id
stringlengths 9
10
| submitter
stringlengths 5
46
⌀ | authors
stringlengths 5
1.31k
| title
stringlengths 8
223
| comments
stringlengths 2
574
⌀ | journal-ref
stringclasses 587
values | doi
stringclasses 784
values | report-no
stringclasses 75
values | categories
stringlengths 5
72
| license
stringclasses 9
values | abstract
stringlengths 82
3.31k
| versions
listlengths 1
15
| update_date
unknown | authors_parsed
sequencelengths 1
76
| label
class label 2
classes |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2002.03228 | Liang Liao | Liang Liao and Stephen John Maybank | Intrinsic Dimension Estimation via Nearest Constrained Subspace
Classifier | 19 pages, 7 figures, 4 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problems of classification and intrinsic dimension estimation
on image data. A new subspace based classifier is proposed for supervised
classification or intrinsic dimension estimation. The distribution of the data
in each class is modeled by a union of of a finite number ofaffine subspaces of
the feature space. The affine subspaces have a common dimension, which is
assumed to be much less than the dimension of the feature space. The subspaces
are found using regression based on the L0-norm. The proposed method is a
generalisation of classical NN (Nearest Neighbor), NFL (Nearest Feature Line)
classifiers and has a close relationship to NS (Nearest Subspace) classifier.
The proposed classifier with an accurately estimated dimension parameter
generally outperforms its competitors in terms of classification accuracy. We
also propose a fast version of the classifier using a neighborhood
representation to reduce its computational complexity. Experiments on publicly
available datasets corroborate these claims.
| [
{
"created": "Sat, 8 Feb 2020 20:54:42 GMT",
"version": "v1"
}
] | "2020-02-11T00:00:00" | [
[
"Liao",
"Liang",
""
],
[
"Maybank",
"Stephen John",
""
]
] | 0no_new_dataset
|
2104.01883 | Alex Dytso | Alex Dytso, H. Vincent Poor, Shlomo Shamai (Shitz) | A General Derivative Identity for the Conditional Mean Estimator in
Gaussian Noise and Some Applications | null | null | null | null | cs.IT math.IT math.ST stat.ML stat.TH | http://creativecommons.org/licenses/by/4.0/ | Consider a channel ${\bf Y}={\bf X}+ {\bf N}$ where ${\bf X}$ is an
$n$-dimensional random vector, and ${\bf N}$ is a Gaussian vector with a
covariance matrix ${\bf \mathsf{K}}_{\bf N}$. The object under consideration in
this paper is the conditional mean of ${\bf X}$ given ${\bf Y}={\bf y}$, that
is ${\bf y} \to E[{\bf X}|{\bf Y}={\bf y}]$. Several identities in the
literature connect $E[{\bf X}|{\bf Y}={\bf y}]$ to other quantities such as the
conditional variance, score functions, and higher-order conditional moments.
The objective of this paper is to provide a unifying view of these identities.
In the first part of the paper, a general derivative identity for the
conditional mean is derived. Specifically, for the Markov chain ${\bf U}
\leftrightarrow {\bf X} \leftrightarrow {\bf Y}$, it is shown that the Jacobian
of $E[{\bf U}|{\bf Y}={\bf y}]$ is given by ${\bf \mathsf{K}}_{{\bf N}}^{-1}
{\bf Cov} ( {\bf X}, {\bf U} | {\bf Y}={\bf y})$.
In the second part of the paper, via various choices of ${\bf U}$, the new
identity is used to generalize many of the known identities and derive some new
ones. First, a simple proof of the Hatsel and Nolte identity for the
conditional variance is shown. Second, a simple proof of the recursive identity
due to Jaffer is provided. Third, a new connection between the conditional
cumulants and the conditional expectation is shown. In particular, it is shown
that the $k$-th derivative of $E[X|Y=y]$ is the $(k+1)$-th conditional
cumulant.
The third part of the paper considers some applications. In a first
application, the power series and the compositional inverse of $E[X|Y=y]$ are
derived. In a second application, the distribution of the estimator error
$(X-E[X|Y])$ is derived. In a third application, we construct consistent
estimators (empirical Bayes estimators) of the conditional cumulants from an
i.i.d. sequence $Y_1,...,Y_n$.
| [
{
"created": "Mon, 5 Apr 2021 12:48:28 GMT",
"version": "v1"
}
] | "2021-04-06T00:00:00" | [
[
"Dytso",
"Alex",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | 0no_new_dataset
|
2401.14542 | Julia Barnett | Julia Barnett, Hugo Flores Garcia, Bryan Pardo | Exploring Musical Roots: Applying Audio Embeddings to Empower Influence
Attribution for a Generative Music Model | 14 pages + references. Under conference review | null | null | null | cs.SD cs.AI eess.AS | http://creativecommons.org/licenses/by/4.0/ | Every artist has a creative process that draws inspiration from previous
artists and their works. Today, "inspiration" has been automated by generative
music models. The black box nature of these models obscures the identity of the
works that influence their creative output. As a result, users may
inadvertently appropriate, misuse, or copy existing artists' works. We
establish a replicable methodology to systematically identify similar pieces of
music audio in a manner that is useful for understanding training data
attribution. A key aspect of our approach is to harness an effective music
audio similarity measure. We compare the effect of applying CLMR and CLAP
embeddings to similarity measurement in a set of 5 million audio clips used to
train VampNet, a recent open source generative music model. We validate this
approach with a human listening study. We also explore the effect that
modifications of an audio example (e.g., pitch shifting, time stretching,
background noise) have on similarity measurements. This work is foundational to
incorporating automated influence attribution into generative modeling, which
promises to let model creators and users move from ignorant appropriation to
informed creation. Audio samples that accompany this paper are available at
https://tinyurl.com/exploring-musical-roots.
| [
{
"created": "Thu, 25 Jan 2024 22:20:42 GMT",
"version": "v1"
}
] | "2024-01-29T00:00:00" | [
[
"Barnett",
"Julia",
""
],
[
"Garcia",
"Hugo Flores",
""
],
[
"Pardo",
"Bryan",
""
]
] | 0no_new_dataset
|
2311.09182 | Jierui Li | Jierui Li, Vipul Raheja, Dhruv Kumar | ContraDoc: Understanding Self-Contradictions in Documents with Large
Language Models | Accepted to NAACL 2024 main conference | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In recent times, large language models (LLMs) have shown impressive
performance on various document-level tasks such as document classification,
summarization, and question-answering. However, research on understanding their
capabilities on the task of self-contradictions in long documents has been very
limited. In this work, we introduce ContraDoc, the first human-annotated
dataset to study self-contradictions in long documents across multiple domains,
varying document lengths, self-contradictions types, and scope. We then analyze
the current capabilities of four state-of-the-art open-source and commercially
available LLMs: GPT3.5, GPT4, PaLM2, and LLaMAv2 on this dataset. While GPT4
performs the best and can outperform humans on this task, we find that it is
still unreliable and struggles with self-contradictions that require more
nuance and context. We release the dataset and all the code associated with the
experiments (https://github.com/ddhruvkr/CONTRADOC).
| [
{
"created": "Wed, 15 Nov 2023 18:23:17 GMT",
"version": "v1"
},
{
"created": "Fri, 12 Apr 2024 21:06:43 GMT",
"version": "v2"
}
] | "2024-04-16T00:00:00" | [
[
"Li",
"Jierui",
""
],
[
"Raheja",
"Vipul",
""
],
[
"Kumar",
"Dhruv",
""
]
] | 1new_dataset
|
2002.07173 | Koosha Zarei | Koosha Zarei, Reza Farahbakhsh, Noel Crespi | How Impersonators Exploit Instagram to Generate Fake Engagement? | null | null | null | null | cs.SI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Impersonators on Online Social Networks such as Instagram are playing an
important role in the propagation of the content. These entities are the type
of nefarious fake accounts that intend to disguise a legitimate account by
making similar profiles. In addition to having impersonated profiles, we
observed a considerable engagement from these entities to the published posts
of verified accounts. Toward that end, we concentrate on the engagement of
impersonators in terms of active and passive engagements which is studied in
three major communities including ``Politician'', ``News agency'', and ``Sports
star'' on Instagram. Inside each community, four verified accounts have been
selected. Based on the implemented approach in our previous studies, we have
collected 4.8K comments, and 2.6K likes across 566 posts created from 3.8K
impersonators during 7 months. Our study shed light into this interesting
phenomena and provides a surprising observation that can help us to understand
better how impersonators engaging themselves inside Instagram in terms of
writing Comments and leaving Likes.
| [
{
"created": "Mon, 17 Feb 2020 14:53:01 GMT",
"version": "v1"
}
] | "2020-02-19T00:00:00" | [
[
"Zarei",
"Koosha",
""
],
[
"Farahbakhsh",
"Reza",
""
],
[
"Crespi",
"Noel",
""
]
] | 0no_new_dataset
|
1909.00107 | Panayiotis Georgiou | Prashanth Gurunath Shivakumar, Shao-Yen Tseng, Panayiotis Georgiou,
Shrikanth Narayanan | Behavior Gated Language Models | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most current language modeling techniques only exploit co-occurrence,
semantic and syntactic information from the sequence of words. However, a range
of information such as the state of the speaker and dynamics of the interaction
might be useful. In this work we derive motivation from psycholinguistics and
propose the addition of behavioral information into the context of language
modeling. We propose the augmentation of language models with an additional
module which analyzes the behavioral state of the current context. This
behavioral information is used to gate the outputs of the language model before
the final word prediction output. We show that the addition of behavioral
context in language models achieves lower perplexities on behavior-rich
datasets. We also confirm the validity of the proposed models on a variety of
model architectures and improve on previous state-of-the-art models with
generic domain Penn Treebank Corpus.
| [
{
"created": "Sat, 31 Aug 2019 02:10:32 GMT",
"version": "v1"
}
] | "2019-09-04T00:00:00" | [
[
"Shivakumar",
"Prashanth Gurunath",
""
],
[
"Tseng",
"Shao-Yen",
""
],
[
"Georgiou",
"Panayiotis",
""
],
[
"Narayanan",
"Shrikanth",
""
]
] | 0no_new_dataset
|
2002.05945 | Daniel Schuster | Daniel Schuster and Sebastiaan J. van Zelst | Online Process Monitoring Using Incremental State-Space Expansion: An
Exact Algorithm | null | null | 10.1007/978-3-030-58666-9_9 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The execution of (business) processes generates valuable traces of event data
in the information systems employed within companies. Recently, approaches for
monitoring the correctness of the execution of running processes have been
developed in the area of process mining, i.e., online conformance checking. The
advantages of monitoring a process' conformity during its execution are clear,
i.e., deviations are detected as soon as they occur and countermeasures can
immediately be initiated to reduce the possible negative effects caused by
process deviations. Existing work in online conformance checking only allows
for obtaining approximations of non-conformity, e.g., overestimating the actual
severity of the deviation. In this paper, we present an exact, parameter-free,
online conformance checking algorithm that computes conformance checking
results on the fly. Our algorithm exploits the fact that the conformance
checking problem can be reduced to a shortest path problem, by incrementally
expanding the search space and reusing previously computed intermediate
results. Our experiments show that our algorithm outperforms comparable
state-of-the-art approximation algorithms.
| [
{
"created": "Fri, 14 Feb 2020 10:10:43 GMT",
"version": "v1"
},
{
"created": "Thu, 19 Mar 2020 14:18:16 GMT",
"version": "v2"
},
{
"created": "Wed, 15 Jul 2020 16:27:03 GMT",
"version": "v3"
}
] | "2020-09-23T00:00:00" | [
[
"Schuster",
"Daniel",
""
],
[
"van Zelst",
"Sebastiaan J.",
""
]
] | 0no_new_dataset
|
1903.07902 | Vinay Setty | Megha Khosla and Vinay Setty and Avishek Anand | A Comparative Study for Unsupervised Network Representation Learning | Accepted for publication in IEEE TKDE | null | 10.1109/TKDE.2019.2951398 | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There has been appreciable progress in unsupervised network representation
learning (UNRL) approaches over graphs recently with flexible random-walk
approaches, new optimization objectives and deep architectures. However, there
is no common ground for systematic comparison of embeddings to understand their
behavior for different graphs and tasks. In this paper we theoretically group
different approaches under a unifying framework and empirically investigate the
effectiveness of different network representation methods. In particular, we
argue that most of the UNRL approaches either explicitly or implicit model and
exploit context information of a node. Consequently, we propose a framework
that casts a variety of approaches -- random walk based, matrix factorization
and deep learning based -- into a unified context-based optimization function.
We systematically group the methods based on their similarities and
differences. We study the differences among these methods in detail which we
later use to explain their performance differences (on downstream tasks). We
conduct a large-scale empirical study considering 9 popular and recent UNRL
techniques and 11 real-world datasets with varying structural properties and
two common tasks -- node classification and link prediction. We find that there
is no single method that is a clear winner and that the choice of a suitable
method is dictated by certain properties of the embedding methods, task and
structural properties of the underlying graph. In addition we also report the
common pitfalls in evaluation of UNRL methods and come up with suggestions for
experimental design and interpretation of results.
| [
{
"created": "Tue, 19 Mar 2019 09:36:22 GMT",
"version": "v1"
},
{
"created": "Sat, 13 Apr 2019 18:19:22 GMT",
"version": "v2"
},
{
"created": "Wed, 30 Oct 2019 20:24:47 GMT",
"version": "v3"
},
{
"created": "Sat, 2 Nov 2019 17:36:28 GMT",
"version": "v4"
},
{
"created": "Mon, 18 Nov 2019 12:07:43 GMT",
"version": "v5"
},
{
"created": "Wed, 11 Mar 2020 14:03:04 GMT",
"version": "v6"
}
] | "2020-03-12T00:00:00" | [
[
"Khosla",
"Megha",
""
],
[
"Setty",
"Vinay",
""
],
[
"Anand",
"Avishek",
""
]
] | 0no_new_dataset
|
2402.04814 | Roshni Kamath | Roshni Kamath, Rupert Mitchell, Subarnaduti Paul, Kristian Kersting,
Martin Mundt | BOWLL: A Deceptively Simple Open World Lifelong Learner | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | The quest to improve scalar performance numbers on predetermined benchmarks
seems to be deeply engraved in deep learning. However, the real world is seldom
carefully curated and applications are seldom limited to excelling on test
sets. A practical system is generally required to recognize novel concepts,
refrain from actively including uninformative data, and retain previously
acquired knowledge throughout its lifetime. Despite these key elements being
rigorously researched individually, the study of their conjunction, open world
lifelong learning, is only a recent trend. To accelerate this multifaceted
field's exploration, we introduce its first monolithic and much-needed
baseline. Leveraging the ubiquitous use of batch normalization across deep
neural networks, we propose a deceptively simple yet highly effective way to
repurpose standard models for open world lifelong learning. Through extensive
empirical evaluation, we highlight why our approach should serve as a future
standard for models that are able to effectively maintain their knowledge,
selectively focus on informative data, and accelerate future learning.
| [
{
"created": "Wed, 7 Feb 2024 13:04:35 GMT",
"version": "v1"
}
] | "2024-02-08T00:00:00" | [
[
"Kamath",
"Roshni",
""
],
[
"Mitchell",
"Rupert",
""
],
[
"Paul",
"Subarnaduti",
""
],
[
"Kersting",
"Kristian",
""
],
[
"Mundt",
"Martin",
""
]
] | 0no_new_dataset
|
1311.6045 | Nidhal El-Abbadi | Nidhal El-Abbadi, Ahmed Nidhal Khdhair, Adel Al-Nasrawi | Build Electronic Arabic Lexicon | 4 pages | The International Arab Journal of Information Technology, Vol. 8,
No. 2, April 2011 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are many known Arabic lexicons organized on different ways, each of
them has a different number of Arabic words according to its organization way.
This paper has used mathematical relations to count a number of Arabic words,
which proofs the number of Arabic words presented by Al Farahidy. The paper
also presents new way to build an electronic Arabic lexicon by using a hash
function that converts each word (as input) to correspond a unique integer
number (as output), these integer numbers will be used as an index to a lexicon
entry.
| [
{
"created": "Sat, 23 Nov 2013 20:10:24 GMT",
"version": "v1"
}
] | "2013-11-26T00:00:00" | [
[
"El-Abbadi",
"Nidhal",
""
],
[
"Khdhair",
"Ahmed Nidhal",
""
],
[
"Al-Nasrawi",
"Adel",
""
]
] | 0no_new_dataset
|
1601.01092 | Joy Bose | Joy Bose, Amit Singhai, Anish Patankar, Ankit Kumar | Attention Sensitive Web Browsing | 5 pages, 7 figures | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With a number of cheap commercial dry EEG kits available today, it is
possible to look at user attention driven scenarios for interaction with the
web browser. Using EEG to determine the user's attention level is preferable to
using methods such as gaze tracking or time spent on the webpage. In this paper
we use the attention level in three different ways. First, as a control
mechanism, to control user interface elements such as menus or buttons. Second,
to make the web browser responsive to the current attention level. Third, as a
means for the web developer to control the user experience based on the level
of attention paid by the user, thus creating attention sensitive websites. We
present implementation details for each of these, using the NeuroSky MindWave
sensor. We also explore issues in the system, and possibility of an EEG based
web standard.
| [
{
"created": "Wed, 6 Jan 2016 06:34:21 GMT",
"version": "v1"
}
] | "2016-01-07T00:00:00" | [
[
"Bose",
"Joy",
""
],
[
"Singhai",
"Amit",
""
],
[
"Patankar",
"Anish",
""
],
[
"Kumar",
"Ankit",
""
]
] | 0no_new_dataset
|
1605.04265 | Benjamin Niedermann | Benjamin Niedermann, Martin N\"ollenburg | An Algorithmic Framework for Labeling Road Maps | extended version of a paper to appear at GIScience 2016 | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given an unlabeled road map, we consider, from an algorithmic perspective,
the cartographic problem to place non-overlapping road labels embedded in their
roads. We first decompose the road network into logically coherent road
sections, e.g., parts of roads between two junctions. Based on this
decomposition, we present and implement a new and versatile framework for
placing labels in road maps such that the number of labeled road sections is
maximized. In an experimental evaluation with road maps of 11 major cities we
show that our proposed labeling algorithm is both fast in practice and that it
reaches near-optimal solution quality, where optimal solutions are obtained by
mixed-integer linear programming. In comparison to the standard OpenStreetMap
renderer Mapnik, our algorithm labels 31% more road sections in average.
| [
{
"created": "Fri, 13 May 2016 17:34:02 GMT",
"version": "v1"
}
] | "2016-05-16T00:00:00" | [
[
"Niedermann",
"Benjamin",
""
],
[
"Nöllenburg",
"Martin",
""
]
] | 0no_new_dataset
|
cs/0310038 | Shipra Agrawal | Shipra Agrawal, Vijay Krishnan, Jayant Haritsa | On Addressing Efficiency Concerns in Privacy Preserving Data Mining | null | null | null | null | cs.DB | null | Data mining services require accurate input data for their results to be
meaningful, but privacy concerns may influence users to provide spurious
information. To encourage users to provide correct inputs, we recently proposed
a data distortion scheme for association rule mining that simultaneously
provides both privacy to the user and accuracy in the mining results. However,
mining the distorted database can be orders of magnitude more time-consuming as
compared to mining the original database. In this paper, we address this issue
and demonstrate that by (a) generalizing the distortion process to perform
symbol-specific distortion, (b) appropriately choosing the distortion
parameters, and (c) applying a variety of optimizations in the reconstruction
process, runtime efficiencies that are well within an order of magnitude of
undistorted mining can be achieved.
| [
{
"created": "Fri, 17 Oct 2003 16:55:08 GMT",
"version": "v1"
}
] | "2011-11-09T00:00:00" | [
[
"Agrawal",
"Shipra",
""
],
[
"Krishnan",
"Vijay",
""
],
[
"Haritsa",
"Jayant",
""
]
] | 0no_new_dataset
|
1909.06761 | Georgios Kapidis | Georgios Kapidis, Ronald Poppe, Elsbeth van Dam, Lucas Noldus, Remco
Veltkamp | Multitask Learning to Improve Egocentric Action Recognition | 10 pages, 3 figures, accepted at the 5th Egocentric Perception,
Interaction and Computing (EPIC) workshop at ICCV 2019, code repository:
https://github.com/georkap/hand_track_classification | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we employ multitask learning to capitalize on the structure that
exists in related supervised tasks to train complex neural networks. It allows
training a network for multiple objectives in parallel, in order to improve
performance on at least one of them by capitalizing on a shared representation
that is developed to accommodate more information than it otherwise would for a
single task. We employ this idea to tackle action recognition in egocentric
videos by introducing additional supervised tasks. We consider learning the
verbs and nouns from which action labels consist of and predict coordinates
that capture the hand locations and the gaze-based visual saliency for all the
frames of the input video segments. This forces the network to explicitly focus
on cues from secondary tasks that it might otherwise have missed resulting in
improved inference. Our experiments on EPIC-Kitchens and EGTEA Gaze+ show
consistent improvements when training with multiple tasks over the single-task
baseline. Furthermore, in EGTEA Gaze+ we outperform the state-of-the-art in
action recognition by 3.84%. Apart from actions, our method produces accurate
hand and gaze estimations as side tasks, without requiring any additional input
at test time other than the RGB video clips.
| [
{
"created": "Sun, 15 Sep 2019 08:29:46 GMT",
"version": "v1"
}
] | "2019-09-17T00:00:00" | [
[
"Kapidis",
"Georgios",
""
],
[
"Poppe",
"Ronald",
""
],
[
"van Dam",
"Elsbeth",
""
],
[
"Noldus",
"Lucas",
""
],
[
"Veltkamp",
"Remco",
""
]
] | 0no_new_dataset
|
2203.09975 | Sheng Yu | Sheng Yu, Zheng Yuan, Jun Xia, Shengxuan Luo, Huaiyuan Ying, Sihang
Zeng, Jingyi Ren, Hongyi Yuan, Zhengyun Zhao, Yucong Lin, Keming Lu, Jing
Wang, Yutao Xie, Heung-Yeung Shum | BIOS: An Algorithmically Generated Biomedical Knowledge Graph | null | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Biomedical knowledge graphs (BioMedKGs) are essential infrastructures for
biomedical and healthcare big data and artificial intelligence (AI),
facilitating natural language processing, model development, and data exchange.
For decades, these knowledge graphs have been developed via expert curation;
however, this method can no longer keep up with today's AI development, and a
transition to algorithmically generated BioMedKGs is necessary. In this work,
we introduce the Biomedical Informatics Ontology System (BIOS), the first
large-scale publicly available BioMedKG generated completely by machine
learning algorithms. BIOS currently contains 4.1 million concepts, 7.4 million
terms in two languages, and 7.3 million relation triplets. We present the
methodology for developing BIOS, including the curation of raw biomedical
terms, computational identification of synonymous terms and aggregation of
these terms to create concept nodes, semantic type classification of the
concepts, relation identification, and biomedical machine translation. We
provide statistics on the current BIOS content and perform preliminary
assessments of term quality, synonym grouping, and relation extraction. The
results suggest that machine learning-based BioMedKG development is a viable
alternative to traditional expert curation.
| [
{
"created": "Fri, 18 Mar 2022 14:09:22 GMT",
"version": "v1"
},
{
"created": "Sun, 24 Apr 2022 10:11:59 GMT",
"version": "v2"
}
] | "2022-04-26T00:00:00" | [
[
"Yu",
"Sheng",
""
],
[
"Yuan",
"Zheng",
""
],
[
"Xia",
"Jun",
""
],
[
"Luo",
"Shengxuan",
""
],
[
"Ying",
"Huaiyuan",
""
],
[
"Zeng",
"Sihang",
""
],
[
"Ren",
"Jingyi",
""
],
[
"Yuan",
"Hongyi",
""
],
[
"Zhao",
"Zhengyun",
""
],
[
"Lin",
"Yucong",
""
],
[
"Lu",
"Keming",
""
],
[
"Wang",
"Jing",
""
],
[
"Xie",
"Yutao",
""
],
[
"Shum",
"Heung-Yeung",
""
]
] | 1new_dataset
|
2206.11632 | Yosi Shrem | Yosi Shrem, Felix Kreuk and Joseph Keshet | Formant Estimation and Tracking using Probabilistic Heat-Maps | interspeech 2022 | null | null | null | cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | Formants are the spectral maxima that result from acoustic resonances of the
human vocal tract, and their accurate estimation is among the most fundamental
speech processing problems. Recent work has been shown that those frequencies
can accurately be estimated using deep learning techniques. However, when
presented with a speech from a different domain than that in which they have
been trained on, these methods exhibit a decline in performance, limiting their
usage as generic tools.
The contribution of this paper is to propose a new network architecture that
performs well on a variety of different speaker and speech domains. Our
proposed model is composed of a shared encoder that gets as input a spectrogram
and outputs a domain-invariant representation. Then, multiple decoders further
process this representation, each responsible for predicting a different
formant while considering the lower formant predictions. An advantage of our
model is that it is based on heatmaps that generate a probability distribution
over formant predictions. Results suggest that our proposed model better
represents the signal over various domains and leads to better formant
frequency tracking and estimation.
| [
{
"created": "Thu, 23 Jun 2022 11:39:08 GMT",
"version": "v1"
}
] | "2022-06-24T00:00:00" | [
[
"Shrem",
"Yosi",
""
],
[
"Kreuk",
"Felix",
""
],
[
"Keshet",
"Joseph",
""
]
] | 1new_dataset
|
2401.03675 | Haena Kim | Haena Kim, Yejun Kim, Seungjoo Kim | A Study on the Security Requirements Analysis to build a Zero
Trust-based Remote Work Environment | 60 pages, 6 figures, 12 tables | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, the usage of cloud services has been increasing annually, and with
remote work becoming one of the new forms of employment within enterprises, the
security of cloud-based remote work environments has become important. The
existing work environment relies on a perimeter security model, where accessing
one's resources is based on the assumption that everything within the internal
network is secure. However, due to the limitations of the perimeter security
model, which assumes the safety of everything within the internal network, the
adoption of Zero Trust is now being demanded. Accordingly, NIST and DoD have
published guidelines related to Zero Trust architecture. However, these
guidelines describe security requirements at an abstract level, focusing on
logical architecture. In this paper, we conduct a threat modeling for OpenStack
cloud to propose more detailed security requirements compared to NIST and DoD
guidelines. Subsequently, we perform a security analysis of commercial cloud
services such as Microsoft Azure, Amazon Web Service, and Google Cloud to
validate these requirements. The security analysis results identify security
requirements that each cloud service fails to satisfy, indicating potential
exposure to threats. This paper proposes detailed security requirements based
on the Zero Trust model and conducts security analyses of various cloud
services accordingly. As a result of the security analysis, we proposed
potential threats and countermeasures for cloud services with Zero Trust, and
this is intended to help build a secure Zero Trust-based remote work
environment.
| [
{
"created": "Mon, 8 Jan 2024 05:50:20 GMT",
"version": "v1"
}
] | "2024-01-09T00:00:00" | [
[
"Kim",
"Haena",
""
],
[
"Kim",
"Yejun",
""
],
[
"Kim",
"Seungjoo",
""
]
] | 0no_new_dataset
|
2007.08273 | Shaofeng Li | Shaofeng Li, Shiqing Ma, Minhui Xue, Benjamin Zi Hao Zhao | Deep Learning Backdoors | null | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intuitively, a backdoor attack against Deep Neural Networks (DNNs) is to
inject hidden malicious behaviors into DNNs such that the backdoor model
behaves legitimately for benign inputs, yet invokes a predefined malicious
behavior when its input contains a malicious trigger. The trigger can take a
plethora of forms, including a special object present in the image (e.g., a
yellow pad), a shape filled with custom textures (e.g., logos with particular
colors) or even image-wide stylizations with special filters (e.g., images
altered by Nashville or Gotham filters). These filters can be applied to the
original image by replacing or perturbing a set of image pixels.
| [
{
"created": "Thu, 16 Jul 2020 11:54:20 GMT",
"version": "v1"
},
{
"created": "Sat, 6 Feb 2021 09:02:57 GMT",
"version": "v2"
}
] | "2021-02-09T00:00:00" | [
[
"Li",
"Shaofeng",
""
],
[
"Ma",
"Shiqing",
""
],
[
"Xue",
"Minhui",
""
],
[
"Zhao",
"Benjamin Zi Hao",
""
]
] | 0no_new_dataset
|
1506.04650 | Prashanth Reddy | B. Prashanth Reddy | Coding Side-Information for Implementing Cubic Transformation | 12 pages, 9 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the implementation of the cubic public-key
transformation, a public-key cryptographic scheme that requires sending of
additional side-information. A coding scheme for the side-information, based on
the residue number system, is presented. In the conventional one-to-one
encryption mapping also, such coding can be used to send additional like that
of watermarking, which could be used to detect man-in-the-middle attacks or
used for authentication.
| [
{
"created": "Mon, 15 Jun 2015 16:14:07 GMT",
"version": "v1"
}
] | "2015-06-16T00:00:00" | [
[
"Reddy",
"B. Prashanth",
""
]
] | 0no_new_dataset
|
1206.6453 | Florian Yger | Florian Yger (LITIS), Maxime Berar (LITIS), Gilles Gasso (INSA de
Rouen), Alain Rakotomamonjy (INSA de Rouen) | Adaptive Canonical Correlation Analysis Based On Matrix Manifolds | Appears in Proceedings of the 29th International Conference on
Machine Learning (ICML 2012) | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we formulate the Canonical Correlation Analysis (CCA) problem
on matrix manifolds. This framework provides a natural way for dealing with
matrix constraints and tools for building efficient algorithms even in an
adaptive setting. Finally, an adaptive CCA algorithm is proposed and applied to
a change detection problem in EEG signals.
| [
{
"created": "Wed, 27 Jun 2012 19:59:59 GMT",
"version": "v1"
}
] | "2012-07-03T00:00:00" | [
[
"Yger",
"Florian",
"",
"LITIS"
],
[
"Berar",
"Maxime",
"",
"LITIS"
],
[
"Gasso",
"Gilles",
"",
"INSA de\n Rouen"
],
[
"Rakotomamonjy",
"Alain",
"",
"INSA de Rouen"
]
] | 0no_new_dataset
|
1905.11604 | Preetum Nakkiran | Preetum Nakkiran, Gal Kaplun, Dimitris Kalimeris, Tristan Yang,
Benjamin L. Edelman, Fred Zhang, Boaz Barak | SGD on Neural Networks Learns Functions of Increasing Complexity | Submitted to NeurIPS 2019 | null | null | null | cs.LG cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We perform an experimental study of the dynamics of Stochastic Gradient
Descent (SGD) in learning deep neural networks for several real and synthetic
classification tasks. We show that in the initial epochs, almost all of the
performance improvement of the classifier obtained by SGD can be explained by a
linear classifier. More generally, we give evidence for the hypothesis that, as
iterations progress, SGD learns functions of increasing complexity. This
hypothesis can be helpful in explaining why SGD-learned classifiers tend to
generalize well even in the over-parameterized regime. We also show that the
linear classifier learned in the initial stages is "retained" throughout the
execution even if training is continued to the point of zero training error,
and complement this with a theoretical result in a simplified model. Key to our
work is a new measure of how well one classifier explains the performance of
another, based on conditional mutual information.
| [
{
"created": "Tue, 28 May 2019 04:34:08 GMT",
"version": "v1"
}
] | "2019-05-29T00:00:00" | [
[
"Nakkiran",
"Preetum",
""
],
[
"Kaplun",
"Gal",
""
],
[
"Kalimeris",
"Dimitris",
""
],
[
"Yang",
"Tristan",
""
],
[
"Edelman",
"Benjamin L.",
""
],
[
"Zhang",
"Fred",
""
],
[
"Barak",
"Boaz",
""
]
] | 0no_new_dataset
|
2309.06229 | He Ye | He Ye, Zimin Chen and Claire Le Goues | PreciseBugCollector: Extensible, Executable and Precise Bug-fix
Collection | Accepted at the industry challenge track of ASE 2023 | null | null | null | cs.SE cs.PL | http://creativecommons.org/licenses/by/4.0/ | Bug datasets are vital for enabling deep learning techniques to address
software maintenance tasks related to bugs. However, existing bug datasets
suffer from precise and scale limitations: they are either small-scale but
precise with manual validation or large-scale but imprecise with simple commit
message processing. In this paper, we introduce PreciseBugCollector, a precise,
multi-language bug collection approach that overcomes these two limitations.
PreciseBugCollector is based on two novel components: a) A bug tracker to map
the codebase repositories with external bug repositories to trace bug type
information, and b) A bug injector to generate project-specific bugs by
injecting noise into the correct codebases and then executing them against
their test suites to obtain test failure messages.
We implement PreciseBugCollector against three sources: 1) A bug tracker that
links to the national vulnerability data set (NVD) to collect general-wise
vulnerabilities, 2) A bug tracker that links to OSS-Fuzz to collect
general-wise bugs, and 3) A bug injector based on 16 injection rules to
generate project-wise bugs. To date, PreciseBugCollector comprises 1057818 bugs
extracted from 2968 open-source projects. Of these, 12602 bugs are sourced from
bug repositories (NVD and OSS-Fuzz), while the remaining 1045216
project-specific bugs are generated by the bug injector. Considering the
challenge objectives, we argue that a bug injection approach is highly valuable
for the industrial setting, since project-specific bugs align with domain
knowledge, share the same codebase, and adhere to the coding style employed in
industrial projects.
| [
{
"created": "Tue, 12 Sep 2023 13:47:44 GMT",
"version": "v1"
},
{
"created": "Wed, 13 Sep 2023 14:20:35 GMT",
"version": "v2"
},
{
"created": "Fri, 6 Oct 2023 16:00:26 GMT",
"version": "v3"
},
{
"created": "Sat, 9 Mar 2024 22:43:56 GMT",
"version": "v4"
}
] | "2024-03-12T00:00:00" | [
[
"Ye",
"He",
""
],
[
"Chen",
"Zimin",
""
],
[
"Goues",
"Claire Le",
""
]
] | 1new_dataset
|
1904.05247 | Linus W. Dietz | Rinita Roy and Linus W. Dietz | A Model for Using Physiological Conditions for Proactive Tourist
Recommendations | null | ABIS '2019 Proceedings of the 23rd International Workshop on
Personalization and Recommendation on the Web and Beyond | 10.1145/3345002.3349289 | null | cs.HC cs.IR cs.LG | http://creativecommons.org/licenses/by/4.0/ | Mobile proactive tourist recommender systems can support tourists by
recommending the best choice depending on different contexts related to herself
and the environment. In this paper, we propose to utilize wearable sensors to
gather health information about a tourist and use them for recommending tourist
activities. We discuss a range of wearable devices, sensors to infer
physiological conditions of the users, and exemplify the feasibility using a
popular self-quantification mobile app. Our main contribution then comprises a
data model to derive relations between the parameters measured by the wearable
sensors, such as heart rate, body temperature, blood pressure, and use them to
infer the physiological condition of a user. This model can then be used to
derive classes of tourist activities that determine which items should be
recommended.
| [
{
"created": "Wed, 10 Apr 2019 15:37:28 GMT",
"version": "v1"
}
] | "2019-12-17T00:00:00" | [
[
"Roy",
"Rinita",
""
],
[
"Dietz",
"Linus W.",
""
]
] | 0no_new_dataset
|
2210.06794 | Yakun Huang | Yakun Huang, Yuanwei Zhu, Xiuquan Qiao, Xiang Su, Schahram Dustdar,
Ping Zhang | Towards Holographic Video Communications: A Promising AI-driven Solution | null | null | null | null | cs.MM cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Real-time holographic video communications enable immersive experiences for
next-generation video services in the future metaverse era. However,
high-fidelity holographic videos require high bandwidth and significant
computation resources, which exceed the transferring and computing capacity of
5G networks. This article reviews state-of-the-art holographic point cloud
video (PCV) transmission techniques and highlights the critical challenges of
delivering such immersive services. We further implement a preliminary
prototype of an AI-driven holographic video communication system and present
critical experimental results to evaluate its performance. Finally, we identify
future research directions and discuss potential solutions for providing
real-time and high-quality holographic experiences.
| [
{
"created": "Thu, 13 Oct 2022 07:13:16 GMT",
"version": "v1"
}
] | "2022-10-14T00:00:00" | [
[
"Huang",
"Yakun",
""
],
[
"Zhu",
"Yuanwei",
""
],
[
"Qiao",
"Xiuquan",
""
],
[
"Su",
"Xiang",
""
],
[
"Dustdar",
"Schahram",
""
],
[
"Zhang",
"Ping",
""
]
] | 0no_new_dataset
|
2206.14802 | Colin Kohler | Colin Kohler, Robert Platt | Visual Foresight With a Local Dynamics Model | null | null | null | null | cs.RO cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Model-free policy learning has been shown to be capable of learning
manipulation policies which can solve long-time horizon tasks using single-step
manipulation primitives. However, training these policies is a time-consuming
process requiring large amounts of data. We propose the Local Dynamics Model
(LDM) which efficiently learns the state-transition function for these
manipulation primitives. By combining the LDM with model-free policy learning,
we can learn policies which can solve complex manipulation tasks using one-step
lookahead planning. We show that the LDM is both more sample-efficient and
outperforms other model architectures. When combined with planning, we can
outperform other model-based and model-free policies on several challenging
manipulation tasks in simulation.
| [
{
"created": "Wed, 29 Jun 2022 17:58:14 GMT",
"version": "v1"
}
] | "2022-06-30T00:00:00" | [
[
"Kohler",
"Colin",
""
],
[
"Platt",
"Robert",
""
]
] | 0no_new_dataset
|
2106.12884 | Peshal Nayak | Peshal Nayak, Sudhanshu Verma, Preetam Kumar | A Novel Compact Tri-Band Antenna Design for WiMAX, WLAN and Bluetooth
Applications | null | null | null | null | cs.NI eess.SP | http://creativecommons.org/licenses/by/4.0/ | A novel and compact tri-band planar antenna for 2.4/5.2/5.8-GHz wireless
local area network (WLAN), 2.3/3.5/5.5GHz Worldwide Interoperability for
Microwave Access (WiMAX) and Bluetooth applications is proposed and studied in
this paper. The antenna comprises of a L-shaped element which is coupled with a
ground shorted parasitic resonator to generate three resonant modes for
tri-band operation. The L-shaped element which is placed on top of the
substrate is fed by a 50$\Omega$ microstrip feed line and is responsible for
the generation of a wide band at 5.5 GHz. The parasitic resonator is placed on
the other side of the substrate and is directly connected to the ground plane.
The presence of the parasitic resonator gives rise to two additional resonant
bands at 2.3 GHz and 3.5 GHz. Thus, together the two elements generate three
resonant bands to cover WLAN, WiMAX and Bluetooth bands of operation. A
thorough parametric study has been performed on the antenna and it has been
found that the three bands can be tuned by varying certain dimensions of the
antenna. Hence, the same design can be used for frequencies in adjacent bands
as well with minor changes in its dimensions. Important antenna parameters such
as return loss, radiation pattern and peak gains in the operating bands have
been studied in detail to prove that the proposed design is a promising
candidate for the aforementioned wireless technologies.
| [
{
"created": "Thu, 13 May 2021 18:19:52 GMT",
"version": "v1"
}
] | "2021-06-25T00:00:00" | [
[
"Nayak",
"Peshal",
""
],
[
"Verma",
"Sudhanshu",
""
],
[
"Kumar",
"Preetam",
""
]
] | 0no_new_dataset
|
2306.15354 | Siqi Zheng | Siqi Zheng, Luyao Cheng, Yafeng Chen, Hui Wang, Qian Chen | 3D-Speaker: A Large-Scale Multi-Device, Multi-Distance, and
Multi-Dialect Corpus for Speech Representation Disentanglement | null | null | null | null | cs.CL cs.SD eess.AS | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Disentangling uncorrelated information in speech utterances is a crucial
research topic within speech community. Different speech-related tasks focus on
extracting distinct speech representations while minimizing the affects of
other uncorrelated information. We present a large-scale speech corpus to
facilitate the research of speech representation disentanglement. 3D-Speaker
contains over 10,000 speakers, each of whom are simultaneously recorded by
multiple Devices, locating at different Distances, and some speakers are
speaking multiple Dialects. The controlled combinations of multi-dimensional
audio data yield a matrix of a diverse blend of speech representation
entanglement, thereby motivating intriguing methods to untangle them. The
multi-domain nature of 3D-Speaker also makes it a suitable resource to evaluate
large universal speech models and experiment methods of out-of-domain learning
and self-supervised learning. https://3dspeaker.github.io/
| [
{
"created": "Tue, 27 Jun 2023 10:09:43 GMT",
"version": "v1"
},
{
"created": "Wed, 28 Jun 2023 02:44:35 GMT",
"version": "v2"
},
{
"created": "Mon, 25 Sep 2023 02:36:41 GMT",
"version": "v3"
}
] | "2023-09-26T00:00:00" | [
[
"Zheng",
"Siqi",
""
],
[
"Cheng",
"Luyao",
""
],
[
"Chen",
"Yafeng",
""
],
[
"Wang",
"Hui",
""
],
[
"Chen",
"Qian",
""
]
] | 1new_dataset
|
1105.2447 | Gabriele D'Angelo | Gabriele D'Angelo and Stefano Ferretti | LUNES: Agent-based Simulation of P2P Systems (Extended Version) | Proceedings of the International Workshop on Modeling and Simulation
of Peer-to-Peer Architectures and Systems (MOSPAS 2011). As part of the 2011
International Conference on High Performance Computing and Simulation (HPCS
2011) | null | 10.1109/HPCSim.2011.5999879 | null | cs.DC cs.MA cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present LUNES, an agent-based Large Unstructured NEtwork Simulator, which
allows to simulate complex networks composed of a high number of nodes. LUNES
is modular, since it splits the three phases of network topology creation,
protocol simulation and performance evaluation. This permits to easily
integrate external software tools into the main software architecture. The
simulation of the interaction protocols among network nodes is performed via a
simulation middleware that supports both the sequential and the
parallel/distributed simulation approaches. In the latter case, a specific
mechanism for the communication overhead-reduction is used; this guarantees
high levels of performance and scalability. To demonstrate the efficiency of
LUNES, we test the simulator with gossip protocols executed on top of networks
(representing peer-to-peer overlays), generated with different topologies.
Results demonstrate the effectiveness of the proposed approach.
| [
{
"created": "Thu, 12 May 2011 12:26:40 GMT",
"version": "v1"
},
{
"created": "Thu, 27 Dec 2012 08:58:52 GMT",
"version": "v2"
},
{
"created": "Mon, 28 Jul 2014 09:38:29 GMT",
"version": "v3"
}
] | "2015-03-19T00:00:00" | [
[
"D'Angelo",
"Gabriele",
""
],
[
"Ferretti",
"Stefano",
""
]
] | 0no_new_dataset
|
2211.01916 | Hongrui Chen | Hongrui Chen, Holden Lee, Jianfeng Lu | Improved Analysis of Score-based Generative Modeling: User-Friendly
Bounds under Minimal Smoothness Assumptions | 36 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give an improved theoretical analysis of score-based generative modeling.
Under a score estimate with small $L^2$ error (averaged across timesteps), we
provide efficient convergence guarantees for any data distribution with
second-order moment, by either employing early stopping or assuming smoothness
condition on the score function of the data distribution. Our result does not
rely on any log-concavity or functional inequality assumption and has a
logarithmic dependence on the smoothness. In particular, we show that under
only a finite second moment condition, approximating the following in reverse
KL divergence in $\epsilon$-accuracy can be done in $\tilde O\left(\frac{d \log
(1/\delta)}{\epsilon}\right)$ steps: 1) the variance-$\delta$ Gaussian
perturbation of any data distribution; 2) data distributions with
$1/\delta$-smooth score functions. Our analysis also provides a quantitative
comparison between different discrete approximations and may guide the choice
of discretization points in practice.
| [
{
"created": "Thu, 3 Nov 2022 15:51:00 GMT",
"version": "v1"
},
{
"created": "Thu, 2 Feb 2023 10:34:04 GMT",
"version": "v2"
}
] | "2023-02-03T00:00:00" | [
[
"Chen",
"Hongrui",
""
],
[
"Lee",
"Holden",
""
],
[
"Lu",
"Jianfeng",
""
]
] | 0no_new_dataset
|
2112.15115 | Beril Sirmacek | Pablo Torres, Beril Sirmacek, Sergio Hoyas, Ricardo Vinuesa | Aim in Climate Change and City Pollution | null | null | null | null | cs.LG cs.AI cs.CY | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The sustainability of urban environments is an increasingly relevant problem.
Air pollution plays a key role in the degradation of the environment as well as
the health of the citizens exposed to it. In this chapter we provide a review
of the methods available to model air pollution, focusing on the application of
machine-learning methods. In fact, machine-learning methods have proved to
importantly increase the accuracy of traditional air-pollution approaches while
limiting the development cost of the models. Machine-learning tools have opened
new approaches to study air pollution, such as flow-dynamics modelling or
remote-sensing methodologies.
| [
{
"created": "Thu, 30 Dec 2021 16:17:46 GMT",
"version": "v1"
}
] | "2022-01-03T00:00:00" | [
[
"Torres",
"Pablo",
""
],
[
"Sirmacek",
"Beril",
""
],
[
"Hoyas",
"Sergio",
""
],
[
"Vinuesa",
"Ricardo",
""
]
] | 0no_new_dataset
|
1604.03541 | Pritam Mukherjee | Pritam Mukherjee and Sennur Ulukus | Secure Degrees of Freedom of the Multiple Access Wiretap Channel with
Multiple Antennas | Submitted to IEEE Transactions on Information Theory, February 2016 | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a two-user multiple-input multiple-output (MIMO) multiple access
wiretap channel with $N$ antennas at each transmitter, $N$ antennas at the
legitimate receiver, and $K$ antennas at the eavesdropper. We determine the
optimal sum secure degrees of freedom (s.d.o.f.) for this model for all values
of $N$ and $K$. We subdivide our problem into several regimes based on the
values of $N$ and $K$, and provide achievable schemes based on real and vector
space alignment techniques for fixed and fading channel gains, respectively. To
prove the optimality of the achievable schemes, we provide matching converses
for each regime. Our results show how the number of eavesdropper antennas
affects the optimal sum s.d.o.f. of the multiple access wiretap channel.
| [
{
"created": "Tue, 12 Apr 2016 19:48:00 GMT",
"version": "v1"
}
] | "2016-04-13T00:00:00" | [
[
"Mukherjee",
"Pritam",
""
],
[
"Ulukus",
"Sennur",
""
]
] | 0no_new_dataset
|
2112.02970 | Shilin Zhou | Shilin Zhou, Qingrong Xia, Zhenghua Li, Yu Zhang, Yu Hong, Min Zhang | Fast and Accurate End-to-End Span-based Semantic Role Labeling as
Word-based Graph Parsing | COLING 2022 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes to cast end-to-end span-based SRL as a word-based graph
parsing task. The major challenge is how to represent spans at the word level.
Borrowing ideas from research on Chinese word segmentation and named entity
recognition, we propose and compare four different schemata of graph
representation, i.e., BES, BE, BIES, and BII, among which we find that the BES
schema performs the best. We further gain interesting insights through detailed
analysis. Moreover, we propose a simple constrained Viterbi procedure to ensure
the legality of the output graph according to the constraints of the SRL
structure. We conduct experiments on two widely used benchmark datasets, i.e.,
CoNLL05 and CoNLL12. Results show that our word-based graph parsing approach
achieves consistently better performance than previous results, under all
settings of end-to-end and predicate-given, without and with pre-trained
language models (PLMs). More importantly, our model can parse 669/252 sentences
per second, without and with PLMs respectively.
| [
{
"created": "Mon, 6 Dec 2021 12:30:58 GMT",
"version": "v1"
},
{
"created": "Fri, 16 Sep 2022 13:43:42 GMT",
"version": "v2"
}
] | "2022-09-19T00:00:00" | [
[
"Zhou",
"Shilin",
""
],
[
"Xia",
"Qingrong",
""
],
[
"Li",
"Zhenghua",
""
],
[
"Zhang",
"Yu",
""
],
[
"Hong",
"Yu",
""
],
[
"Zhang",
"Min",
""
]
] | 0no_new_dataset
|
1910.05915 | Shengluan Hou | Shengluan Hou and Ruqian Lu | Knowledge-guided Unsupervised Rhetorical Parsing for Text Summarization | 16 pages, 4 figures | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatic text summarization (ATS) has recently achieved impressive
performance thanks to recent advances in deep learning and the availability of
large-scale corpora. To make the summarization results more faithful, this
paper presents an unsupervised approach that combines rhetorical structure
theory, deep neural model and domain knowledge concern for ATS. This
architecture mainly contains three components: domain knowledge base
construction based on representation learning, attentional encoder-decoder
model for rhetorical parsing and subroutine-based model for text summarization.
Domain knowledge can be effectively used for unsupervised rhetorical parsing
thus rhetorical structure trees for each document can be derived. In the
unsupervised rhetorical parsing module, the idea of translation was adopted to
alleviate the problem of data scarcity. The subroutine-based summarization
model purely depends on the derived rhetorical structure trees and can generate
content-balanced results. To evaluate the summary results without golden
standard, we proposed an unsupervised evaluation metric, whose hyper-parameters
were tuned by supervised learning. Experimental results show that, on a
large-scale Chinese dataset, our proposed approach can obtain comparable
performances compared with existing methods.
| [
{
"created": "Mon, 14 Oct 2019 04:48:16 GMT",
"version": "v1"
}
] | "2019-10-15T00:00:00" | [
[
"Hou",
"Shengluan",
""
],
[
"Lu",
"Ruqian",
""
]
] | 0no_new_dataset
|
2007.12087 | James Jordon | James Jordon, Daniel Jarrett, Jinsung Yoon, Tavian Barnes, Paul
Elbers, Patrick Thoral, Ari Ercole, Cheng Zhang, Danielle Belgrave and
Mihaela van der Schaar | Hide-and-Seek Privacy Challenge | 19 pages, 5 figures. Part of the NeurIPS 2020 competition track | null | null | null | cs.LG cs.CR cs.CY stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The clinical time-series setting poses a unique combination of challenges to
data modeling and sharing. Due to the high dimensionality of clinical time
series, adequate de-identification to preserve privacy while retaining data
utility is difficult to achieve using common de-identification techniques. An
innovative approach to this problem is synthetic data generation. From a
technical perspective, a good generative model for time-series data should
preserve temporal dynamics, in the sense that new sequences respect the
original relationships between high-dimensional variables across time. From the
privacy perspective, the model should prevent patient re-identification by
limiting vulnerability to membership inference attacks. The NeurIPS 2020
Hide-and-Seek Privacy Challenge is a novel two-tracked competition to
simultaneously accelerate progress in tackling both problems. In our
head-to-head format, participants in the synthetic data generation track (i.e.
"hiders") and the patient re-identification track (i.e. "seekers") are directly
pitted against each other by way of a new, high-quality intensive care
time-series dataset: the AmsterdamUMCdb dataset. Ultimately, we seek to advance
generative techniques for dense and high-dimensional temporal data streams that
are (1) clinically meaningful in terms of fidelity and predictivity, as well as
(2) capable of minimizing membership privacy risks in terms of the concrete
notion of patient re-identification.
| [
{
"created": "Thu, 23 Jul 2020 15:50:59 GMT",
"version": "v1"
},
{
"created": "Fri, 24 Jul 2020 17:10:18 GMT",
"version": "v2"
}
] | "2020-07-27T00:00:00" | [
[
"Jordon",
"James",
""
],
[
"Jarrett",
"Daniel",
""
],
[
"Yoon",
"Jinsung",
""
],
[
"Barnes",
"Tavian",
""
],
[
"Elbers",
"Paul",
""
],
[
"Thoral",
"Patrick",
""
],
[
"Ercole",
"Ari",
""
],
[
"Zhang",
"Cheng",
""
],
[
"Belgrave",
"Danielle",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] | 1new_dataset
|
2011.09257 | Pablo Pino | Pablo Pino, Denis Parra, Pablo Messina, Cecilia Besa, Sergio Uribe | Inspecting state of the art performance and NLP metrics in image-based
medical report generation | 3 pages, 1 figure, 1 table. Accepted in LatinX in AI workshop at
NeurIPS 2020. (v3 updated ack) | null | null | null | cs.CL cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several deep learning architectures have been proposed over the last years to
deal with the problem of generating a written report given an imaging exam as
input. Most works evaluate the generated reports using standard Natural
Language Processing (NLP) metrics (e.g. BLEU, ROUGE), reporting significant
progress. In this article, we contrast this progress by comparing state of the
art (SOTA) models against weak baselines. We show that simple and even naive
approaches yield near SOTA performance on most traditional NLP metrics. We
conclude that evaluation methods in this task should be further studied towards
correctly measuring clinical accuracy, ideally involving physicians to
contribute to this end.
| [
{
"created": "Wed, 18 Nov 2020 13:09:12 GMT",
"version": "v1"
},
{
"created": "Sat, 21 Nov 2020 17:58:40 GMT",
"version": "v2"
},
{
"created": "Sat, 15 Jan 2022 06:05:51 GMT",
"version": "v3"
}
] | "2022-01-19T00:00:00" | [
[
"Pino",
"Pablo",
""
],
[
"Parra",
"Denis",
""
],
[
"Messina",
"Pablo",
""
],
[
"Besa",
"Cecilia",
""
],
[
"Uribe",
"Sergio",
""
]
] | 0no_new_dataset
|
2206.01953 | Fabio Arnez | Fabio Arnez, Ansgar Radermacher, Huascar Espinoza | Quantifying and Using System Uncertainty in UAV Navigation | Accepted at the ICRA 2022 Workshop on Releasing Robots into the Wild:
Simulations, Benchmarks, and Deployment | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | As autonomous systems increasingly rely on Deep Neural Networks (DNN) to
implement the navigation pipeline functions, uncertainty estimation methods
have become paramount for estimating confidence in DNN predictions. Bayesian
Deep Learning (BDL) offers a principled approach to model uncertainties in
DNNs. However, DNN components from autonomous systems partially capture
uncertainty, or more importantly, the uncertainty effect in downstream tasks is
ignored. This paper provides a method to capture the overall system uncertainty
in a UAV navigation task. In particular, we study the effect of the uncertainty
from perception representations in downstream control predictions. Moreover, we
leverage the uncertainty in the system's output to improve control decisions
that positively impact the UAV's performance on its task.
| [
{
"created": "Sat, 4 Jun 2022 09:34:40 GMT",
"version": "v1"
}
] | "2022-06-07T00:00:00" | [
[
"Arnez",
"Fabio",
""
],
[
"Radermacher",
"Ansgar",
""
],
[
"Espinoza",
"Huascar",
""
]
] | 0no_new_dataset
|
1910.04755 | Dmitry Zhukov | David Prokhorov, Dmitry Zhukov, Olga Barinova, Anna Vorontsova, Anton
Konushin | Measuring robustness of Visual SLAM | null | null | null | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simultaneous localization and mapping (SLAM) is an essential component of
robotic systems. In this work we perform a feasibility study of RGB-D SLAM for
the task of indoor robot navigation. Recent visual SLAM methods, e.g. ORBSLAM2
\cite{mur2017orb}, demonstrate really impressive accuracy, but the experiments
in the papers are usually conducted on just a few sequences, that makes it
difficult to reason about the robustness of the methods. Another problem is
that all available RGB-D datasets contain the trajectories with very complex
camera motions. In this work we extensively evaluate ORBSLAM2 to better
understand the state-of-the-art. First, we conduct experiments on the popular
publicly available datasets for RGB-D SLAM across the conventional metrics. We
perform statistical analysis of the results and find correlations between the
metrics and the attributes of the trajectories. Then, we introduce a new large
and diverse HomeRobot dataset where we model the motions of a simple home
robot. Our dataset is created using physically-based rendering with realistic
lighting and contains the scenes composed by human designers. It includes
thousands of sequences, that is two orders of magnitude greater than in
previous works. We find that while in many cases the accuracy of SLAM is very
good, the robustness is still an issue.
| [
{
"created": "Thu, 10 Oct 2019 06:12:44 GMT",
"version": "v1"
}
] | "2019-10-14T00:00:00" | [
[
"Prokhorov",
"David",
""
],
[
"Zhukov",
"Dmitry",
""
],
[
"Barinova",
"Olga",
""
],
[
"Vorontsova",
"Anna",
""
],
[
"Konushin",
"Anton",
""
]
] | 1new_dataset
|
1802.03699 | Jintao Ke | Jintao Ke, Shuaichao Zhang, Hai Yang, Xiqun Chen | PCA-Based Missing Information Imputation for Real-Time Crash Likelihood
Prediction Under Imbalanced Data | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The real-time crash likelihood prediction has been an important research
topic. Various classifiers, such as support vector machine (SVM) and tree-based
boosting algorithms, have been proposed in traffic safety studies. However, few
research focuses on the missing data imputation in real-time crash likelihood
prediction, although missing values are commonly observed due to breakdown of
sensors or external interference. Besides, classifying imbalanced data is also
a difficult problem in real-time crash likelihood prediction, since it is hard
to distinguish crash-prone cases from non-crash cases which compose the
majority of the observed samples. In this paper, principal component analysis
(PCA) based approaches, including LS-PCA, PPCA, and VBPCA, are employed for
imputing missing values, while two kinds of solutions are developed to solve
the problem in imbalanced data. The results show that PPCA and VBPCA not only
outperform LS-PCA and other imputation methods (including mean imputation and
k-means clustering imputation), in terms of the root mean square error (RMSE),
but also help the classifiers achieve better predictive performance. The two
solutions, i.e., cost-sensitive learning and synthetic minority oversampling
technique (SMOTE), help improve the sensitivity by adjusting the classifiers to
pay more attention to the minority class.
| [
{
"created": "Sun, 11 Feb 2018 06:21:47 GMT",
"version": "v1"
}
] | "2018-02-13T00:00:00" | [
[
"Ke",
"Jintao",
""
],
[
"Zhang",
"Shuaichao",
""
],
[
"Yang",
"Hai",
""
],
[
"Chen",
"Xiqun",
""
]
] | 0no_new_dataset
|
2407.05067 | Richard Hlad\'ik | Richard Hlad\'ik, Jakub T\v{e}tek | Smooth Sensitivity Revisited: Towards Optimality | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Smooth sensitivity is one of the most commonly used techniques for designing
practical differentially private mechanisms. In this approach, one computes the
smooth sensitivity of a given query $q$ on the given input $D$ and releases
$q(D)$ with noise added proportional to this smooth sensitivity. One question
remains: what distribution should we pick the noise from?
In this paper, we give a new class of distributions suitable for the use with
smooth sensitivity, which we name the PolyPlace distribution. This distribution
improves upon the state-of-the-art Student's T distribution in terms of
standard deviation by arbitrarily large factors, depending on a "smoothness
parameter" $\gamma$, which one has to set in the smooth sensitivity framework.
Moreover, our distribution is defined for a wider range of parameter $\gamma$,
which can lead to significantly better performance.
Moreover, we prove that the PolyPlace distribution converges for $\gamma
\rightarrow 0$ to the Laplace distribution and so does its variance. This means
that the Laplace mechanism is a limit special case of the PolyPlace mechanism.
This implies that out mechanism is in a certain sense optimal for $\gamma \to
0$.
| [
{
"created": "Sat, 6 Jul 2024 13:09:36 GMT",
"version": "v1"
}
] | "2024-07-09T00:00:00" | [
[
"Hladík",
"Richard",
""
],
[
"Tětek",
"Jakub",
""
]
] | 0no_new_dataset
|
2210.09439 | Natasha Alkhatib | Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | CAN-BERT do it? Controller Area Network Intrusion Detection System based
on BERT Language Model | null | null | null | null | cs.LG cs.CR cs.NI | http://creativecommons.org/licenses/by/4.0/ | Due to the rising number of sophisticated customer functionalities,
electronic control units (ECUs) are increasingly integrated into modern
automotive systems. However, the high connectivity between the in-vehicle and
the external networks paves the way for hackers who could exploit in-vehicle
network protocols' vulnerabilities. Among these protocols, the Controller Area
Network (CAN), known as the most widely used in-vehicle networking technology,
lacks encryption and authentication mechanisms, making the communications
delivered by distributed ECUs insecure. Inspired by the outstanding performance
of bidirectional encoder representations from transformers (BERT) for improving
many natural language processing tasks, we propose in this paper ``CAN-BERT", a
deep learning based network intrusion detection system, to detect cyber attacks
on CAN bus protocol. We show that the BERT model can learn the sequence of
arbitration identifiers (IDs) in the CAN bus for anomaly detection using the
``masked language model" unsupervised training objective. The experimental
results on the ``Car Hacking: Attack \& Defense Challenge 2020" dataset show
that ``CAN-BERT" outperforms state-of-the-art approaches. In addition to being
able to identify in-vehicle intrusions in real-time within 0.8 ms to 3 ms w.r.t
CAN ID sequence length, it can also detect a wide variety of cyberattacks with
an F1-score of between 0.81 and 0.99.
| [
{
"created": "Mon, 17 Oct 2022 21:21:37 GMT",
"version": "v1"
}
] | "2022-10-19T00:00:00" | [
[
"Alkhatib",
"Natasha",
""
],
[
"Mushtaq",
"Maria",
""
],
[
"Ghauch",
"Hadi",
""
],
[
"Danger",
"Jean-Luc",
""
]
] | 1new_dataset
|
2310.13395 | Ilias Marios Stogiannidis | Ilias Stogiannidis, Stavros Vassos, Prodromos Malakasiotis, Ion
Androutsopoulos | Cache me if you Can: an Online Cost-aware Teacher-Student framework to
Reduce the Calls to Large Language Models | Short paper (5 pages), accepted at Findings of EMNLP 2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Prompting Large Language Models (LLMs) performs impressively in zero- and
few-shot settings. Hence, small and medium-sized enterprises (SMEs) that cannot
afford the cost of creating large task-specific training datasets, but also the
cost of pretraining their own LLMs, are increasingly turning to third-party
services that allow them to prompt LLMs. However, such services currently
require a payment per call, which becomes a significant operating expense
(OpEx). Furthermore, customer inputs are often very similar over time, hence
SMEs end-up prompting LLMs with very similar instances. We propose a framework
that allows reducing the calls to LLMs by caching previous LLM responses and
using them to train a local inexpensive model on the SME side. The framework
includes criteria for deciding when to trust the local model or call the LLM,
and a methodology to tune the criteria and measure the tradeoff between
performance and cost. For experimental purposes, we instantiate our framework
with two LLMs, GPT-3.5 or GPT-4, and two inexpensive students, a k-NN
classifier or a Multi-Layer Perceptron, using two common business tasks, intent
recognition and sentiment analysis. Experimental results indicate that
significant OpEx savings can be obtained with only slightly lower performance.
| [
{
"created": "Fri, 20 Oct 2023 10:05:07 GMT",
"version": "v1"
}
] | "2023-10-23T00:00:00" | [
[
"Stogiannidis",
"Ilias",
""
],
[
"Vassos",
"Stavros",
""
],
[
"Malakasiotis",
"Prodromos",
""
],
[
"Androutsopoulos",
"Ion",
""
]
] | 0no_new_dataset
|
2308.09454 | Mathias Rose Bjare MSc | Mathias Rose Bjare, Stefan Lattner and Gerhard Widmer | Exploring Sampling Techniques for Generating Melodies with a Transformer
Language Model | 7 pages, 5 figures, 1 table, accepted at the 24th Int. Society for
Music Information Retrieval Conf., Milan, Italy, 2023 | null | null | null | cs.SD cs.CL eess.AS | http://creativecommons.org/licenses/by/4.0/ | Research in natural language processing has demonstrated that the quality of
generations from trained autoregressive language models is significantly
influenced by the used sampling strategy. In this study, we investigate the
impact of different sampling techniques on musical qualities such as diversity
and structure. To accomplish this, we train a high-capacity transformer model
on a vast collection of highly-structured Irish folk melodies and analyze the
musical qualities of the samples generated using distribution truncation
sampling techniques. Specifically, we use nucleus sampling, the recently
proposed "typical sampling", and conventional ancestral sampling. We evaluate
the effect of these sampling strategies in two scenarios: optimal circumstances
with a well-calibrated model and suboptimal circumstances where we
systematically degrade the model's performance. We assess the generated samples
using objective and subjective evaluations. We discover that probability
truncation techniques may restrict diversity and structural patterns in optimal
circumstances, but may also produce more musical samples in suboptimal
circumstances.
| [
{
"created": "Fri, 18 Aug 2023 10:34:46 GMT",
"version": "v1"
}
] | "2023-08-21T00:00:00" | [
[
"Bjare",
"Mathias Rose",
""
],
[
"Lattner",
"Stefan",
""
],
[
"Widmer",
"Gerhard",
""
]
] | 0no_new_dataset
|
1707.04364 | Mohammad Kachuee Mr. | Sandeep Singh Sandha, Mohammad Kachuee, Sajad Darabi | Complex Event Processing of Health Data in Real-time to Predict Heart
Failure Risk and Stress | null | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we develop a scalable system which can do real-time analytics
for different health applications. The occurrence of different health
conditions can be regarded as the complex events and thus this concept can be
extended to other use cases easily. Large number of users should be able to
send the data in real-time, and should be able to receive the feedback and
result. Keeping the requirements in mind we used Kafka and Spark to develop our
system. In this setting, multiple users are running Kafka producer clients,
which are sending data in real-time. Spark streaming is used to process data
from Kafka of different window sizes to analyze the health conditions. We have
developed and tested the heart attack risk and stress prediction as our sample
complex events detection use cases. We have simulated and tested our system
with multiple health datasets.
| [
{
"created": "Fri, 14 Jul 2017 01:22:50 GMT",
"version": "v1"
}
] | "2017-07-17T00:00:00" | [
[
"Sandha",
"Sandeep Singh",
""
],
[
"Kachuee",
"Mohammad",
""
],
[
"Darabi",
"Sajad",
""
]
] | 1new_dataset
|
cs/0606122 | P. Oscar Boykin | Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury | Comparison of Image Similarity Queries in P2P Systems | To appear in IEEE P2P2006 | null | null | null | cs.DC cs.NI | null | Given some of the recent advances in Distributed Hash Table (DHT) based
Peer-To-Peer (P2P) systems we ask the following questions: Are there
applications where unstructured queries are still necessary (i.e., the
underlying queries do not efficiently map onto any structured framework), and
are there unstructured P2P systems that can deliver the high bandwidth and
computing performance necessary to support such applications. Toward this end,
we consider an image search application which supports queries based on image
similarity metrics, such as color histogram intersection, and discuss why in
this setting, standard DHT approaches are not directly applicable. We then
study the feasibility of implementing such an image search system on two
different unstructured P2P systems: power-law topology with percolation search,
and an optimized super-node topology using structured broadcasts. We examine
the average and maximum values for node bandwidth, storage and processing
requirements in the percolation and super-node models, and show that current
high-end computers and high-speed links have sufficient resources to enable
deployments of large-scale complex image search systems.
| [
{
"created": "Thu, 29 Jun 2006 14:28:32 GMT",
"version": "v1"
}
] | "2007-05-23T00:00:00" | [
[
"Mueller",
"Wolfgang",
""
],
[
"Boykin",
"P. Oscar",
""
],
[
"Sarshar",
"Nima",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] | 0no_new_dataset
|
2112.07120 | Jonathan Scarlett | Yan Hao Ling and Jonathan Scarlett | Simple Coding Techniques for Many-Hop Relaying | IEEE Transactions on Information Theory, Volume 68, Issue 11, pp.
7043-7053, Nov. 2022 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the problem of relaying a single bit of information
across a series of binary symmetric channels, and the associated trade-off
between the number of hops $m$, the transmission time $n$, and the error
probability. We introduce a simple, efficient, and deterministic protocol that
attains positive information velocity (i.e., a non-vanishing ratio
$\frac{m}{n}$ and small error probability) and is significantly simpler than
existing protocols that do so. In addition, we characterize the optimal
low-noise and high-noise scaling laws of the information velocity, and we adapt
our 1-bit protocol to transmit $k$ bits over $m$ hops with $O(m+k)$
transmission time.
| [
{
"created": "Tue, 14 Dec 2021 02:45:45 GMT",
"version": "v1"
},
{
"created": "Wed, 26 Jan 2022 06:31:02 GMT",
"version": "v2"
},
{
"created": "Mon, 6 Jun 2022 06:29:26 GMT",
"version": "v3"
},
{
"created": "Thu, 8 Dec 2022 03:25:01 GMT",
"version": "v4"
}
] | "2022-12-09T00:00:00" | [
[
"Ling",
"Yan Hao",
""
],
[
"Scarlett",
"Jonathan",
""
]
] | 0no_new_dataset
|
2212.10513 | Connor Gibbs | Connor P. Gibbs and Bailey K. Fosdick and James D. Wilson | ECoHeN: A Hypothesis Testing Framework for Extracting Communities from
Heterogeneous Networks | 31 pages, 8 figures, 1 table, 1 algorithm | null | null | null | cs.SI stat.ME | http://creativecommons.org/licenses/by/4.0/ | Community discovery is the general process of attaining assortative
communities from a network: collections of nodes that are densely connected
within yet sparsely connected to the rest of the network. While community
discovery has been well studied, few such techniques exist for heterogeneous
networks, which contain different types of nodes and possibly different
connectivity patterns between the node types. In this paper, we introduce a
framework called ECoHeN, which \textbf{e}xtracts \textbf{co}mmunities from a
\textbf{he}terogeneous \textbf{n}etwork in a statistically meaningful way.
Using a heterogeneous configuration model as a reference distribution, ECoHeN
identifies communities that are significantly more densely connected than
expected given the node types and connectivity of its membership. Specifically,
the ECoHeN algorithm extracts communities one at a time through a dynamic set
of iterative updating rules, is guaranteed to converge, and imposes no
constraints on the type composition of extracted communities. To our knowledge
this is the first discovery method that distinguishes and identifies both
homogeneous and heterogeneous, possibly overlapping, community structure in a
network. We demonstrate the performance of ECoHeN through simulation and in
application to a political blogs network to identify collections of blogs which
reference one another more than expected considering the ideology of its'
members.
| [
{
"created": "Tue, 20 Dec 2022 18:30:55 GMT",
"version": "v1"
}
] | "2022-12-21T00:00:00" | [
[
"Gibbs",
"Connor P.",
""
],
[
"Fosdick",
"Bailey K.",
""
],
[
"Wilson",
"James D.",
""
]
] | 1new_dataset
|
1806.05285 | Gilles Puy | Gilles Puy and Patrick P\'erez | A Flexible Convolutional Solver with Application to Photorealistic Style
Transfer | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new flexible deep convolutional neural network (convnet) to
perform fast visual style transfer. In contrast to existing convnets that
address the same task, our architecture derives directly from the structure of
the gradient descent originally used to solve the style transfer problem [Gatys
et al., 2016]. Like existing convnets, ours approximately solves the original
problem much faster than the gradient descent. However, our network is uniquely
flexible by design: it can be manipulated at runtime to enforce new constraints
on the final solution. In particular, we show how to modify it to obtain a
photorealistic result with no retraining. We study the modifications made by
[Luan et al., 2017] to the original cost function of [Gatys et al., 2016] to
achieve photorealistic style transfer. These modifications affect directly the
gradient descent and can be reported on-the-fly in our network. These
modifications are possible as the proposed architecture stems from unrolling
the gradient descent.
| [
{
"created": "Wed, 13 Jun 2018 22:05:35 GMT",
"version": "v1"
}
] | "2018-06-15T00:00:00" | [
[
"Puy",
"Gilles",
""
],
[
"Pérez",
"Patrick",
""
]
] | 0no_new_dataset
|
1909.12054 | Alexis Stoven-Dubois | Alexis Stoven-Dubois, Janos Botzheim and Naoyuki Kubota | Fuzzy Gesture Expression Model for an Interactive and Safe Robot Partner | 11 pages, 8 figures, accepted for publication in Journal of Network
Intelligence | Journal of Network Intelligence Vol. 1 Number 4 (2016) pgs.
119-129 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interaction with a robot partner requires many elements, including not only
speech but also embodiment. Thus, gestural and facial expressions are important
for communication. Furthermore, understanding human movements is essential for
safe and natural interchange. This paper proposes an interactive fuzzy
emotional model for the robot partner's gesture expression, following its
facial emotional model.
First, we describe the physical interaction between the user and its robot
partner. Next, we propose a kinematic model for the robot partner based on the
Denavit-Hartenberg convention and solve the inverse kinematic transformation
through Bacterial Memetic Algorithm. Then, the emotional model along its
interactivity with the user is discussed. Finally, we show experimental results
of the proposed model.
| [
{
"created": "Thu, 26 Sep 2019 12:39:02 GMT",
"version": "v1"
}
] | "2019-10-02T00:00:00" | [
[
"Stoven-Dubois",
"Alexis",
""
],
[
"Botzheim",
"Janos",
""
],
[
"Kubota",
"Naoyuki",
""
]
] | 0no_new_dataset
|
1811.02275 | Veronica Morfi | Veronica Morfi, Yves Bas, Hanna Pamu{\l}a, Herv\'e Glotin, Dan Stowell | NIPS4Bplus: a richly annotated birdsong audio dataset | 5 pages, 5 figures, submitted to ICASSP 2019 | null | null | null | cs.SD cs.DL eess.AS | http://creativecommons.org/licenses/by/4.0/ | Recent advances in birdsong detection and classification have approached a
limit due to the lack of fully annotated recordings. In this paper, we present
NIPS4Bplus, the first richly annotated birdsong audio dataset, that is
comprised of recordings containing bird vocalisations along with their active
species tags plus the temporal annotations acquired for them. Statistical
information about the recordings, their species specific tags and their
temporal annotations are presented along with example uses. NIPS4Bplus could be
used in various ecoacoustic tasks, such as training models for bird population
monitoring, species classification, birdsong vocalisation detection and
classification.
| [
{
"created": "Tue, 6 Nov 2018 10:46:27 GMT",
"version": "v1"
},
{
"created": "Wed, 14 Nov 2018 12:25:27 GMT",
"version": "v2"
}
] | "2018-11-15T00:00:00" | [
[
"Morfi",
"Veronica",
""
],
[
"Bas",
"Yves",
""
],
[
"Pamuła",
"Hanna",
""
],
[
"Glotin",
"Hervé",
""
],
[
"Stowell",
"Dan",
""
]
] | 1new_dataset
|
1907.13077 | Markus Levonyak | Carlos Pachajoa, Markus Levonyak, Wilfried N. Gansterer, Jesper
Larsson Tr\"aff | How to Make the Preconditioned Conjugate Gradient Method Resilient
Against Multiple Node Failures | 10 pages, 4 figures, 3 tables | Proceedings of the 48th International Conference on Parallel
Processing (2019) 67:1-67:10 | 10.1145/3337821.3337849 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study algorithmic approaches for recovering from the failure of several
compute nodes in the parallel preconditioned conjugate gradient (PCG) solver on
large-scale parallel computers. In particular, we analyze and extend an exact
state reconstruction (ESR) approach, which is based on a method proposed by
Chen (2011). In the ESR approach, the solver keeps redundant information from
previous search directions, so that the solver state can be fully reconstructed
if a node fails unexpectedly. ESR does not require checkpointing or external
storage for saving dynamic solver data and has low overhead compared to the
failure-free situation.
In this paper, we improve the fault tolerance of the PCG algorithm based on
the ESR approach. In particular, we support recovery from simultaneous or
overlapping failures of several nodes for general sparsity patterns of the
system matrix, which cannot be handled by Chen's method. For this purpose, we
refine the strategy for how to store redundant information across nodes. We
analyze and implement our new method and perform numerical experiments with
large sparse matrices from real-world applications on 128 nodes of the Vienna
Scientific Cluster (VSC). For recovering from three simultaneous node failures
we observe average runtime overheads between only 2.8% and 55.0%. The overhead
of the improved resilience depends on the sparsity pattern of the system
matrix.
| [
{
"created": "Tue, 30 Jul 2019 17:01:33 GMT",
"version": "v1"
}
] | "2019-08-21T00:00:00" | [
[
"Pachajoa",
"Carlos",
""
],
[
"Levonyak",
"Markus",
""
],
[
"Gansterer",
"Wilfried N.",
""
],
[
"Träff",
"Jesper Larsson",
""
]
] | 0no_new_dataset
|
2010.12033 | Victor Sanches Portella | Yihan Zhou, Victor S. Portella, Mark Schmidt, Nicholas J. A. Harvey | Regret Bounds without Lipschitz Continuity: Online Learning with
Relative-Lipschitz Losses | 22 pages, camera-ready version, accepted in NeurIPS 2020 for poster
presentation. Second version has a new reference (acknowledged in the
acknowledgements section) and comments on the relationship of this work with
the paper | null | null | null | cs.LG math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In online convex optimization (OCO), Lipschitz continuity of the functions is
commonly assumed in order to obtain sublinear regret. Moreover, many algorithms
have only logarithmic regret when these functions are also strongly convex.
Recently, researchers from convex optimization proposed the notions of
"relative Lipschitz continuity" and "relative strong convexity". Both of the
notions are generalizations of their classical counterparts. It has been shown
that subgradient methods in the relative setting have performance analogous to
their performance in the classical setting.
In this work, we consider OCO for relative Lipschitz and relative strongly
convex functions. We extend the known regret bounds for classical OCO
algorithms to the relative setting. Specifically, we show regret bounds for the
follow the regularized leader algorithms and a variant of online mirror
descent. Due to the generality of these methods, these results yield regret
bounds for a wide variety of OCO algorithms. Furthermore, we further extend the
results to algorithms with extra regularization such as regularized dual
averaging.
| [
{
"created": "Thu, 22 Oct 2020 20:22:19 GMT",
"version": "v1"
},
{
"created": "Mon, 28 Dec 2020 22:02:54 GMT",
"version": "v2"
}
] | "2021-01-01T00:00:00" | [
[
"Zhou",
"Yihan",
""
],
[
"Portella",
"Victor S.",
""
],
[
"Schmidt",
"Mark",
""
],
[
"Harvey",
"Nicholas J. A.",
""
]
] | 0no_new_dataset
|
2311.09776 | EPTCS | Astrid Rakow (German Aerospace Center (DLR) e.V.), Mehrnoush
Hajnorouzi (German Aerospace Center (DLR) e.V.), Akhila Bairy (Carl von
Ossietzky University of Oldenburg) | What to tell when? -- Information Provision as a Game | In Proceedings FMAS 2023, arXiv:2311.08987 | EPTCS 395, 2023, pp. 1-9 | 10.4204/EPTCS.395.1 | null | cs.GT cs.HC | http://creativecommons.org/licenses/by/4.0/ | Constantly informing systems (CIS), that is technical systems that provide us
with information over a long period of time, face the challenge of providing us
with helpful information. The information base of a human model changes over
time but also his mood and his ability to accept information. An information
provision strategy should hence take such aspects into account. In this paper,
we describe our vision of an approach to aid the design of CIS. We envision
using psychological models of the human mind and emotions in an information
provision game. Its analysis gives comparative insights into design variants.
| [
{
"created": "Thu, 16 Nov 2023 11:01:02 GMT",
"version": "v1"
}
] | "2023-11-17T00:00:00" | [
[
"Rakow",
"Astrid",
"",
"German Aerospace Center"
],
[
"Hajnorouzi",
"Mehrnoush",
"",
"German Aerospace Center"
],
[
"Bairy",
"Akhila",
"",
"Carl von\n Ossietzky University of Oldenburg"
]
] | 0no_new_dataset
|
2002.04335 | Eren Sezener | Eren Sezener and Peter Dayan | Static and Dynamic Values of Computation in MCTS | Presented in UAI 2020 | PMLR 124:31-40, 2020 | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Monte-Carlo Tree Search (MCTS) is one of the most-widely used methods for
planning, and has powered many recent advances in artificial intelligence. In
MCTS, one typically performs computations (i.e., simulations) to collect
statistics about the possible future consequences of actions, and then chooses
accordingly. Many popular MCTS methods such as UCT and its variants decide
which computations to perform by trading-off exploration and exploitation. In
this work, we take a more direct approach, and explicitly quantify the value of
a computation based on its expected impact on the quality of the action
eventually chosen. Our approach goes beyond the "myopic" limitations of
existing computation-value-based methods in two senses: (I) we are able to
account for the impact of non-immediate (ie, future) computations (II) on
non-immediate actions. We show that policies that greedily optimize computation
values are optimal under certain assumptions and obtain results that are
competitive with the state-of-the-art.
| [
{
"created": "Tue, 11 Feb 2020 12:05:58 GMT",
"version": "v1"
},
{
"created": "Thu, 19 Nov 2020 12:28:19 GMT",
"version": "v2"
}
] | "2020-11-20T00:00:00" | [
[
"Sezener",
"Eren",
""
],
[
"Dayan",
"Peter",
""
]
] | 0no_new_dataset
|
0807.4052 | Andreas Noack | Andreas Noack | Modularity clustering is force-directed layout | 9 pages, 7 figures, see http://code.google.com/p/linloglayout/ for
downloading the graph clustering and layout software | Phys. Rev. E 79, 026102 (2009) | 10.1103/PhysRevE.79.026102 | null | cs.DM cs.CG physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two natural and widely used representations for the community structure of
networks are clusterings, which partition the vertex set into disjoint subsets,
and layouts, which assign the vertices to positions in a metric space. This
paper unifies prominent characterizations of layout quality and clustering
quality, by showing that energy models of pairwise attraction and repulsion
subsume Newman and Girvan's modularity measure. Layouts with optimal energy are
relaxations of, and are thus consistent with, clusterings with optimal
modularity, which is of practical relevance because both representations are
complementary and often used together.
| [
{
"created": "Fri, 25 Jul 2008 19:56:08 GMT",
"version": "v1"
},
{
"created": "Tue, 9 Dec 2008 16:13:37 GMT",
"version": "v2"
}
] | "2009-02-06T00:00:00" | [
[
"Noack",
"Andreas",
""
]
] | 0no_new_dataset
|
2303.11564 | Eduardo Ulises Moya-S\'anchez | Abraham S\'anchez, Ra\'ul Nanclares, Alexander Quevedo, Ulises
Pelagio, Alejandra Aguilar, Gabriela Calvario and E. Ulises Moya-S\'anchez | Agave crop segmentation and maturity classification with deep learning
data-centric strategies using very high-resolution satellite imagery | 12 pages, 8 figures | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The responsible and sustainable agave-tequila production chain is fundamental
for the social, environment and economic development of Mexico's agave regions.
It is therefore relevant to develop new tools for large scale automatic agave
region monitoring. In this work, we present an Agave tequilana Weber azul crop
segmentation and maturity classification using very high resolution satellite
imagery, which could be useful for this task. To achieve this, we solve
real-world deep learning problems in the very specific context of agave crop
segmentation such as lack of data, low quality labels, highly imbalanced data,
and low model performance. The proposed strategies go beyond data augmentation
and data transfer combining active learning and the creation of synthetic
images with human supervision. As a result, the segmentation performance
evaluated with Intersection over Union (IoU) value increased from 0.72 to 0.90
in the test set. We also propose a method for classifying agave crop maturity
with 95% accuracy. With the resulting accurate models, agave production
forecasting can be made available for large regions. In addition, some
supply-demand problems such excessive supplies of agave or, deforestation,
could be detected early.
| [
{
"created": "Tue, 21 Mar 2023 03:15:29 GMT",
"version": "v1"
},
{
"created": "Wed, 5 Apr 2023 23:29:05 GMT",
"version": "v2"
}
] | "2023-04-07T00:00:00" | [
[
"Sánchez",
"Abraham",
""
],
[
"Nanclares",
"Raúl",
""
],
[
"Quevedo",
"Alexander",
""
],
[
"Pelagio",
"Ulises",
""
],
[
"Aguilar",
"Alejandra",
""
],
[
"Calvario",
"Gabriela",
""
],
[
"Moya-Sánchez",
"E. Ulises",
""
]
] | 1new_dataset
|
1905.03929 | Yuxiu Hua | Yuxiu Hua, Rongpeng Li, Zhifeng Zhao, Xianfu Chen, Honggang Zhang | GAN-powered Deep Distributional Reinforcement Learning for Resource
Management in Network Slicing | null | null | null | null | cs.LG cs.AI cs.NI stat.ML | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Network slicing is a key technology in 5G communications system. Its purpose
is to dynamically and efficiently allocate resources for diversified services
with distinct requirements over a common underlying physical infrastructure.
Therein, demand-aware resource allocation is of significant importance to
network slicing. In this paper, we consider a scenario that contains several
slices in a radio access network with base stations that share the same
physical resources (e.g., bandwidth or slots). We leverage deep reinforcement
learning (DRL) to solve this problem by considering the varying service demands
as the environment state and the allocated resources as the environment action.
In order to reduce the effects of the annoying randomness and noise embedded in
the received service level agreement (SLA) satisfaction ratio (SSR) and
spectrum efficiency (SE), we primarily propose generative adversarial
network-powered deep distributional Q network (GAN-DDQN) to learn the
action-value distribution driven by minimizing the discrepancy between the
estimated action-value distribution and the target action-value distribution.
We put forward a reward-clipping mechanism to stabilize GAN-DDQN training
against the effects of widely-spanning utility values. Moreover, we further
develop Dueling GAN-DDQN, which uses a specially designed dueling generator, to
learn the action-value distribution by estimating the state-value distribution
and the action advantage function. Finally, we verify the performance of the
proposed GAN-DDQN and Dueling GAN-DDQN algorithms through extensive
simulations.
| [
{
"created": "Fri, 10 May 2019 04:10:43 GMT",
"version": "v1"
},
{
"created": "Fri, 21 Jun 2019 01:58:34 GMT",
"version": "v2"
},
{
"created": "Wed, 20 Nov 2019 14:51:31 GMT",
"version": "v3"
}
] | "2019-11-21T00:00:00" | [
[
"Hua",
"Yuxiu",
""
],
[
"Li",
"Rongpeng",
""
],
[
"Zhao",
"Zhifeng",
""
],
[
"Chen",
"Xianfu",
""
],
[
"Zhang",
"Honggang",
""
]
] | 0no_new_dataset
|
1610.02728 | Marco Chiesa | Marco Chiesa and G\'abor R\'etv\'ari and Michael Schapira | Lying Your Way to Better Traffic Engineering | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To optimize the flow of traffic in IP networks, operators do traffic
engineering (TE), i.e., tune routing-protocol parameters in response to traffic
demands. TE in IP networks typically involves configuring static link weights
and splitting traffic between the resulting shortest-paths via the
Equal-Cost-MultiPath (ECMP) mechanism. Unfortunately, ECMP is a notoriously
cumbersome and indirect means for optimizing traffic flow, often leading to
poor network performance. Also, obtaining accurate knowledge of traffic demands
as the input to TE is elusive, and traffic conditions can be highly variable,
further complicating TE. We leverage recently proposed schemes for increasing
ECMP's expressiveness via carefully disseminated bogus information ("lies") to
design COYOTE, a readily deployable TE scheme for robust and efficient network
utilization. COYOTE leverages new algorithmic ideas to configure (static)
traffic splitting ratios that are optimized with respect to all (even
adversarially chosen) traffic scenarios within the operator's "uncertainty
bounds". Our experimental analyses show that COYOTE significantly outperforms
today's prevalent TE schemes in a manner that is robust to traffic uncertainty
and variation. We discuss experiments with a prototype implementation of
COYOTE.
| [
{
"created": "Sun, 9 Oct 2016 21:57:39 GMT",
"version": "v1"
},
{
"created": "Tue, 1 Nov 2016 13:21:43 GMT",
"version": "v2"
}
] | "2016-11-02T00:00:00" | [
[
"Chiesa",
"Marco",
""
],
[
"Rétvári",
"Gábor",
""
],
[
"Schapira",
"Michael",
""
]
] | 0no_new_dataset
|
1702.01340 | Nicola Prezza | Alberto Policriti, Nicola Prezza | From LZ77 to the Run-Length Encoded Burrows-Wheeler Transform, and Back | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Lempel-Ziv factorization (LZ77) and the Run-Length encoded
Burrows-Wheeler Transform (RLBWT) are two important tools in text compression
and indexing, being their sizes $z$ and $r$ closely related to the amount of
text self-repetitiveness. In this paper we consider the problem of converting
the two representations into each other within a working space proportional to
the input and the output. Let $n$ be the text length. We show that $RLBWT$ can
be converted to $LZ77$ in $\mathcal{O}(n\log r)$ time and $\mathcal{O}(r)$
words of working space. Conversely, we provide an algorithm to convert $LZ77$
to $RLBWT$ in $\mathcal{O}\big(n(\log r + \log z)\big)$ time and
$\mathcal{O}(r+z)$ words of working space. Note that $r$ and $z$ can be
\emph{constant} if the text is highly repetitive, and our algorithms can
operate with (up to) \emph{exponentially} less space than naive solutions based
on full decompression.
| [
{
"created": "Sat, 4 Feb 2017 20:19:26 GMT",
"version": "v1"
}
] | "2017-02-07T00:00:00" | [
[
"Policriti",
"Alberto",
""
],
[
"Prezza",
"Nicola",
""
]
] | 0no_new_dataset
|
2405.20931 | Tom\'a\v{s} Masa\v{r}\'ik | Karolina Drabik, Tom\'a\v{s} Masa\v{r}\'ik | Finding Diverse Solutions Parameterized by Cliquewidth | 28 pages, 1 figure | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finding a few solutions for a given problem that are diverse, as opposed to
finding a single best solution to solve the problem, has recently become a
notable topic in theoretical computer science. Recently, Baste, Fellows,
Jaffke, Masa\v{r}\'ik, Oliveira, Philip, and Rosamond showed that under a
standard structural parameterization by treewidth, one can find a set of
diverse solutions for many problems with only a very small additional cost
[Artificial Intelligence 2022]. In this paper, we investigate a much stronger
graph parameter, the cliquewidth, which can additionally describe some dense
graph classes. Broadly speaking, it describes graphs that can be recursively
constructed by a few operations defined on graphs whose vertices are divided
into a bounded number of groups while each such group behaves uniformly with
respect to any operation.
We show that for any vertex problem, if we are given a dynamic program
solving that problem on cliquewidth decomposition, we can modify it to produce
a few solutions that are as diverse as possible with as little overhead as in
the above-mentioned treewidth paper. As a consequence, we prove that a diverse
version of any MSO$_1$ expressible problem can be solved in FPT time
parameterized by cliquewidth, the number of sought solutions, and the number of
quantifiers in the formula. That was an important missing piece in the
complexity landscape of structural graph parameters and logic. We prove our
results allowing for a more general natural collection of diversity functions
compared to only two mostly studied diversity functions previously. That might
be of independent interest as a larger pool of different diversity functions
can highlight various aspects of different solutions to a problem.
| [
{
"created": "Fri, 31 May 2024 15:29:56 GMT",
"version": "v1"
}
] | "2024-06-03T00:00:00" | [
[
"Drabik",
"Karolina",
""
],
[
"Masařík",
"Tomáš",
""
]
] | 0no_new_dataset
|
1704.02046 | Dan Elbaz | Dan Elbaz, Michael Zibulevsky | End to End Deep Neural Network Frequency Demodulation of Speech Signals | null | null | null | null | cs.LG cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Frequency modulation (FM) is a form of radio broadcasting which is widely
used nowadays and has been for almost a century. We suggest a
software-defined-radio (SDR) receiver for FM demodulation that adopts an
end-to-end learning based approach and utilizes the prior information of
transmitted speech message in the demodulation process. The receiver detects
and enhances speech from the in-phase and quadrature components of its base
band version. The new system yields high performance detection for both
acoustical disturbances, and communication channel noise and is foreseen to
out-perform the established methods for low signal to noise ratio (SNR)
conditions in both mean square error and in perceptual evaluation of speech
quality score.
| [
{
"created": "Thu, 6 Apr 2017 23:16:33 GMT",
"version": "v1"
},
{
"created": "Mon, 10 Apr 2017 14:47:16 GMT",
"version": "v2"
},
{
"created": "Wed, 12 Apr 2017 00:47:36 GMT",
"version": "v3"
},
{
"created": "Sun, 21 May 2017 11:55:14 GMT",
"version": "v4"
},
{
"created": "Sat, 7 Oct 2017 16:34:18 GMT",
"version": "v5"
}
] | "2017-10-10T00:00:00" | [
[
"Elbaz",
"Dan",
""
],
[
"Zibulevsky",
"Michael",
""
]
] | 0no_new_dataset
|
2103.09179 | Chenwei Cui | Chenwei Cui, Liangfu Lu, Zhiyuan Tan, Amir Hussain | Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text
Detection | Preprint submitted to Neurocomputing | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Segmentation-based methods are widely used for scene text detection due to
their superiority in describing arbitrary-shaped text instances. However, two
major problems still exist: 1) current label generation techniques are mostly
empirical and lack theoretical support, discouraging elaborate label design; 2)
as a result, most methods rely heavily on text kernel segmentation which is
unstable and requires deliberate tuning. To address these challenges, we
propose a human cognition-inspired framework, termed, Conceptual Text Region
Network (CTRNet). The framework utilizes Conceptual Text Regions (CTRs), which
is a class of cognition-based tools inheriting good mathematical properties,
allowing for sophisticated label design. Another component of CTRNet is an
inference pipeline that, with the help of CTRs, completely omits the need for
text kernel segmentation. Compared with previous segmentation-based methods,
our approach is not only more interpretable but also more accurate.
Experimental results show that CTRNet achieves state-of-the-art performance on
benchmark CTW1500, Total-Text, MSRA-TD500, and ICDAR 2015 datasets, yielding
performance gains of up to 2.0%. Notably, to the best of our knowledge, CTRNet
is among the first detection models to achieve F-measures higher than 85.0% on
all four of the benchmarks, with remarkable consistency and stability.
| [
{
"created": "Tue, 16 Mar 2021 16:28:33 GMT",
"version": "v1"
}
] | "2021-03-17T00:00:00" | [
[
"Cui",
"Chenwei",
""
],
[
"Lu",
"Liangfu",
""
],
[
"Tan",
"Zhiyuan",
""
],
[
"Hussain",
"Amir",
""
]
] | 1new_dataset
|
1705.05922 | Subarna Tripathi | Subarna Tripathi and Gokce Dane and Byeongkeun Kang and Vasudev
Bhaskaran and Truong Nguyen | LCDet: Low-Complexity Fully-Convolutional Neural Networks for Object
Detection in Embedded Systems | Embedded Vision Workshop in CVPR | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep convolutional Neural Networks (CNN) are the state-of-the-art performers
for object detection task. It is well known that object detection requires more
computation and memory than image classification. Thus the consolidation of a
CNN-based object detection for an embedded system is more challenging. In this
work, we propose LCDet, a fully-convolutional neural network for generic object
detection that aims to work in embedded systems. We design and develop an
end-to-end TensorFlow(TF)-based model. Additionally, we employ 8-bit
quantization on the learned weights. We use face detection as a use case. Our
TF-Slim based network can predict different faces of different shapes and sizes
in a single forward pass. Our experimental results show that the proposed
method achieves comparative accuracy comparing with state-of-the-art CNN-based
face detection methods, while reducing the model size by 3x and memory-BW by
~4x comparing with one of the best real-time CNN-based object detector such as
YOLO. TF 8-bit quantized model provides additional 4x memory reduction while
keeping the accuracy as good as the floating point model. The proposed model
thus becomes amenable for embedded implementations.
| [
{
"created": "Tue, 16 May 2017 21:05:49 GMT",
"version": "v1"
}
] | "2017-05-18T00:00:00" | [
[
"Tripathi",
"Subarna",
""
],
[
"Dane",
"Gokce",
""
],
[
"Kang",
"Byeongkeun",
""
],
[
"Bhaskaran",
"Vasudev",
""
],
[
"Nguyen",
"Truong",
""
]
] | 0no_new_dataset
|
2305.12506 | Xiaoguang Li | Xiaoguang Li | CNN-based Dendrite Core Detection from Microscopic Images of
Directionally Solidified Ni-base Alloys | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dendrite core is the center point of the dendrite. The information of
dendrite core is very helpful for material scientists to analyze the properties
of materials. Therefore, detecting the dendrite core is a very important task
in the material science field. Meanwhile, because of some special properties of
the dendrites, this task is also very challenging. Different from the typical
detection problems in the computer vision field, detecting the dendrite core
aims to detect a single point location instead of the bounding-box. As a
result, the existing regressing bounding-box based detection methods can not
work well on this task because the calculated center point location based on
the upper-left and lower-right corners of the bounding-box is usually not
precise. In this work, we formulate the dendrite core detection problem as a
segmentation task and proposed a novel detection method to detect the dendrite
core directly. Our whole pipeline contains three steps: Easy Sample Detection
(ESD), Hard Sample Detection(HSD), and Hard Sample Refinement (HSR).
Specifically, ESD and HSD focus on the easy samples and hard samples of
dendrite cores respectively. Both of them employ the same Central Point
Detection Network (CPDN) but do not share parameters. To make HSD only focus on
the feature of hard samples of dendrite cores, we destroy the structure of the
easy samples of dendrites which are detected by ESD and force HSD to learn the
feature of hard samples. HSR is a binary classifier which is used to filter out
the false positive prediction of HSD. We evaluate our method on the dendrite
dataset. Our method outperforms the state-of-the-art baselines on three
metrics, i.e., Recall, Precision, and F-score.
| [
{
"created": "Sun, 21 May 2023 16:51:15 GMT",
"version": "v1"
}
] | "2023-05-23T00:00:00" | [
[
"Li",
"Xiaoguang",
""
]
] | 1new_dataset
|
2310.04285 | Marcel Kollovieh | Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan
G\"unnemann | Assessing Robustness via Score-Based Adversarial Image Generation | null | null | null | null | cs.CV cs.AI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most adversarial attacks and defenses focus on perturbations within small
$\ell_p$-norm constraints. However, $\ell_p$ threat models cannot capture all
relevant semantic-preserving perturbations, and hence, the scope of robustness
evaluations is limited. In this work, we introduce Score-Based Adversarial
Generation (ScoreAG), a novel framework that leverages the advancements in
score-based generative models to generate adversarial examples beyond
$\ell_p$-norm constraints, so-called unrestricted adversarial examples,
overcoming their limitations. Unlike traditional methods, ScoreAG maintains the
core semantics of images while generating realistic adversarial examples,
either by transforming existing images or synthesizing new ones entirely from
scratch. We further exploit the generative capability of ScoreAG to purify
images, empirically enhancing the robustness of classifiers. Our extensive
empirical evaluation demonstrates that ScoreAG matches the performance of
state-of-the-art attacks and defenses across multiple benchmarks. This work
highlights the importance of investigating adversarial examples bounded by
semantics rather than $\ell_p$-norm constraints. ScoreAG represents an
important step towards more encompassing robustness assessments.
| [
{
"created": "Fri, 6 Oct 2023 14:37:22 GMT",
"version": "v1"
}
] | "2023-10-09T00:00:00" | [
[
"Kollovieh",
"Marcel",
""
],
[
"Gosch",
"Lukas",
""
],
[
"Scholten",
"Yan",
""
],
[
"Lienen",
"Marten",
""
],
[
"Günnemann",
"Stephan",
""
]
] | 0no_new_dataset
|
1803.03790 | Junzhong Shen | Junzhong Shen, Yuran Qiao, You Huang, Mei Wen, Chunyuan Zhang | Towards a Multi-array Architecture for Accelerating Large-scale Matrix
Multiplication on FPGAs | This paper has been accepet by IEEE International Symposium on
Circuits and Systems (ISCAS 2018) | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large-scale floating-point matrix multiplication is a fundamental kernel in
many scientific and engineering applications. Most existing work only focus on
accelerating matrix multiplication on FPGA by adopting a linear systolic array.
This paper towards the extension of this architecture by proposing a scalable
and highly configurable multi-array architecture. In addition, we propose a
work-stealing scheme to ensure the equality in the workload partition among
multiple linear arrays. Furthermore, an analytical model is developed to
determine the optimal design parameters. Experiments on a real-life
convolutional neural network (CNN) show that we can obtain the optimal
extension of the linear array architecture.
| [
{
"created": "Sat, 10 Mar 2018 10:33:28 GMT",
"version": "v1"
}
] | "2018-03-13T00:00:00" | [
[
"Shen",
"Junzhong",
""
],
[
"Qiao",
"Yuran",
""
],
[
"Huang",
"You",
""
],
[
"Wen",
"Mei",
""
],
[
"Zhang",
"Chunyuan",
""
]
] | 0no_new_dataset
|
2206.05414 | Tiejun Lv | Jintao Xing and Tiejun Lv and Yashuai Cao and Jie Zeng and Pingmu
Huang | Downlink Power Minimization in Intelligent Reconfigurable Surface-Aided
Security Classification Wireless Communications System | 13 pages, 9 figures, Accepted by IEEE Systems Journal | null | 10.1109/JSYST.2022.3182465 | null | cs.IT eess.SP math.IT | http://creativecommons.org/publicdomain/zero/1.0/ | User privacy protection is considered a critical issue in wireless networks,
which drives the demand for various secure information interaction techniques.
In this paper, we introduce an intelligent reflecting surface (IRS)-aided
security classification wireless communication system, which reduces the
transmit power of the base station (BS) by classifying users with different
security requirements. Specifically, we divide the users into confidential
subscribers with secure communication requirements and general communication
users with simple communication requirements. During the communication period,
we guarantee the secure rate of the confidential subscribers while ensuring the
service quality of the general communication users, thereby reducing the
transmit power of the BS. To realize such a secure and green information
transmission, the BS implements a beamforming design on the transmitted signal
superimposed with artificial noise (AN) and then broadcasts it to users with
the assistance of the IRS's reflection. We develop an alternating optimization
framework to minimize the BS downlink power with respect to the active
beamformers of the BS, the AN vector at the BS, and the reflection phase shifts
of the IRS. A successive convex approximation (SCA) method is proposed so that
the nonconvex beamforming problems can be converted to tractable convex forms.
The simulation results demonstrate that the proposed algorithm is convergent
and can reduce the transmit power by 20\% compared to the best benchmark
scheme.
| [
{
"created": "Sat, 11 Jun 2022 04:02:27 GMT",
"version": "v1"
}
] | "2022-06-14T00:00:00" | [
[
"Xing",
"Jintao",
""
],
[
"Lv",
"Tiejun",
""
],
[
"Cao",
"Yashuai",
""
],
[
"Zeng",
"Jie",
""
],
[
"Huang",
"Pingmu",
""
]
] | 0no_new_dataset
|
2205.08869 | J\"urgen Giesl | Nils Lommen, Fabian Meyer, J\"urgen Giesl | Automatic Complexity Analysis of Integer Programs via Triangular Weakly
Non-Linear Loops | Full version of a paper which appeared in the Proceedings of IJCAR
2022 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There exist several results on deciding termination and computing runtime
bounds for triangular weakly non-linear loops (twn-loops). We show how to use
results on such subclasses of programs where complexity bounds are computable
within incomplete approaches for complexity analysis of full integer programs.
To this end, we present a novel modular approach which computes local runtime
bounds for subprograms which can be transformed into twn-loops. These local
runtime bounds are then lifted to global runtime bounds for the whole program.
The power of our approach is shown by our implementation in the tool KoAT which
analyzes complexity of programs where all other state-of-the-art tools fail.
| [
{
"created": "Wed, 18 May 2022 11:33:18 GMT",
"version": "v1"
},
{
"created": "Sat, 3 Jun 2023 10:03:33 GMT",
"version": "v2"
}
] | "2023-06-06T00:00:00" | [
[
"Lommen",
"Nils",
""
],
[
"Meyer",
"Fabian",
""
],
[
"Giesl",
"Jürgen",
""
]
] | 0no_new_dataset
|
1804.00035 | Andreas Venzke | Andreas Venzke, Spyros Chatzivasileiadis | Convex Relaxations of Probabilistic AC Optimal Power Flow for
Interconnected AC and HVDC Grids | null | null | 10.1109/TPWRS.2019.2895122 | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High Voltage Direct Current (HVDC) systems interconnect AC grids to increase
reliability, connect offshore wind generation, and enable coupling of
electricity markets. Considering the growing uncertainty in power infeed and
the complexity introduced by additional controls, robust decision support tools
are necessary. This paper proposes a chance constrained AC-OPF for AC and HVDC
grids, which considers wind uncertainty, fully utilizes HVDC control
capabilities, and uses the semidefinite relaxation of the AC-OPF. We consider a
joint chance constraint for both AC and HVDC systems, we introduce a piecewise
affine approximation to achieve tractability of the chance constraint, and we
allow corrective control policies for HVDC converters and generators to be
determined. An active loss penalty term in the objective function and a
systematic procedure to choose the penalty weights allow us to obtain
AC-feasible solutions. We introduce Benders decomposition to maintain
scalability. Using realistic forecast data, we demonstrate our approach on a
53-bus and a 214-bus AC-DC system, obtaining tight near-global optimality
guarantees. With a Monte Carlo analysis, we show that a chance constrained
DC-OPF leads to violations, whereas our proposed approach complies with the
joint chance constraint.
| [
{
"created": "Fri, 30 Mar 2018 19:13:40 GMT",
"version": "v1"
},
{
"created": "Mon, 10 Sep 2018 14:23:25 GMT",
"version": "v2"
},
{
"created": "Wed, 19 Dec 2018 10:34:51 GMT",
"version": "v3"
},
{
"created": "Mon, 28 Jan 2019 08:43:42 GMT",
"version": "v4"
},
{
"created": "Thu, 23 Jul 2020 08:02:06 GMT",
"version": "v5"
}
] | "2020-07-24T00:00:00" | [
[
"Venzke",
"Andreas",
""
],
[
"Chatzivasileiadis",
"Spyros",
""
]
] | 0no_new_dataset
|
2003.08817 | Adrian Bowman Prof. | Stanislav Katina and Liberty Vittert and Adrian W. Bowman | Functional Data Analysis and Visualisation of Three-dimensional Surface
Shape | null | null | null | null | cs.CV stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The advent of high resolution imaging has made data on surface shape
widespread. Methods for the analysis of shape based on landmarks are well
established but high resolution data require a functional approach. The
starting point is a systematic and consistent description of each surface
shape. Three innovative forms of analysis are then introduced. The first uses
surface integration to address issues of registration, principal component
analysis and the measurement of asymmetry, all in functional form.
Computational issues are handled through discrete approximations to integrals,
based in this case on appropriate surface area weighted sums. The second
innovation is to focus on sub-spaces where interesting behaviour such as group
differences are exhibited, rather than on individual principal components. The
third innovation concerns the comparison of individual shapes with a relevant
control set, where the concept of a normal range is extended to the highly
multivariate setting of surface shape. This has particularly strong
applications to medical contexts where the assessment of individual patients is
very important. All of these ideas are developed and illustrated in the
important context of human facial shape, with a strong emphasis on the
effective visual communication of effects of interest.
| [
{
"created": "Sat, 14 Mar 2020 13:54:24 GMT",
"version": "v1"
}
] | "2020-03-20T00:00:00" | [
[
"Katina",
"Stanislav",
""
],
[
"Vittert",
"Liberty",
""
],
[
"Bowman",
"Adrian W.",
""
]
] | 0no_new_dataset
|
2306.10052 | Ethan Mollick | Ethan Mollick, Lilach Mollick | Assigning AI: Seven Approaches for Students, with Prompts | 46 pages | null | null | null | cs.CY cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This paper examines the transformative role of Large Language Models (LLMs)
in education and their potential as learning tools, despite their inherent
risks and limitations. The authors propose seven approaches for utilizing AI in
classrooms: AI-tutor, AI-coach, AI-mentor, AI-teammate, AI-tool, AI-simulator,
and AI-student, each with distinct pedagogical benefits and risks. The aim is
to help students learn with and about AI, with practical strategies designed to
mitigate risks such as complacency about the AI's output, errors, and biases.
These strategies promote active oversight, critical assessment of AI outputs,
and complementarity of AI's capabilities with the students' unique insights. By
challenging students to remain the "human in the loop," the authors aim to
enhance learning outcomes while ensuring that AI serves as a supportive tool
rather than a replacement. The proposed framework offers a guide for educators
navigating the integration of AI-assisted learning in classrooms
| [
{
"created": "Tue, 13 Jun 2023 03:36:36 GMT",
"version": "v1"
}
] | "2023-06-21T00:00:00" | [
[
"Mollick",
"Ethan",
""
],
[
"Mollick",
"Lilach",
""
]
] | 0no_new_dataset
|
cs/0304023 | Mirela Damian | Mirela Damian and Joseph O'Rourke | Partitioning Regular Polygons into Circular Pieces I: Convex Partitions | 21 pages, 25 figures | null | null | null | cs.CG | null | We explore an instance of the question of partitioning a polygon into pieces,
each of which is as ``circular'' as possible, in the sense of having an aspect
ratio close to 1. The aspect ratio of a polygon is the ratio of the diameters
of the smallest circumscribing circle to the largest inscribed disk. The
problem is rich even for partitioning regular polygons into convex pieces, the
focus of this paper. We show that the optimal (most circular) partition for an
equilateral triangle has an infinite number of pieces, with the lower bound
approachable to any accuracy desired by a particular finite partition. For
pentagons and all regular k-gons, k > 5, the unpartitioned polygon is already
optimal. The square presents an interesting intermediate case. Here the
one-piece partition is not optimal, but nor is the trivial lower bound
approachable. We narrow the optimal ratio to an aspect-ratio gap of 0.01082
with several somewhat intricate partitions.
| [
{
"created": "Thu, 17 Apr 2003 12:29:29 GMT",
"version": "v1"
}
] | "2007-05-23T00:00:00" | [
[
"Damian",
"Mirela",
""
],
[
"O'Rourke",
"Joseph",
""
]
] | 0no_new_dataset
|
1311.6236 | Claudio Soriente | Claudio Soriente and Ghassan Karame and Hubert Ritzdorf and Srdjan
Marinovic and Srdjan Capkun | Commune: Shared Ownership in an Agnostic Cloud | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although cloud storage platforms promise a convenient way for users to share
files and engage in collaborations, they require all files to have a single
owner who unilaterally makes access control decisions. Existing clouds are,
thus, agnostic to shared ownership. This can be a significant limitation in
many collaborations because one owner can, for example, delete files and revoke
access without consulting the other collaborators.
In this paper, we first formally define a notion of shared ownership within a
file access control model. We then propose a solution, called Commune, to the
problem of distributively enforcing shared ownership in agnostic clouds, so
that access grants require the support of a pre-arranged threshold of owners.
Commune can be used in existing clouds without requiring any modifications to
the platforms. We analyze the security of our solution and evaluate its
scalability and performance by means of an implementation integrated with
Amazon S3.
| [
{
"created": "Mon, 25 Nov 2013 08:50:12 GMT",
"version": "v1"
}
] | "2013-11-26T00:00:00" | [
[
"Soriente",
"Claudio",
""
],
[
"Karame",
"Ghassan",
""
],
[
"Ritzdorf",
"Hubert",
""
],
[
"Marinovic",
"Srdjan",
""
],
[
"Capkun",
"Srdjan",
""
]
] | 0no_new_dataset
|
1205.3964 | Yusuf Perwej | Yusuf Perwej, Ashish Chaturvedi | Machine Recognition of Hand Written Characters using Neural Networks | 4 pages, 1 Figure, ISSN:0975 - 8887 | International Journal of Computer Applications (IJCA) ,January
2011 Volume 14, Number 2, Pages 6-9 | 10.5120/1819-2380 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Even today in Twenty First Century Handwritten communication has its own
stand and most of the times, in daily life it is globally using as means of
communication and recording the information like to be shared with others.
Challenges in handwritten characters recognition wholly lie in the variation
and distortion of handwritten characters, since different people may use
different style of handwriting, and direction to draw the same shape of the
characters of their known script. This paper demonstrates the nature of
handwritten characters, conversion of handwritten data into electronic data,
and the neural network approach to make machine capable of recognizing hand
written characters.
| [
{
"created": "Thu, 17 May 2012 15:50:08 GMT",
"version": "v1"
}
] | "2012-05-18T00:00:00" | [
[
"Perwej",
"Yusuf",
""
],
[
"Chaturvedi",
"Ashish",
""
]
] | 0no_new_dataset
|
2308.10585 | Dingzirui Wang | Dingzirui Wang, Longxu Dou, Wenbin Zhang, Junyu Zeng, Wanxiang Che | Exploring Equation as a Better Intermediate Meaning Representation for
Numerical Reasoning | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Numerical reasoning is vital for natural language processing models to
understand and process numerical information in real-world scenarios. Most
current methods first generate the Intermediate Meaning Representations (IMRs)
of questions and then generate answers. Current SOTA methods generate programs
as IMRs with large language models (LLMs). Intuitively, equations have fewer
restrictions and closer semantics to the question than programs, leading to
higher generation accuracy. However, current LLMs generate equations worse than
programs, where we assume that the equation data is rare in pre-training data
compared to programs. So in this paper, we try to use equations as IMRs to
solve the numerical reasoning task by addressing two problems: (1)
Theoretically, how to prove that the equation is an IMR with higher generation
accuracy than programs; (2) Empirically, how to improve the generation accuracy
of equations with LLMs. For the first problem, we propose and prove a
proposition to theoretically compare the generation accuracy of different IMRs.
For the second problem, we present a method called Boosting Numerical
Reason\textbfing by Decomposing the Generation of Equations (Bridge), which can
improve the accuracy of LLMs in generating equations as IMRs by reducing the
tendency of generating constant expressions and programs. Our method improves
the performance by 2.2%, 0.9%, and 1.7% on GSM8K, SVAMP, and Algebra datasets
compared to the previous state-of-the-art methods under the single reasoning
path setting. Our codes and prompts are released in
https://github.com/zirui-HIT/Bridge_for_Numerical_Reasoning.
| [
{
"created": "Mon, 21 Aug 2023 09:35:33 GMT",
"version": "v1"
}
] | "2023-08-22T00:00:00" | [
[
"Wang",
"Dingzirui",
""
],
[
"Dou",
"Longxu",
""
],
[
"Zhang",
"Wenbin",
""
],
[
"Zeng",
"Junyu",
""
],
[
"Che",
"Wanxiang",
""
]
] | 0no_new_dataset
|
2208.01588 | Vivek Kumar Singh Ph.D. | Anurag Kanaujia, Prashasti Singh, Abhirup Nandy, Vivek Kumar Singh | Research Contribution of major Centrally Funded Institution Systems of
India | null | null | null | null | cs.DL | http://creativecommons.org/licenses/by/4.0/ | India is now among the major knowledge producers of the world, ranking among
the top 5 countries in total research output, as per some recent reports. The
institutional setup for Research & Development (R&D) in India comprises a
diverse set of Institutions, including Universities, government departments,
research laboratories, and private sector institutions etc. It may be noted
that more than 45% share of India's Gross Expenditure on Research and
Development (GERD) comes from the central government. In this context, this
article attempts to explore the quantum of research contribution of centrally
funded institutions and institution systems of India. The volume, proportionate
share and growth patterns of research publications from the major centrally
funded institutions, organised in 16 groups, is analysed. These institutions
taken together account for 67.54% of Indian research output during 2001 to
2020. The research output of the centrally funded institutions in India has
increased steadily since 2001 with a good value for CAGR. The paper presents
noteworthy insights about scientific research production of India that may be
useful to policymakers, researchers and science practitioners in India. It
presents a case for increased activity by the state governments and private
sector to further the cause of sustainable and inclusive research and
development in the country.
| [
{
"created": "Tue, 2 Aug 2022 16:52:56 GMT",
"version": "v1"
}
] | "2022-08-03T00:00:00" | [
[
"Kanaujia",
"Anurag",
""
],
[
"Singh",
"Prashasti",
""
],
[
"Nandy",
"Abhirup",
""
],
[
"Singh",
"Vivek Kumar",
""
]
] | 0no_new_dataset
|
2310.18615 | Xiangchen Song | Xiangchen Song, Weiran Yao, Yewen Fan, Xinshuai Dong, Guangyi Chen,
Juan Carlos Niebles, Eric Xing, Kun Zhang | Temporally Disentangled Representation Learning under Unknown
Nonstationarity | NeurIPS 2023 | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | In unsupervised causal representation learning for sequential data with
time-delayed latent causal influences, strong identifiability results for the
disentanglement of causally-related latent variables have been established in
stationary settings by leveraging temporal structure. However, in nonstationary
setting, existing work only partially addressed the problem by either utilizing
observed auxiliary variables (e.g., class labels and/or domain indexes) as side
information or assuming simplified latent causal dynamics. Both constrain the
method to a limited range of scenarios. In this study, we further explored the
Markov Assumption under time-delayed causally related process in nonstationary
setting and showed that under mild conditions, the independent latent
components can be recovered from their nonlinear mixture up to a permutation
and a component-wise transformation, without the observation of auxiliary
variables. We then introduce NCTRL, a principled estimation framework, to
reconstruct time-delayed latent causal variables and identify their relations
from measured sequential data only. Empirical evaluations demonstrated the
reliable identification of time-delayed latent causal influences, with our
methodology substantially outperforming existing baselines that fail to exploit
the nonstationarity adequately and then, consequently, cannot distinguish
distribution shifts.
| [
{
"created": "Sat, 28 Oct 2023 06:46:03 GMT",
"version": "v1"
}
] | "2023-10-31T00:00:00" | [
[
"Song",
"Xiangchen",
""
],
[
"Yao",
"Weiran",
""
],
[
"Fan",
"Yewen",
""
],
[
"Dong",
"Xinshuai",
""
],
[
"Chen",
"Guangyi",
""
],
[
"Niebles",
"Juan Carlos",
""
],
[
"Xing",
"Eric",
""
],
[
"Zhang",
"Kun",
""
]
] | 0no_new_dataset
|
2301.03416 | Jiaxiang Liu | Weixin Liu, Xuyi Chen, Jiaxiang Liu, Shikun Feng, Yu Sun, Hao Tian,
Hua Wu | ERNIE 3.0 Tiny: Frustratingly Simple Method to Improve Task-Agnostic
Distillation Generalization | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Task-agnostic knowledge distillation attempts to address the problem of
deploying large pretrained language model in resource-constrained scenarios by
compressing a large pretrained model called teacher into a smaller one called
student such that the student can be directly finetuned on downstream tasks and
retains comparable performance. However, we empirically find that there is a
generalization gap between the student and the teacher in existing methods. In
this work, we show that we can leverage multi-task learning in task-agnostic
distillation to advance the generalization of the resulted student. In
particular, we propose Multi-task Infused Task-agnostic Knowledge Distillation
(MITKD). We first enhance the teacher by multi-task training it on multiple
downstream tasks and then perform distillation to produce the student.
Experimental results demonstrate that our method yields a student with much
better generalization, significantly outperforms existing baselines, and
establishes a new state-of-the-art result on in-domain, out-domain, and
low-resource datasets in the setting of task-agnostic distillation. Moreover,
our method even exceeds an 8x larger BERT$_{\text{Base}}$ on SQuAD and four
GLUE tasks. In addition, by combining ERNIE 3.0, our method achieves
state-of-the-art results on 10 Chinese datasets.
| [
{
"created": "Mon, 9 Jan 2023 15:12:50 GMT",
"version": "v1"
}
] | "2023-01-10T00:00:00" | [
[
"Liu",
"Weixin",
""
],
[
"Chen",
"Xuyi",
""
],
[
"Liu",
"Jiaxiang",
""
],
[
"Feng",
"Shikun",
""
],
[
"Sun",
"Yu",
""
],
[
"Tian",
"Hao",
""
],
[
"Wu",
"Hua",
""
]
] | 0no_new_dataset
|
2309.11935 | Maxime Vaidis | Maxime Vaidis, Mohsen Hassanzadeh Shahraji, Effie Daum, William
Dubois, Philippe Gigu\`ere, and Fran\c{c}ois Pomerleau | RTS-GT: Robotic Total Stations Ground Truthing dataset | 7 pages; Accepted to ICRA 2024 | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | Numerous datasets and benchmarks exist to assess and compare Simultaneous
Localization and Mapping (SLAM) algorithms. Nevertheless, their precision must
follow the rate at which SLAM algorithms improved in recent years. Moreover,
current datasets fall short of comprehensive data-collection protocol for
reproducibility and the evaluation of the precision or accuracy of the recorded
trajectories. With this objective in mind, we proposed the Robotic Total
Stations Ground Truthing dataset (RTS-GT) dataset to support localization
research with the generation of six-Degrees Of Freedom (DOF) ground truth
trajectories. This novel dataset includes six-DOF ground truth trajectories
generated using a system of three Robotic Total Stations (RTSs) tracking moving
robotic platforms. Furthermore, we compare the performance of the RTS-based
system to a Global Navigation Satellite System (GNSS)-based setup. The dataset
comprises around sixty experiments conducted in various conditions over a
period of 17 months, and encompasses over 49 kilometers of trajectories, making
it the most extensive dataset of RTS-based measurements to date. Additionally,
we provide the precision of all poses for each experiment, a feature not found
in the current state-of-the-art datasets. Our results demonstrate that RTSs
provide measurements that are 22 times more stable than GNSS in various
environmental settings, making them a valuable resource for SLAM benchmark
development.
| [
{
"created": "Thu, 21 Sep 2023 09:47:55 GMT",
"version": "v1"
},
{
"created": "Wed, 13 Mar 2024 00:44:02 GMT",
"version": "v2"
}
] | "2024-03-14T00:00:00" | [
[
"Vaidis",
"Maxime",
""
],
[
"Shahraji",
"Mohsen Hassanzadeh",
""
],
[
"Daum",
"Effie",
""
],
[
"Dubois",
"William",
""
],
[
"Giguère",
"Philippe",
""
],
[
"Pomerleau",
"François",
""
]
] | 1new_dataset
|
1904.09302 | Kyoungseok Han | Kyoungseok Han, Giseo Park, Gokul S. Sankar, Kanghyun Nam, and Seibum
B. Choi | Model Predictive Control Framework for Improving Vehicle Cornering
Performance Using Handling Characteristics | null | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a new control strategy to improve vehicle cornering
performance in a model predictive control framework. The most distinguishing
feature of the proposed method is that the natural handling characteristics of
the production vehicle is exploited to reduce the complexity of the
conventional control methods. For safety s sake, most production vehicles are
built to exhibit an understeer handling characteristics to some extent. By
monitoring how much the vehicle is biased into the understeer state, the
controller attempts to adjust this amount in a way that improves the vehicle
cornering performance. With this particular strategy, an innovative controller
can be designed without road friction information, which complicates the
conventional control methods. In addition, unlike the conventional controllers,
the reference yaw rate that is highly dependent on road friction need not be
defined due to the proposed control structure. The optimal control problem is
formulated in a model predictive control framework to handle the constraints
efficiently, and simulations in various test scenarios illustrate the
effectiveness of the proposed approach.
| [
{
"created": "Fri, 19 Apr 2019 18:00:50 GMT",
"version": "v1"
},
{
"created": "Thu, 14 Nov 2019 22:30:07 GMT",
"version": "v2"
}
] | "2019-11-18T00:00:00" | [
[
"Han",
"Kyoungseok",
""
],
[
"Park",
"Giseo",
""
],
[
"Sankar",
"Gokul S.",
""
],
[
"Nam",
"Kanghyun",
""
],
[
"Choi",
"Seibum B.",
""
]
] | 0no_new_dataset
|
2401.03547 | Hiromitsu Nishizaki | Takashi Minato, Ryuichiro Higashinaka, Kurima Sakai, Tomo Funayama,
Hiromitsu Nishizaki, Takayuki Naga | Overview of Dialogue Robot Competition 2023 | Proceedings of Dialogue Robot Competition 2023. arXiv admin note:
text overlap with arXiv:2210.12863 | null | null | null | cs.RO cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have held dialogue robot competitions in 2020 and 2022 to compare the
performances of interactive robots using an android that closely resembles a
human. In 2023, the third competition DRC2023 was held. The task of DRC2023 was
designed to be more challenging than the previous travel agent dialogue tasks.
Since anyone can now develop a dialogue system using LLMs, the participating
teams are required to develop a system that effectively uses information about
the situation on the spot (real-time information), which is not handled by
ChatGPT and other systems. DRC2023 has two rounds, a preliminary round and the
final round as well as the previous competitions. The preliminary round has
held on Oct.27 -- Nov.20, 2023 at real travel agency stores. The final round
will be held on December 23, 2023. This paper provides an overview of the task
settings and evaluation method of DRC2023 and the preliminary round results.
| [
{
"created": "Sun, 7 Jan 2024 17:18:26 GMT",
"version": "v1"
}
] | "2024-01-09T00:00:00" | [
[
"Minato",
"Takashi",
""
],
[
"Higashinaka",
"Ryuichiro",
""
],
[
"Sakai",
"Kurima",
""
],
[
"Funayama",
"Tomo",
""
],
[
"Nishizaki",
"Hiromitsu",
""
],
[
"Naga",
"Takayuki",
""
]
] | 0no_new_dataset
|
1710.10979 | Petr Golovach | Petr A. Golovach, Pinar Heggernes, Paloma Lima, and Pedro Montealegre | Finding Connected Secluded Subgraphs | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Problems related to finding induced subgraphs satisfying given properties
form one of the most studied areas within graph algorithms. Such problems have
given rise to breakthrough results and led to development of new techniques
both within the traditional P vs NP dichotomy and within parameterized
complexity. The \Pi-Subgraph problem asks whether an input graph contains an
induced subgraph on at least k vertices satisfying graph property \Pi. For many
applications, it is desirable that the found subgraph has as few connections to
the rest of the graph as possible, which gives rise to the Secluded
\Pi-Subgraph problem. Here, input k is the size of the desired subgraph, and
input t is a limit on the number of neighbors this subgraph has in the rest of
the graph. This problem has been studied from a parameterized perspective, and
unfortunately it turns out to be W[1]-hard for many graph properties \Pi, even
when parameterized by k+t. We show that the situation changes when we are
looking for a connected induced subgraph satisfying \Pi. In particular, we show
that the Connected \Pi-Secluded Subgraph problem is FPT when parameterized by
just t for many important graph properties \Pi.
| [
{
"created": "Mon, 30 Oct 2017 14:34:45 GMT",
"version": "v1"
}
] | "2017-10-31T00:00:00" | [
[
"Golovach",
"Petr A.",
""
],
[
"Heggernes",
"Pinar",
""
],
[
"Lima",
"Paloma",
""
],
[
"Montealegre",
"Pedro",
""
]
] | 0no_new_dataset
|
1601.01343 | Ikuya Yamada | Ikuya Yamada, Hiroyuki Shindo, Hideaki Takeda, Yoshiyasu Takefuji | Joint Learning of the Embedding of Words and Entities for Named Entity
Disambiguation | Accepted at CoNLL 2016 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Named Entity Disambiguation (NED) refers to the task of resolving multiple
named entity mentions in a document to their correct references in a knowledge
base (KB) (e.g., Wikipedia). In this paper, we propose a novel embedding method
specifically designed for NED. The proposed method jointly maps words and
entities into the same continuous vector space. We extend the skip-gram model
by using two models. The KB graph model learns the relatedness of entities
using the link structure of the KB, whereas the anchor context model aims to
align vectors such that similar words and entities occur close to one another
in the vector space by leveraging KB anchors and their context words. By
combining contexts based on the proposed embedding with standard NED features,
we achieved state-of-the-art accuracy of 93.1% on the standard CoNLL dataset
and 85.2% on the TAC 2010 dataset.
| [
{
"created": "Wed, 6 Jan 2016 22:19:20 GMT",
"version": "v1"
},
{
"created": "Sat, 19 Mar 2016 07:31:47 GMT",
"version": "v2"
},
{
"created": "Sun, 1 May 2016 06:39:19 GMT",
"version": "v3"
},
{
"created": "Fri, 10 Jun 2016 01:51:26 GMT",
"version": "v4"
}
] | "2016-06-13T00:00:00" | [
[
"Yamada",
"Ikuya",
""
],
[
"Shindo",
"Hiroyuki",
""
],
[
"Takeda",
"Hideaki",
""
],
[
"Takefuji",
"Yoshiyasu",
""
]
] | 0no_new_dataset
|
2105.07949 | Abhijit Suresh | Abhijit Suresh, Jennifer Jacobs, Vivian Lai, Chenhao Tan, Wayne Ward,
James H. Martin, Tamara Sumner | Using Transformers to Provide Teachers with Personalized Feedback on
their Classroom Discourse: The TalkMoves Application | Presented at the AAAI 2021 Spring Symposium on Artificial
Intelligence for K-12 Education | null | null | null | cs.CY cs.CL | http://creativecommons.org/licenses/by/4.0/ | TalkMoves is an innovative application designed to support K-12 mathematics
teachers to reflect on, and continuously improve their instructional practices.
This application combines state-of-the-art natural language processing
capabilities with automated speech recognition to automatically analyze
classroom recordings and provide teachers with personalized feedback on their
use of specific types of discourse aimed at broadening and deepening classroom
conversations about mathematics. These specific discourse strategies are
referred to as "talk moves" within the mathematics education community and
prior research has documented the ways in which systematic use of these
discourse strategies can positively impact student engagement and learning. In
this article, we describe the TalkMoves application's cloud-based
infrastructure for managing and processing classroom recordings, and its
interface for providing teachers with feedback on their use of talk moves
during individual teaching episodes. We present the series of model
architectures we developed, and the studies we conducted, to develop our
best-performing, transformer-based model (F1 = 79.3%). We also discuss several
technical challenges that need to be addressed when working with real-world
speech and language data from noisy K-12 classrooms.
| [
{
"created": "Thu, 29 Apr 2021 20:45:02 GMT",
"version": "v1"
}
] | "2021-05-18T00:00:00" | [
[
"Suresh",
"Abhijit",
""
],
[
"Jacobs",
"Jennifer",
""
],
[
"Lai",
"Vivian",
""
],
[
"Tan",
"Chenhao",
""
],
[
"Ward",
"Wayne",
""
],
[
"Martin",
"James H.",
""
],
[
"Sumner",
"Tamara",
""
]
] | 0no_new_dataset
|
2008.04872 | Xingyu Chen | Xingyu Chen, Xuguang Lan, Fuchun Sun, Nanning Zheng | A Boundary Based Out-of-Distribution Classifier for Generalized
Zero-Shot Learning | We found that the results in the first version are incorrect, due to
the data leak problem in the original dataset splits. In this version, we fix
this problem in the experiments | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generalized Zero-Shot Learning (GZSL) is a challenging topic that has
promising prospects in many realistic scenarios. Using a gating mechanism that
discriminates the unseen samples from the seen samples can decompose the GZSL
problem to a conventional Zero-Shot Learning (ZSL) problem and a supervised
classification problem. However, training the gate is usually challenging due
to the lack of data in the unseen domain. To resolve this problem, in this
paper, we propose a boundary based Out-of-Distribution (OOD) classifier which
classifies the unseen and seen domains by only using seen samples for training.
First, we learn a shared latent space on a unit hyper-sphere where the latent
distributions of visual features and semantic attributes are aligned
class-wisely. Then we find the boundary and the center of the manifold for each
class. By leveraging the class centers and boundaries, the unseen samples can
be separated from the seen samples. After that, we use two experts to classify
the seen and unseen samples separately. We extensively validate our approach on
five popular benchmark datasets including AWA1, AWA2, CUB, FLO and SUN. The
experimental results demonstrate the advantages of our approach over
state-of-the-art methods.
| [
{
"created": "Sun, 9 Aug 2020 11:27:19 GMT",
"version": "v1"
},
{
"created": "Mon, 3 Jan 2022 09:00:51 GMT",
"version": "v2"
}
] | "2022-01-04T00:00:00" | [
[
"Chen",
"Xingyu",
""
],
[
"Lan",
"Xuguang",
""
],
[
"Sun",
"Fuchun",
""
],
[
"Zheng",
"Nanning",
""
]
] | 0no_new_dataset
|
1711.00309 | Jingyi Zhang | Jingyi Zhang, Masao Utiyama, Eiichro Sumita, Graham Neubig, Satoshi
Nakamura | Improving Neural Machine Translation through Phrase-based Forced
Decoding | IJCNLP2017 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compared to traditional statistical machine translation (SMT), neural machine
translation (NMT) often sacrifices adequacy for the sake of fluency. We propose
a method to combine the advantages of traditional SMT and NMT by exploiting an
existing phrase-based SMT model to compute the phrase-based decoding cost for
an NMT output and then using this cost to rerank the n-best NMT outputs. The
main challenge in implementing this approach is that NMT outputs may not be in
the search space of the standard phrase-based decoding algorithm, because the
search space of phrase-based SMT is limited by the phrase-based translation
rule table. We propose a soft forced decoding algorithm, which can always
successfully find a decoding path for any NMT output. We show that using the
forced decoding cost to rerank the NMT outputs can successfully improve
translation quality on four different language pairs.
| [
{
"created": "Wed, 1 Nov 2017 12:25:20 GMT",
"version": "v1"
}
] | "2017-11-02T00:00:00" | [
[
"Zhang",
"Jingyi",
""
],
[
"Utiyama",
"Masao",
""
],
[
"Sumita",
"Eiichro",
""
],
[
"Neubig",
"Graham",
""
],
[
"Nakamura",
"Satoshi",
""
]
] | 0no_new_dataset
|
2108.06001 | Supun Kamburugamuve | Vibhatha Abeykoon, Supun Kamburugamuve, Chathura Widanage, Niranda
Perera, Ahmet Uyar, Thejaka Amila Kanewala, Gregor von Laszewski, and
Geoffrey Fox | HPTMT Parallel Operators for High Performance Data Science & Data
Engineering | null | null | null | null | cs.DC cs.AI | http://creativecommons.org/licenses/by/4.0/ | Data-intensive applications are becoming commonplace in all science
disciplines. They are comprised of a rich set of sub-domains such as data
engineering, deep learning, and machine learning. These applications are built
around efficient data abstractions and operators that suit the applications of
different domains. Often lack of a clear definition of data structures and
operators in the field has led to other implementations that do not work well
together. The HPTMT architecture that we proposed recently, identifies a set of
data structures, operators, and an execution model for creating rich data
applications that links all aspects of data engineering and data science
together efficiently. This paper elaborates and illustrates this architecture
using an end-to-end application with deep learning and data engineering parts
working together.
| [
{
"created": "Fri, 13 Aug 2021 00:05:43 GMT",
"version": "v1"
}
] | "2021-08-16T00:00:00" | [
[
"Abeykoon",
"Vibhatha",
""
],
[
"Kamburugamuve",
"Supun",
""
],
[
"Widanage",
"Chathura",
""
],
[
"Perera",
"Niranda",
""
],
[
"Uyar",
"Ahmet",
""
],
[
"Kanewala",
"Thejaka Amila",
""
],
[
"von Laszewski",
"Gregor",
""
],
[
"Fox",
"Geoffrey",
""
]
] | 1new_dataset
|
2406.11572 | Yu Chen | Yu Chen, Yilin Cai, Jinyun Xu, Zhongqiang Ren, Guanya Shi, Howie
Choset | Propagative Distance Optimization for Constrained Inverse Kinematics | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates a constrained inverse kinematic (IK) problem that
seeks a feasible configuration of an articulated robot under various
constraints such as joint limits and obstacle collision avoidance. Due to the
high-dimensionality and complex constraints, this problem is often solved
numerically via iterative local optimization. Classic local optimization
methods take joint angles as the decision variable, which suffers from
non-linearity caused by the trigonometric constraints. Recently, distance-based
IK methods have been developed as an alternative approach that formulates IK as
an optimization over the distances among points attached to the robot and the
obstacles. Although distance-based methods have demonstrated unique advantages,
they still suffer from low computational efficiency, since these approaches
usually ignore the chain structure in the kinematics of serial robots. This
paper proposes a new method called propagative distance optimization for
constrained inverse kinematics (PDO-IK), which captures and leverages the chain
structure in the distance-based formulation and expedites the optimization by
computing forward kinematics and the Jacobian propagatively along the kinematic
chain. Test results show that PDO-IK runs up to two orders of magnitude faster
than the existing distance-based methods under joint limits constraints and
obstacle avoidance constraints. It also achieves up to three times higher
success rates than the conventional joint-angle-based optimization methods for
IK problems. The high runtime efficiency of PDO-IK allows the real-time
computation (10$-$1500 Hz) and enables a simulated humanoid robot with 19
degrees of freedom (DoFs) to avoid moving obstacles, which is otherwise hard to
achieve with the baselines.
| [
{
"created": "Mon, 17 Jun 2024 14:07:43 GMT",
"version": "v1"
}
] | "2024-06-18T00:00:00" | [
[
"Chen",
"Yu",
""
],
[
"Cai",
"Yilin",
""
],
[
"Xu",
"Jinyun",
""
],
[
"Ren",
"Zhongqiang",
""
],
[
"Shi",
"Guanya",
""
],
[
"Choset",
"Howie",
""
]
] | 0no_new_dataset
|
1309.5105 | Aleksandar Haber | Aleksandar Haber and Michel Verhaegen | Subspace identification of large-scale interconnected systems | revised version, conditionally accepted for publication in IEEE
Transaction on Automatic Control | null | null | null | cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a decentralized subspace algorithm for identification of
large-scale, interconnected systems that are described by sparse (multi) banded
state-space matrices. First, we prove that the state of a local subsystem can
be approximated by a linear combination of inputs and outputs of the local
subsystems that are in its neighborhood. Furthermore, we prove that for
interconnected systems with well-conditioned, finite-time observability
Gramians (or observability matrices), the size of this neighborhood is
relatively small. On the basis of these results, we develop a subspace
identification algorithm that identifies a state-space model of a local
subsystem from the local input-output data. Consequently, the developed
algorithm is computationally feasible for interconnected systems with a large
number of local subsystems. Numerical results confirm the effectiveness of the
new identification algorithm.
| [
{
"created": "Thu, 19 Sep 2013 21:32:10 GMT",
"version": "v1"
},
{
"created": "Thu, 2 Jan 2014 15:19:07 GMT",
"version": "v2"
},
{
"created": "Fri, 14 Feb 2014 17:41:59 GMT",
"version": "v3"
}
] | "2014-02-17T00:00:00" | [
[
"Haber",
"Aleksandar",
""
],
[
"Verhaegen",
"Michel",
""
]
] | 0no_new_dataset
|
1609.04373 | Aiman Soliman | Aiman Soliman, Kiumars Soltani, Anand Padmanabhan, Shaowen Wang | Consistency of Social Sensing Signatures Across Major US Cities | CyberGIS16 | null | null | null | cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previous studies have shown that Twitter users have biases to tweet from
certain locations, locational bias, and during certain hours, temporal bias. We
used three years of geolocated Twitter Data to quantify these biases and test
our central hypothesis that Twitter users biases are consistent across US
cities. Our results suggest that temporal and locational bias of Twitter users
are inconsistent between three US metropolitan cities. We derive conclusions
about the role of the complexity of the underlying data producing process on
its consistency and argue for the potential research avenue for Geospatial Data
Science to test and quantify these inconsistencies in the class of organically
evolved Big Data.
| [
{
"created": "Wed, 14 Sep 2016 18:41:23 GMT",
"version": "v1"
}
] | "2016-09-15T00:00:00" | [
[
"Soliman",
"Aiman",
""
],
[
"Soltani",
"Kiumars",
""
],
[
"Padmanabhan",
"Anand",
""
],
[
"Wang",
"Shaowen",
""
]
] | 0no_new_dataset
|
2308.07931 | Ge Yang | William Shen, Ge Yang, Alan Yu, Jansen Wong, Leslie Pack Kaelbling,
Phillip Isola | Distilled Feature Fields Enable Few-Shot Language-Guided Manipulation | Project website at https://f3rm.csail.mit.edu, Accepted at the 7th
Annual Conference on Robot Learning (CoRL), 2023 in Atlanta, US | null | null | null | cs.CV cs.AI cs.CL cs.LG cs.RO | http://creativecommons.org/licenses/by/4.0/ | Self-supervised and language-supervised image models contain rich knowledge
of the world that is important for generalization. Many robotic tasks, however,
require a detailed understanding of 3D geometry, which is often lacking in 2D
image features. This work bridges this 2D-to-3D gap for robotic manipulation by
leveraging distilled feature fields to combine accurate 3D geometry with rich
semantics from 2D foundation models. We present a few-shot learning method for
6-DOF grasping and placing that harnesses these strong spatial and semantic
priors to achieve in-the-wild generalization to unseen objects. Using features
distilled from a vision-language model, CLIP, we present a way to designate
novel objects for manipulation via free-text natural language, and demonstrate
its ability to generalize to unseen expressions and novel categories of
objects.
| [
{
"created": "Thu, 27 Jul 2023 17:59:14 GMT",
"version": "v1"
},
{
"created": "Sat, 30 Dec 2023 01:10:41 GMT",
"version": "v2"
}
] | "2024-01-02T00:00:00" | [
[
"Shen",
"William",
""
],
[
"Yang",
"Ge",
""
],
[
"Yu",
"Alan",
""
],
[
"Wong",
"Jansen",
""
],
[
"Kaelbling",
"Leslie Pack",
""
],
[
"Isola",
"Phillip",
""
]
] | 0no_new_dataset
|
2106.09350 | Yuhao Wang | Yuhao Wang, Arnab Bhattacharyya | Identifiability of AMP chain graph models | 16 pages, 4 figures | null | null | null | cs.DS stat.ML | http://creativecommons.org/licenses/by/4.0/ | We study identifiability of Andersson-Madigan-Perlman (AMP) chain graph
models, which are a common generalization of linear structural equation models
and Gaussian graphical models. AMP models are described by DAGs on chain
components which themselves are undirected graphs.
For a known chain component decomposition, we show that the DAG on the chain
components is identifiable if the determinants of the residual covariance
matrices of the chain components are monotone non-decreasing in topological
order. This condition extends the equal variance identifiability criterion for
Bayes nets, and it can be generalized from determinants to any super-additive
function on positive semidefinite matrices. When the component decomposition is
unknown, we describe conditions that allow recovery of the full structure using
a polynomial time algorithm based on submodular function minimization. We also
conduct experiments comparing our algorithm's performance against existing
baselines.
| [
{
"created": "Thu, 17 Jun 2021 10:09:30 GMT",
"version": "v1"
}
] | "2021-06-18T00:00:00" | [
[
"Wang",
"Yuhao",
""
],
[
"Bhattacharyya",
"Arnab",
""
]
] | 0no_new_dataset
|
2307.15339 | Sumati Thareja | Le Gong, Shiying Li, Naqib Sad Pathan, Mohammad Shifat-E-Rabbi,
Gustavo K. Rohde, Abu Hasnat Mohammad Rubaiyat and Sumati Thareja | The Radon Signed Cumulative Distribution Transform and its applications
in classification of Signed Images | null | null | null | null | cs.IT cs.CV cs.LG math.IT | http://creativecommons.org/licenses/by/4.0/ | Here we describe a new image representation technique based on the
mathematics of transport and optimal transport. The method relies on the
combination of the well-known Radon transform for images and a recent signal
representation method called the Signed Cumulative Distribution Transform. The
newly proposed method generalizes previous transport-related image
representation methods to arbitrary functions (images), and thus can be used in
more applications. We describe the new transform, and some of its mathematical
properties and demonstrate its ability to partition image classes with real and
simulated data. In comparison to existing transport transform methods, as well
as deep learning-based classification methods, the new transform more
accurately represents the information content of signed images, and thus can be
used to obtain higher classification accuracies. The implementation of the
proposed method in Python language is integrated as a part of the software
package PyTransKit, available on Github.
| [
{
"created": "Fri, 28 Jul 2023 06:32:33 GMT",
"version": "v1"
}
] | "2023-07-31T00:00:00" | [
[
"Gong",
"Le",
""
],
[
"Li",
"Shiying",
""
],
[
"Pathan",
"Naqib Sad",
""
],
[
"Shifat-E-Rabbi",
"Mohammad",
""
],
[
"Rohde",
"Gustavo K.",
""
],
[
"Rubaiyat",
"Abu Hasnat Mohammad",
""
],
[
"Thareja",
"Sumati",
""
]
] | 1new_dataset
|
2405.06219 | Haojie Duanmu | Haojie Duanmu, Zhihang Yuan, Xiuhong Li, Jiangfei Duan, Xingcheng
Zhang, Dahua Lin | SKVQ: Sliding-window Key and Value Cache Quantization for Large Language
Models | null | null | null | null | cs.LG cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large language models (LLMs) can now handle longer sequences of tokens,
enabling complex tasks like book understanding and generating lengthy novels.
However, the key-value (KV) cache required for LLMs consumes substantial memory
as context length increasing, becoming the bottleneck for deployment. In this
paper, we present a strategy called SKVQ, which stands for sliding-window KV
cache quantization, to address the issue of extremely low bitwidth KV cache
quantization. To achieve this, SKVQ rearranges the channels of the KV cache in
order to improve the similarity of channels in quantization groups, and applies
clipped dynamic quantization at the group level. Additionally, SKVQ ensures
that the most recent window tokens in the KV cache are preserved with high
precision. This helps maintain the accuracy of a small but important portion of
the KV cache.SKVQ achieves high compression ratios while maintaining accuracy.
Our evaluation on LLMs demonstrates that SKVQ surpasses previous quantization
approaches, allowing for quantization of the KV cache to 2-bit keys and 1.5-bit
values with minimal loss of accuracy. With SKVQ, it is possible to process
context lengths of up to 1M on an 80GB memory GPU for a 7b model and up to 7
times faster decoding.
| [
{
"created": "Fri, 10 May 2024 03:06:24 GMT",
"version": "v1"
},
{
"created": "Mon, 13 May 2024 14:39:11 GMT",
"version": "v2"
}
] | "2024-05-14T00:00:00" | [
[
"Duanmu",
"Haojie",
""
],
[
"Yuan",
"Zhihang",
""
],
[
"Li",
"Xiuhong",
""
],
[
"Duan",
"Jiangfei",
""
],
[
"Zhang",
"Xingcheng",
""
],
[
"Lin",
"Dahua",
""
]
] | 0no_new_dataset
|
2209.07216 | Daniel Loureiro | Daniel Loureiro, Aminette D'Souza, Areej Nasser Muhajab, Isabella A.
White, Gabriel Wong, Luis Espinosa Anke, Leonardo Neves, Francesco Barbieri,
Jose Camacho-Collados | TempoWiC: An Evaluation Benchmark for Detecting Meaning Shift in Social
Media | Accepted to COLING 2022. Used to create the TempoWiC Shared Task for
EvoNLP | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Language evolves over time, and word meaning changes accordingly. This is
especially true in social media, since its dynamic nature leads to faster
semantic shifts, making it challenging for NLP models to deal with new content
and trends. However, the number of datasets and models that specifically
address the dynamic nature of these social platforms is scarce. To bridge this
gap, we present TempoWiC, a new benchmark especially aimed at accelerating
research in social media-based meaning shift. Our results show that TempoWiC is
a challenging benchmark, even for recently-released language models specialized
in social media.
| [
{
"created": "Thu, 15 Sep 2022 11:17:56 GMT",
"version": "v1"
},
{
"created": "Fri, 16 Sep 2022 16:54:46 GMT",
"version": "v2"
}
] | "2022-09-19T00:00:00" | [
[
"Loureiro",
"Daniel",
""
],
[
"D'Souza",
"Aminette",
""
],
[
"Muhajab",
"Areej Nasser",
""
],
[
"White",
"Isabella A.",
""
],
[
"Wong",
"Gabriel",
""
],
[
"Anke",
"Luis Espinosa",
""
],
[
"Neves",
"Leonardo",
""
],
[
"Barbieri",
"Francesco",
""
],
[
"Camacho-Collados",
"Jose",
""
]
] | 1new_dataset
|
2303.14679 | Yongqi An | Yongqi An, Xu Zhao, Tao Yu, Haiyun Guo, Chaoyang Zhao, Ming Tang,
Jinqiao Wang | ZBS: Zero-shot Background Subtraction via Instance-level Background
Modeling and Foreground Selection | Accepted by CVPR 2023. Code is available at
https://github.com/CASIA-IVA-Lab/ZBS | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Background subtraction (BGS) aims to extract all moving objects in the video
frames to obtain binary foreground segmentation masks. Deep learning has been
widely used in this field. Compared with supervised-based BGS methods,
unsupervised methods have better generalization. However, previous unsupervised
deep learning BGS algorithms perform poorly in sophisticated scenarios such as
shadows or night lights, and they cannot detect objects outside the pre-defined
categories. In this work, we propose an unsupervised BGS algorithm based on
zero-shot object detection called Zero-shot Background Subtraction (ZBS). The
proposed method fully utilizes the advantages of zero-shot object detection to
build the open-vocabulary instance-level background model. Based on it, the
foreground can be effectively extracted by comparing the detection results of
new frames with the background model. ZBS performs well for sophisticated
scenarios, and it has rich and extensible categories. Furthermore, our method
can easily generalize to other tasks, such as abandoned object detection in
unseen environments. We experimentally show that ZBS surpasses state-of-the-art
unsupervised BGS methods by 4.70% F-Measure on the CDnet 2014 dataset. The code
is released at https://github.com/CASIA-IVA-Lab/ZBS.
| [
{
"created": "Sun, 26 Mar 2023 10:59:03 GMT",
"version": "v1"
}
] | "2023-03-28T00:00:00" | [
[
"An",
"Yongqi",
""
],
[
"Zhao",
"Xu",
""
],
[
"Yu",
"Tao",
""
],
[
"Guo",
"Haiyun",
""
],
[
"Zhao",
"Chaoyang",
""
],
[
"Tang",
"Ming",
""
],
[
"Wang",
"Jinqiao",
""
]
] | 1new_dataset
|
2007.10720 | Longbing Cao | Chengzhang Zhu, Longbing Cao, and Jianping Yin | Unsupervised Heterogeneous Coupling Learning for Categorical
Representation | null | IEEE Transactions on Pattern Analysis and Machine Intelligence,
2020 | 10.1109/TPAMI.2020.3010953 | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex categorical data is often hierarchically coupled with heterogeneous
relationships between attributes and attribute values and the couplings between
objects. Such value-to-object couplings are heterogeneous with complementary
and inconsistent interactions and distributions. Limited research exists on
unlabeled categorical data representations, ignores the heterogeneous and
hierarchical couplings, underestimates data characteristics and complexities,
and overuses redundant information, etc. The deep representation learning of
unlabeled categorical data is challenging, overseeing such value-to-object
couplings, complementarity and inconsistency, and requiring large data,
disentanglement, and high computational power. This work introduces a shallow
but powerful UNsupervised heTerogeneous couplIng lEarning (UNTIE) approach for
representing coupled categorical data by untying the interactions between
couplings and revealing heterogeneous distributions embedded in each type of
couplings. UNTIE is efficiently optimized w.r.t. a kernel k-means objective
function for unsupervised representation learning of heterogeneous and
hierarchical value-to-object couplings. Theoretical analysis shows that UNTIE
can represent categorical data with maximal separability while effectively
represent heterogeneous couplings and disclose their roles in categorical data.
The UNTIE-learned representations make significant performance improvement
against the state-of-the-art categorical representations and deep
representation models on 25 categorical data sets with diversified
characteristics.
| [
{
"created": "Tue, 21 Jul 2020 11:23:27 GMT",
"version": "v1"
}
] | "2020-07-28T00:00:00" | [
[
"Zhu",
"Chengzhang",
""
],
[
"Cao",
"Longbing",
""
],
[
"Yin",
"Jianping",
""
]
] | 0no_new_dataset
|
2210.17344 | Mallikarjun Byrasandra Ramalinga Reddy | Mallikarjun BR, Ayush Tewari, Xingang Pan, Mohamed Elgharib, Christian
Theobalt | gCoRF: Generative Compositional Radiance Fields | https://vcai.mpi-inf.mpg.de/projects/gCoRF/ | null | null | null | cs.GR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | 3D generative models of objects enable photorealistic image synthesis with 3D
control. Existing methods model the scene as a global scene representation,
ignoring the compositional aspect of the scene. Compositional reasoning can
enable a wide variety of editing applications, in addition to enabling
generalizable 3D reasoning. In this paper, we present a compositional
generative model, where each semantic part of the object is represented as an
independent 3D representation learned from only in-the-wild 2D data. We start
with a global generative model (GAN) and learn to decompose it into different
semantic parts using supervision from 2D segmentation masks. We then learn to
composite independently sampled parts in order to create coherent global
scenes. Different parts can be independently sampled while keeping the rest of
the object fixed. We evaluate our method on a wide variety of objects and parts
and demonstrate editing applications.
| [
{
"created": "Mon, 31 Oct 2022 14:10:44 GMT",
"version": "v1"
}
] | "2022-11-01T00:00:00" | [
[
"BR",
"Mallikarjun",
""
],
[
"Tewari",
"Ayush",
""
],
[
"Pan",
"Xingang",
""
],
[
"Elgharib",
"Mohamed",
""
],
[
"Theobalt",
"Christian",
""
]
] | 0no_new_dataset
|
1806.05658 | Fei Liu | Kaiqiang Song, Lin Zhao, Fei Liu | Structure-Infused Copy Mechanisms for Abstractive Summarization | 13 pages | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Seq2seq learning has produced promising results on summarization. However, in
many cases, system summaries still struggle to keep the meaning of the original
intact. They may miss out important words or relations that play critical roles
in the syntactic structure of source sentences. In this paper, we present
structure-infused copy mechanisms to facilitate copying important words and
relations from the source sentence to summary sentence. The approach naturally
combines source dependency structure with the copy mechanism of an abstractive
sentence summarizer. Experimental results demonstrate the effectiveness of
incorporating source-side syntactic information in the system, and our proposed
approach compares favorably to state-of-the-art methods.
| [
{
"created": "Thu, 14 Jun 2018 17:31:18 GMT",
"version": "v1"
},
{
"created": "Sun, 24 Jun 2018 01:36:22 GMT",
"version": "v2"
}
] | "2018-06-26T00:00:00" | [
[
"Song",
"Kaiqiang",
""
],
[
"Zhao",
"Lin",
""
],
[
"Liu",
"Fei",
""
]
] | 0no_new_dataset
|
2002.10938 | Ziyuan Liu | Ziyuan Liu, Georg von Wichert | Applying Rule-Based Context Knowledge to Build Abstract Semantic Maps of
Indoor Environments | arXiv admin note: text overlap with arXiv:2002.08402 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a generalizable method that systematically combines
data driven MCMC samplingand inference using rule-based context knowledge for
data abstraction. In particular, we demonstrate the usefulness of our method in
the scenario of building abstract semantic maps for indoor environments. The
product of our system is a parametric abstract model of the perceived
environment that not only accurately represents the geometry of the environment
but also provides valuable abstract information which benefits high-level
robotic applications. Based on predefined abstract terms,such as type and
relation, we define task-specific context knowledge as descriptive rules in
Markov Logic Networks. The corresponding inference results are used to
construct a priordistribution that aims to add reasonable constraints to the
solution space of semantic maps. In addition, by applying a semantically
annotated sensor model, we explicitly use context information to interpret the
sensor data. Experiments on real world data show promising results and thus
confirm the usefulness of our system.
| [
{
"created": "Fri, 21 Feb 2020 20:56:02 GMT",
"version": "v1"
}
] | "2020-02-26T00:00:00" | [
[
"Liu",
"Ziyuan",
""
],
[
"von Wichert",
"Georg",
""
]
] | 0no_new_dataset
|
2111.13539 | Mohammad Mahdi Johari | Mohammad Mahdi Johari, Yann Lepoittevin, Fran\c{c}ois Fleuret | GeoNeRF: Generalizing NeRF with Geometry Priors | CVPR2022 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | We present GeoNeRF, a generalizable photorealistic novel view synthesis
method based on neural radiance fields. Our approach consists of two main
stages: a geometry reasoner and a renderer. To render a novel view, the
geometry reasoner first constructs cascaded cost volumes for each nearby source
view. Then, using a Transformer-based attention mechanism and the cascaded cost
volumes, the renderer infers geometry and appearance, and renders detailed
images via classical volume rendering techniques. This architecture, in
particular, allows sophisticated occlusion reasoning, gathering information
from consistent source views. Moreover, our method can easily be fine-tuned on
a single scene, and renders competitive results with per-scene optimized neural
rendering methods with a fraction of computational cost. Experiments show that
GeoNeRF outperforms state-of-the-art generalizable neural rendering models on
various synthetic and real datasets. Lastly, with a slight modification to the
geometry reasoner, we also propose an alternative model that adapts to RGBD
images. This model directly exploits the depth information often available
thanks to depth sensors. The implementation code is available at
https://www.idiap.ch/paper/geonerf.
| [
{
"created": "Fri, 26 Nov 2021 15:15:37 GMT",
"version": "v1"
},
{
"created": "Mon, 21 Mar 2022 10:14:15 GMT",
"version": "v2"
}
] | "2022-03-22T00:00:00" | [
[
"Johari",
"Mohammad Mahdi",
""
],
[
"Lepoittevin",
"Yann",
""
],
[
"Fleuret",
"François",
""
]
] | 0no_new_dataset
|