id
stringlengths
9
10
submitter
stringlengths
1
64
authors
stringlengths
4
20.7k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
404
doi
stringlengths
11
153
report-no
stringlengths
2
254
categories
stringlengths
5
98
license
stringclasses
9 values
orig_abstract
stringlengths
14
3.35k
versions
listlengths
1
60
update_date
stringlengths
10
10
authors_parsed
listlengths
1
1.35k
abstract
stringlengths
11
3.34k
1906.06297
Joshua Romero
Joshua Romero, Mauro Bisson, Massimiliano Fatica, Massimo Bernaschi
A Performance Study of the 2D Ising Model on GPUs
null
null
10.1016/j.cpc.2020.107473
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The simulation of the two-dimensional Ising model is used as a benchmark to show the computational capabilities of Graphic Processing Units (GPUs). The rich programming environment now available on GPUs and flexible hardware capabilities allowed us to quickly experiment with several implementation ideas: a simple ste...
[ { "created": "Fri, 14 Jun 2019 17:09:16 GMT", "version": "v1" } ]
2020-08-26
[ [ "Romero", "Joshua", "" ], [ "Bisson", "Mauro", "" ], [ "Fatica", "Massimiliano", "" ], [ "Bernaschi", "Massimo", "" ] ]
The simulation of the two-dimensional Ising model is used as a benchmark to show the computational capabilities of Graphic Processing Units (GPUs). The rich programming environment now available on GPUs and flexible hardware capabilities allowed us to quickly experiment with several implementation ideas: a simple stenc...
1603.07866
Romain Couillet
Romain Couillet, Gilles Wainrib, Harry Sevi, Hafiz Tiomoko Ali
The Asymptotic Performance of Linear Echo State Neural Networks
null
null
null
null
cs.LG cs.NE math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, a study of the mean-square error (MSE) performance of linear echo-state neural networks is performed, both for training and testing tasks. Considering the realistic setting of noise present at the network nodes, we derive deterministic equivalents for the aforementioned MSE in the limit where the num...
[ { "created": "Fri, 25 Mar 2016 10:27:00 GMT", "version": "v1" } ]
2016-03-28
[ [ "Couillet", "Romain", "" ], [ "Wainrib", "Gilles", "" ], [ "Sevi", "Harry", "" ], [ "Ali", "Hafiz Tiomoko", "" ] ]
In this article, a study of the mean-square error (MSE) performance of linear echo-state neural networks is performed, both for training and testing tasks. Considering the realistic setting of noise present at the network nodes, we derive deterministic equivalents for the aforementioned MSE in the limit where the numbe...
1611.06728
Dmitry Gromov
Dmitry Gromov, Ingo Bulla, Ethan O. Romero-Severson, Oana Silvia Serea
Numerical optimal control for HIV prevention with dynamic budget allocation
Submitted paper
null
10.1093/imammb/dqx015
null
cs.SY math.NA math.OC q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is about numerical control of HIV propagation. The contribution of the paper is threefold: first, a novel model of HIV propagation is proposed; second, the methods from numerical optimal control are successfully applied to the developed model to compute optimal control profiles; finally, the computed resul...
[ { "created": "Mon, 21 Nov 2016 11:28:27 GMT", "version": "v1" } ]
2023-05-30
[ [ "Gromov", "Dmitry", "" ], [ "Bulla", "Ingo", "" ], [ "Romero-Severson", "Ethan O.", "" ], [ "Serea", "Oana Silvia", "" ] ]
This paper is about numerical control of HIV propagation. The contribution of the paper is threefold: first, a novel model of HIV propagation is proposed; second, the methods from numerical optimal control are successfully applied to the developed model to compute optimal control profiles; finally, the computed results...
1810.11758
Hao-Hsuan Chang
Hao-Hsuan Chang, Hao Song, Yang Yi, Jianzhong Zhang, Haibo He, Lingjia Liu
Distributive Dynamic Spectrum Access through Deep Reinforcement Learning: A Reservoir Computing Based Approach
This work is accepted in IEEE IoT Journal 2018
null
10.1109/JIOT.2018.2872441
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic spectrum access (DSA) is regarded as an effective and efficient technology to share radio spectrum among different networks. As a secondary user (SU), a DSA device will face two critical problems: avoiding causing harmful interference to primary users (PUs), and conducting effective interference coordination ...
[ { "created": "Sun, 28 Oct 2018 04:02:27 GMT", "version": "v1" } ]
2018-10-30
[ [ "Chang", "Hao-Hsuan", "" ], [ "Song", "Hao", "" ], [ "Yi", "Yang", "" ], [ "Zhang", "Jianzhong", "" ], [ "He", "Haibo", "" ], [ "Liu", "Lingjia", "" ] ]
Dynamic spectrum access (DSA) is regarded as an effective and efficient technology to share radio spectrum among different networks. As a secondary user (SU), a DSA device will face two critical problems: avoiding causing harmful interference to primary users (PUs), and conducting effective interference coordination wi...
2402.01018
Weijie Xu
Weijie Xu, Zicheng Huang, Wenxiang Hu, Xi Fang, Rajesh Kumar Cherukuri, Naumaan Nayyar, Lorenzo Malandri, Srinivasan H. Sengamedu
HR-MultiWOZ: A Task Oriented Dialogue (TOD) Dataset for HR LLM Agent
13 pages, 9 figures
EACL 2024
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
Recent advancements in Large Language Models (LLMs) have been reshaping Natural Language Processing (NLP) task in several domains. Their use in the field of Human Resources (HR) has still room for expansions and could be beneficial for several time consuming tasks. Examples such as time-off submissions, medical claim...
[ { "created": "Thu, 1 Feb 2024 21:10:44 GMT", "version": "v1" } ]
2024-02-05
[ [ "Xu", "Weijie", "" ], [ "Huang", "Zicheng", "" ], [ "Hu", "Wenxiang", "" ], [ "Fang", "Xi", "" ], [ "Cherukuri", "Rajesh Kumar", "" ], [ "Nayyar", "Naumaan", "" ], [ "Malandri", "Lorenzo", "" ], [ "...
Recent advancements in Large Language Models (LLMs) have been reshaping Natural Language Processing (NLP) task in several domains. Their use in the field of Human Resources (HR) has still room for expansions and could be beneficial for several time consuming tasks. Examples such as time-off submissions, medical claims ...
1705.10301
Maruan Al-Shedivat
Maruan Al-Shedivat, Avinava Dubey, Eric P. Xing
Contextual Explanation Networks
48 pages, 18 figures, to appear in JMLR
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern learning algorithms excel at producing accurate but complex models of the data. However, deploying such models in the real-world requires extra care: we must ensure their reliability, robustness, and absence of undesired biases. This motivates the development of models that are equally accurate but can be also...
[ { "created": "Mon, 29 May 2017 17:39:51 GMT", "version": "v1" }, { "created": "Tue, 30 Jan 2018 00:06:02 GMT", "version": "v2" }, { "created": "Tue, 18 Dec 2018 22:33:40 GMT", "version": "v3" }, { "created": "Wed, 9 Sep 2020 14:20:44 GMT", "version": "v4" } ]
2020-09-10
[ [ "Al-Shedivat", "Maruan", "" ], [ "Dubey", "Avinava", "" ], [ "Xing", "Eric P.", "" ] ]
Modern learning algorithms excel at producing accurate but complex models of the data. However, deploying such models in the real-world requires extra care: we must ensure their reliability, robustness, and absence of undesired biases. This motivates the development of models that are equally accurate but can be also e...
1803.04190
Mousumi Dutt
Mousumi Dutt, Arindam Biswas, Benedek Nagy
Counting of Shortest Paths in Cubic Grid
15 pages, 8 figures
null
null
null
cs.DM cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The enumeration of shortest paths in cubic grid is presented here. The cubic grid considers three neighborhods--- 6-neighborhood (face connectivity), 18-neighborhood (edge connectivity), and 26-neighborhood (vertex connectivity). The formulation for distance metrics are given here. $L_1$, $D_{18}$, and $L_\infty$ are...
[ { "created": "Mon, 12 Mar 2018 11:08:08 GMT", "version": "v1" } ]
2018-03-13
[ [ "Dutt", "Mousumi", "" ], [ "Biswas", "Arindam", "" ], [ "Nagy", "Benedek", "" ] ]
The enumeration of shortest paths in cubic grid is presented here. The cubic grid considers three neighborhods--- 6-neighborhood (face connectivity), 18-neighborhood (edge connectivity), and 26-neighborhood (vertex connectivity). The formulation for distance metrics are given here. $L_1$, $D_{18}$, and $L_\infty$ are t...
2401.10273
Yu Han
Yu Han, Jingwen Tao
Revolutionizing Pharma: Unveiling the AI and LLM Trends in the Pharmaceutical Industry
null
null
null
null
cs.CY cs.AI
http://creativecommons.org/licenses/by/4.0/
This document offers a critical overview of the emerging trends and significant advancements in artificial intelligence (AI) within the pharmaceutical industry. Detailing its application across key operational areas, including research and development, animal testing, clinical trials, hospital clinical stages, produc...
[ { "created": "Fri, 5 Jan 2024 04:01:09 GMT", "version": "v1" }, { "created": "Mon, 22 Jan 2024 04:47:20 GMT", "version": "v2" } ]
2024-01-23
[ [ "Han", "Yu", "" ], [ "Tao", "Jingwen", "" ] ]
This document offers a critical overview of the emerging trends and significant advancements in artificial intelligence (AI) within the pharmaceutical industry. Detailing its application across key operational areas, including research and development, animal testing, clinical trials, hospital clinical stages, producti...
2203.00046
Mattias Heinrich
Mattias P. Heinrich and Lasse Hansen
Voxelmorph++ Going beyond the cranial vault with keypoint supervision and multi-channel instance optimisation
10 pages, accepted at WBIR 2022
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
The majority of current research in deep learning based image registration addresses inter-patient brain registration with moderate deformation magnitudes. The recent Learn2Reg medical registration benchmark has demonstrated that single-scale U-Net architectures, such as VoxelMorph that directly employ a spatial tran...
[ { "created": "Mon, 28 Feb 2022 19:23:29 GMT", "version": "v1" } ]
2022-03-02
[ [ "Heinrich", "Mattias P.", "" ], [ "Hansen", "Lasse", "" ] ]
The majority of current research in deep learning based image registration addresses inter-patient brain registration with moderate deformation magnitudes. The recent Learn2Reg medical registration benchmark has demonstrated that single-scale U-Net architectures, such as VoxelMorph that directly employ a spatial transf...
2407.02112
Andrej Tschalzev
Andrej Tschalzev, Sascha Marton, Stefan L\"udtke, Christian Bartelt, Heiner Stuckenschmidt
A Data-Centric Perspective on Evaluating Machine Learning Models for Tabular Data
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
Tabular data is prevalent in real-world machine learning applications, and new models for supervised learning of tabular data are frequently proposed. Comparative studies assessing the performance of models typically consist of model-centric evaluation setups with overly standardized data preprocessing. This paper de...
[ { "created": "Tue, 2 Jul 2024 09:54:39 GMT", "version": "v1" } ]
2024-07-03
[ [ "Tschalzev", "Andrej", "" ], [ "Marton", "Sascha", "" ], [ "Lüdtke", "Stefan", "" ], [ "Bartelt", "Christian", "" ], [ "Stuckenschmidt", "Heiner", "" ] ]
Tabular data is prevalent in real-world machine learning applications, and new models for supervised learning of tabular data are frequently proposed. Comparative studies assessing the performance of models typically consist of model-centric evaluation setups with overly standardized data preprocessing. This paper demo...
1207.4258
Lin Chen
Lin Chen, Athanasios V. Vasilakos
Joint Rate Adaptation and Medium Access in Wireless LANs: a Non-cooperative Game Theoretic Perspective
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless local area networks (WLANs) based on IEEE 802.11 standards are becoming ubiquitous today and typically support multiple data rates. In such multi-rate WLANs, distributed medium access and rate adaptation are two key elements to achieve efficient radio resource utilization, especially in non-cooperative envir...
[ { "created": "Wed, 18 Jul 2012 04:04:35 GMT", "version": "v1" } ]
2012-07-19
[ [ "Chen", "Lin", "" ], [ "Vasilakos", "Athanasios V.", "" ] ]
Wireless local area networks (WLANs) based on IEEE 802.11 standards are becoming ubiquitous today and typically support multiple data rates. In such multi-rate WLANs, distributed medium access and rate adaptation are two key elements to achieve efficient radio resource utilization, especially in non-cooperative environ...
2403.12566
Zhichao Feng
Zhichao Feng, Junjiie Xie, Kaiyuan Li, Yu Qin, Pengfei Wang, Qianzhong Li, Bin Yin, Xiang Li, Wei Lin, Shangguang Wang
Context-based Fast Recommendation Strategy for Long User Behavior Sequence in Meituan Waimai
9 pages, accepted by WWW 2024 Industry Track
null
10.1145/3589335.3648334
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the recommender system of Meituan Waimai, we are dealing with ever-lengthening user behavior sequences, which pose an increasing challenge to modeling user preference effectively. Existing sequential recommendation models often fail to capture long-term dependencies or are too complex, complicating the fulfillment...
[ { "created": "Tue, 19 Mar 2024 09:20:43 GMT", "version": "v1" } ]
2024-03-20
[ [ "Feng", "Zhichao", "" ], [ "Xie", "Junjiie", "" ], [ "Li", "Kaiyuan", "" ], [ "Qin", "Yu", "" ], [ "Wang", "Pengfei", "" ], [ "Li", "Qianzhong", "" ], [ "Yin", "Bin", "" ], [ "Li", "Xiang", ...
In the recommender system of Meituan Waimai, we are dealing with ever-lengthening user behavior sequences, which pose an increasing challenge to modeling user preference effectively. Existing sequential recommendation models often fail to capture long-term dependencies or are too complex, complicating the fulfillment o...
1702.01606
Daniel Gall
Daniel Gall and Thom Fr\"uhwirth
An Operational Semantics for the Cognitive Architecture ACT-R and its Translation to Constraint Handling Rules
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computational psychology has the aim to explain human cognition by computational models of cognitive processes. The cognitive architecture ACT-R is popular to develop such models. Although ACT-R has a well-defined psychological theory and has been used to explain many cognitive processes, there are two problems that ...
[ { "created": "Mon, 6 Feb 2017 13:19:00 GMT", "version": "v1" } ]
2017-02-07
[ [ "Gall", "Daniel", "" ], [ "Frühwirth", "Thom", "" ] ]
Computational psychology has the aim to explain human cognition by computational models of cognitive processes. The cognitive architecture ACT-R is popular to develop such models. Although ACT-R has a well-defined psychological theory and has been used to explain many cognitive processes, there are two problems that ma...
1804.10694
R. Baghdadi
Riyadh Baghdadi, Jessica Ray, Malek Ben Romdhane, Emanuele Del Sozzo, Abdurrahman Akkas, Yunming Zhang, Patricia Suriana, Shoaib Kamil, Saman Amarasinghe
Tiramisu: A Polyhedral Compiler for Expressing Fast and Portable Code
arXiv admin note: substantial text overlap with arXiv:1803.00419
null
null
null
cs.PL cs.DC cs.MS cs.NE cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces Tiramisu, a polyhedral framework designed to generate high performance code for multiple platforms including multicores, GPUs, and distributed machines. Tiramisu introduces a scheduling language with novel extensions to explicitly manage the complexities that arise when targeting these systems. ...
[ { "created": "Fri, 27 Apr 2018 21:28:44 GMT", "version": "v1" }, { "created": "Wed, 12 Sep 2018 19:58:57 GMT", "version": "v2" }, { "created": "Wed, 26 Sep 2018 21:24:44 GMT", "version": "v3" }, { "created": "Tue, 18 Dec 2018 02:41:00 GMT", "version": "v4" }, { "c...
2018-12-21
[ [ "Baghdadi", "Riyadh", "" ], [ "Ray", "Jessica", "" ], [ "Romdhane", "Malek Ben", "" ], [ "Del Sozzo", "Emanuele", "" ], [ "Akkas", "Abdurrahman", "" ], [ "Zhang", "Yunming", "" ], [ "Suriana", "Patricia", "...
This paper introduces Tiramisu, a polyhedral framework designed to generate high performance code for multiple platforms including multicores, GPUs, and distributed machines. Tiramisu introduces a scheduling language with novel extensions to explicitly manage the complexities that arise when targeting these systems. Th...
2002.03997
Vladimir Kovalenko
Vladimir Kovalenko, Egor Bogomolov, Timofey Bryksin, Alberto Bacchelli
Building Implicit Vector Representations of Individual Coding Style
null
null
null
null
cs.SE cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the goal of facilitating team collaboration, we propose a new approach to building vector representations of individual developers by capturing their individual contribution style, or coding style. Such representations can find use in the next generation of software development team collaboration tools, for exam...
[ { "created": "Mon, 10 Feb 2020 18:12:27 GMT", "version": "v1" } ]
2020-02-11
[ [ "Kovalenko", "Vladimir", "" ], [ "Bogomolov", "Egor", "" ], [ "Bryksin", "Timofey", "" ], [ "Bacchelli", "Alberto", "" ] ]
With the goal of facilitating team collaboration, we propose a new approach to building vector representations of individual developers by capturing their individual contribution style, or coding style. Such representations can find use in the next generation of software development team collaboration tools, for exampl...
0902.0221
Alireza Avanaki
Alireza Avanaki
Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom
null
null
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A well-known issue of local (adaptive) histogram equalization (LHE) is over-enhancement (i.e., generation of spurious details) in homogenous areas of the image. In this paper, we show that the LHE problem has many solutions due to the ambiguity in ranking pixels with the same intensity. The LHE solution space can be ...
[ { "created": "Mon, 2 Feb 2009 10:41:53 GMT", "version": "v1" }, { "created": "Mon, 14 Sep 2009 10:14:32 GMT", "version": "v2" } ]
2009-09-14
[ [ "Avanaki", "Alireza", "" ] ]
A well-known issue of local (adaptive) histogram equalization (LHE) is over-enhancement (i.e., generation of spurious details) in homogenous areas of the image. In this paper, we show that the LHE problem has many solutions due to the ambiguity in ranking pixels with the same intensity. The LHE solution space can be se...
2408.05960
Alexander Dockhorn
Carlo N\"ubel, Alexander Dockhorn, Sanaz Mostaghim
Match Point AI: A Novel AI Framework for Evaluating Data-Driven Tennis Strategies
4 pages, 1 page abstract, short paper, to be published in Proceedings of the IEEE Conference on Games 2024
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many works in the domain of artificial intelligence in games focus on board or video games due to the ease of reimplementing their mechanics. Decision-making problems in real-world sports share many similarities to such domains. Nevertheless, not many frameworks on sports games exist. In this paper, we present the te...
[ { "created": "Mon, 12 Aug 2024 07:22:46 GMT", "version": "v1" } ]
2024-08-13
[ [ "Nübel", "Carlo", "" ], [ "Dockhorn", "Alexander", "" ], [ "Mostaghim", "Sanaz", "" ] ]
Many works in the domain of artificial intelligence in games focus on board or video games due to the ease of reimplementing their mechanics. Decision-making problems in real-world sports share many similarities to such domains. Nevertheless, not many frameworks on sports games exist. In this paper, we present the tenn...
2210.14677
Olivier Colliot
Rosana El Jurdi and Olivier Colliot
How precise are performance estimates for typical medical image segmentation tasks?
null
null
null
null
cs.CV q-bio.QM stat.AP
http://creativecommons.org/licenses/by/4.0/
An important issue in medical image processing is to be able to estimate not only the performances of algorithms but also the precision of the estimation of these performances. Reporting precision typically amounts to reporting standard-error of the mean (SEM) or equivalently confidence intervals. However, this is ra...
[ { "created": "Wed, 26 Oct 2022 12:53:15 GMT", "version": "v1" }, { "created": "Tue, 1 Nov 2022 10:54:16 GMT", "version": "v2" }, { "created": "Wed, 24 May 2023 12:32:40 GMT", "version": "v3" } ]
2023-05-25
[ [ "Jurdi", "Rosana El", "" ], [ "Colliot", "Olivier", "" ] ]
An important issue in medical image processing is to be able to estimate not only the performances of algorithms but also the precision of the estimation of these performances. Reporting precision typically amounts to reporting standard-error of the mean (SEM) or equivalently confidence intervals. However, this is rare...
2005.04016
Abderrahmane Maaradji
Abderrahmane Maaradji, Marlon Dumas, Marcello La Rosa, and Alireza Ostovar
Detecting sudden and gradual drifts in business processes from execution traces
null
IEEE Transactions on Knowledge and Data Engineering 29, no. 10 (2017)
10.1109/TKDE.2017.2720601
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Business processes are prone to unexpected changes, as process workers may suddenly or gradually start executing a process differently in order to adjust to changes in workload, season, or other external factors. Early detection of business process changes enables managers to identify and act upon changes that may ot...
[ { "created": "Thu, 7 May 2020 16:22:11 GMT", "version": "v1" } ]
2020-05-11
[ [ "Maaradji", "Abderrahmane", "" ], [ "Dumas", "Marlon", "" ], [ "La Rosa", "Marcello", "" ], [ "Ostovar", "Alireza", "" ] ]
Business processes are prone to unexpected changes, as process workers may suddenly or gradually start executing a process differently in order to adjust to changes in workload, season, or other external factors. Early detection of business process changes enables managers to identify and act upon changes that may othe...
1703.04086
L.T. Handoko
A.A. Waskita, H. Suhartanto, L.T. Handoko
A performance study of anomaly detection using entropy method
Proceeding of the International Conference on Computer, Control, Informatics and its Applications (2017) pp. 137-140
null
10.1109/IC3INA.2016.7863038
FISIKALIPI-16081
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An experiment to study the entropy method for an anomaly detection system has been performed. The study has been conducted using real data generated from the distributed sensor networks at the Intel Berkeley Research Laboratory. The experimental results were compared with the elliptical method and has been analyzed i...
[ { "created": "Sun, 12 Mar 2017 09:37:34 GMT", "version": "v1" } ]
2017-03-14
[ [ "Waskita", "A. A.", "" ], [ "Suhartanto", "H.", "" ], [ "Handoko", "L. T.", "" ] ]
An experiment to study the entropy method for an anomaly detection system has been performed. The study has been conducted using real data generated from the distributed sensor networks at the Intel Berkeley Research Laboratory. The experimental results were compared with the elliptical method and has been analyzed in ...
2004.08852
Hyeonseong Im
Hyeon-Seong Im and Si-Hyeon Lee
Mobility-Assisted Covert Communication over Wireless Ad Hoc Networks
This paper was submitted to IEEE Transactions on Information Forensics and Security. The material in this paper will be presented in part at IEEE ISIT 2020
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the effect of node mobility on the throughput scaling of the covert communication over a wireless adhoc network. It is assumed that $n$ mobile nodes want to communicate each other in a unit disk while keeping the presence of the communication secret from each of $\Theta(n^s)$ non-colluding wardens ($s>0$). O...
[ { "created": "Sun, 19 Apr 2020 13:42:44 GMT", "version": "v1" }, { "created": "Tue, 21 Apr 2020 06:52:53 GMT", "version": "v2" } ]
2020-04-22
[ [ "Im", "Hyeon-Seong", "" ], [ "Lee", "Si-Hyeon", "" ] ]
We study the effect of node mobility on the throughput scaling of the covert communication over a wireless adhoc network. It is assumed that $n$ mobile nodes want to communicate each other in a unit disk while keeping the presence of the communication secret from each of $\Theta(n^s)$ non-colluding wardens ($s>0$). Our...
1812.05802
Xin Yang
Cheng Bian, Xin Yang, Jianqiang Ma, Shen Zheng, Yu-An Liu, Reza Nezafat, Pheng-Ann Heng, and Yefeng Zheng
Pyramid Network with Online Hard Example Mining for Accurate Left Atrium Segmentation
9 pages, 4 figures. MICCAI Workshop on STACOM 2018
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accurately segmenting left atrium in MR volume can benefit the ablation procedure of atrial fibrillation. Traditional automated solutions often fail in relieving experts from the labor-intensive manual labeling. In this paper, we propose a deep neural network based solution for automated left atrium segmentation in g...
[ { "created": "Fri, 14 Dec 2018 07:28:07 GMT", "version": "v1" } ]
2018-12-17
[ [ "Bian", "Cheng", "" ], [ "Yang", "Xin", "" ], [ "Ma", "Jianqiang", "" ], [ "Zheng", "Shen", "" ], [ "Liu", "Yu-An", "" ], [ "Nezafat", "Reza", "" ], [ "Heng", "Pheng-Ann", "" ], [ "Zheng", "Yefe...
Accurately segmenting left atrium in MR volume can benefit the ablation procedure of atrial fibrillation. Traditional automated solutions often fail in relieving experts from the labor-intensive manual labeling. In this paper, we propose a deep neural network based solution for automated left atrium segmentation in gad...
2008.04638
Marco Comunita'
Marco Comunit\`a, Andrea Gerino, Veranika Lim, Lorenzo Picinali
PlugSonic: a web- and mobile-based platform for binaural audio and sonic narratives
22 pages, 11 figures
null
null
null
cs.SD cs.HC cs.MM eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
PlugSonic is a suite of web- and mobile-based applications for the curation and experience of binaural interactive soundscapes and sonic narratives. It was developed as part of the PLUGGY EU project (Pluggable Social Platform for Heritage Awareness and Participation) and consists of two main applications: PlugSonic S...
[ { "created": "Tue, 11 Aug 2020 11:42:49 GMT", "version": "v1" } ]
2020-08-12
[ [ "Comunità", "Marco", "" ], [ "Gerino", "Andrea", "" ], [ "Lim", "Veranika", "" ], [ "Picinali", "Lorenzo", "" ] ]
PlugSonic is a suite of web- and mobile-based applications for the curation and experience of binaural interactive soundscapes and sonic narratives. It was developed as part of the PLUGGY EU project (Pluggable Social Platform for Heritage Awareness and Participation) and consists of two main applications: PlugSonic Sam...
2312.07951
Zhaorui Tan
Zhaorui Tan, Xi Yang, Kaizhu Huang
Semantic-aware Data Augmentation for Text-to-image Synthesis
Accepted by AAAI24
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data augmentation has been recently leveraged as an effective regularizer in various vision-language deep neural networks. However, in text-to-image synthesis (T2Isyn), current augmentation wisdom still suffers from the semantic mismatch between augmented paired data. Even worse, semantic collapse may occur when gene...
[ { "created": "Wed, 13 Dec 2023 07:57:40 GMT", "version": "v1" } ]
2023-12-14
[ [ "Tan", "Zhaorui", "" ], [ "Yang", "Xi", "" ], [ "Huang", "Kaizhu", "" ] ]
Data augmentation has been recently leveraged as an effective regularizer in various vision-language deep neural networks. However, in text-to-image synthesis (T2Isyn), current augmentation wisdom still suffers from the semantic mismatch between augmented paired data. Even worse, semantic collapse may occur when genera...
2104.14970
Luis Sa-Couto
Luis Sa-Couto and Andreas Wichert
Using brain inspired principles to unsupervisedly learn good representations for visual pattern recognition
null
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although deep learning has solved difficult problems in visual pattern recognition, it is mostly successful in tasks where there are lots of labeled training data available. Furthermore, the global back-propagation based training rule and the amount of employed layers represents a departure from biological inspiratio...
[ { "created": "Fri, 30 Apr 2021 13:08:14 GMT", "version": "v1" } ]
2021-05-03
[ [ "Sa-Couto", "Luis", "" ], [ "Wichert", "Andreas", "" ] ]
Although deep learning has solved difficult problems in visual pattern recognition, it is mostly successful in tasks where there are lots of labeled training data available. Furthermore, the global back-propagation based training rule and the amount of employed layers represents a departure from biological inspiration....
1310.6311
Elian Carsenat
Elian Carsenat
Onomastics and Big Data Mining
ParisTech Review, October 2013
null
null
null
cs.CY
http://creativecommons.org/licenses/by/3.0/
As of today, the main business application of onomastics is naming, or branding: finding the proper name for your company or your product to stand out in the world. Meaningfully, Onoma, the Greek root for name, is also a registered trademark of Nomen, the naming agency founded by Marcel Botton in 1981. Nomen initiall...
[ { "created": "Sun, 20 Oct 2013 10:53:39 GMT", "version": "v1" } ]
2013-10-24
[ [ "Carsenat", "Elian", "" ] ]
As of today, the main business application of onomastics is naming, or branding: finding the proper name for your company or your product to stand out in the world. Meaningfully, Onoma, the Greek root for name, is also a registered trademark of Nomen, the naming agency founded by Marcel Botton in 1981. Nomen initially ...
1903.05697
Sanjay Thakur
Sanjay Thakur, Herke van Hoof, Juan Camilo Gamboa Higuera, Doina Precup, David Meger
Uncertainty Aware Learning from Demonstrations in Multiple Contexts using Bayesian Neural Networks
Copyright 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to serve...
null
null
null
cs.RO cs.LG
http://creativecommons.org/licenses/by/4.0/
Diversity of environments is a key challenge that causes learned robotic controllers to fail due to the discrepancies between the training and evaluation conditions. Training from demonstrations in various conditions can mitigate---but not completely prevent---such failures. Learned controllers such as neural network...
[ { "created": "Wed, 13 Mar 2019 19:47:36 GMT", "version": "v1" } ]
2019-03-15
[ [ "Thakur", "Sanjay", "" ], [ "van Hoof", "Herke", "" ], [ "Higuera", "Juan Camilo Gamboa", "" ], [ "Precup", "Doina", "" ], [ "Meger", "David", "" ] ]
Diversity of environments is a key challenge that causes learned robotic controllers to fail due to the discrepancies between the training and evaluation conditions. Training from demonstrations in various conditions can mitigate---but not completely prevent---such failures. Learned controllers such as neural networks ...
2011.05459
Juntao Tan
Juntao Tan, Changkyu Song, Abdeslam Boularias
A Self-supervised Learning System for Object Detection in Videos Using Random Walks on Graphs
2021 IEEE International Conference on Robotics and Automation (ICRA 2021)
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new self-supervised system for learning to detect novel and previously unseen categories of objects in images. The proposed system receives as input several unlabeled videos of scenes containing various objects. The frames of the videos are segmented into objects using depth information, and the...
[ { "created": "Tue, 10 Nov 2020 23:37:40 GMT", "version": "v1" }, { "created": "Tue, 6 Apr 2021 21:36:59 GMT", "version": "v2" }, { "created": "Tue, 24 Aug 2021 07:26:19 GMT", "version": "v3" } ]
2021-08-25
[ [ "Tan", "Juntao", "" ], [ "Song", "Changkyu", "" ], [ "Boularias", "Abdeslam", "" ] ]
This paper presents a new self-supervised system for learning to detect novel and previously unseen categories of objects in images. The proposed system receives as input several unlabeled videos of scenes containing various objects. The frames of the videos are segmented into objects using depth information, and the s...
2201.11209
Suya Wu
Mohammadreza Soltani, Suya Wu, Yuerong Li, Jie Ding, Vahid Tarokh
On The Energy Statistics of Feature Maps in Pruning of Neural Networks with Skip-Connections
null
null
null
null
cs.LG eess.IV
http://creativecommons.org/licenses/by/4.0/
We propose a new structured pruning framework for compressing Deep Neural Networks (DNNs) with skip connections, based on measuring the statistical dependency of hidden layers and predicted outputs. The dependence measure defined by the energy statistics of hidden layers serves as a model-free measure of information ...
[ { "created": "Wed, 26 Jan 2022 22:20:51 GMT", "version": "v1" } ]
2022-01-28
[ [ "Soltani", "Mohammadreza", "" ], [ "Wu", "Suya", "" ], [ "Li", "Yuerong", "" ], [ "Ding", "Jie", "" ], [ "Tarokh", "Vahid", "" ] ]
We propose a new structured pruning framework for compressing Deep Neural Networks (DNNs) with skip connections, based on measuring the statistical dependency of hidden layers and predicted outputs. The dependence measure defined by the energy statistics of hidden layers serves as a model-free measure of information be...
2104.06401
Triantafyllos Afouras
Triantafyllos Afouras, Yuki M. Asano, Francois Fagan, Andrea Vedaldi, Florian Metze
Self-supervised object detection from audio-visual correspondence
Accepted to CVPR 2022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We tackle the problem of learning object detectors without supervision. Differently from weakly-supervised object detection, we do not assume image-level class labels. Instead, we extract a supervisory signal from audio-visual data, using the audio component to "teach" the object detector. While this problem is relat...
[ { "created": "Tue, 13 Apr 2021 17:59:03 GMT", "version": "v1" }, { "created": "Sat, 9 Jul 2022 18:20:19 GMT", "version": "v2" } ]
2022-07-12
[ [ "Afouras", "Triantafyllos", "" ], [ "Asano", "Yuki M.", "" ], [ "Fagan", "Francois", "" ], [ "Vedaldi", "Andrea", "" ], [ "Metze", "Florian", "" ] ]
We tackle the problem of learning object detectors without supervision. Differently from weakly-supervised object detection, we do not assume image-level class labels. Instead, we extract a supervisory signal from audio-visual data, using the audio component to "teach" the object detector. While this problem is related...
2210.08061
Mahyar Najibi
Mahyar Najibi, Jingwei Ji, Yin Zhou, Charles R. Qi, Xinchen Yan, Scott Ettinger, Dragomir Anguelov
Motion Inspired Unsupervised Perception and Prediction in Autonomous Driving
ECCV 2022
null
null
null
cs.CV cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning-based perception and prediction modules in modern autonomous driving systems typically rely on expensive human annotation and are designed to perceive only a handful of predefined object categories. This closed-set paradigm is insufficient for the safety-critical autonomous driving task, where the autonomous...
[ { "created": "Fri, 14 Oct 2022 18:55:44 GMT", "version": "v1" } ]
2022-10-18
[ [ "Najibi", "Mahyar", "" ], [ "Ji", "Jingwei", "" ], [ "Zhou", "Yin", "" ], [ "Qi", "Charles R.", "" ], [ "Yan", "Xinchen", "" ], [ "Ettinger", "Scott", "" ], [ "Anguelov", "Dragomir", "" ] ]
Learning-based perception and prediction modules in modern autonomous driving systems typically rely on expensive human annotation and are designed to perceive only a handful of predefined object categories. This closed-set paradigm is insufficient for the safety-critical autonomous driving task, where the autonomous v...
1812.04741
Marija Slavkovik
Beishui Liao, Pere Pardo, Marija Slavkovik, Leendert van der Torre
The Jiminy Advisor: Moral Agreements Among Stakeholders Based on Norms and Argumentation
Accepted for publication with JAIR
Journal of Artificial Intelligence Research 77: 737 - 792 (2023)
10.1613/jair.1.14368
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An autonomous system is constructed by a manufacturer, operates in a society subject to norms and laws, and interacts with end users. All of these actors are stakeholders affected by the behavior of the autonomous system. We address the challenge of how the ethical views of such stakeholders can be integrated in the ...
[ { "created": "Tue, 11 Dec 2018 23:16:16 GMT", "version": "v1" }, { "created": "Wed, 6 Mar 2019 15:23:15 GMT", "version": "v2" }, { "created": "Thu, 13 Jan 2022 13:16:01 GMT", "version": "v3" }, { "created": "Fri, 28 Apr 2023 10:17:14 GMT", "version": "v4" } ]
2023-07-17
[ [ "Liao", "Beishui", "" ], [ "Pardo", "Pere", "" ], [ "Slavkovik", "Marija", "" ], [ "van der Torre", "Leendert", "" ] ]
An autonomous system is constructed by a manufacturer, operates in a society subject to norms and laws, and interacts with end users. All of these actors are stakeholders affected by the behavior of the autonomous system. We address the challenge of how the ethical views of such stakeholders can be integrated in the be...
1006.2812
Jenny Blight
Arup Abhinna Acharya and Sisir Kumar Jena
Component Interaction Graph: A new approach to test component composition
Submitted to Journal of Computer Science and Engineering, see http://sites.google.com/site/jcseuk/volume-1-issue-1-may-2010
Journal of Computer Science and Engineering, Volume 1, Issue 1, p64-67, May 2010
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The key factor of component based software development is component composition technology. A Component interaction graph is used to describe the interrelation of components. Drawing a complete component interaction graph (CIG) provides an objective basis and technical means for making the testing outline. Although m...
[ { "created": "Mon, 14 Jun 2010 19:33:59 GMT", "version": "v1" } ]
2010-06-15
[ [ "Acharya", "Arup Abhinna", "" ], [ "Jena", "Sisir Kumar", "" ] ]
The key factor of component based software development is component composition technology. A Component interaction graph is used to describe the interrelation of components. Drawing a complete component interaction graph (CIG) provides an objective basis and technical means for making the testing outline. Although man...
1702.03288
Christopher Banks
Christopher J. Banks and Ian Stark
A More Sensitive Context
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logic of Behaviour in Context (LBC) is a spatio-temporal logic for expressing properties of continuous-state processes, such as biochemical reaction networks. LBC builds on the existing Metric Interval Temporal Logic (MITL) and adds a "context modality" that explores the behaviour of a system when composed with an ex...
[ { "created": "Fri, 10 Feb 2017 18:59:20 GMT", "version": "v1" } ]
2017-02-13
[ [ "Banks", "Christopher J.", "" ], [ "Stark", "Ian", "" ] ]
Logic of Behaviour in Context (LBC) is a spatio-temporal logic for expressing properties of continuous-state processes, such as biochemical reaction networks. LBC builds on the existing Metric Interval Temporal Logic (MITL) and adds a "context modality" that explores the behaviour of a system when composed with an exte...
2309.10375
Ryosuke Oshima
Ryosuke Oshima, Seitaro Shinagawa, Hideki Tsunashima, Qi Feng, Shigeo Morishima
Pointing out Human Answer Mistakes in a Goal-Oriented Visual Dialogue
Accepted at ICCVW 2023
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Effective communication between humans and intelligent agents has promising applications for solving complex problems. One such approach is visual dialogue, which leverages multimodal context to assist humans. However, real-world scenarios occasionally involve human mistakes, which can cause intelligent agents to fai...
[ { "created": "Tue, 19 Sep 2023 07:22:05 GMT", "version": "v1" } ]
2023-09-20
[ [ "Oshima", "Ryosuke", "" ], [ "Shinagawa", "Seitaro", "" ], [ "Tsunashima", "Hideki", "" ], [ "Feng", "Qi", "" ], [ "Morishima", "Shigeo", "" ] ]
Effective communication between humans and intelligent agents has promising applications for solving complex problems. One such approach is visual dialogue, which leverages multimodal context to assist humans. However, real-world scenarios occasionally involve human mistakes, which can cause intelligent agents to fail....
2011.13132
Xing Yan
Xiangqian Sun, Xing Yan, Qi Wu
Generative Learning of Heterogeneous Tail Dependence
Major technical flaws in theoretical aspects
null
null
null
cs.LG q-fin.RM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a multivariate generative model to capture the complex dependence structure often encountered in business and financial data. Our model features heterogeneous and asymmetric tail dependence between all pairs of individual dimensions while also allowing heterogeneity and asymmetry in the tails of the margin...
[ { "created": "Thu, 26 Nov 2020 05:34:31 GMT", "version": "v1" }, { "created": "Mon, 13 Nov 2023 01:52:24 GMT", "version": "v2" } ]
2023-11-14
[ [ "Sun", "Xiangqian", "" ], [ "Yan", "Xing", "" ], [ "Wu", "Qi", "" ] ]
We propose a multivariate generative model to capture the complex dependence structure often encountered in business and financial data. Our model features heterogeneous and asymmetric tail dependence between all pairs of individual dimensions while also allowing heterogeneity and asymmetry in the tails of the marginal...
1610.04345
Julien Perez
Fei Liu and Julien Perez and Scott Nowson
A Language-independent and Compositional Model for Personality Trait Recognition from Short Texts
10 pages, 2 figures, 2 tables
null
null
null
cs.CL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many methods have been used to recognize author personality traits from text, typically combining linguistic feature engineering with shallow learning models, e.g. linear regression or Support Vector Machines. This work uses deep-learning-based models and atomic features of text, the characters, to build hierarchical...
[ { "created": "Fri, 14 Oct 2016 07:14:44 GMT", "version": "v1" } ]
2016-10-17
[ [ "Liu", "Fei", "" ], [ "Perez", "Julien", "" ], [ "Nowson", "Scott", "" ] ]
Many methods have been used to recognize author personality traits from text, typically combining linguistic feature engineering with shallow learning models, e.g. linear regression or Support Vector Machines. This work uses deep-learning-based models and atomic features of text, the characters, to build hierarchical, ...
0906.3919
Serguei Mokhov
Serguei A. Mokhov and Joey Paquet
A Type System Theory for Higher-Order Intensional Logic Support for Variable Bindings in Hybrid Intensional-Imperative Programs in GIPSY
12 pages, 1 table; 2 figures
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a type system for a platform called the General Intensional Programming System (GIPSY), designed to support intensional programming languages built upon intensional logic and their imperative counter-parts for the intensional execution model. In GIPSY, the type system glues the static and dynamic typing b...
[ { "created": "Mon, 22 Jun 2009 05:27:49 GMT", "version": "v1" } ]
2009-12-21
[ [ "Mokhov", "Serguei A.", "" ], [ "Paquet", "Joey", "" ] ]
We describe a type system for a platform called the General Intensional Programming System (GIPSY), designed to support intensional programming languages built upon intensional logic and their imperative counter-parts for the intensional execution model. In GIPSY, the type system glues the static and dynamic typing bet...
2401.11316
Nadav Benedek
Nadav Benedek, Lior Wolf
PRILoRA: Pruned and Rank-Increasing Low-Rank Adaptation
EACL 2024
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
With the proliferation of large pre-trained language models (PLMs), fine-tuning all model parameters becomes increasingly inefficient, particularly when dealing with numerous downstream tasks that entail substantial training and storage costs. Several approaches aimed at achieving parameter-efficient fine-tuning (PEF...
[ { "created": "Sat, 20 Jan 2024 20:25:17 GMT", "version": "v1" } ]
2024-01-23
[ [ "Benedek", "Nadav", "" ], [ "Wolf", "Lior", "" ] ]
With the proliferation of large pre-trained language models (PLMs), fine-tuning all model parameters becomes increasingly inefficient, particularly when dealing with numerous downstream tasks that entail substantial training and storage costs. Several approaches aimed at achieving parameter-efficient fine-tuning (PEFT)...
1705.03102
Albert Reuther PhD
Albert Reuther, Chansup Byun, William Arcand, David Bestor, Bill Bergeron, Matthew Hubbell, Michael Jones, Peter Michaleas, Andrew Prout, Antonio Rosa, Jeremy Kepner
Scalable System Scheduling for HPC and Big Data
34 pages, 7 figures
null
10.1016/j.jpdc.2017.06.009
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the rapidly expanding field of parallel processing, job schedulers are the "operating systems" of modern big data architectures and supercomputing systems. Job schedulers allocate computing resources and control the execution of processes on those resources. Historically, job schedulers were the domain of supercom...
[ { "created": "Mon, 8 May 2017 21:58:12 GMT", "version": "v1" } ]
2018-03-06
[ [ "Reuther", "Albert", "" ], [ "Byun", "Chansup", "" ], [ "Arcand", "William", "" ], [ "Bestor", "David", "" ], [ "Bergeron", "Bill", "" ], [ "Hubbell", "Matthew", "" ], [ "Jones", "Michael", "" ], [ ...
In the rapidly expanding field of parallel processing, job schedulers are the "operating systems" of modern big data architectures and supercomputing systems. Job schedulers allocate computing resources and control the execution of processes on those resources. Historically, job schedulers were the domain of supercompu...
2311.07041
Wei Chen
Weiran Jiang, Wei Chen, Bo Ai
Deep Joint Source Channel Coding With Attention Modules Over MIMO Channels
null
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose two deep joint source and channel coding (DJSCC) structures with attention modules for the multi-input multi-output (MIMO) channel, including a serial structure and a parallel structure. With singular value decomposition (SVD)-based precoding scheme, the MIMO channel can be decomposed into v...
[ { "created": "Mon, 13 Nov 2023 02:53:30 GMT", "version": "v1" }, { "created": "Tue, 12 Mar 2024 00:41:35 GMT", "version": "v2" }, { "created": "Fri, 15 Mar 2024 09:15:14 GMT", "version": "v3" } ]
2024-03-18
[ [ "Jiang", "Weiran", "" ], [ "Chen", "Wei", "" ], [ "Ai", "Bo", "" ] ]
In this paper, we propose two deep joint source and channel coding (DJSCC) structures with attention modules for the multi-input multi-output (MIMO) channel, including a serial structure and a parallel structure. With singular value decomposition (SVD)-based precoding scheme, the MIMO channel can be decomposed into var...
1212.6680
Henricus Bouwmeester
Henricus Bouwmeester, Andrew Dougherty, and Andrew V. Knyazev
Nonsymmetric multigrid preconditioning for conjugate gradient methods
7 pages
Procedia Computer Science, v. 51, pp. 276-285, 2015
10.1016/j.procs.2015.05.241
TR2013-027
cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We numerically analyze the possibility of turning off post-smoothing (relaxation) in geometric multigrid when used as a preconditioner in conjugate gradient linear and eigenvalue solvers for the 3D Laplacian. The geometric Semicoarsening Multigrid (SMG) method is provided by the hypre parallel software package. We so...
[ { "created": "Sun, 30 Dec 2012 01:15:51 GMT", "version": "v1" }, { "created": "Fri, 26 Apr 2013 23:14:59 GMT", "version": "v2" }, { "created": "Fri, 21 Jun 2013 18:45:39 GMT", "version": "v3" } ]
2015-06-09
[ [ "Bouwmeester", "Henricus", "" ], [ "Dougherty", "Andrew", "" ], [ "Knyazev", "Andrew V.", "" ] ]
We numerically analyze the possibility of turning off post-smoothing (relaxation) in geometric multigrid when used as a preconditioner in conjugate gradient linear and eigenvalue solvers for the 3D Laplacian. The geometric Semicoarsening Multigrid (SMG) method is provided by the hypre parallel software package. We solv...
1904.02338
Maruan Al-Shedivat
Maruan Al-Shedivat and Ankur P. Parikh
Consistency by Agreement in Zero-shot Neural Machine Translation
NAACL 2019 (14 pages, 5 figures)
null
null
null
cs.LG cs.CL cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generalization and reliability of multilingual translation often highly depend on the amount of available parallel data for each language pair of interest. In this paper, we focus on zero-shot generalization---a challenging setup that tests models on translation directions they have not been optimized for at training...
[ { "created": "Thu, 4 Apr 2019 03:49:05 GMT", "version": "v1" }, { "created": "Wed, 10 Apr 2019 04:00:03 GMT", "version": "v2" } ]
2019-04-11
[ [ "Al-Shedivat", "Maruan", "" ], [ "Parikh", "Ankur P.", "" ] ]
Generalization and reliability of multilingual translation often highly depend on the amount of available parallel data for each language pair of interest. In this paper, we focus on zero-shot generalization---a challenging setup that tests models on translation directions they have not been optimized for at training t...
2106.13764
Yasir Zaki
Moumena Chaqfeh, Muhammad Haseeb, Waleed Hashmi, Patrick Inshuti, Manesha Ramesh, Matteo Varvello, Fareed Zaffar, Lakshmi Subramanian, Yasir Zaki
To Block or Not to Block: Accelerating Mobile Web Pages On-The-Fly Through JavaScript Classification
11 pages, 11 figures
null
null
null
cs.OH
http://creativecommons.org/licenses/by/4.0/
The increasing complexity of JavaScript in modern mobile web pages has become a critical performance bottleneck for low-end mobile phone users, especially in developing regions. In this paper, we propose SlimWeb, a novel approach that automatically derives lightweight versions of mobile web pages on-the-fly by elimin...
[ { "created": "Sun, 20 Jun 2021 10:32:10 GMT", "version": "v1" } ]
2021-06-28
[ [ "Chaqfeh", "Moumena", "" ], [ "Haseeb", "Muhammad", "" ], [ "Hashmi", "Waleed", "" ], [ "Inshuti", "Patrick", "" ], [ "Ramesh", "Manesha", "" ], [ "Varvello", "Matteo", "" ], [ "Zaffar", "Fareed", "" ], ...
The increasing complexity of JavaScript in modern mobile web pages has become a critical performance bottleneck for low-end mobile phone users, especially in developing regions. In this paper, we propose SlimWeb, a novel approach that automatically derives lightweight versions of mobile web pages on-the-fly by eliminat...
2001.00358
Moonyoung Lee
Moonyoung Lee, Yujin Heo, Saihim Cho, Hyunsub Park, Jun-Ho Oh
Motion Generation Interface of ROS to PODO Software Framework for Wheeled Huamanoid Robot
IEEE Int. Conf. on Advanced Robotics (ICAR), 2019
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses the development of robot motion generation interface between a real-time software architecture and a non-real-time robot operating system. In order for robots to execute intelligent manipulation or navigation, close integration of high-level perception and low-level control is required. However, ...
[ { "created": "Thu, 2 Jan 2020 08:37:13 GMT", "version": "v1" } ]
2020-01-03
[ [ "Lee", "Moonyoung", "" ], [ "Heo", "Yujin", "" ], [ "Cho", "Saihim", "" ], [ "Park", "Hyunsub", "" ], [ "Oh", "Jun-Ho", "" ] ]
This paper discusses the development of robot motion generation interface between a real-time software architecture and a non-real-time robot operating system. In order for robots to execute intelligent manipulation or navigation, close integration of high-level perception and low-level control is required. However, ma...
1903.00782
Shehryar Khattak
Shehryar Khattak, Christos Papachristos, Kostas Alexis
Marker based Thermal-Inertial Localization for Aerial Robots in Obscurant Filled Environments
10 pages, 5 figures, Published in International Symposium on Visual Computing 2018
null
10.1007/978-3-030-03801-4_49
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For robotic inspection tasks in known environments fiducial markers provide a reliable and low-cost solution for robot localization. However, detection of such markers relies on the quality of RGB camera data, which degrades significantly in the presence of visual obscurants such as fog and smoke. The ability to navi...
[ { "created": "Sat, 2 Mar 2019 22:33:02 GMT", "version": "v1" } ]
2019-03-05
[ [ "Khattak", "Shehryar", "" ], [ "Papachristos", "Christos", "" ], [ "Alexis", "Kostas", "" ] ]
For robotic inspection tasks in known environments fiducial markers provide a reliable and low-cost solution for robot localization. However, detection of such markers relies on the quality of RGB camera data, which degrades significantly in the presence of visual obscurants such as fog and smoke. The ability to naviga...
2011.10812
Fan Lu
Fan Lu, Guang Chen, Yinlong Liu, Zhijun Li, Sanqing Qu, Tianpei Zou
MoNet: Motion-based Point Cloud Prediction Network
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Predicting the future can significantly improve the safety of intelligent vehicles, which is a key component in autonomous driving. 3D point clouds accurately model 3D information of surrounding environment and are crucial for intelligent vehicles to perceive the scene. Therefore, prediction of 3D point clouds has gr...
[ { "created": "Sat, 21 Nov 2020 15:43:31 GMT", "version": "v1" } ]
2020-11-24
[ [ "Lu", "Fan", "" ], [ "Chen", "Guang", "" ], [ "Liu", "Yinlong", "" ], [ "Li", "Zhijun", "" ], [ "Qu", "Sanqing", "" ], [ "Zou", "Tianpei", "" ] ]
Predicting the future can significantly improve the safety of intelligent vehicles, which is a key component in autonomous driving. 3D point clouds accurately model 3D information of surrounding environment and are crucial for intelligent vehicles to perceive the scene. Therefore, prediction of 3D point clouds has grea...
1603.08642
Jennifer King
Jennifer E. King, Siddhartha S. Srinivasa
Rearrangement Planning via Heuristic Search
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method to apply heuristic search algorithms to solve rearrangement planning by pushing problems. In these problems, a robot must push an object through clutter to achieve a goal. To do this, we exploit the fact that contact with objects in the environment is critical to goal achievement. We dynamically g...
[ { "created": "Tue, 29 Mar 2016 05:03:16 GMT", "version": "v1" } ]
2016-03-30
[ [ "King", "Jennifer E.", "" ], [ "Srinivasa", "Siddhartha S.", "" ] ]
We present a method to apply heuristic search algorithms to solve rearrangement planning by pushing problems. In these problems, a robot must push an object through clutter to achieve a goal. To do this, we exploit the fact that contact with objects in the environment is critical to goal achievement. We dynamically gen...
1810.03806
Chenxiao Zhao
Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang and Chaomin Shen
The Adversarial Attack and Detection under the Fisher Information Metric
Accepted as an AAAI-2019 oral paper
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many deep learning models are vulnerable to the adversarial attack, i.e., imperceptible but intentionally-designed perturbations to the input can cause incorrect output of the networks. In this paper, using information geometry, we provide a reasonable explanation for the vulnerability of deep learning models. By con...
[ { "created": "Tue, 9 Oct 2018 04:25:05 GMT", "version": "v1" }, { "created": "Sat, 9 Feb 2019 03:40:49 GMT", "version": "v2" } ]
2019-02-12
[ [ "Zhao", "Chenxiao", "" ], [ "Fletcher", "P. Thomas", "" ], [ "Yu", "Mixue", "" ], [ "Peng", "Yaxin", "" ], [ "Zhang", "Guixu", "" ], [ "Shen", "Chaomin", "" ] ]
Many deep learning models are vulnerable to the adversarial attack, i.e., imperceptible but intentionally-designed perturbations to the input can cause incorrect output of the networks. In this paper, using information geometry, we provide a reasonable explanation for the vulnerability of deep learning models. By consi...
2404.11504
Ishay Haviv
Ishay Haviv and Michal Parnas
Testing Intersectingness of Uniform Families
20 pages
null
null
null
cs.DS
http://creativecommons.org/licenses/by/4.0/
A set family ${\cal F}$ is called intersecting if every two members of ${\cal F}$ intersect, and it is called uniform if all members of ${\cal F}$ share a common size. A uniform family ${\cal F} \subseteq \binom{[n]}{k}$ of $k$-subsets of $[n]$ is $\varepsilon$-far from intersecting if one has to remove more than $\v...
[ { "created": "Wed, 17 Apr 2024 15:59:25 GMT", "version": "v1" }, { "created": "Thu, 18 Jul 2024 12:30:13 GMT", "version": "v2" } ]
2024-07-19
[ [ "Haviv", "Ishay", "" ], [ "Parnas", "Michal", "" ] ]
A set family ${\cal F}$ is called intersecting if every two members of ${\cal F}$ intersect, and it is called uniform if all members of ${\cal F}$ share a common size. A uniform family ${\cal F} \subseteq \binom{[n]}{k}$ of $k$-subsets of $[n]$ is $\varepsilon$-far from intersecting if one has to remove more than $\var...
2005.11753
Tianhao Wang
Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha
Continuous Release of Data Streams under both Centralized and Local Differential Privacy
null
null
null
null
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the problem of publishing a stream of real-valued data satisfying differential privacy (DP). One major challenge is that the maximal possible value can be quite large; thus it is necessary to estimate a threshold so that numbers above it are truncated to reduce the amount of noise that is requ...
[ { "created": "Sun, 24 May 2020 14:25:49 GMT", "version": "v1" }, { "created": "Thu, 7 Dec 2023 20:02:17 GMT", "version": "v2" } ]
2023-12-11
[ [ "Wang", "Tianhao", "" ], [ "Chen", "Joann Qiongna", "" ], [ "Zhang", "Zhikun", "" ], [ "Su", "Dong", "" ], [ "Cheng", "Yueqiang", "" ], [ "Li", "Zhou", "" ], [ "Li", "Ninghui", "" ], [ "Jha", "S...
In this paper, we study the problem of publishing a stream of real-valued data satisfying differential privacy (DP). One major challenge is that the maximal possible value can be quite large; thus it is necessary to estimate a threshold so that numbers above it are truncated to reduce the amount of noise that is requir...
2312.09730
Emmanuel Raptis
Marios Krestenitis, Emmanuel K. Raptis, Athanasios Ch. Kapoutsis, Konstantinos Ioannidis, Elias B. Kosmatopoulos, Stefanos Vrochidis
Overcome the Fear Of Missing Out: Active Sensing UAV Scanning for Precision Agriculture
null
Robotics and Autonomous Systems (2023): 104581
10.1016/j.robot.2023.104581
null
cs.RO cs.SY eess.SY
http://creativecommons.org/licenses/by/4.0/
This paper deals with the problem of informative path planning for a UAV deployed for precision agriculture applications. First, we observe that the ``fear of missing out'' data lead to uniform, conservative scanning policies over the whole agricultural field. Consequently, employing a non-uniform scanning approach c...
[ { "created": "Fri, 15 Dec 2023 12:13:22 GMT", "version": "v1" } ]
2023-12-18
[ [ "Krestenitis", "Marios", "" ], [ "Raptis", "Emmanuel K.", "" ], [ "Kapoutsis", "Athanasios Ch.", "" ], [ "Ioannidis", "Konstantinos", "" ], [ "Kosmatopoulos", "Elias B.", "" ], [ "Vrochidis", "Stefanos", "" ] ]
This paper deals with the problem of informative path planning for a UAV deployed for precision agriculture applications. First, we observe that the ``fear of missing out'' data lead to uniform, conservative scanning policies over the whole agricultural field. Consequently, employing a non-uniform scanning approach can...
2403.05937
Cunhui Dong
Cunhui Dong, Haichuan Ma, Haotian Zhang, Changsheng Gao, Li Li, Dong Liu
Wavelet-Like Transform-Based Technology in Response to the Call for Proposals on Neural Network-Based Image Coding
null
null
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural network-based image coding has been developing rapidly since its birth. Until 2022, its performance has surpassed that of the best-performing traditional image coding framework -- H.266/VVC. Witnessing such success, the IEEE 1857.11 working subgroup initializes a neural network-based image coding standard proj...
[ { "created": "Sat, 9 Mar 2024 15:13:49 GMT", "version": "v1" } ]
2024-03-12
[ [ "Dong", "Cunhui", "" ], [ "Ma", "Haichuan", "" ], [ "Zhang", "Haotian", "" ], [ "Gao", "Changsheng", "" ], [ "Li", "Li", "" ], [ "Liu", "Dong", "" ] ]
Neural network-based image coding has been developing rapidly since its birth. Until 2022, its performance has surpassed that of the best-performing traditional image coding framework -- H.266/VVC. Witnessing such success, the IEEE 1857.11 working subgroup initializes a neural network-based image coding standard projec...
2208.05622
Qihan Guo
Qihan Guo (1), Siwei Wang (1), Jun Zhu (1) ((1) Tsinghua University)
Regret Analysis for Hierarchical Experts Bandit Problem
14 pages, 2 figures, submitted to AAAI 2023
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study an extension of standard bandit problem in which there are R layers of experts. Multi-layered experts make selections layer by layer and only the experts in the last layer can play arms. The goal of the learning policy is to minimize the total regret in this hierarchical experts setting. We first analyze the...
[ { "created": "Thu, 11 Aug 2022 03:44:55 GMT", "version": "v1" } ]
2022-08-12
[ [ "Guo", "Qihan", "", "Tsinghua University" ], [ "Wang", "Siwei", "", "Tsinghua University" ], [ "Zhu", "Jun", "", "Tsinghua University" ] ]
We study an extension of standard bandit problem in which there are R layers of experts. Multi-layered experts make selections layer by layer and only the experts in the last layer can play arms. The goal of the learning policy is to minimize the total regret in this hierarchical experts setting. We first analyze the c...
2307.06340
Lennart Br\"uggemann
Lennart Br\"uggemann
Securely extending and running low-code applications with C#
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-code development platforms provide an accessible infrastructure for the creation of software by domain experts, also called "citizen developers", without the need for formal programming education. Development is facilitated through graphical user interfaces, although traditional programming can still be used to e...
[ { "created": "Wed, 12 Jul 2023 09:32:31 GMT", "version": "v1" } ]
2023-07-14
[ [ "Brüggemann", "Lennart", "" ] ]
Low-code development platforms provide an accessible infrastructure for the creation of software by domain experts, also called "citizen developers", without the need for formal programming education. Development is facilitated through graphical user interfaces, although traditional programming can still be used to ext...
2404.08761
Joshua Feinglass
Joshua Feinglass, Jayaraman J. Thiagarajan, Rushil Anirudh, T.S. Jayram, Yezhou Yang
`Eyes of a Hawk and Ears of a Fox': Part Prototype Network for Generalized Zero-Shot Learning
Accepted to the CVPR 2024 LIMIT Workshop
null
null
null
cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
Current approaches in Generalized Zero-Shot Learning (GZSL) are built upon base models which consider only a single class attribute vector representation over the entire image. This is an oversimplification of the process of novel category recognition, where different regions of the image may have properties from dif...
[ { "created": "Fri, 12 Apr 2024 18:37:00 GMT", "version": "v1" } ]
2024-04-16
[ [ "Feinglass", "Joshua", "" ], [ "Thiagarajan", "Jayaraman J.", "" ], [ "Anirudh", "Rushil", "" ], [ "Jayram", "T. S.", "" ], [ "Yang", "Yezhou", "" ] ]
Current approaches in Generalized Zero-Shot Learning (GZSL) are built upon base models which consider only a single class attribute vector representation over the entire image. This is an oversimplification of the process of novel category recognition, where different regions of the image may have properties from diffe...
1607.04545
Pedro Montealegre
Pedro Montealegre, Ioan Todinca
On Distance-$d$ Independent Set and other problems in graphs with few minimal separators
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fomin and Villanger (STACS 2010) proved that Maximum Independent Set, Feedback Vertex Set, and more generally the problem of finding a maximum induced subgraph of treewith at most a constant $t$, can be solved in polynomial time on graph classes with polynomially many minimal separators. We extend these results in tw...
[ { "created": "Fri, 15 Jul 2016 15:09:12 GMT", "version": "v1" } ]
2016-07-18
[ [ "Montealegre", "Pedro", "" ], [ "Todinca", "Ioan", "" ] ]
Fomin and Villanger (STACS 2010) proved that Maximum Independent Set, Feedback Vertex Set, and more generally the problem of finding a maximum induced subgraph of treewith at most a constant $t$, can be solved in polynomial time on graph classes with polynomially many minimal separators. We extend these results in two ...
1904.01994
Nabeel Abdur Rehman
Nabeel Abdur Rehman, Umar Saif, Rumi Chunara
Deep Landscape Features for Improving Vector-borne Disease Prediction
10 pages, 3 figures, 1 table
null
null
null
cs.CY cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The global population at risk of mosquito-borne diseases such as dengue, yellow fever, chikungunya and Zika is expanding. Infectious disease models commonly incorporate environmental measures like temperature and precipitation. Given increasing availability of high-resolution satellite imagery, here we consider inclu...
[ { "created": "Wed, 3 Apr 2019 13:29:58 GMT", "version": "v1" } ]
2019-04-04
[ [ "Rehman", "Nabeel Abdur", "" ], [ "Saif", "Umar", "" ], [ "Chunara", "Rumi", "" ] ]
The global population at risk of mosquito-borne diseases such as dengue, yellow fever, chikungunya and Zika is expanding. Infectious disease models commonly incorporate environmental measures like temperature and precipitation. Given increasing availability of high-resolution satellite imagery, here we consider includi...
2401.16312
Yen-Chi Lee
Yun-Feng Lo, Yen-Chi Lee, Min-Hsiu Hsieh
Degradability of Modified Landau-Streater Type Low-Noise Quantum Channels in High Dimensions
13 pages, 1 figure, comments welcome! v2: Introduction enhanced
null
null
null
cs.IT math.IT quant-ph
http://creativecommons.org/licenses/by/4.0/
This paper delves into the degradability of quantum channels, with a specific focus on high-dimensional extensions of qubit depolarizing channels in low-noise regimes. We build upon the foundation of $\eta$-approximate degradable channels, as established by Sutter et al. and Leditzky et al., to introduce and examine ...
[ { "created": "Mon, 29 Jan 2024 17:17:34 GMT", "version": "v1" }, { "created": "Tue, 30 Jan 2024 05:04:50 GMT", "version": "v2" } ]
2024-01-31
[ [ "Lo", "Yun-Feng", "" ], [ "Lee", "Yen-Chi", "" ], [ "Hsieh", "Min-Hsiu", "" ] ]
This paper delves into the degradability of quantum channels, with a specific focus on high-dimensional extensions of qubit depolarizing channels in low-noise regimes. We build upon the foundation of $\eta$-approximate degradable channels, as established by Sutter et al. and Leditzky et al., to introduce and examine th...
2305.06801
Francois Remy
Fran\c{c}ois Remy, Alfiya Khabibullina, Thomas Demeester
Detecting Idiomatic Multiword Expressions in Clinical Terminology using Definition-Based Representation Learning
Best Paper Award @ MWE 2023
null
null
null
cs.CL
http://creativecommons.org/publicdomain/zero/1.0/
This paper shines a light on the potential of definition-based semantic models for detecting idiomatic and semi-idiomatic multiword expressions (MWEs) in clinical terminology. Our study focuses on biomedical entities defined in the UMLS ontology and aims to help prioritize the translation efforts of these entities. I...
[ { "created": "Thu, 11 May 2023 13:42:58 GMT", "version": "v1" } ]
2023-05-12
[ [ "Remy", "François", "" ], [ "Khabibullina", "Alfiya", "" ], [ "Demeester", "Thomas", "" ] ]
This paper shines a light on the potential of definition-based semantic models for detecting idiomatic and semi-idiomatic multiword expressions (MWEs) in clinical terminology. Our study focuses on biomedical entities defined in the UMLS ontology and aims to help prioritize the translation efforts of these entities. In ...
1509.01770
Kishan Wimalawarne
Kishan Wimalawarne, Ryota Tomioka and Masashi Sugiyama
Theoretical and Experimental Analyses of Tensor-Based Regression and Classification
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We theoretically and experimentally investigate tensor-based regression and classification. Our focus is regularization with various tensor norms, including the overlapped trace norm, the latent trace norm, and the scaled latent trace norm. We first give dual optimization methods using the alternating direction metho...
[ { "created": "Sun, 6 Sep 2015 05:03:27 GMT", "version": "v1" } ]
2015-09-08
[ [ "Wimalawarne", "Kishan", "" ], [ "Tomioka", "Ryota", "" ], [ "Sugiyama", "Masashi", "" ] ]
We theoretically and experimentally investigate tensor-based regression and classification. Our focus is regularization with various tensor norms, including the overlapped trace norm, the latent trace norm, and the scaled latent trace norm. We first give dual optimization methods using the alternating direction method ...
1309.6608
sukhjit Singh Sehra Er.
Sukhjit Singh Sehra, Jaiteg Singh and Hardeep Singh Rai
Assessment of OpenStreetMap Data - A Review
Review paper
International Journal of Computer Applications, 76(16):17-20, August 2013
10.5120/13331-0888 10.5120/13331-0888
null
cs.CY cs.DB cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The meaning and purposes of web has been changing and evolving day by day. Web 2. 0 encouraged more contribution by the end users. This movement provided revolutionary methods of sharing and computing data by crowdsourcing such as OpenStreetmap, also called "the wikification of maps" by some researchers. When crowdso...
[ { "created": "Wed, 25 Sep 2013 18:52:48 GMT", "version": "v1" } ]
2013-09-26
[ [ "Sehra", "Sukhjit Singh", "" ], [ "Singh", "Jaiteg", "" ], [ "Rai", "Hardeep Singh", "" ] ]
The meaning and purposes of web has been changing and evolving day by day. Web 2. 0 encouraged more contribution by the end users. This movement provided revolutionary methods of sharing and computing data by crowdsourcing such as OpenStreetmap, also called "the wikification of maps" by some researchers. When crowdsour...
2311.12779
Pooria Namyar
Pooria Namyar, Behnaz Arzani, Ryan Beckett, Santiago Segarra, Himanshu Raj, Umesh Krishnaswamy, Ramesh Govindan, Srikanth Kandula
Finding Adversarial Inputs for Heuristics using Multi-level Optimization
null
null
null
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Production systems use heuristics because they are faster or scale better than their optimal counterparts. Yet, practitioners are often unaware of the performance gap between a heuristic and the optimum or between two heuristics in realistic scenarios. We present MetaOpt, a system that helps analyze heuristics. Users...
[ { "created": "Tue, 21 Nov 2023 18:43:16 GMT", "version": "v1" } ]
2023-11-22
[ [ "Namyar", "Pooria", "" ], [ "Arzani", "Behnaz", "" ], [ "Beckett", "Ryan", "" ], [ "Segarra", "Santiago", "" ], [ "Raj", "Himanshu", "" ], [ "Krishnaswamy", "Umesh", "" ], [ "Govindan", "Ramesh", "" ], ...
Production systems use heuristics because they are faster or scale better than their optimal counterparts. Yet, practitioners are often unaware of the performance gap between a heuristic and the optimum or between two heuristics in realistic scenarios. We present MetaOpt, a system that helps analyze heuristics. Users s...
2402.09965
Inkyu Park
Han Yegang, Park Minjun, Byun Duwon, Park Inkyu
Hierarchy Representation of Data in Machine Learnings
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When there are models with clear-cut judgment results for several data points, it is possible that most models exhibit a relationship where if they correctly judge one target, they also correctly judge another target. Conversely, if most models incorrectly judge one target, they may also incorrectly judge another tar...
[ { "created": "Thu, 30 Nov 2023 01:49:52 GMT", "version": "v1" } ]
2024-02-16
[ [ "Yegang", "Han", "" ], [ "Minjun", "Park", "" ], [ "Duwon", "Byun", "" ], [ "Inkyu", "Park", "" ] ]
When there are models with clear-cut judgment results for several data points, it is possible that most models exhibit a relationship where if they correctly judge one target, they also correctly judge another target. Conversely, if most models incorrectly judge one target, they may also incorrectly judge another targe...
2205.13963
Georg Hager
Ayesha Afzal, Georg Hager, Gerhard Wellein, Stefano Markidis
Exploring Techniques for the Analysis of Spontaneous Asynchronicity in MPI-Parallel Applications
12 pages, 9 figures, 1 table
null
10.1007/978-3-031-30442-2_12
null
cs.DC cs.LG cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the utility of using data analytics and machine learning techniques for identifying, classifying, and characterizing the dynamics of large-scale parallel (MPI) programs. To this end, we run microbenchmarks and realistic proxy applications with the regular compute-communicate structure on two differ...
[ { "created": "Fri, 27 May 2022 13:19:07 GMT", "version": "v1" } ]
2023-09-06
[ [ "Afzal", "Ayesha", "" ], [ "Hager", "Georg", "" ], [ "Wellein", "Gerhard", "" ], [ "Markidis", "Stefano", "" ] ]
This paper studies the utility of using data analytics and machine learning techniques for identifying, classifying, and characterizing the dynamics of large-scale parallel (MPI) programs. To this end, we run microbenchmarks and realistic proxy applications with the regular compute-communicate structure on two differen...
1909.02871
Stephan G\"unther
Stephan M. G\"unther, Nicolas Appel and Georg Carle
Galois Field Arithmetics for Linear Network Coding using AVX512 Instruction Set Extensions
6 pages, 2 figures, the updated finite field library is available under the LGPL at https://moep80211.net/plink/libmoepgf-avx512
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear network coding requires arithmetic operations over Galois fields, more specifically over finite extension fields. While coding over GF(2) reduces to simple XOR operations, this field is less preferred for practical applications of random linear network coding due to high chances of linear dependencies and ther...
[ { "created": "Wed, 4 Sep 2019 09:20:59 GMT", "version": "v1" } ]
2019-09-09
[ [ "Günther", "Stephan M.", "" ], [ "Appel", "Nicolas", "" ], [ "Carle", "Georg", "" ] ]
Linear network coding requires arithmetic operations over Galois fields, more specifically over finite extension fields. While coding over GF(2) reduces to simple XOR operations, this field is less preferred for practical applications of random linear network coding due to high chances of linear dependencies and theref...
2202.12888
MohammadJavad Azizi
Mohammadjavad Azizi, Branislav Kveton, Mohammad Ghavamzadeh, Sumeet Katariya
Meta-Learning for Simple Regret Minimization
null
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a meta-learning framework for simple regret minimization in bandits. In this framework, a learning agent interacts with a sequence of bandit tasks, which are sampled i.i.d.\ from an unknown prior distribution, and learns its meta-parameters to perform better on future tasks. We propose the first Bayesian a...
[ { "created": "Fri, 25 Feb 2022 18:56:54 GMT", "version": "v1" }, { "created": "Tue, 4 Jul 2023 20:01:11 GMT", "version": "v2" } ]
2023-07-06
[ [ "Azizi", "Mohammadjavad", "" ], [ "Kveton", "Branislav", "" ], [ "Ghavamzadeh", "Mohammad", "" ], [ "Katariya", "Sumeet", "" ] ]
We develop a meta-learning framework for simple regret minimization in bandits. In this framework, a learning agent interacts with a sequence of bandit tasks, which are sampled i.i.d.\ from an unknown prior distribution, and learns its meta-parameters to perform better on future tasks. We propose the first Bayesian and...
2310.05324
Andrew Starnes
Andrew Starnes, Anton Dereventsov, Clayton Webster
Increasing Entropy to Boost Policy Gradient Performance on Personalization Tasks
8 pages, 3 figures, accepted to WAIN 2023
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
In this effort, we consider the impact of regularization on the diversity of actions taken by policies generated from reinforcement learning agents trained using a policy gradient. Policy gradient agents are prone to entropy collapse, which means certain actions are seldomly, if ever, selected. We augment the optimiz...
[ { "created": "Mon, 9 Oct 2023 01:03:05 GMT", "version": "v1" } ]
2023-10-10
[ [ "Starnes", "Andrew", "" ], [ "Dereventsov", "Anton", "" ], [ "Webster", "Clayton", "" ] ]
In this effort, we consider the impact of regularization on the diversity of actions taken by policies generated from reinforcement learning agents trained using a policy gradient. Policy gradient agents are prone to entropy collapse, which means certain actions are seldomly, if ever, selected. We augment the optimizat...
2211.12224
Igor Donevski
Igor Donevski, Marco Virgili, Nithin Babu, Jimmy Jessen Nielsen, Andrew J. Forsyth, Constantinos B. Papadias, Petar Popovski
Sustainable Wireless Services with UAV Swarms Tailored to Renewable Energy Sources
To be published in Transactions on Smart Grid
null
null
null
cs.NI eess.SP
http://creativecommons.org/licenses/by/4.0/
Unmanned Aerial Vehicle (UAV) swarms are often required in off-grid scenarios, such as disaster-struck, war-torn or rural areas, where the UAVs have no access to the power grid and instead rely on renewable energy. Considering a main battery fed from two renewable sources, wind and solar, we scale such a system based...
[ { "created": "Tue, 22 Nov 2022 12:30:39 GMT", "version": "v1" }, { "created": "Wed, 23 Nov 2022 17:16:56 GMT", "version": "v2" } ]
2022-11-24
[ [ "Donevski", "Igor", "" ], [ "Virgili", "Marco", "" ], [ "Babu", "Nithin", "" ], [ "Nielsen", "Jimmy Jessen", "" ], [ "Forsyth", "Andrew J.", "" ], [ "Papadias", "Constantinos B.", "" ], [ "Popovski", "Petar", ...
Unmanned Aerial Vehicle (UAV) swarms are often required in off-grid scenarios, such as disaster-struck, war-torn or rural areas, where the UAVs have no access to the power grid and instead rely on renewable energy. Considering a main battery fed from two renewable sources, wind and solar, we scale such a system based o...
1412.5275
Azade Rezaeezade
Ismail Nojavani, Azade Rezaeezade and Amirhassan Monadjemi
Iranian cashes recognition using mobile
arXiv #133709
International Journal of Computer Science & Information Technology, volume 6, issue 6, pp.61-71, 2014
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
In economical societies of today, using cash is an inseparable aspect of human life. People use cashes for marketing, services, entertainments, bank operations and so on. This huge amount of contact with cash and the necessity of knowing the monetary value of it caused one of the most challenging problems for visuall...
[ { "created": "Wed, 17 Dec 2014 07:51:56 GMT", "version": "v1" } ]
2014-12-18
[ [ "Nojavani", "Ismail", "" ], [ "Rezaeezade", "Azade", "" ], [ "Monadjemi", "Amirhassan", "" ] ]
In economical societies of today, using cash is an inseparable aspect of human life. People use cashes for marketing, services, entertainments, bank operations and so on. This huge amount of contact with cash and the necessity of knowing the monetary value of it caused one of the most challenging problems for visually ...
1901.10583
Vithya Yogarajan
Vithya Yogarajan, Bernhard Pfahringer and Michael Mayo
Automatic end-to-end De-identification: Is high accuracy the only metric?
17 pages, 1 figure, 7 tables, review journal paper
Applied Artificial Intelligence, 2020
10.1080/08839514.2020.1718343
04-Feb-2020
cs.CY cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
De-identification of electronic health records (EHR) is a vital step towards advancing health informatics research and maximising the use of available data. It is a two-step process where step one is the identification of protected health information (PHI), and step two is replacing such PHI with surrogates. Despite ...
[ { "created": "Sun, 27 Jan 2019 21:51:40 GMT", "version": "v1" } ]
2020-02-18
[ [ "Yogarajan", "Vithya", "" ], [ "Pfahringer", "Bernhard", "" ], [ "Mayo", "Michael", "" ] ]
De-identification of electronic health records (EHR) is a vital step towards advancing health informatics research and maximising the use of available data. It is a two-step process where step one is the identification of protected health information (PHI), and step two is replacing such PHI with surrogates. Despite th...
2303.12653
Fenghao Zhu
Fenghao Zhu, Bohao Wang, Zhaohui Yang, Chongwen Huang, Zhaoyang Zhang, George C.Alexandropoulos, Chau Yuen and Merouane Debbah
Robust Millimeter Beamforming via Self-Supervised Hybrid Deep Learning
Accept by EUSIPCO 2023
2023 31st European Signal Processing Conference (EUSIPCO), Helsinki, Finland, 2023, pp. 915-919
10.23919/EUSIPCO58844.2023.10289989
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Beamforming with large-scale antenna arrays has been widely used in recent years, which is acknowledged as an important part in 5G and incoming 6G. Thus, various techniques are leveraged to improve its performance, e.g., deep learning, advanced optimization algorithms, etc. Although its performance in many previous r...
[ { "created": "Thu, 9 Mar 2023 05:30:53 GMT", "version": "v1" }, { "created": "Wed, 2 Aug 2023 12:20:40 GMT", "version": "v2" }, { "created": "Fri, 2 Aug 2024 04:02:26 GMT", "version": "v3" } ]
2024-08-05
[ [ "Zhu", "Fenghao", "" ], [ "Wang", "Bohao", "" ], [ "Yang", "Zhaohui", "" ], [ "Huang", "Chongwen", "" ], [ "Zhang", "Zhaoyang", "" ], [ "Alexandropoulos", "George C.", "" ], [ "Yuen", "Chau", "" ], [ ...
Beamforming with large-scale antenna arrays has been widely used in recent years, which is acknowledged as an important part in 5G and incoming 6G. Thus, various techniques are leveraged to improve its performance, e.g., deep learning, advanced optimization algorithms, etc. Although its performance in many previous res...
2401.01013
Thanh Dung Le
Thanh-Dung Le
Boosting Transformer's Robustness and Efficacy in PPG Signal Artifact Detection with Self-Supervised Learning
Under preparation to submit to IEEE for possible publications
null
null
null
cs.LG eess.SP
http://creativecommons.org/licenses/by-nc-nd/4.0/
Recent research at CHU Sainte Justine's Pediatric Critical Care Unit (PICU) has revealed that traditional machine learning methods, such as semi-supervised label propagation and K-nearest neighbors, outperform Transformer-based models in artifact detection from PPG signals, mainly when data is limited. This study add...
[ { "created": "Tue, 2 Jan 2024 04:00:48 GMT", "version": "v1" } ]
2024-01-03
[ [ "Le", "Thanh-Dung", "" ] ]
Recent research at CHU Sainte Justine's Pediatric Critical Care Unit (PICU) has revealed that traditional machine learning methods, such as semi-supervised label propagation and K-nearest neighbors, outperform Transformer-based models in artifact detection from PPG signals, mainly when data is limited. This study addre...
1705.02822
Syed Mohammad Meesum
Syed Mohammad Meesum, Fahad Panolan, Saket Saurabh, and Meirav Zehavi
Rank Vertex Cover as a Natural Problem for Algebraic Compression
null
null
null
null
cs.DS
http://creativecommons.org/licenses/by-nc-sa/4.0/
The question of the existence of a polynomial kernelization of the Vertex Cover Above LP problem has been a longstanding, notorious open problem in Parameterized Complexity. Five years ago, the breakthrough work by Kratsch and Wahlstrom on representative sets has finally answered this question in the affirmative [FOC...
[ { "created": "Mon, 8 May 2017 10:56:28 GMT", "version": "v1" }, { "created": "Wed, 10 May 2017 11:32:23 GMT", "version": "v2" } ]
2017-05-11
[ [ "Meesum", "Syed Mohammad", "" ], [ "Panolan", "Fahad", "" ], [ "Saurabh", "Saket", "" ], [ "Zehavi", "Meirav", "" ] ]
The question of the existence of a polynomial kernelization of the Vertex Cover Above LP problem has been a longstanding, notorious open problem in Parameterized Complexity. Five years ago, the breakthrough work by Kratsch and Wahlstrom on representative sets has finally answered this question in the affirmative [FOCS ...
2204.09121
Henggang Cui
Christopher Hazard, Akshay Bhagat, Balarama Raju Buddharaju, Zhongtao Liu, Yunming Shao, Lu Lu, Sammy Omari, Henggang Cui
Importance is in your attention: agent importance prediction for autonomous driving
Accepted at CVPR 2022 Precognition workshop
null
null
null
cs.RO cs.CV
http://creativecommons.org/licenses/by/4.0/
Trajectory prediction is an important task in autonomous driving. State-of-the-art trajectory prediction models often use attention mechanisms to model the interaction between agents. In this paper, we show that the attention information from such models can also be used to measure the importance of each agent with r...
[ { "created": "Tue, 19 Apr 2022 20:34:30 GMT", "version": "v1" } ]
2022-04-21
[ [ "Hazard", "Christopher", "" ], [ "Bhagat", "Akshay", "" ], [ "Buddharaju", "Balarama Raju", "" ], [ "Liu", "Zhongtao", "" ], [ "Shao", "Yunming", "" ], [ "Lu", "Lu", "" ], [ "Omari", "Sammy", "" ], [ ...
Trajectory prediction is an important task in autonomous driving. State-of-the-art trajectory prediction models often use attention mechanisms to model the interaction between agents. In this paper, we show that the attention information from such models can also be used to measure the importance of each agent with res...
1704.03970
Joel Mackenzie
Joel Mackenzie and J. Shane Culpepper and Roi Blanco and Matt Crane and Charles L. A. Clarke and Jimmy Lin
Efficient and Effective Tail Latency Minimization in Multi-Stage Retrieval Systems
Update 1: Edited email address
null
10.1145/3159652.3159676
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scalable web search systems typically employ multi-stage retrieval architectures, where an initial stage generates a set of candidate documents that are then pruned and re-ranked. Since subsequent stages typically exploit a multitude of features of varying costs using machine-learned models, reducing the number of do...
[ { "created": "Thu, 13 Apr 2017 02:09:37 GMT", "version": "v1" }, { "created": "Thu, 20 Apr 2017 23:34:13 GMT", "version": "v2" } ]
2017-12-12
[ [ "Mackenzie", "Joel", "" ], [ "Culpepper", "J. Shane", "" ], [ "Blanco", "Roi", "" ], [ "Crane", "Matt", "" ], [ "Clarke", "Charles L. A.", "" ], [ "Lin", "Jimmy", "" ] ]
Scalable web search systems typically employ multi-stage retrieval architectures, where an initial stage generates a set of candidate documents that are then pruned and re-ranked. Since subsequent stages typically exploit a multitude of features of varying costs using machine-learned models, reducing the number of docu...
2301.12475
Michael Mislove
Sam van Gool, Paul-Andr\'e Melli\`es and Vincent Moreau
Profinite lambda-terms and parametricity
For the proceedings of MFPS2023
Electronic Notes in Theoretical Informatics and Computer Science, Volume 3 - Proceedings of MFPS XXXIX (November 23, 2023) entics:12280
10.46298/entics.12280
null
cs.LO
http://creativecommons.org/licenses/by-nc-sa/4.0/
Combining ideas coming from Stone duality and Reynolds parametricity, we formulate in a clean and principled way a notion of profinite lambda-term which, we show, generalizes at every type the traditional notion of profinite word coming from automata theory. We start by defining the Stone space of profinite lambda-te...
[ { "created": "Sun, 29 Jan 2023 15:56:12 GMT", "version": "v1" }, { "created": "Tue, 18 Apr 2023 14:06:16 GMT", "version": "v2" }, { "created": "Thu, 14 Sep 2023 06:59:53 GMT", "version": "v3" }, { "created": "Sat, 18 Nov 2023 21:07:52 GMT", "version": "v4" } ]
2024-02-14
[ [ "van Gool", "Sam", "" ], [ "Melliès", "Paul-André", "" ], [ "Moreau", "Vincent", "" ] ]
Combining ideas coming from Stone duality and Reynolds parametricity, we formulate in a clean and principled way a notion of profinite lambda-term which, we show, generalizes at every type the traditional notion of profinite word coming from automata theory. We start by defining the Stone space of profinite lambda-term...
1507.03840
Levis Zerpa
Levis Zerpa
Using interrogative logic to teach classical logic
Proceedings of the Fourth International Conference on Tools for Teaching Logic (TTL2015), Rennes, France, June 9-12, 2015. Editors: M. Antonia Huertas, Jo\~ao Marcos, Mar\'ia Manzano, Sophie Pinchinat, Fran\c{c}ois Schwarzentruber
null
null
null
cs.CY cs.LO
http://creativecommons.org/licenses/by/4.0/
In the paper I discuss a tool for helping students in their symbolizations of natural language sentences using the formal language of classical first order logic (CFOL). The tool is an extension of Hintikka's concept of (Inquirer's) range of attention in the context of interrogative games. Any given text is reconstru...
[ { "created": "Tue, 14 Jul 2015 13:16:49 GMT", "version": "v1" } ]
2015-07-19
[ [ "Zerpa", "Levis", "" ] ]
In the paper I discuss a tool for helping students in their symbolizations of natural language sentences using the formal language of classical first order logic (CFOL). The tool is an extension of Hintikka's concept of (Inquirer's) range of attention in the context of interrogative games. Any given text is reconstruct...
2310.12632
Yannik Hahn
Yannik Hahn, Robert Maack, Guido Buchholz, Marion Purrio, Matthias Angerhausen, Hasan Tercan, Tobias Meisen
Towards a Deep Learning-based Online Quality Prediction System for Welding Processes
Accepted for CIRP CMS '23
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The digitization of manufacturing processes enables promising applications for machine learning-assisted quality assurance. A widely used manufacturing process that can strongly benefit from data-driven solutions is gas metal arc welding (GMAW). The welding process is characterized by complex cause-effect relationshi...
[ { "created": "Thu, 19 Oct 2023 10:35:50 GMT", "version": "v1" }, { "created": "Fri, 20 Oct 2023 10:44:04 GMT", "version": "v2" } ]
2023-10-23
[ [ "Hahn", "Yannik", "" ], [ "Maack", "Robert", "" ], [ "Buchholz", "Guido", "" ], [ "Purrio", "Marion", "" ], [ "Angerhausen", "Matthias", "" ], [ "Tercan", "Hasan", "" ], [ "Meisen", "Tobias", "" ] ]
The digitization of manufacturing processes enables promising applications for machine learning-assisted quality assurance. A widely used manufacturing process that can strongly benefit from data-driven solutions is gas metal arc welding (GMAW). The welding process is characterized by complex cause-effect relationships...
2209.10208
Andreas Nienk\"otter
Andreas Nienk\"otter, Xiaoyi Jiang
Kernel-Based Generalized Median Computation for Consensus Learning
17 pages, 5 figures, 7 tables
Early Access by TPAMI 2022 (https://ieeexplore.ieee.org/document/9869722)
10.1109/TPAMI.2022.3202565
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing a consensus object from a set of given objects is a core problem in machine learning and pattern recognition. One popular approach is to formulate it as an optimization problem using the generalized median. Previous methods like the Prototype and Distance-Preserving Embedding methods transform objects into ...
[ { "created": "Wed, 21 Sep 2022 09:09:01 GMT", "version": "v1" } ]
2022-09-22
[ [ "Nienkötter", "Andreas", "" ], [ "Jiang", "Xiaoyi", "" ] ]
Computing a consensus object from a set of given objects is a core problem in machine learning and pattern recognition. One popular approach is to formulate it as an optimization problem using the generalized median. Previous methods like the Prototype and Distance-Preserving Embedding methods transform objects into a ...
2311.17105
Kerui Gu
Kerui Gu, Rongyu Chen, Angela Yao
On the Calibration of Human Pose Estimation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most 2D human pose estimation frameworks estimate keypoint confidence in an ad-hoc manner, using heuristics such as the maximum value of heatmaps. The confidence is part of the evaluation scheme, e.g., AP for the MSCOCO dataset, yet has been largely overlooked in the development of state-of-the-art methods. This pape...
[ { "created": "Tue, 28 Nov 2023 09:31:09 GMT", "version": "v1" } ]
2023-11-30
[ [ "Gu", "Kerui", "" ], [ "Chen", "Rongyu", "" ], [ "Yao", "Angela", "" ] ]
Most 2D human pose estimation frameworks estimate keypoint confidence in an ad-hoc manner, using heuristics such as the maximum value of heatmaps. The confidence is part of the evaluation scheme, e.g., AP for the MSCOCO dataset, yet has been largely overlooked in the development of state-of-the-art methods. This paper ...
1509.03017
EPTCS
Helle Hvid Hansen (Delft University of Technology, Delft, The Netherlands), Clemens Kupke (University of Strathclyde, Glasgow, United Kingdom)
Weak Completeness of Coalgebraic Dynamic Logics
In Proceedings FICS 2015, arXiv:1509.02826
EPTCS 191, 2015, pp. 90-104
10.4204/EPTCS.191.9
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a coalgebraic generalisation of Fischer and Ladner's Propositional Dynamic Logic (PDL) and Parikh's Game Logic (GL). In earlier work, we proved a generic strong completeness result for coalgebraic dynamic logics without iteration. The coalgebraic semantics of such programs is given by a monad T, and modali...
[ { "created": "Thu, 10 Sep 2015 05:32:04 GMT", "version": "v1" } ]
2016-08-08
[ [ "Hansen", "Helle Hvid", "", "Delft University of Technology, Delft, The\n Netherlands" ], [ "Kupke", "Clemens", "", "University of Strathclyde, Glasgow, United\n Kingdom" ] ]
We present a coalgebraic generalisation of Fischer and Ladner's Propositional Dynamic Logic (PDL) and Parikh's Game Logic (GL). In earlier work, we proved a generic strong completeness result for coalgebraic dynamic logics without iteration. The coalgebraic semantics of such programs is given by a monad T, and modaliti...
1803.05652
Samson Zhou
Jeremiah Blocki, Venkata Gandikota, Elena Grigorescu, Samson Zhou
Relaxed Locally Correctable Codes in Computationally Bounded Channels
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Error-correcting codes that admit local decoding and correcting algorithms have been the focus of much recent research due to their numerous theoretical and practical applications. An important goal is to obtain the best possible tradeoffs between the number of queries the algorithm makes to its oracle (the locality ...
[ { "created": "Thu, 15 Mar 2018 09:23:58 GMT", "version": "v1" }, { "created": "Mon, 17 Sep 2018 20:45:49 GMT", "version": "v2" } ]
2018-09-19
[ [ "Blocki", "Jeremiah", "" ], [ "Gandikota", "Venkata", "" ], [ "Grigorescu", "Elena", "" ], [ "Zhou", "Samson", "" ] ]
Error-correcting codes that admit local decoding and correcting algorithms have been the focus of much recent research due to their numerous theoretical and practical applications. An important goal is to obtain the best possible tradeoffs between the number of queries the algorithm makes to its oracle (the locality of...
2310.04276
Ilker Yildirim
Ilker Yildirim, L.A. Paul
From task structures to world models: What do LLMs know?
null
null
10.1016/j.tics.2024.02.008
null
cs.AI q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In what sense does a large language model have knowledge? The answer to this question extends beyond the capabilities of a particular AI system, and challenges our assumptions about the nature of knowledge and intelligence. We answer by granting LLMs "instrumental knowledge"; knowledge defined by a certain set of abi...
[ { "created": "Fri, 6 Oct 2023 14:21:59 GMT", "version": "v1" } ]
2024-04-02
[ [ "Yildirim", "Ilker", "" ], [ "Paul", "L. A.", "" ] ]
In what sense does a large language model have knowledge? The answer to this question extends beyond the capabilities of a particular AI system, and challenges our assumptions about the nature of knowledge and intelligence. We answer by granting LLMs "instrumental knowledge"; knowledge defined by a certain set of abili...
2311.12176
Meng-Che Chang
Meng-Che Chang and Matthieu R. Bloch
Covert Online Decision Making: From Sequential Hypothesis Testing to Stochastic Bandits
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
We study the problem of covert online decision-making in which an agent attempts to identify a parameter governing a system by probing the system while escaping detection from an adversary. The system is modeled as a Markov kernel whose input is controlled by the agent and whose two outputs are observed by the agent ...
[ { "created": "Mon, 20 Nov 2023 20:43:49 GMT", "version": "v1" } ]
2023-11-22
[ [ "Chang", "Meng-Che", "" ], [ "Bloch", "Matthieu R.", "" ] ]
We study the problem of covert online decision-making in which an agent attempts to identify a parameter governing a system by probing the system while escaping detection from an adversary. The system is modeled as a Markov kernel whose input is controlled by the agent and whose two outputs are observed by the agent an...
1709.05487
Sreelekha S
Sreelekha S, Pushpak Bhattacharyya
Role of Morphology Injection in Statistical Machine Translation
36 pages, 12 figures, 15 tables, Modified version Published in: ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP) TALLIP Homepage archive Volume 17 Issue 1, September 2017 Issue-in-Progress,Article No. 1
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), Volume 17 Issue 1, September 2017 Issue-in-Progress, Article No. 1
10.1145/3129208
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Phrase-based Statistical models are more commonly used as they perform optimally in terms of both, translation quality and complexity of the system. Hindi and in general all Indian languages are morphologically richer than English. Hence, even though Phrase-based systems perform very well for the less divergent langu...
[ { "created": "Sat, 16 Sep 2017 09:40:36 GMT", "version": "v1" } ]
2017-09-19
[ [ "S", "Sreelekha", "" ], [ "Bhattacharyya", "Pushpak", "" ] ]
Phrase-based Statistical models are more commonly used as they perform optimally in terms of both, translation quality and complexity of the system. Hindi and in general all Indian languages are morphologically richer than English. Hence, even though Phrase-based systems perform very well for the less divergent languag...
2306.02519
Ted Sanders
Ari Allyn-Feuer and Ted Sanders
Transformative AGI by 2043 is <1% likely
114 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is a submission to the Open Philanthropy AI Worldviews Contest. In it, we estimate the likelihood of transformative artificial general intelligence (AGI) by 2043 and find it to be <1%. Specifically, we argue: The bar is high: AGI as defined by the contest - something like AI that can perform nearly all...
[ { "created": "Mon, 5 Jun 2023 00:58:51 GMT", "version": "v1" } ]
2023-06-06
[ [ "Allyn-Feuer", "Ari", "" ], [ "Sanders", "Ted", "" ] ]
This paper is a submission to the Open Philanthropy AI Worldviews Contest. In it, we estimate the likelihood of transformative artificial general intelligence (AGI) by 2043 and find it to be <1%. Specifically, we argue: The bar is high: AGI as defined by the contest - something like AI that can perform nearly all valua...
2405.14053
Henri Alam
Henri Alam, Antonio de Domenico, Florian Kaltenberger, David L\'opez-P\'erez
On the Role of Non-Terrestrial Networks for Boosting Terrestrial Network Performance in Dynamic Traffic Scenarios
To be published in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 2024
null
null
null
cs.NI
http://creativecommons.org/licenses/by/4.0/
Due to an ever-expansive network deployment, numerous questions are being raised regarding the energy consumption of the mobile network. Recently, Non-Terrestrial Networks (NTNs) have proven to be a useful, and complementary solution to Terrestrial Networks (TN) to provide ubiquitous coverage. In this paper, we consi...
[ { "created": "Wed, 22 May 2024 22:49:54 GMT", "version": "v1" } ]
2024-05-24
[ [ "Alam", "Henri", "" ], [ "de Domenico", "Antonio", "" ], [ "Kaltenberger", "Florian", "" ], [ "López-Pérez", "David", "" ] ]
Due to an ever-expansive network deployment, numerous questions are being raised regarding the energy consumption of the mobile network. Recently, Non-Terrestrial Networks (NTNs) have proven to be a useful, and complementary solution to Terrestrial Networks (TN) to provide ubiquitous coverage. In this paper, we conside...
2202.08869
Jesse Pisel
Jesse R. Pisel, Joshua A. Dierker, Sanya Srivastava, Samira B. Ravilisetty, Michael J. Pyrcz
A recommender system for automatic picking of subsurface formation tops
14 pages, 9 figures, 2 tables, 2 appendices
null
null
null
cs.IR
http://creativecommons.org/licenses/by-sa/4.0/
Geoscience domain experts traditionally correlate formation tops in the subsurface using geophysical well logs (known as well-log correlation) by-hand. Based on individual well log interpretation and well-to-well comparisons, these correlations are done in the context of depositional models within a stratigraphic fra...
[ { "created": "Thu, 17 Feb 2022 19:12:08 GMT", "version": "v1" } ]
2022-02-21
[ [ "Pisel", "Jesse R.", "" ], [ "Dierker", "Joshua A.", "" ], [ "Srivastava", "Sanya", "" ], [ "Ravilisetty", "Samira B.", "" ], [ "Pyrcz", "Michael J.", "" ] ]
Geoscience domain experts traditionally correlate formation tops in the subsurface using geophysical well logs (known as well-log correlation) by-hand. Based on individual well log interpretation and well-to-well comparisons, these correlations are done in the context of depositional models within a stratigraphic frame...
1910.04301
Yueming Lyu
Yueming Lyu and Ivor W. Tsang
Black-box Optimizer with Implicit Natural Gradient
Black-box Optimization
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Black-box optimization is primarily important for many compute-intensive applications, including reinforcement learning (RL), robot control, etc. This paper presents a novel theoretical framework for black-box optimization, in which our method performs stochastic update with the implicit natural gradient of an expone...
[ { "created": "Wed, 9 Oct 2019 23:34:36 GMT", "version": "v1" }, { "created": "Thu, 13 Feb 2020 23:22:51 GMT", "version": "v2" }, { "created": "Wed, 9 Sep 2020 10:46:10 GMT", "version": "v3" } ]
2020-09-10
[ [ "Lyu", "Yueming", "" ], [ "Tsang", "Ivor W.", "" ] ]
Black-box optimization is primarily important for many compute-intensive applications, including reinforcement learning (RL), robot control, etc. This paper presents a novel theoretical framework for black-box optimization, in which our method performs stochastic update with the implicit natural gradient of an exponent...
2310.07756
Yi Sui
Yi Sui, Tongzi Wu, Jesse C. Cresswell, Ga Wu, George Stein, Xiao Shi Huang, Xiaochen Zhang, Maksims Volkovs
Self-supervised Representation Learning From Random Data Projectors
Published as a conference paper of ICLR 2024. https://openreview.net/pdf?id=EpYnZpDpsQ
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Self-supervised representation learning~(SSRL) has advanced considerably by exploiting the transformation invariance assumption under artificially designed data augmentations. While augmentation-based SSRL algorithms push the boundaries of performance in computer vision and natural language processing, they are often...
[ { "created": "Wed, 11 Oct 2023 18:00:01 GMT", "version": "v1" }, { "created": "Wed, 20 Mar 2024 18:00:04 GMT", "version": "v2" } ]
2024-03-22
[ [ "Sui", "Yi", "" ], [ "Wu", "Tongzi", "" ], [ "Cresswell", "Jesse C.", "" ], [ "Wu", "Ga", "" ], [ "Stein", "George", "" ], [ "Huang", "Xiao Shi", "" ], [ "Zhang", "Xiaochen", "" ], [ "Volkovs", ...
Self-supervised representation learning~(SSRL) has advanced considerably by exploiting the transformation invariance assumption under artificially designed data augmentations. While augmentation-based SSRL algorithms push the boundaries of performance in computer vision and natural language processing, they are often n...
2307.00079
Channing Moore
R. Channing Moore, Daniel P. W. Ellis, Eduardo Fonseca, Shawn Hershey, Aren Jansen, Manoj Plakal
Dataset balancing can hurt model performance
5 pages, 3 figures, ICASSP 2023
ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece, 2023, pp. 1-5
10.1109/ICASSP49357.2023.10095255
null
cs.LG cs.SD eess.AS
http://creativecommons.org/licenses/by/4.0/
Machine learning from training data with a skewed distribution of examples per class can lead to models that favor performance on common classes at the expense of performance on rare ones. AudioSet has a very wide range of priors over its 527 sound event classes. Classification performance on AudioSet is usually eval...
[ { "created": "Fri, 30 Jun 2023 18:33:27 GMT", "version": "v1" } ]
2023-07-04
[ [ "Moore", "R. Channing", "" ], [ "Ellis", "Daniel P. W.", "" ], [ "Fonseca", "Eduardo", "" ], [ "Hershey", "Shawn", "" ], [ "Jansen", "Aren", "" ], [ "Plakal", "Manoj", "" ] ]
Machine learning from training data with a skewed distribution of examples per class can lead to models that favor performance on common classes at the expense of performance on rare ones. AudioSet has a very wide range of priors over its 527 sound event classes. Classification performance on AudioSet is usually evalua...
1109.2944
Zhengdao Wang
Zhengdao Wang
Real Interference Alignment and Degrees of Freedom Region of Wireless X Networks
5 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a single hop wireless X network with $K$ transmitters and $J$ receivers, all with single antenna. Each transmitter conveys for each receiver an independent message. The channel is assumed to have constant coefficients. We develop interference alignment scheme for this setup and derived several achievable ...
[ { "created": "Tue, 13 Sep 2011 22:01:36 GMT", "version": "v1" } ]
2011-09-15
[ [ "Wang", "Zhengdao", "" ] ]
We consider a single hop wireless X network with $K$ transmitters and $J$ receivers, all with single antenna. Each transmitter conveys for each receiver an independent message. The channel is assumed to have constant coefficients. We develop interference alignment scheme for this setup and derived several achievable de...
1910.10384
Mohammadjavad Salehi
MohammadJavad Salehi, Antti T\"olli, Seyed Pooya Shariatpanahi
A Multi-Antenna Coded Caching Scheme with Linear Subpacketization
6 Pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Exponentially growing subpacketization is known to be a major issue for practical implementation of coded caching, specially in networks with multi-antenna communication setups. We provide a new coded caching scheme for such networks, which requires linear subpacketization and is applicable to any set of network para...
[ { "created": "Wed, 23 Oct 2019 06:51:58 GMT", "version": "v1" }, { "created": "Tue, 29 Oct 2019 10:38:36 GMT", "version": "v2" } ]
2019-10-30
[ [ "Salehi", "MohammadJavad", "" ], [ "Tölli", "Antti", "" ], [ "Shariatpanahi", "Seyed Pooya", "" ] ]
Exponentially growing subpacketization is known to be a major issue for practical implementation of coded caching, specially in networks with multi-antenna communication setups. We provide a new coded caching scheme for such networks, which requires linear subpacketization and is applicable to any set of network parame...
2105.14874
Zhou Yang
Zhou Yang, Muhammad Hilmi Asyrofi and David Lo
BiasRV: Uncovering Biased Sentiment Predictions at Runtime
Accepted to appear in the Demonstrations track of the ESEC/FSE 2021
null
10.1145/3468264.3473117
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sentiment analysis (SA) systems, though widely applied in many domains, have been demonstrated to produce biased results. Some research works have been done in automatically generating test cases to reveal unfairness in SA systems, but the community still lacks tools that can monitor and uncover biased predictions at...
[ { "created": "Mon, 31 May 2021 10:55:29 GMT", "version": "v1" }, { "created": "Sat, 26 Jun 2021 08:30:12 GMT", "version": "v2" } ]
2022-01-06
[ [ "Yang", "Zhou", "" ], [ "Asyrofi", "Muhammad Hilmi", "" ], [ "Lo", "David", "" ] ]
Sentiment analysis (SA) systems, though widely applied in many domains, have been demonstrated to produce biased results. Some research works have been done in automatically generating test cases to reveal unfairness in SA systems, but the community still lacks tools that can monitor and uncover biased predictions at r...
2402.11487
Tanzila Rahman
Tanzila Rahman, Shweta Mahajan, Hsin-Ying Lee, Jian Ren, Sergey Tulyakov, Leonid Sigal
Visual Concept-driven Image Generation with Text-to-Image Diffusion Model
11 Figures, 14 Pages, 2 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text-to-image (TTI) diffusion models have demonstrated impressive results in generating high-resolution images of complex and imaginative scenes. Recent approaches have further extended these methods with personalization techniques that allow them to integrate user-illustrated concepts (e.g., the user him/herself) us...
[ { "created": "Sun, 18 Feb 2024 07:28:37 GMT", "version": "v1" }, { "created": "Wed, 17 Jul 2024 01:47:16 GMT", "version": "v2" } ]
2024-07-18
[ [ "Rahman", "Tanzila", "" ], [ "Mahajan", "Shweta", "" ], [ "Lee", "Hsin-Ying", "" ], [ "Ren", "Jian", "" ], [ "Tulyakov", "Sergey", "" ], [ "Sigal", "Leonid", "" ] ]
Text-to-image (TTI) diffusion models have demonstrated impressive results in generating high-resolution images of complex and imaginative scenes. Recent approaches have further extended these methods with personalization techniques that allow them to integrate user-illustrated concepts (e.g., the user him/herself) usin...
2402.17169
Fabio Miranda
Kazi Shahrukh Omar, Gustavo Moreira, Daniel Hodczak, Maryam Hosseini, Nicola Colaninno, Marcos Lage, Fabio Miranda
Deep Umbra: A Generative Approach for Sunlight Access Computation in Urban Spaces
Accepted at IEEE Transactions on Big Data. Deep Umbra is available at https://urbantk.org/shadows
null
10.1109/TBDATA.2024.3382964
null
cs.CV cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sunlight and shadow play critical roles in how urban spaces are utilized, thrive, and grow. While access to sunlight is essential to the success of urban environments, shadows can provide shaded places to stay during the hot seasons, mitigate heat island effect, and increase pedestrian comfort levels. Properly quanti...
[ { "created": "Tue, 27 Feb 2024 03:05:05 GMT", "version": "v1" } ]
2024-07-02
[ [ "Omar", "Kazi Shahrukh", "" ], [ "Moreira", "Gustavo", "" ], [ "Hodczak", "Daniel", "" ], [ "Hosseini", "Maryam", "" ], [ "Colaninno", "Nicola", "" ], [ "Lage", "Marcos", "" ], [ "Miranda", "Fabio", "" ] ...
Sunlight and shadow play critical roles in how urban spaces are utilized, thrive, and grow. While access to sunlight is essential to the success of urban environments, shadows can provide shaded places to stay during the hot seasons, mitigate heat island effect, and increase pedestrian comfort levels. Properly quantify...
2206.03388
Paulo Rezeck
Paulo Rezeck and Luiz Chaimowicz
Chemistry-Inspired Pattern Formation with Robotic Swarms
Submitted to IEEE RA-L/IROS 2022
IEEE Robotics and Automation Letters (2022)
10.1109/LRA.2022.3190638
21951131
cs.RO
http://creativecommons.org/licenses/by-nc-nd/4.0/
Self-organized emergent patterns can be widely seen in particle interactions producing complex structures such as chemical elements and molecules. Inspired by these interactions, this work presents a novel stochastic approach that allows a swarm of heterogeneous robots to create emergent patterns in a completely dece...
[ { "created": "Tue, 7 Jun 2022 15:31:29 GMT", "version": "v1" } ]
2022-09-01
[ [ "Rezeck", "Paulo", "" ], [ "Chaimowicz", "Luiz", "" ] ]
Self-organized emergent patterns can be widely seen in particle interactions producing complex structures such as chemical elements and molecules. Inspired by these interactions, this work presents a novel stochastic approach that allows a swarm of heterogeneous robots to create emergent patterns in a completely decent...
1909.10266
Felix Hamborg
Felix Hamborg, Philipp Meschenmoser, Moritz Schubotz, Bela Gipp
NewsDeps: Visualizing the Origin of Information in News Articles
null
null
null
null
cs.IR
http://creativecommons.org/licenses/by/4.0/
In scientific publications, citations allow readers to assess the authenticity of the presented information and verify it in the original context. News articles, however, do not contain citations and only rarely refer readers to further sources. Readers often cannot assess the authenticity of the presented informatio...
[ { "created": "Mon, 23 Sep 2019 10:25:24 GMT", "version": "v1" } ]
2019-09-27
[ [ "Hamborg", "Felix", "" ], [ "Meschenmoser", "Philipp", "" ], [ "Schubotz", "Moritz", "" ], [ "Gipp", "Bela", "" ] ]
In scientific publications, citations allow readers to assess the authenticity of the presented information and verify it in the original context. News articles, however, do not contain citations and only rarely refer readers to further sources. Readers often cannot assess the authenticity of the presented information ...
2405.18085
Micha{\l} Czuba Mr
Micha{\l} Czuba, Mateusz Nurek, Damian Serwata, Yu-Xuan Qiu, Mingshan Jia, Katarzyna Musial, Rados{\l}aw Michalski, Piotr Br\'odka
Network Diffusion -- Framework to Simulate Spreading Processes in Complex Networks
To be published in: Big Data Mining and Analytics (https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8254253)
null
10.26599/BDMA.2024.9020010
null
cs.SI cs.MA cs.SY eess.SY
http://creativecommons.org/licenses/by/4.0/
With the advancement of computational network science, its research scope has significantly expanded beyond static graphs to encompass more complex structures. The introduction of streaming, temporal, multilayer, and hypernetwork approaches has brought new possibilities and imposed additional requirements. For instan...
[ { "created": "Tue, 28 May 2024 11:46:18 GMT", "version": "v1" } ]
2024-05-29
[ [ "Czuba", "Michał", "" ], [ "Nurek", "Mateusz", "" ], [ "Serwata", "Damian", "" ], [ "Qiu", "Yu-Xuan", "" ], [ "Jia", "Mingshan", "" ], [ "Musial", "Katarzyna", "" ], [ "Michalski", "Radosław", "" ], [ ...
With the advancement of computational network science, its research scope has significantly expanded beyond static graphs to encompass more complex structures. The introduction of streaming, temporal, multilayer, and hypernetwork approaches has brought new possibilities and imposed additional requirements. For instance...