returns a scalar that captures the degree at which a draw from $p$ is preferred. The goal of language model alignment is to alter $p$ to a new distribution $\phi$ that results in a higher expected reward while keeping $\phi$ close to $p.$ ...
[ { "created": "Tue, 2 Apr 2024 08:40:07 GMT", "version": "v1" } ]
2024-04-03
[ [ "Yang", "Joy Qiping", "" ], [ "Salamatian", "Salman", "" ], [ "Sun", "Ziteng", "" ], [ "Suresh", "Ananda Theertha", "" ], [ "Beirami", "Ahmad", "" ] ]
Let $p$ denote a generative language model. Let $r$ denote a reward model that returns a scalar that captures the degree at which a draw from $p$ is preferred. The goal of language model alignment is to alter $p$ to a new distribution $\phi$ that results in a higher expected reward while keeping $\phi$ close to $p.$ A ...
1708.05908
Stojan Trajanovski
Stojan Trajanovski, Fernando A. Kuipers, Yezekael Hayel, Eitan Altman and Piet Van Mieghem
Designing virus-resistant, high-performance networks: a game-formation approach
accepted for publication in IEEE Transactions on Control of Network Systems
null
10.1109/TCNS.2017.2747840
null
cs.GT cs.NI cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Designing an optimal network topology while balancing multiple, possibly conflicting objectives like cost, performance, and resiliency to viruses is a challenging endeavor, let alone in the case of decentralized network formation. We therefore propose a game-formation technique where each player aims to minimize its ...
[ { "created": "Sat, 19 Aug 2017 22:48:39 GMT", "version": "v1" }, { "created": "Thu, 24 Aug 2017 23:12:48 GMT", "version": "v2" }, { "created": "Sun, 1 Oct 2017 16:26:07 GMT", "version": "v3" } ]
2017-10-03
[ [ "Trajanovski", "Stojan", "" ], [ "Kuipers", "Fernando A.", "" ], [ "Hayel", "Yezekael", "" ], [ "Altman", "Eitan", "" ], [ "Van Mieghem", "Piet", "" ] ]
Designing an optimal network topology while balancing multiple, possibly conflicting objectives like cost, performance, and resiliency to viruses is a challenging endeavor, let alone in the case of decentralized network formation. We therefore propose a game-formation technique where each player aims to minimize its co...
1709.05262
Vikas Garg
Vikas K. Garg, Adam Kalai
Supervising Unsupervised Learning
11 two column pages. arXiv admin note: substantial text overlap with arXiv:1612.09030
null
null
null
cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a framework to leverage knowledge acquired from a repository of (heterogeneous) supervised datasets to new unsupervised datasets. Our perspective avoids the subjectivity inherent in unsupervised learning by reducing it to supervised learning, and provides a principled way to evaluate unsupervised algorit...
[ { "created": "Thu, 14 Sep 2017 14:42:41 GMT", "version": "v1" }, { "created": "Fri, 16 Feb 2018 14:08:39 GMT", "version": "v2" } ]
2018-02-19
[ [ "Garg", "Vikas K.", "" ], [ "Kalai", "Adam", "" ] ]
We introduce a framework to leverage knowledge acquired from a repository of (heterogeneous) supervised datasets to new unsupervised datasets. Our perspective avoids the subjectivity inherent in unsupervised learning by reducing it to supervised learning, and provides a principled way to evaluate unsupervised algorithm...
2209.10791
Guangyu Chen
Guangyu Chen
Homophone Reveals the Truth: A Reality Check for Speech2Vec
Corrected typos
null
null
null
cs.CL cs.SD eess.AS
http://creativecommons.org/licenses/by/4.0/
Generating spoken word embeddings that possess semantic information is a fascinating topic. Compared with text-based embeddings, they cover both phonetic and semantic characteristics, which can provide richer information and are potentially helpful for improving ASR and speech translation systems. In this paper, we r...
[ { "created": "Thu, 22 Sep 2022 05:32:09 GMT", "version": "v1" }, { "created": "Fri, 23 Sep 2022 11:10:15 GMT", "version": "v2" } ]
2022-09-26
[ [ "Chen", "Guangyu", "" ] ]
Generating spoken word embeddings that possess semantic information is a fascinating topic. Compared with text-based embeddings, they cover both phonetic and semantic characteristics, which can provide richer information and are potentially helpful for improving ASR and speech translation systems. In this paper, we rev...
1201.2995
Rajathilagam Bijoy
B.Rajathilagam, Murali Rangarajan, K.P.Soman
G-Lets: Signal Processing Using Transformation Groups
20 pages, 8 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm using transformation groups and their irreducible representations to generate an orthogonal basis for a signal in the vector space of the signal. It is shown that multiresolution analysis can be done with amplitudes using a transformation group. G-lets is thus not a single transform, but a gro...
[ { "created": "Sat, 14 Jan 2012 07:18:06 GMT", "version": "v1" } ]
2012-01-17
[ [ "Rajathilagam", "B.", "" ], [ "Rangarajan", "Murali", "" ], [ "Soman", "K. P.", "" ] ]
We present an algorithm using transformation groups and their irreducible representations to generate an orthogonal basis for a signal in the vector space of the signal. It is shown that multiresolution analysis can be done with amplitudes using a transformation group. G-lets is thus not a single transform, but a group...
1902.10388
Itsikiantsoa Randrianantenaina
Itsikiantsoa Randrianantenaina, Megumi Kaneko, Hayssam Dahrouj, Hesham ElSawy, and Mohamed-Slim Alouini
Interference Management in NOMA-based Fog-Radio Access Networks via Joint Scheduling and Power Adaptation
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-Orthogonal Multiple Access (NOMA) and Fog Radio Access Networks (FRAN) are promising candidates within the 5G and beyond systems. This work examines the benefit of adopting NOMA in an FRAN architecture with constrained capacity fronthaul. The paper proposes methods for optimizing joint scheduling and power adapta...
[ { "created": "Wed, 27 Feb 2019 08:38:20 GMT", "version": "v1" } ]
2019-02-28
[ [ "Randrianantenaina", "Itsikiantsoa", "" ], [ "Kaneko", "Megumi", "" ], [ "Dahrouj", "Hayssam", "" ], [ "ElSawy", "Hesham", "" ], [ "Alouini", "Mohamed-Slim", "" ] ]
Non-Orthogonal Multiple Access (NOMA) and Fog Radio Access Networks (FRAN) are promising candidates within the 5G and beyond systems. This work examines the benefit of adopting NOMA in an FRAN architecture with constrained capacity fronthaul. The paper proposes methods for optimizing joint scheduling and power adaptati...
2401.11287
Mikael Bisgaard Dahlsen-Jensen
Mikael Bisgaard Dahlsen-Jensen (1), Baptiste Fievet (2), Laure Petrucci (2), Jaco van de Pol (1) ((1) Aarhus University, Aarhus, Denmark, (2) Universit\'e Sorbonne Paris Nord CNRS, Villetaneuse, France)
On-The-Fly Algorithm for Reachability in Parametric Timed Games (Extended Version)
26 pages, 4 figures
null
null
null
cs.FL
http://creativecommons.org/licenses/by/4.0/
Parametric Timed Games (PTG) are an extension of the model of Timed Automata. They allow for the verification and synthesis of real-time systems, reactive to their environmeand depending on adjustable parameters. Given a PTG and a reachability objective, we synthesize the values of the parameters such that the game i...
[ { "created": "Sat, 20 Jan 2024 17:38:43 GMT", "version": "v1" } ]
2024-01-23
[ [ "Dahlsen-Jensen", "Mikael Bisgaard", "" ], [ "Fievet", "Baptiste", "" ], [ "Petrucci", "Laure", "" ], [ "van de Pol", "Jaco", "" ] ]
Parametric Timed Games (PTG) are an extension of the model of Timed Automata. They allow for the verification and synthesis of real-time systems, reactive to their environmeand depending on adjustable parameters. Given a PTG and a reachability objective, we synthesize the values of the parameters such that the game is ...
2205.12594
Fatemeh Hadaeghi
Zohreh Ansari, Farzin Pourhoseini, Fatemeh Hadaeghi
Heterogeneous Reservoir Computing Models for Persian Speech Recognition
This paper was accepted for oral presentation in IEEE WCCI 2022 + IJCNN 2022, special session on Reservoir Computing: algorithms, implementations and applications
null
null
null
cs.SD cs.LG eess.AS
http://creativecommons.org/licenses/by-nc-nd/4.0/
Over the last decade, deep-learning methods have been gradually incorporated into conventional automatic speech recognition (ASR) frameworks to create acoustic, pronunciation, and language models. Although it led to significant improvements in ASRs' recognition accuracy, due to their hard constraints related to hardw...
[ { "created": "Wed, 25 May 2022 09:15:15 GMT", "version": "v1" } ]
2022-05-26
[ [ "Ansari", "Zohreh", "" ], [ "Pourhoseini", "Farzin", "" ], [ "Hadaeghi", "Fatemeh", "" ] ]
Over the last decade, deep-learning methods have been gradually incorporated into conventional automatic speech recognition (ASR) frameworks to create acoustic, pronunciation, and language models. Although it led to significant improvements in ASRs' recognition accuracy, due to their hard constraints related to hardwar...
2406.09960
Jannis Kiesel
Jannis Kiesel, Elias Gr\"unewald
Extending Business Process Management for Regulatory Transparency
Preprint, accepted to the BPM Forum 2024
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ever-increasingly complex business processes are enabled by loosely coupled cloud-native systems. In such fast-paced development environments, data controllers face the challenge of capturing and updating all personal data processing activities due to considerable communication overhead between development teams and ...
[ { "created": "Fri, 14 Jun 2024 12:08:34 GMT", "version": "v1" } ]
2024-06-17
[ [ "Kiesel", "Jannis", "" ], [ "Grünewald", "Elias", "" ] ]
Ever-increasingly complex business processes are enabled by loosely coupled cloud-native systems. In such fast-paced development environments, data controllers face the challenge of capturing and updating all personal data processing activities due to considerable communication overhead between development teams and da...
2307.03319
Amir Globerson
Roni Rabin, Alexandre Djerbetian, Roee Engelberg, Lidan Hackmon, Gal Elidan, Reut Tsarfaty, Amir Globerson
Covering Uncommon Ground: Gap-Focused Question Generation for Answer Assessment
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Human communication often involves information gaps between the interlocutors. For example, in an educational dialogue, a student often provides an answer that is incomplete, and there is a gap between this answer and the perfect one expected by the teacher. Successful dialogue then hinges on the teacher asking about...
[ { "created": "Thu, 6 Jul 2023 22:21:42 GMT", "version": "v1" } ]
2023-07-10
[ [ "Rabin", "Roni", "" ], [ "Djerbetian", "Alexandre", "" ], [ "Engelberg", "Roee", "" ], [ "Hackmon", "Lidan", "" ], [ "Elidan", "Gal", "" ], [ "Tsarfaty", "Reut", "" ], [ "Globerson", "Amir", "" ] ]
Human communication often involves information gaps between the interlocutors. For example, in an educational dialogue, a student often provides an answer that is incomplete, and there is a gap between this answer and the perfect one expected by the teacher. Successful dialogue then hinges on the teacher asking about t...
cs/0603023
Marcus Hutter
Viktor Zhumatiy and Faustino Gomez and Marcus Hutter and Juergen Schmidhuber
Metric State Space Reinforcement Learning for a Vision-Capable Mobile Robot
14 pages, 8 figures
Proc. 9th International Conf. on Intelligent Autonomous Systems (IAS 2006) pages 272-281
null
IDSIA-05-06
cs.RO cs.LG
null
We address the problem of autonomously learning controllers for vision-capable mobile robots. We extend McCallum's (1995) Nearest-Sequence Memory algorithm to allow for general metrics over state-action trajectories. We demonstrate the feasibility of our approach by successfully running our algorithm on a real mobile...
[ { "created": "Tue, 7 Mar 2006 08:44:29 GMT", "version": "v1" } ]
2007-05-23
[ [ "Zhumatiy", "Viktor", "" ], [ "Gomez", "Faustino", "" ], [ "Hutter", "Marcus", "" ], [ "Schmidhuber", "Juergen", "" ] ]
We address the problem of autonomously learning controllers for vision-capable mobile robots. We extend McCallum's (1995) Nearest-Sequence Memory algorithm to allow for general metrics over state-action trajectories. We demonstrate the feasibility of our approach by successfully running our algorithm on a real mobile r...
2211.06385
Md Vasimuddin
Md Vasimuddin, Ramanarayan Mohanty, Sanchit Misra, Sasikanth Avancha
DistGNN-MB: Distributed Large-Scale Graph Neural Network Training on x86 via Minibatch Sampling
null
null
null
null
cs.LG cs.DC
http://creativecommons.org/licenses/by/4.0/
Training Graph Neural Networks, on graphs containing billions of vertices and edges, at scale using minibatch sampling poses a key challenge: strong-scaling graphs and training examples results in lower compute and higher communication volume and potential performance loss. DistGNN-MB employs a novel Historical Embed...
[ { "created": "Fri, 11 Nov 2022 18:07:33 GMT", "version": "v1" } ]
2022-11-14
[ [ "Vasimuddin", "Md", "" ], [ "Mohanty", "Ramanarayan", "" ], [ "Misra", "Sanchit", "" ], [ "Avancha", "Sasikanth", "" ] ]
Training Graph Neural Networks, on graphs containing billions of vertices and edges, at scale using minibatch sampling poses a key challenge: strong-scaling graphs and training examples results in lower compute and higher communication volume and potential performance loss. DistGNN-MB employs a novel Historical Embeddi...
2307.02105
Matthias Barkowsky
Matthias Barkowsky and Holger Giese
Incremental Model Transformations with Triple Graph Grammars for Multi-version Models
arXiv admin note: substantial text overlap with arXiv:2301.00623
null
null
null
cs.SE
http://creativecommons.org/licenses/by/4.0/
Like conventional software projects, projects in model-driven software engineering require adequate management of multiple versions of development artifacts, importantly allowing living with temporary inconsistencies. In previous work, multi-version models for model-driven software engineering have been introduced, w...
[ { "created": "Wed, 5 Jul 2023 08:26:18 GMT", "version": "v1" }, { "created": "Fri, 7 Jul 2023 12:49:21 GMT", "version": "v2" } ]
2023-07-10
[ [ "Barkowsky", "Matthias", "" ], [ "Giese", "Holger", "" ] ]
Like conventional software projects, projects in model-driven software engineering require adequate management of multiple versions of development artifacts, importantly allowing living with temporary inconsistencies. In previous work, multi-version models for model-driven software engineering have been introduced, whi...
2307.07313
Oscar Carlsson
Oscar Carlsson, Jan E. Gerken, Hampus Linander, Heiner Spie{\ss}, Fredrik Ohlsson, Christoffer Petersson, Daniel Persson
HEAL-SWIN: A Vision Transformer On The Sphere
Accepted as poster to CVPR 2024. Main body: 10 pages, 7 figures. Appendices: 9 pages, 6 figures
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-resolution wide-angle fisheye images are becoming more and more important for robotics applications such as autonomous driving. However, using ordinary convolutional neural networks or vision transformers on this data is problematic due to projection and distortion losses introduced when projecting to a rectangu...
[ { "created": "Fri, 14 Jul 2023 12:46:59 GMT", "version": "v1" }, { "created": "Wed, 8 May 2024 15:49:58 GMT", "version": "v2" } ]
2024-05-09
[ [ "Carlsson", "Oscar", "" ], [ "Gerken", "Jan E.", "" ], [ "Linander", "Hampus", "" ], [ "Spieß", "Heiner", "" ], [ "Ohlsson", "Fredrik", "" ], [ "Petersson", "Christoffer", "" ], [ "Persson", "Daniel", "" ...
High-resolution wide-angle fisheye images are becoming more and more important for robotics applications such as autonomous driving. However, using ordinary convolutional neural networks or vision transformers on this data is problematic due to projection and distortion losses introduced when projecting to a rectangula...
1701.00806
Monique Laurent
Monique Laurent, Matteo Seminaroti, Shin-ichi Tanigawa
A Structural Characterization for Certifying Robinsonian Matrices
21 pages, 1 figure
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A symmetric matrix is Robinsonian if its rows and columns can be simultaneously reordered in such a way that entries are monotone nondecreasing in rows and columns when moving toward the diagonal. The adjacency matrix of a graph is Robinsonian precisely when the graph is a unit interval graph, so that Robinsonian mat...
[ { "created": "Tue, 3 Jan 2017 19:59:17 GMT", "version": "v1" } ]
2018-11-20
[ [ "Laurent", "Monique", "" ], [ "Seminaroti", "Matteo", "" ], [ "Tanigawa", "Shin-ichi", "" ] ]
A symmetric matrix is Robinsonian if its rows and columns can be simultaneously reordered in such a way that entries are monotone nondecreasing in rows and columns when moving toward the diagonal. The adjacency matrix of a graph is Robinsonian precisely when the graph is a unit interval graph, so that Robinsonian matri...
1402.5979
Renato J Cintra
V. A. Coutinho, R. J. Cintra, F. M. Bayer, S. Kulasekera, A. Madanayake
A Multiplierless Pruned DCT-like Transformation for Image and Video Compression that Requires 10 Additions Only
13 pages, 4 figures, 5 tables
Journal of Real-Time Image Processing, August 2016, Volume 12, Issue 2, pp 247-255
10.1007/s11554-015-0492-8
null
cs.MM cs.CV stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multiplierless pruned approximate 8-point discrete cosine transform (DCT) requiring only 10 additions is introduced. The proposed algorithm was assessed in image and video compression, showing competitive performance with state-of-the-art methods. Digital implementation in 45 nm CMOS technology up to place-and-rout...
[ { "created": "Mon, 24 Feb 2014 21:04:41 GMT", "version": "v1" }, { "created": "Sun, 11 Dec 2016 19:23:57 GMT", "version": "v2" } ]
2016-12-13
[ [ "Coutinho", "V. A.", "" ], [ "Cintra", "R. J.", "" ], [ "Bayer", "F. M.", "" ], [ "Kulasekera", "S.", "" ], [ "Madanayake", "A.", "" ] ]
A multiplierless pruned approximate 8-point discrete cosine transform (DCT) requiring only 10 additions is introduced. The proposed algorithm was assessed in image and video compression, showing competitive performance with state-of-the-art methods. Digital implementation in 45 nm CMOS technology up to place-and-route ...
1807.06446
Haoyu Yang
Haoyu Yang, Shuhe Li, Cyrus Tabery, Bingqing Lin, Bei Yu
Bridging the Gap Between Layout Pattern Sampling and Hotspot Detection via Batch Active Learning
8 pages, 7 figures
null
null
null
cs.LG eess.IV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Layout hotpot detection is one of the main steps in modern VLSI design. A typical hotspot detection flow is extremely time consuming due to the computationally expensive mask optimization and lithographic simulation. Recent researches try to facilitate the procedure with a reduced flow including feature extraction, t...
[ { "created": "Fri, 13 Jul 2018 17:51:42 GMT", "version": "v1" } ]
2018-07-18
[ [ "Yang", "Haoyu", "" ], [ "Li", "Shuhe", "" ], [ "Tabery", "Cyrus", "" ], [ "Lin", "Bingqing", "" ], [ "Yu", "Bei", "" ] ]
Layout hotpot detection is one of the main steps in modern VLSI design. A typical hotspot detection flow is extremely time consuming due to the computationally expensive mask optimization and lithographic simulation. Recent researches try to facilitate the procedure with a reduced flow including feature extraction, tra...
1101.0302
Tsachy Weissman
Rami Atar and Tsachy Weissman
Mutual Information, Relative Entropy, and Estimation in the Poisson Channel
24 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $X$ be a non-negative random variable and let the conditional distribution of a random variable $Y$, given $X$, be ${Poisson}(\gamma \cdot X)$, for a parameter $\gamma \geq 0$. We identify a natural loss function such that: 1) The derivative of the mutual information between $X$ and $Y$ with respect to $\gamma$ i...
[ { "created": "Fri, 31 Dec 2010 21:28:43 GMT", "version": "v1" } ]
2015-03-17
[ [ "Atar", "Rami", "" ], [ "Weissman", "Tsachy", "" ] ]
Let $X$ be a non-negative random variable and let the conditional distribution of a random variable $Y$, given $X$, be ${Poisson}(\gamma \cdot X)$, for a parameter $\gamma \geq 0$. We identify a natural loss function such that: 1) The derivative of the mutual information between $X$ and $Y$ with respect to $\gamma$ is ...
1806.02867
Guy Lorberbom
Guy Lorberbom (Technion), Andreea Gane (MIT), Tommi Jaakkola (MIT), Tamir Hazan (Technion)
Direct Optimization through $\arg \max$ for Discrete Variational Auto-Encoder
Accepted by Neural Information Processing Systems (NeurIPS 2019)
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reparameterization of variational auto-encoders with continuous random variables is an effective method for reducing the variance of their gradient estimates. In the discrete case, one can perform reparametrization using the Gumbel-Max trick, but the resulting objective relies on an $\arg \max$ operation and is non-d...
[ { "created": "Thu, 7 Jun 2018 19:09:21 GMT", "version": "v1" }, { "created": "Thu, 11 Oct 2018 17:07:53 GMT", "version": "v2" }, { "created": "Sat, 9 Feb 2019 19:34:43 GMT", "version": "v3" }, { "created": "Thu, 30 May 2019 13:49:37 GMT", "version": "v4" }, { "cre...
2019-12-10
[ [ "Lorberbom", "Guy", "", "Technion" ], [ "Gane", "Andreea", "", "MIT" ], [ "Jaakkola", "Tommi", "", "MIT" ], [ "Hazan", "Tamir", "", "Technion" ] ]
Reparameterization of variational auto-encoders with continuous random variables is an effective method for reducing the variance of their gradient estimates. In the discrete case, one can perform reparametrization using the Gumbel-Max trick, but the resulting objective relies on an $\arg \max$ operation and is non-dif...
2103.15596
Thiago Gomes
Thiago L. Gomes and Renato Martins and Jo\~ao Ferreira and Rafael Azevedo and Guilherme Torres and Erickson R. Nascimento
A Shape-Aware Retargeting Approach to Transfer Human Motion and Appearance in Monocular Videos
19 pages, 13 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Transferring human motion and appearance between videos of human actors remains one of the key challenges in Computer Vision. Despite the advances from recent image-to-image translation approaches, there are several transferring contexts where most end-to-end learning-based retargeting methods still perform poorly. T...
[ { "created": "Mon, 29 Mar 2021 13:17:41 GMT", "version": "v1" }, { "created": "Wed, 28 Apr 2021 15:56:27 GMT", "version": "v2" } ]
2021-04-29
[ [ "Gomes", "Thiago L.", "" ], [ "Martins", "Renato", "" ], [ "Ferreira", "João", "" ], [ "Azevedo", "Rafael", "" ], [ "Torres", "Guilherme", "" ], [ "Nascimento", "Erickson R.", "" ] ]
Transferring human motion and appearance between videos of human actors remains one of the key challenges in Computer Vision. Despite the advances from recent image-to-image translation approaches, there are several transferring contexts where most end-to-end learning-based retargeting methods still perform poorly. Tra...
1805.07966
Sopan Khosla
Sopan Khosla, Niyati Chhaya, Kushal Chawla
Aff2Vec: Affect--Enriched Distributional Word Representations
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
Human communication includes information, opinions, and reactions. Reactions are often captured by the affective-messages in written as well as verbal communications. While there has been work in affect modeling and to some extent affective content generation, the area of affective word distributions in not well stud...
[ { "created": "Mon, 21 May 2018 10:10:16 GMT", "version": "v1" } ]
2018-05-22
[ [ "Khosla", "Sopan", "" ], [ "Chhaya", "Niyati", "" ], [ "Chawla", "Kushal", "" ] ]
Human communication includes information, opinions, and reactions. Reactions are often captured by the affective-messages in written as well as verbal communications. While there has been work in affect modeling and to some extent affective content generation, the area of affective word distributions in not well studie...
2202.12650
Javier L\'opez-Randulfe
Javier L\'opez-Randulfe, Nico Reeb, Negin Karimi, Chen Liu, Hector A. Gonzalez, Robin Dietrich, Bernhard Vogginger, Christian Mayr, Alois Knoll
Time-coded Spiking Fourier Transform in Neuromorphic Hardware
Accepted version on IEEE Transactions on Computers (early access). Added copyright notice
null
10.1109/TC.2022.3162708
null
cs.NE eess.SP
http://creativecommons.org/licenses/by-sa/4.0/
After several decades of continuously optimizing computing systems, the Moore's law is reaching itsend. However, there is an increasing demand for fast and efficient processing systems that can handlelarge streams of data while decreasing system footprints. Neuromorphic computing answers thisneed by creating decentra...
[ { "created": "Fri, 25 Feb 2022 12:15:46 GMT", "version": "v1" }, { "created": "Thu, 31 Mar 2022 10:34:13 GMT", "version": "v2" } ]
2022-04-01
[ [ "López-Randulfe", "Javier", "" ], [ "Reeb", "Nico", "" ], [ "Karimi", "Negin", "" ], [ "Liu", "Chen", "" ], [ "Gonzalez", "Hector A.", "" ], [ "Dietrich", "Robin", "" ], [ "Vogginger", "Bernhard", "" ], ...
After several decades of continuously optimizing computing systems, the Moore's law is reaching itsend. However, there is an increasing demand for fast and efficient processing systems that can handlelarge streams of data while decreasing system footprints. Neuromorphic computing answers thisneed by creating decentrali...