id
stringlengths
9
10
submitter
stringlengths
5
46
authors
stringlengths
5
1.31k
title
stringlengths
8
223
comments
stringlengths
2
574
journal-ref
stringclasses
587 values
doi
stringclasses
784 values
report-no
stringclasses
75 values
categories
stringlengths
5
72
license
stringclasses
9 values
abstract
stringlengths
82
3.31k
versions
listlengths
1
15
update_date
timestamp[us]
authors_parsed
sequencelengths
1
76
label
class label
2 classes
1709.00268
Santiago Hern\'andez Orozco
Santiago Hern\'andez-Orozco, Narsis A. Kiani and Hector Zenil
Algorithmically probable mutations reproduce aspects of evolution such as convergence rate, genetic memory, and modularity
13 pages, 10 figures
null
null
null
cs.NE cs.IT math.IT q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Natural selection explains how life has evolved over millions of years from more primitive forms. The speed at which this happens, however, has sometimes defied formal explanations when based on random (uniformly distributed) mutations. Here we investigate the application of a simplicity bias based on a natural but algorithmic distribution of mutations (no recombination) in various examples, particularly binary matrices in order to compare evolutionary convergence rates. Results both on synthetic and on small biological examples indicate an accelerated rate when mutations are not statistical uniform but \textit{algorithmic uniform}. We show that algorithmic distributions can evolve modularity and genetic memory by preservation of structures when they first occur sometimes leading to an accelerated production of diversity but also population extinctions, possibly explaining naturally occurring phenomena such as diversity explosions (e.g. the Cambrian) and massive extinctions (e.g. the End Triassic) whose causes are currently a cause for debate. The natural approach introduced here appears to be a better approximation to biological evolution than models based exclusively upon random uniform mutations, and it also approaches a formal version of open-ended evolution based on previous formal results. These results validate some suggestions in the direction that computation may be an equally important driver of evolution. We also show that inducing the method on problems of optimization, such as genetic algorithms, has the potential to accelerate convergence of artificial evolutionary algorithms.
[ { "created": "Fri, 1 Sep 2017 12:12:02 GMT", "version": "v1" }, { "created": "Tue, 5 Sep 2017 11:27:40 GMT", "version": "v2" }, { "created": "Wed, 6 Sep 2017 00:51:01 GMT", "version": "v3" }, { "created": "Thu, 14 Sep 2017 19:18:19 GMT", "version": "v4" }, { "created": "Fri, 1 Dec 2017 00:06:20 GMT", "version": "v5" }, { "created": "Thu, 1 Feb 2018 22:23:08 GMT", "version": "v6" }, { "created": "Sat, 10 Mar 2018 19:36:29 GMT", "version": "v7" }, { "created": "Wed, 20 Jun 2018 20:23:47 GMT", "version": "v8" } ]
2018-06-22T00:00:00
[ [ "Hernández-Orozco", "Santiago", "" ], [ "Kiani", "Narsis A.", "" ], [ "Zenil", "Hector", "" ] ]
0no_new_dataset
2310.00760
Faraz Lotfi Dr
Faraz Lotfi, Khalil Virji, Farnoosh Faraji, Lucas Berry, Andrew Holliday, David Meger, Gregory Dudek
Uncertainty-aware hybrid paradigm of nonlinear MPC and model-based RL for offroad navigation: Exploration of transformers in the predictive model
null
null
null
null
cs.RO
http://creativecommons.org/licenses/by-nc-nd/4.0/
In this paper, we investigate a hybrid scheme that combines nonlinear model predictive control (MPC) and model-based reinforcement learning (RL) for navigation planning of an autonomous model car across offroad, unstructured terrains without relying on predefined maps. Our innovative approach takes inspiration from BADGR, an LSTM-based network that primarily concentrates on environment modeling, but distinguishes itself by substituting LSTM modules with transformers to greatly elevate the performance our model. Addressing uncertainty within the system, we train an ensemble of predictive models and estimate the mutual information between model weights and outputs, facilitating dynamic horizon planning through the introduction of variable speeds. Further enhancing our methodology, we incorporate a nonlinear MPC controller that accounts for the intricacies of the vehicle's model and states. The model-based RL facet produces steering angles and quantifies inherent uncertainty. At the same time, the nonlinear MPC suggests optimal throttle settings, striking a balance between goal attainment speed and managing model uncertainty influenced by velocity. In the conducted studies, our approach excels over the existing baseline by consistently achieving higher metric values in predicting future events and seamlessly integrating the vehicle's kinematic model for enhanced decision-making. The code and the evaluation data are available at https://github.com/FARAZLOTFI/offroad_autonomous_navigation/).
[ { "created": "Sun, 1 Oct 2023 18:47:02 GMT", "version": "v1" } ]
2023-10-03T00:00:00
[ [ "Lotfi", "Faraz", "" ], [ "Virji", "Khalil", "" ], [ "Faraji", "Farnoosh", "" ], [ "Berry", "Lucas", "" ], [ "Holliday", "Andrew", "" ], [ "Meger", "David", "" ], [ "Dudek", "Gregory", "" ] ]
0no_new_dataset
1802.07653
Babajide Ayinde
Babajide O. Ayinde and Jacek M. Zurada
Building Efficient ConvNets using Redundant Feature Pruning
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an efficient technique to prune deep and/or wide convolutional neural network models by eliminating redundant features (or filters). Previous studies have shown that over-sized deep neural network models tend to produce a lot of redundant features that are either shifted version of one another or are very similar and show little or no variations; thus resulting in filtering redundancy. We propose to prune these redundant features along with their connecting feature maps according to their differentiation and based on their relative cosine distances in the feature space, thus yielding smaller network size with reduced inference costs and competitive performance. We empirically show on select models and CIFAR-10 dataset that inference costs can be reduced by 40% for VGG-16, 27% for ResNet-56, and 39% for ResNet-110.
[ { "created": "Wed, 21 Feb 2018 16:31:28 GMT", "version": "v1" } ]
2018-02-22T00:00:00
[ [ "Ayinde", "Babajide O.", "" ], [ "Zurada", "Jacek M.", "" ] ]
0no_new_dataset
2312.06886
Mengwei Ren
Mengwei Ren, Wei Xiong, Jae Shin Yoon, Zhixin Shu, Jianming Zhang, HyunJoon Jung, Guido Gerig, He Zhang
Relightful Harmonization: Lighting-aware Portrait Background Replacement
CVPR 2024 camera ready
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Portrait harmonization aims to composite a subject into a new background, adjusting its lighting and color to ensure harmony with the background scene. Existing harmonization techniques often only focus on adjusting the global color and brightness of the foreground and ignore crucial illumination cues from the background such as apparent lighting direction, leading to unrealistic compositions. We introduce Relightful Harmonization, a lighting-aware diffusion model designed to seamlessly harmonize sophisticated lighting effect for the foreground portrait using any background image. Our approach unfolds in three stages. First, we introduce a lighting representation module that allows our diffusion model to encode lighting information from target image background. Second, we introduce an alignment network that aligns lighting features learned from image background with lighting features learned from panorama environment maps, which is a complete representation for scene illumination. Last, to further boost the photorealism of the proposed method, we introduce a novel data simulation pipeline that generates synthetic training pairs from a diverse range of natural images, which are used to refine the model. Our method outperforms existing benchmarks in visual fidelity and lighting coherence, showing superior generalization in real-world testing scenarios, highlighting its versatility and practicality.
[ { "created": "Mon, 11 Dec 2023 23:20:31 GMT", "version": "v1" }, { "created": "Sun, 7 Apr 2024 21:41:05 GMT", "version": "v2" } ]
2024-04-09T00:00:00
[ [ "Ren", "Mengwei", "" ], [ "Xiong", "Wei", "" ], [ "Yoon", "Jae Shin", "" ], [ "Shu", "Zhixin", "" ], [ "Zhang", "Jianming", "" ], [ "Jung", "HyunJoon", "" ], [ "Gerig", "Guido", "" ], [ "Zhang", "He", "" ] ]
1new_dataset
2207.01112
Vahid Reza Khazaie
Vahid Reza Khazaie and Anthony Wong and Yalda Mohsenzadeh
Augment to Detect Anomalies with Continuous Labelling
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
Anomaly detection is to recognize samples that differ in some respect from the training observations. These samples which do not conform to the distribution of normal data are called outliers or anomalies. In real-world anomaly detection problems, the outliers are absent, not well defined, or have a very limited number of instances. Recent state-of-the-art deep learning-based anomaly detection methods suffer from high computational cost, complexity, unstable training procedures, and non-trivial implementation, making them difficult to deploy in real-world applications. To combat this problem, we leverage a simple learning procedure that trains a lightweight convolutional neural network, reaching state-of-the-art performance in anomaly detection. In this paper, we propose to solve anomaly detection as a supervised regression problem. We label normal and anomalous data using two separable distributions of continuous values. To compensate for the unavailability of anomalous samples during training time, we utilize straightforward image augmentation techniques to create a distinct set of samples as anomalies. The distribution of the augmented set is similar but slightly deviated from the normal data, whereas real anomalies are expected to have an even further distribution. Therefore, training a regressor on these augmented samples will result in more separable distributions of labels for normal and real anomalous data points. Anomaly detection experiments on image and video datasets show the superiority of the proposed method over the state-of-the-art approaches.
[ { "created": "Sun, 3 Jul 2022 20:11:51 GMT", "version": "v1" } ]
2022-07-05T00:00:00
[ [ "Khazaie", "Vahid Reza", "" ], [ "Wong", "Anthony", "" ], [ "Mohsenzadeh", "Yalda", "" ] ]
1new_dataset
1910.10263
Christopher Buss
Ben McCamish, Christopher Buss, Arash Termehchy, David Maier
Integrating Information About Entities Progressively
demonstration
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Users often have to integrate information about entities from multiple data sources. This task is challenging as each data source may represent information about the same entity in a distinct form, e.g., each data source may use a different name for the same person. Currently, data from different representations are translated into a unified one via lengthy and costly expert attention and tuning. Such methods cannot scale to the rapidly increasing number and variety of available data sources. We demonstrate ProgMap, a entity-matching framework in which data sources learn to collaborate and integrate information about entities on-demand and with minimal expert intervention. The data sources leverage user feedback to improve the accuracy of their collaboration and results. ProgMap also has techniques to reduce the amount of required user feedback to achieve effective matchings.
[ { "created": "Tue, 22 Oct 2019 22:40:24 GMT", "version": "v1" } ]
2019-10-24T00:00:00
[ [ "McCamish", "Ben", "" ], [ "Buss", "Christopher", "" ], [ "Termehchy", "Arash", "" ], [ "Maier", "David", "" ] ]
0no_new_dataset
1603.08379
Brian Ruttenberg
Brian Ruttenberg, Lee Kellogg, Avi Pfeffer
Probabilistic Programming for Malware Analysis
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constructing lineages of malware is an important cyber-defense task. Performing this task is difficult, however, due to the amount of malware data and obfuscation techniques by the authors. In this work, we formulate the lineage task as a probabilistic model, and use a novel probabilistic programming solution to jointly infer the lineage and creation times of families of malware.
[ { "created": "Mon, 28 Mar 2016 13:40:29 GMT", "version": "v1" } ]
2016-03-29T00:00:00
[ [ "Ruttenberg", "Brian", "" ], [ "Kellogg", "Lee", "" ], [ "Pfeffer", "Avi", "" ] ]
0no_new_dataset
1812.09926
Sirui Xie
Sirui Xie, Hehui Zheng, Chunxiao Liu, Liang Lin
SNAS: Stochastic Neural Architecture Search
ICLR 2019
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose Stochastic Neural Architecture Search (SNAS), an economical end-to-end solution to Neural Architecture Search (NAS) that trains neural operation parameters and architecture distribution parameters in same round of back-propagation, while maintaining the completeness and differentiability of the NAS pipeline. In this work, NAS is reformulated as an optimization problem on parameters of a joint distribution for the search space in a cell. To leverage the gradient information in generic differentiable loss for architecture search, a novel search gradient is proposed. We prove that this search gradient optimizes the same objective as reinforcement-learning-based NAS, but assigns credits to structural decisions more efficiently. This credit assignment is further augmented with locally decomposable reward to enforce a resource-efficient constraint. In experiments on CIFAR-10, SNAS takes less epochs to find a cell architecture with state-of-the-art accuracy than non-differentiable evolution-based and reinforcement-learning-based NAS, which is also transferable to ImageNet. It is also shown that child networks of SNAS can maintain the validation accuracy in searching, with which attention-based NAS requires parameter retraining to compete, exhibiting potentials to stride towards efficient NAS on big datasets. We have released our implementation at https://github.com/SNAS-Series/SNAS-Series.
[ { "created": "Mon, 24 Dec 2018 14:13:16 GMT", "version": "v1" }, { "created": "Sat, 12 Jan 2019 17:19:01 GMT", "version": "v2" }, { "created": "Wed, 1 Apr 2020 00:44:35 GMT", "version": "v3" } ]
2020-04-02T00:00:00
[ [ "Xie", "Sirui", "" ], [ "Zheng", "Hehui", "" ], [ "Liu", "Chunxiao", "" ], [ "Lin", "Liang", "" ] ]
0no_new_dataset
2206.10059
Qi Zheng
Qi Zheng, Chaoyue Wang, Dadong Wang
Bypass Network for Semantics Driven Image Paragraph Captioning
Under consideration at Computer Vision and Image Understanding
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
Image paragraph captioning aims to describe a given image with a sequence of coherent sentences. Most existing methods model the coherence through the topic transition that dynamically infers a topic vector from preceding sentences. However, these methods still suffer from immediate or delayed repetitions in generated paragraphs because (i) the entanglement of syntax and semantics distracts the topic vector from attending pertinent visual regions; (ii) there are few constraints or rewards for learning long-range transitions. In this paper, we propose a bypass network that separately models semantics and linguistic syntax of preceding sentences. Specifically, the proposed model consists of two main modules, i.e. a topic transition module and a sentence generation module. The former takes previous semantic vectors as queries and applies attention mechanism on regional features to acquire the next topic vector, which reduces immediate repetition by eliminating linguistics. The latter decodes the topic vector and the preceding syntax state to produce the following sentence. To further reduce delayed repetition in generated paragraphs, we devise a replacement-based reward for the REINFORCE training. Comprehensive experiments on the widely used benchmark demonstrate the superiority of the proposed model over the state of the art for coherence while maintaining high accuracy.
[ { "created": "Tue, 21 Jun 2022 00:48:22 GMT", "version": "v1" } ]
2022-06-22T00:00:00
[ [ "Zheng", "Qi", "" ], [ "Wang", "Chaoyue", "" ], [ "Wang", "Dadong", "" ] ]
0no_new_dataset
2007.11318
Kenneth Lai
K. Lai, S. Samoil, and S.N.Yanushkevich
Multi-Spectral Facial Biometrics in Access Control
null
2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), Orlando, FL, 2014, pp. 102-109
10.1109/CIBIM.2014.7015450
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study demonstrates how facial biometrics, acquired using multi-spectral sensors, such as RGB, depth, and infrared, assist the data accumulation in the process of authorizing users of automated and semi-automated access systems. This data serves the purposes of person authentication, as well as facial temperature estimation. We utilize depth data taken using an inexpensive RGB-D sensor to find the head pose of a subject. This allows the selection of video frames containing a frontal-view head pose for face recognition and face temperature reading. Usage of the frontal-view frames improves the efficiency of face recognition while the corresponding synchronized IR video frames allow for more efficient temperature estimation for facial regions of interest. In addition, this study reports emerging applications of biometrics in biomedical and health care solutions. Including surveys of recent pilot projects, involving new sensors of biometric data and new applications of human physiological and behavioral biometrics. It also shows the new and promising horizons of using biometrics in natural and contactless control interfaces for surgical control, rehabilitation and accessibility.
[ { "created": "Wed, 22 Jul 2020 10:16:05 GMT", "version": "v1" } ]
2020-07-23T00:00:00
[ [ "Lai", "K.", "" ], [ "Samoil", "S.", "" ], [ "Yanushkevich", "S. N.", "" ] ]
1new_dataset
1811.10103
Johanna Hansen
Johanna Hansen, Sandeep Manjanna, Alberto Quattrini Li, Ioannis Rekleitis and Gregory Dudek
Autonomous Marine Sampling Enhanced by Strategically Deployed Drifters in Marine Flow Fields
7 pages, 7 figures, MTS/IEEE OCEANS 2018 Conference
null
10.1109/OCEANS.2018.8604873
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
We present a transportable system for ocean observations in which a small autonomous surface vehicle (ASV) adaptively collects spatially diverse samples with aid from a team of inexpensive, passive floating sensors known as drifters. Drifters can provide an increase in spatial coverage at little cost as they are propelled about the survey area by the ambient flow field instead of with actuators. Our iterative planning approach demonstrates how we can use the ASV to strategically deploy drifters into points of the flow field for high expected information gain, while also adaptively sampling the space. In this paper, we examine the performance of this heterogeneous sensing system in simulated flow field experiments.
[ { "created": "Sun, 25 Nov 2018 21:44:41 GMT", "version": "v1" } ]
2021-01-13T00:00:00
[ [ "Hansen", "Johanna", "" ], [ "Manjanna", "Sandeep", "" ], [ "Li", "Alberto Quattrini", "" ], [ "Rekleitis", "Ioannis", "" ], [ "Dudek", "Gregory", "" ] ]
0no_new_dataset
2305.05576
Pratyush Kumar
Pratyush Kumar
Large Language Models Humanize Technology
null
null
null
null
cs.CY cs.CL
http://creativecommons.org/licenses/by/4.0/
Large Language Models (LLMs) have made rapid progress in recent months and weeks, garnering significant public attention. This has sparked concerns about aligning these models with human values, their impact on labor markets, and the potential need for regulation in further research and development. However, the discourse often lacks a focus on the imperative to widely diffuse the societal benefits of LLMs. To qualify this societal benefit, we assert that LLMs exhibit emergent abilities to humanize technology more effectively than previous technologies, and for people across language, occupation, and accessibility divides. We argue that they do so by addressing three mechanizing bottlenecks in today's computing technologies: creating diverse and accessible content, learning complex digital tools, and personalizing machine learning algorithms. We adopt a case-based approach and illustrate each bottleneck with two examples where current technology imposes bottlenecks that LLMs demonstrate the ability to address. Given this opportunity to humanize technology widely, we advocate for more widespread understanding of LLMs, tools and methods to simplify use of LLMs, and cross-cutting institutional capacity.
[ { "created": "Tue, 9 May 2023 16:05:36 GMT", "version": "v1" } ]
2023-05-10T00:00:00
[ [ "Kumar", "Pratyush", "" ] ]
0no_new_dataset
cs/0611125
Yasutada Oohama
Yasutada Oohama
Relay Channels with Confidential Messages
20 pages, 6 figures, submitted to IEEE Transactions on Information Theory, Special issue on Information Theoretic Security
null
null
null
cs.IT math.IT
null
We consider a relay channel where a relay helps the transmission of messages from one sender to one receiver. The relay is considered not only as a sender that helps the message transmission but as a wire-tapper who can obtain some knowledge about the transmitted messages. In this paper we study the coding problem of the relay channel under the situation that some of transmitted messages are confidential to the relay. A security of such confidential messages is measured by the conditional entropy. The rate region is defined by the set of transmission rates for which messages are reliably transmitted and the security of confidential messages is larger than a prescribed level. In this paper we give two definition of the rate region. We first define the rate region in the case of deterministic encoder and call it the deterministic rate region. Next, we define the rate region in the case of stochastic encoder and call it the stochastic rate region. We derive explicit inner and outer bounds for the above two rate regions and present a class of relay channels where two bounds match. Furthermore, we show that stochastic encoder can enlarge the rate region. We also evaluate the deterministic rate region of the Gaussian relay channel with confidential messages.
[ { "created": "Fri, 24 Nov 2006 12:39:46 GMT", "version": "v1" }, { "created": "Mon, 27 Nov 2006 09:37:21 GMT", "version": "v2" }, { "created": "Tue, 5 Dec 2006 11:15:29 GMT", "version": "v3" }, { "created": "Thu, 21 Dec 2006 12:26:23 GMT", "version": "v4" }, { "created": "Mon, 19 Feb 2007 13:22:09 GMT", "version": "v5" }, { "created": "Wed, 21 Feb 2007 15:21:39 GMT", "version": "v6" }, { "created": "Sat, 24 Mar 2007 12:22:17 GMT", "version": "v7" } ]
2007-07-13T00:00:00
[ [ "Oohama", "Yasutada", "" ] ]
0no_new_dataset
2202.10324
Che Wang
Che Wang, Xufang Luo, Keith Ross, Dongsheng Li
VRL3: A Data-Driven Framework for Visual Deep Reinforcement Learning
41 pages, camera-ready final version, accepted to NeurIPS 2022
null
null
null
cs.CV cs.AI cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose VRL3, a powerful data-driven framework with a simple design for solving challenging visual deep reinforcement learning (DRL) tasks. We analyze a number of major obstacles in taking a data-driven approach, and present a suite of design principles, novel findings, and critical insights about data-driven visual DRL. Our framework has three stages: in stage 1, we leverage non-RL datasets (e.g. ImageNet) to learn task-agnostic visual representations; in stage 2, we use offline RL data (e.g. a limited number of expert demonstrations) to convert the task-agnostic representations into more powerful task-specific representations; in stage 3, we fine-tune the agent with online RL. On a set of challenging hand manipulation tasks with sparse reward and realistic visual inputs, compared to the previous SOTA, VRL3 achieves an average of 780% better sample efficiency. And on the hardest task, VRL3 is 1220% more sample efficient (2440% when using a wider encoder) and solves the task with only 10% of the computation. These significant results clearly demonstrate the great potential of data-driven deep reinforcement learning.
[ { "created": "Thu, 17 Feb 2022 09:51:32 GMT", "version": "v1" }, { "created": "Sat, 24 Sep 2022 09:45:01 GMT", "version": "v2" }, { "created": "Fri, 31 Mar 2023 06:41:29 GMT", "version": "v3" } ]
2023-04-03T00:00:00
[ [ "Wang", "Che", "" ], [ "Luo", "Xufang", "" ], [ "Ross", "Keith", "" ], [ "Li", "Dongsheng", "" ] ]
0no_new_dataset
1808.03841
Jia Pan
Tingxiang Fan, Pinxin Long, Wenxi Liu, Jia Pan
Fully Distributed Multi-Robot Collision Avoidance via Deep Reinforcement Learning for Safe and Efficient Navigation in Complex Scenarios
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a decentralized sensor-level collision avoidance policy for multi-robot systems, which shows promising results in practical applications. In particular, our policy directly maps raw sensor measurements to an agent's steering commands in terms of the movement velocity. As a first step toward reducing the performance gap between decentralized and centralized methods, we present a multi-scenario multi-stage training framework to learn an optimal policy. The policy is trained over a large number of robots in rich, complex environments simultaneously using a policy gradient based reinforcement learning algorithm. The learning algorithm is also integrated into a hybrid control framework to further improve the policy's robustness and effectiveness. We validate the learned sensor-level collision avoidance policy in a variety of simulated and real-world scenarios with thorough performance evaluations for large-scale multi-robot systems. The generalization of the learned policy is verified in a set of unseen scenarios including the navigation of a group of heterogeneous robots and a large-scale scenario with 100 robots. Although the policy is trained using simulation data only, we have successfully deployed it on physical robots with shapes and dynamics characteristics that are different from the simulated agents, in order to demonstrate the controller's robustness against the sim-to-real modeling error. Finally, we show that the collision-avoidance policy learned from multi-robot navigation tasks provides an excellent solution to the safe and effective autonomous navigation for a single robot working in a dense real human crowd. Our learned policy enables a robot to make effective progress in a crowd without getting stuck. Videos are available at https://sites.google.com/view/hybridmrca
[ { "created": "Sat, 11 Aug 2018 17:33:40 GMT", "version": "v1" } ]
2018-08-14T00:00:00
[ [ "Fan", "Tingxiang", "" ], [ "Long", "Pinxin", "" ], [ "Liu", "Wenxi", "" ], [ "Pan", "Jia", "" ] ]
0no_new_dataset
1401.3146
Johannes Rauh
Nils Bertschinger, Johannes Rauh
The Blackwell relation defines no lattice
5 pages, 1 figure
null
10.1109/ISIT.2014.6875280
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blackwell's theorem shows the equivalence of two preorders on the set of information channels. Here, we restate, and slightly generalize, his result in terms of random variables. Furthermore, we prove that the corresponding partial order is not a lattice; that is, least upper bounds and greatest lower bounds do not exist.
[ { "created": "Tue, 14 Jan 2014 11:30:27 GMT", "version": "v1" } ]
2015-03-05T00:00:00
[ [ "Bertschinger", "Nils", "" ], [ "Rauh", "Johannes", "" ] ]
0no_new_dataset
1602.08128
Zhenhao Ge
Zhenhao Ge, Sudhendu R. Sharma, Mark J. T. Smith
PCA Method for Automated Detection of Mispronounced Words
SPIE Defense, Security, and Sensing
null
10.1117/12.884155
null
cs.SD cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a method for detecting mispronunciations with the aim of improving Computer Assisted Language Learning (CALL) tools used by foreign language learners. The algorithm is based on Principle Component Analysis (PCA). It is hierarchical with each successive step refining the estimate to classify the test word as being either mispronounced or correct. Preprocessing before detection, like normalization and time-scale modification, is implemented to guarantee uniformity of the feature vectors input to the detection system. The performance using various features including spectrograms and Mel-Frequency Cepstral Coefficients (MFCCs) are compared and evaluated. Best results were obtained using MFCCs, achieving up to 99% accuracy in word verification and 93% in native/non-native classification. Compared with Hidden Markov Models (HMMs) which are used pervasively in recognition application, this particular approach is computational efficient and effective when training data is limited.
[ { "created": "Thu, 25 Feb 2016 21:48:56 GMT", "version": "v1" } ]
2016-02-29T00:00:00
[ [ "Ge", "Zhenhao", "" ], [ "Sharma", "Sudhendu R.", "" ], [ "Smith", "Mark J. T.", "" ] ]
0no_new_dataset
1708.03604
Alfio Lazzaro
Iain Bethune, Andeas Gloess, Juerg Hutter, Alfio Lazzaro, Hans Pabst, Fiona Reid
Porting of the DBCSR library for Sparse Matrix-Matrix Multiplications to Intel Xeon Phi systems
Submitted to the ParCo2017 conference, Bologna, Italy 12-15 September 2017
Advances in Parallel Computing, Volume 32: Parallel Computing is Everywhere, pp 47 - 56, 2018, IOS Press
10.3233/978-1-61499-843-3-47
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiplication of two sparse matrices is a key operation in the simulation of the electronic structure of systems containing thousands of atoms and electrons. The highly optimized sparse linear algebra library DBCSR (Distributed Block Compressed Sparse Row) has been specifically designed to efficiently perform such sparse matrix-matrix multiplications. This library is the basic building block for linear scaling electronic structure theory and low scaling correlated methods in CP2K. It is parallelized using MPI and OpenMP, and can exploit GPU accelerators by means of CUDA. We describe a performance comparison of DBCSR on systems with Intel Xeon Phi Knights Landing (KNL) processors, with respect to systems with Intel Xeon CPUs (including systems with GPUs). We find that the DBCSR on Cray XC40 KNL-based systems is 11%-14% slower than on a hybrid Cray XC50 with Nvidia P100 cards, at the same number of nodes. When compared to a Cray XC40 system equipped with dual-socket Intel Xeon CPUs, the KNL is up to 24% faster.
[ { "created": "Fri, 11 Aug 2017 16:35:59 GMT", "version": "v1" }, { "created": "Mon, 21 Aug 2017 11:55:20 GMT", "version": "v2" } ]
2018-03-13T00:00:00
[ [ "Bethune", "Iain", "" ], [ "Gloess", "Andeas", "" ], [ "Hutter", "Juerg", "" ], [ "Lazzaro", "Alfio", "" ], [ "Pabst", "Hans", "" ], [ "Reid", "Fiona", "" ] ]
0no_new_dataset
2103.02309
Ugur Gudukbay
Aytek Aman, Serkan Demirci, U\u{g}ur G\"ud\"ukbay
Compact Tetrahedralization-based Acceleration Structure for Ray Tracing
null
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a compact and efficient tetrahedral mesh representation to improve the ray-tracing performance. We reorder tetrahedral mesh data using a space-filling curve to improve cache locality. Most importantly, we propose an efficient ray traversal algorithm. We provide details of common ray tracing operations on tetrahedral meshes and give the GPU implementation of our traversal method. We demonstrate our findings through a set of comprehensive experiments. Our method outperforms existing tetrahedral mesh-based traversal methods and yields comparable results to the traversal methods based on the state of the art acceleration structures such as k-dimensional (k-d) trees and Bounding Volume Hierarchies (BVHs).
[ { "created": "Wed, 3 Mar 2021 10:39:03 GMT", "version": "v1" } ]
2021-03-04T00:00:00
[ [ "Aman", "Aytek", "" ], [ "Demirci", "Serkan", "" ], [ "Güdükbay", "Uğur", "" ] ]
0no_new_dataset
1705.04108
Mohammed Al-Imari
Mohammed Al-Imari, Pei Xiao, Muhammad Ali Imran, and Rahim Tafazolli
Uplink Non-Orthogonal Multiple Access for 5G Wireless Networks
Presented in the International Symposium on Wireless Communications Systems (ISWCS), 2014
null
10.1109/ISWCS.2014.6933459
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Orthogonal Frequency Division Multiple Access (OFDMA) as well as other orthogonal multiple access techniques fail to achieve the system capacity limit in the uplink due to the exclusivity in resource allocation. This issue is more prominent when fairness among the users is considered in the system. Current Non-Orthogonal Multiple Access (NOMA) techniques introduce redundancy by coding/spreading to facilitate the users' signals separation at the receiver, which degrade the system spectral efficiency. Hence, in order to achieve higher capacity, more efficient NOMA schemes need to be developed. In this paper, we propose a NOMA scheme for uplink that removes the resource allocation exclusivity and allows more than one user to share the same subcarrier without any coding/spreading redundancy. Joint processing is implemented at the receiver to detect the users' signals. However, to control the receiver complexity, an upper limit on the number of users per subcarrier needs to be imposed. In addition, a novel subcarrier and power allocation algorithm is proposed for the new NOMA scheme that maximizes the users' sum-rate. The link-level performance evaluation has shown that the proposed scheme achieves bit error rate close to the single-user case. Numerical results show that the proposed NOMA scheme can significantly improve the system performance in terms of spectral efficiency and fairness comparing to OFDMA.
[ { "created": "Thu, 11 May 2017 10:54:41 GMT", "version": "v1" } ]
2017-05-12T00:00:00
[ [ "Al-Imari", "Mohammed", "" ], [ "Xiao", "Pei", "" ], [ "Imran", "Muhammad Ali", "" ], [ "Tafazolli", "Rahim", "" ] ]
0no_new_dataset
2302.11982
Boyang Zhang
Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots
To appear in the 32nd USENIX Security Symposium, August 2023, Anaheim, CA, USA
null
null
null
cs.CR cs.LG
http://creativecommons.org/licenses/by/4.0/
Building advanced machine learning (ML) models requires expert knowledge and many trials to discover the best architecture and hyperparameter settings. Previous work demonstrates that model information can be leveraged to assist other attacks, such as membership inference, generating adversarial examples. Therefore, such information, e.g., hyperparameters, should be kept confidential. It is well known that an adversary can leverage a target ML model's output to steal the model's information. In this paper, we discover a new side channel for model information stealing attacks, i.e., models' scientific plots which are extensively used to demonstrate model performance and are easily accessible. Our attack is simple and straightforward. We leverage the shadow model training techniques to generate training data for the attack model which is essentially an image classifier. Extensive evaluation on three benchmark datasets shows that our proposed attack can effectively infer the architecture/hyperparameters of image classifiers based on convolutional neural network (CNN) given the scientific plot generated from it. We also reveal that the attack's success is mainly caused by the shape of the scientific plots, and further demonstrate that the attacks are robust in various scenarios. Given the simplicity and effectiveness of the attack method, our study indicates scientific plots indeed constitute a valid side channel for model information stealing attacks. To mitigate the attacks, we propose several defense mechanisms that can reduce the original attacks' accuracy while maintaining the plot utility. However, such defenses can still be bypassed by adaptive attacks.
[ { "created": "Thu, 23 Feb 2023 12:57:34 GMT", "version": "v1" } ]
2023-02-24T00:00:00
[ [ "Zhang", "Boyang", "" ], [ "He", "Xinlei", "" ], [ "Shen", "Yun", "" ], [ "Wang", "Tianhao", "" ], [ "Zhang", "Yang", "" ] ]
0no_new_dataset
2406.18742
Georgios Tziafas
Georgios Tziafas, Yucheng Xu, Zhibin Li, Hamidreza Kasaei
3D Feature Distillation with Object-Centric Priors
null
null
null
null
cs.CV cs.RO
http://creativecommons.org/licenses/by/4.0/
Grounding natural language to the physical world is a ubiquitous topic with a wide range of applications in computer vision and robotics. Recently, 2D vision-language models such as CLIP have been widely popularized, due to their impressive capabilities for open-vocabulary grounding in 2D images. Recent works aim to elevate 2D CLIP features to 3D via feature distillation, but either learn neural fields that are scene-specific and hence lack generalization, or focus on indoor room scan data that require access to multiple camera views, which is not practical in robot manipulation scenarios. Additionally, related methods typically fuse features at pixel-level and assume that all camera views are equally informative. In this work, we show that this approach leads to sub-optimal 3D features, both in terms of grounding accuracy, as well as segmentation crispness. To alleviate this, we propose a multi-view feature fusion strategy that employs object-centric priors to eliminate uninformative views based on semantic information, and fuse features at object-level via instance segmentation masks. To distill our object-centric 3D features, we generate a large-scale synthetic multi-view dataset of cluttered tabletop scenes, spawning 15k scenes from over 3300 unique object instances, which we make publicly available. We show that our method reconstructs 3D CLIP features with improved grounding capacity and spatial consistency, while doing so from single-view RGB-D, thus departing from the assumption of multiple camera views at test time. Finally, we show that our approach can generalize to novel tabletop domains and be re-purposed for 3D instance segmentation without fine-tuning, and demonstrate its utility for language-guided robotic grasping in clutter
[ { "created": "Wed, 26 Jun 2024 20:16:49 GMT", "version": "v1" }, { "created": "Mon, 1 Jul 2024 18:55:10 GMT", "version": "v2" } ]
2024-07-03T00:00:00
[ [ "Tziafas", "Georgios", "" ], [ "Xu", "Yucheng", "" ], [ "Li", "Zhibin", "" ], [ "Kasaei", "Hamidreza", "" ] ]
0no_new_dataset
1706.01133
Tathagata Chakraborti
Tathagata Chakraborti and Siddharth Srivastava and Alessandro Pinto and Subbarao Kambhampati
An ROS-based Shared Communication Middleware for Plug & Play Modular Intelligent Design of Smart Systems
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Centralized architectures for systems such as smart offices and homes are rapidly becoming obsolete due to inherent inflexibility in their design and management. This is because such systems should not only be easily re-configurable with the addition of newer capabilities over time but should also have the ability to adapt to multiple points of failure. Fully harnessing the capabilities of these massively integrated systems requires higher level reasoning engines that allow them to plan for and achieve diverse long-term goals, rather than being limited to a few predefined tasks. In this paper, we propose a set of properties that will accommodate such capabilities, and develop a general architecture for integrating automated planning components into smart systems. We show how the reasoning capabilities are embedded in the design and operation of the system and demonstrate the same on a real-world implementation of a smart office.
[ { "created": "Sun, 4 Jun 2017 19:23:10 GMT", "version": "v1" } ]
2017-06-06T00:00:00
[ [ "Chakraborti", "Tathagata", "" ], [ "Srivastava", "Siddharth", "" ], [ "Pinto", "Alessandro", "" ], [ "Kambhampati", "Subbarao", "" ] ]
0no_new_dataset
1512.07146
Steve Hanneke
Steve Hanneke
Refined Error Bounds for Several Learning Algorithms
null
Journal of Machine Learning Research, Vol. 17 (2016), No. 135, pp. 1-55
null
null
cs.LG math.ST stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article studies the achievable guarantees on the error rates of certain learning algorithms, with particular focus on refining logarithmic factors. Many of the results are based on a general technique for obtaining bounds on the error rates of sample-consistent classifiers with monotonic error regions, in the realizable case. We prove bounds of this type expressed in terms of either the VC dimension or the sample compression size. This general technique also enables us to derive several new bounds on the error rates of general sample-consistent learning algorithms, as well as refined bounds on the label complexity of the CAL active learning algorithm. Additionally, we establish a simple necessary and sufficient condition for the existence of a distribution-free bound on the error rates of all sample-consistent learning rules, converging at a rate inversely proportional to the sample size. We also study learning in the presence of classification noise, deriving a new excess error rate guarantee for general VC classes under Tsybakov's noise condition, and establishing a simple and general necessary and sufficient condition for the minimax excess risk under bounded noise to converge at a rate inversely proportional to the sample size.
[ { "created": "Tue, 22 Dec 2015 16:17:43 GMT", "version": "v1" }, { "created": "Sat, 10 Sep 2016 15:11:33 GMT", "version": "v2" } ]
2016-09-13T00:00:00
[ [ "Hanneke", "Steve", "" ] ]
0no_new_dataset
1709.08525
Uri Erez
Uri Erez
Comments on Downlink Non-Orthogonal Multiple Access: Relative Gain Subject to Near Sum-Rate Optimality
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Non-orthogonal access techniques have recently gained renewed interest in the context of next generation wireless networks. As the relative gain, with respect to traditionally employed orthogonal-access techniques depends on many factors, it is of interest to obtain insights by considering the simplest scenario, the two-user downlink (broadcast) channel where all nodes are equipped with a single antenna. Further, we focus on rate pairs that are in the vicinity of sum-rate optimalilty with respect to the capacity region of the broadcast channel. A simple and explicit characterization of the relative gain of non-orthogonal transmission with respect to orthogonal transmission is obtained under these conditions as an immediate consequence of the capacity regions of the two.
[ { "created": "Mon, 25 Sep 2017 14:44:34 GMT", "version": "v1" } ]
2017-09-26T00:00:00
[ [ "Erez", "Uri", "" ] ]
0no_new_dataset
1511.02465
Lianwen Jin
Jie Xu, Lianwen Jin, Lingyu Liang, Ziyong Feng, Duorui Xie
A new humanlike facial attractiveness predictor with cascaded fine-tuning deep learning model
5 pages, 3 figures, 5 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a deep leaning method to address the challenging facial attractiveness prediction problem. The method constructs a convolutional neural network of facial beauty prediction using a new deep cascaded fine-turning scheme with various face inputting channels, such as the original RGB face image, the detail layer image, and the lighting layer image. With a carefully designed CNN model of deep structure, large input size and small convolutional kernels, we have achieved a high prediction correlation of 0.88. This result convinces us that the problem of facial attractiveness prediction can be solved by deep learning approach, and it also shows the important roles of the facial smoothness, lightness, and color information that were involved in facial beauty perception, which is consistent with the result of recent psychology studies. Furthermore, we analyze the high-level features learnt by CNN through visualization of its hidden layers, and some interesting phenomena were observed. It is found that the contours and appearance of facial features, especially eyes and moth, are the most significant facial attributes for facial attractiveness prediction, which is also consistent with the visual perception intuition of human.
[ { "created": "Sun, 8 Nov 2015 09:59:04 GMT", "version": "v1" } ]
2015-11-10T00:00:00
[ [ "Xu", "Jie", "" ], [ "Jin", "Lianwen", "" ], [ "Liang", "Lingyu", "" ], [ "Feng", "Ziyong", "" ], [ "Xie", "Duorui", "" ] ]
1new_dataset
1808.06114
Taisir Elgorashi Dr
Opeyemi O. Ajibola, Taisir E. H. El-Gorashi, and Jaafar M. H. Elmirghani
On Energy Efficiency of Networks for Composable Datacentre Infrastructures
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper evaluates the optimal scale of datacentre (DC) resource disaggregation for composable DC infrastructures and investigates the impact of present day silicon photonics technologies on the energy efficiency of different composable DC infrastructures. We formulated a mixed integer linear programming (MILP) model to this end. Our results show that present day silicon photonics technologies enable better network energy efficiency for rack-scale composable DCs compared to pod-scale composable DCs despite reported similarities in CPU and memory resource power consumption.
[ { "created": "Sat, 18 Aug 2018 19:00:01 GMT", "version": "v1" } ]
2018-08-21T00:00:00
[ [ "Ajibola", "Opeyemi O.", "" ], [ "El-Gorashi", "Taisir E. H.", "" ], [ "Elmirghani", "Jaafar M. H.", "" ] ]
0no_new_dataset
1801.00254
Youngsam Kim
Youngsam Kim, Hyopil Shin
A New Approach for Measuring Sentiment Orientation based on Multi-Dimensional Vector Space
8 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study implements a vector space model approach to measure the sentiment orientations of words. Two representative vectors for positive/negative polarity are constructed using high-dimensional vec-tor space in both an unsupervised and a semi-supervised manner. A sentiment ori-entation value per word is determined by taking the difference between the cosine distances against the two reference vec-tors. These two conditions (unsupervised and semi-supervised) are compared against an existing unsupervised method (Turney, 2002). As a result of our experi-ment, we demonstrate that this novel ap-proach significantly outperforms the pre-vious unsupervised approach and is more practical and data efficient as well.
[ { "created": "Sun, 31 Dec 2017 08:44:51 GMT", "version": "v1" } ]
2018-01-03T00:00:00
[ [ "Kim", "Youngsam", "" ], [ "Shin", "Hyopil", "" ] ]
0no_new_dataset
1812.08769
Maria De-Arteaga
Nathaniel Swinger, Maria De-Arteaga, Neil Thomas Heffernan IV, Mark DM Leiserson, Adam Tauman Kalai
What are the biases in my word embedding?
At AIES 2019: the AAAI/ACM Conference on Artificial Intelligence, Ethics, and Society
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an algorithm for enumerating biases in word embeddings. The algorithm exposes a large number of offensive associations related to sensitive features such as race and gender on publicly available embeddings, including a supposedly "debiased" embedding. These biases are concerning in light of the widespread use of word embeddings. The associations are identified by geometric patterns in word embeddings that run parallel between people's names and common lower-case tokens. The algorithm is highly unsupervised: it does not even require the sensitive features to be pre-specified. This is desirable because: (a) many forms of discrimination--such as racial discrimination--are linked to social constructs that may vary depending on the context, rather than to categories with fixed definitions; and (b) it makes it easier to identify biases against intersectional groups, which depend on combinations of sensitive features. The inputs to our algorithm are a list of target tokens, e.g. names, and a word embedding. It outputs a number of Word Embedding Association Tests (WEATs) that capture various biases present in the data. We illustrate the utility of our approach on publicly available word embeddings and lists of names, and evaluate its output using crowdsourcing. We also show how removing names may not remove potential proxy bias.
[ { "created": "Thu, 20 Dec 2018 18:53:05 GMT", "version": "v1" }, { "created": "Sat, 22 Dec 2018 07:58:38 GMT", "version": "v2" }, { "created": "Fri, 17 May 2019 18:55:53 GMT", "version": "v3" }, { "created": "Wed, 19 Jun 2019 19:52:15 GMT", "version": "v4" } ]
2019-06-21T00:00:00
[ [ "Swinger", "Nathaniel", "" ], [ "De-Arteaga", "Maria", "" ], [ "Heffernan", "Neil Thomas", "IV" ], [ "Leiserson", "Mark DM", "" ], [ "Kalai", "Adam Tauman", "" ] ]
0no_new_dataset
1012.0955
Soheil Feizi
Soheil Feizi, Muriel Medard and Michelle Effros
Compressive Sensing Over Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we demonstrate some applications of compressive sensing over networks. We make a connection between compressive sensing and traditional information theoretic techniques in source coding and channel coding. Our results provide an explicit trade-off between the rate and the decoding complexity. The key difference of compressive sensing and traditional information theoretic approaches is at their decoding side. Although optimal decoders to recover the original signal, compressed by source coding have high complexity, the compressive sensing decoder is a linear or convex optimization. First, we investigate applications of compressive sensing on distributed compression of correlated sources. Here, by using compressive sensing, we propose a compression scheme for a family of correlated sources with a modularized decoder, providing a trade-off between the compression rate and the decoding complexity. We call this scheme Sparse Distributed Compression. We use this compression scheme for a general multicast network with correlated sources. Here, we first decode some of the sources by a network decoding technique and then, we use a compressive sensing decoder to obtain the whole sources. Then, we investigate applications of compressive sensing on channel coding. We propose a coding scheme that combines compressive sensing and random channel coding for a high-SNR point-to-point Gaussian channel. We call this scheme Sparse Channel Coding. We propose a modularized decoder providing a trade-off between the capacity loss and the decoding complexity. At the receiver side, first, we use a compressive sensing decoder on a noisy signal to obtain a noisy estimate of the original signal and then, we apply a traditional channel coding decoder to find the original signal.
[ { "created": "Sat, 4 Dec 2010 22:54:18 GMT", "version": "v1" } ]
2010-12-07T00:00:00
[ [ "Feizi", "Soheil", "" ], [ "Medard", "Muriel", "" ], [ "Effros", "Michelle", "" ] ]
0no_new_dataset
1506.06558
Tang Liu
Tang Liu, Daniela Tuninetti, Sae-Young Chung
On the DoF region of the two-user Interference Channel with an Instantaneous Relay
Presented in ISIT 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the Degrees of Freedom (DoF) of the two-user multi-antenna Gaussian interference channel with an {\em instantaneous relay}, or relay without delay, where the relay transmitted signal in channel use $t$ can depend on all received signals up to and including that at channel use $t$. It is assumed that the two transmitters and the two receivers have $M$ antennas, while the relay receives through $N$ antennas and transmits through $L$ antennas. An achievable DoF region is derived, for all possible values of $(M,N,L)$, based on a memoryless linear transmission strategy at the relay that aims to {\it neutralize} as much interference as possible at the receivers. The proposed scheme is shown to attain the largest sum DoF among all memoryless linear transmission strategies at the relay and to actually be optimal for certain values of $(M,N,L)$.
[ { "created": "Mon, 22 Jun 2015 11:39:47 GMT", "version": "v1" } ]
2015-06-23T00:00:00
[ [ "Liu", "Tang", "" ], [ "Tuninetti", "Daniela", "" ], [ "Chung", "Sae-Young", "" ] ]
0no_new_dataset
1405.5461
Justin Kopinsky
Dan Alistarh, Justin Kopinsky, Alexander Matveev, Nir Shavit
The LevelArray: A Fast, Practical Long-Lived Renaming Algorithm
ICDCS 2014
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The long-lived renaming problem appears in shared-memory systems where a set of threads need to register and deregister frequently from the computation, while concurrent operations scan the set of currently registered threads. Instances of this problem show up in concurrent implementations of transactional memory, flat combining, thread barriers, and memory reclamation schemes for lock-free data structures. In this paper, we analyze a randomized solution for long-lived renaming. The algorithmic technique we consider, called the LevelArray, has previously been used for hashing and one-shot (single-use) renaming. Our main contribu- tion is to prove that, in long-lived executions, where processes may register and deregister polynomially many times, the technique guarantees constant steps on average and O(log log n) steps with high probability for registering, unit cost for deregistering, and O(n) steps for collect queries, where n is an upper bound on the number of processes that may be active at any point in time. We also show that the algorithm has the surprising property that it is self-healing: under reasonable assumptions on the schedule, operations running while the data structure is in a degraded state implicitly help the data structure re-balance itself. This subtle mechanism obviates the need for expensive periodic rebuilding procedures. Our benchmarks validate this approach, showing that, for typical use parameters, the average number of steps a process takes to register is less than two and the worst-case number of steps is bounded by six, even in executions with billions of operations. We contrast this with other randomized implementations, whose worst-case behavior we show to be unreliable, and with deterministic implementations, whose cost is linear in n.
[ { "created": "Wed, 21 May 2014 15:57:58 GMT", "version": "v1" } ]
2014-05-22T00:00:00
[ [ "Alistarh", "Dan", "" ], [ "Kopinsky", "Justin", "" ], [ "Matveev", "Alexander", "" ], [ "Shavit", "Nir", "" ] ]
0no_new_dataset
cs/0312046
Toni Urp\'i
Ernest Teniente and Toni Urpi
On the Abductive or Deductive Nature of Database Schema Validation and Update Processing Problems
null
Theory and Practice of Logic Programming 3(3):287-327, may 2003
null
null
cs.DB cs.LO
null
We show that database schema validation and update processing problems such as view updating, materialized view maintenance, integrity constraint checking, integrity constraint maintenance or condition monitoring can be classified as problems of either abductive or deductive nature, according to the reasoning paradigm that inherently suites them. This is done by performing abductive and deductive reasoning on the event rules [Oli91], a set of rules that define the difference between consecutive database states In this way, we show that it is possible to provide methods able to deal with all these problems as a whole. We also show how some existing general deductive and abductive procedures may be used to reason on the event rules. In this way, we show that these procedures can deal with all database schema validation and update processing problems considered in this paper.
[ { "created": "Fri, 19 Dec 2003 15:25:53 GMT", "version": "v1" } ]
2007-05-23T00:00:00
[ [ "Teniente", "Ernest", "" ], [ "Urpi", "Toni", "" ] ]
0no_new_dataset
1805.04807
Chang Liu
Qi-Zhi Cai, Min Du, Chang Liu, Dawn Song
Curriculum Adversarial Training
IJCAI 2018
null
null
null
cs.LG cs.CR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, deep learning has been applied to many security-sensitive applications, such as facial authentication. The existence of adversarial examples hinders such applications. The state-of-the-art result on defense shows that adversarial training can be applied to train a robust model on MNIST against adversarial examples; but it fails to achieve a high empirical worst-case accuracy on a more complex task, such as CIFAR-10 and SVHN. In our work, we propose curriculum adversarial training (CAT) to resolve this issue. The basic idea is to develop a curriculum of adversarial examples generated by attacks with a wide range of strengths. With two techniques to mitigate the forgetting and the generalization issues, we demonstrate that CAT can improve the prior art's empirical worst-case accuracy by a large margin of 25% on CIFAR-10 and 35% on SVHN. At the same, the model's performance on non-adversarial inputs is comparable to the state-of-the-art models.
[ { "created": "Sun, 13 May 2018 02:10:56 GMT", "version": "v1" } ]
2018-05-15T00:00:00
[ [ "Cai", "Qi-Zhi", "" ], [ "Du", "Min", "" ], [ "Liu", "Chang", "" ], [ "Song", "Dawn", "" ] ]
0no_new_dataset
2202.13662
Jos\'e Mennesson
Sami Barchid, Jos\'e Mennesson and Chaabane Dj\'eraba
Bina-Rep Event Frames: a Simple and Effective Representation for Event-based cameras
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents "Bina-Rep", a simple representation method that converts asynchronous streams of events from event cameras to a sequence of sparse and expressive event frames. By representing multiple binary event images as a single frame of $N$-bit numbers, our method is able to obtain sparser and more expressive event frames thanks to the retained information about event orders in the original stream. Coupled with our proposed model based on a convolutional neural network, the reported results achieve state-of-the-art performance and repeatedly outperforms other common event representation methods. Our approach also shows competitive robustness against common image corruptions, compared to other representation techniques.
[ { "created": "Mon, 28 Feb 2022 10:23:09 GMT", "version": "v1" } ]
2022-03-01T00:00:00
[ [ "Barchid", "Sami", "" ], [ "Mennesson", "José", "" ], [ "Djéraba", "Chaabane", "" ] ]
0no_new_dataset
2207.06261
Filip Ilic
Filip Ilic, Thomas Pock, Richard P. Wildes
Is Appearance Free Action Recognition Possible?
null
null
null
null
cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
Intuition might suggest that motion and dynamic information are key to video-based action recognition. In contrast, there is evidence that state-of-the-art deep-learning video understanding architectures are biased toward static information available in single frames. Presently, a methodology and corresponding dataset to isolate the effects of dynamic information in video are missing. Their absence makes it difficult to understand how well contemporary architectures capitalize on dynamic vs. static information. We respond with a novel Appearance Free Dataset (AFD) for action recognition. AFD is devoid of static information relevant to action recognition in a single frame. Modeling of the dynamics is necessary for solving the task, as the action is only apparent through consideration of the temporal dimension. We evaluated 11 contemporary action recognition architectures on AFD as well as its related RGB video. Our results show a notable decrease in performance for all architectures on AFD compared to RGB. We also conducted a complimentary study with humans that shows their recognition accuracy on AFD and RGB is very similar and much better than the evaluated architectures on AFD. Our results motivate a novel architecture that revives explicit recovery of optical flow, within a contemporary design for best performance on AFD and RGB.
[ { "created": "Wed, 13 Jul 2022 15:04:53 GMT", "version": "v1" } ]
2022-07-14T00:00:00
[ [ "Ilic", "Filip", "" ], [ "Pock", "Thomas", "" ], [ "Wildes", "Richard P.", "" ] ]
1new_dataset
1602.05063
Robin Ince
Robin A. A. Ince
Measuring multivariate redundant information with pointwise common change in surprisal
v3: revisions based on review process at Entropy (expand game-theory and max-ent motivation), v2: add game-theoretic operational definition for maximum entropy constraints; remove thresholding and normalisation of values on lattice
Entropy 2017, 19(7), 318
10.3390/e19070318
null
cs.IT math.IT math.ST q-bio.NC q-bio.QM stat.ME stat.TH
http://creativecommons.org/licenses/by-nc-sa/4.0/
The problem of how to properly quantify redundant information is an open question that has been the subject of much recent research. Redundant information refers to information about a target variable S that is common to two or more predictor variables Xi. It can be thought of as quantifying overlapping information content or similarities in the representation of S between the Xi. We present a new measure of redundancy which measures the common change in surprisal shared between variables at the local or pointwise level. We provide a game-theoretic operational definition of unique information, and use this to derive constraints which are used to obtain a maximum entropy distribution. Redundancy is then calculated from this maximum entropy distribution by counting only those local co-information terms which admit an unambiguous interpretation as redundant information. We show how this redundancy measure can be used within the framework of the Partial Information Decomposition (PID) to give an intuitive decomposition of the multivariate mutual information into redundant, unique and synergistic contributions. We compare our new measure to existing approaches over a range of example systems, including continuous Gaussian variables. Matlab code for the measure is provided, including all considered examples.
[ { "created": "Tue, 16 Feb 2016 15:57:36 GMT", "version": "v1" }, { "created": "Tue, 2 May 2017 10:32:28 GMT", "version": "v2" }, { "created": "Thu, 13 Jul 2017 16:54:30 GMT", "version": "v3" } ]
2017-07-14T00:00:00
[ [ "Ince", "Robin A. A.", "" ] ]
0no_new_dataset
2402.18393
Mingfei Cheng
Mingfei Cheng, Yuan Zhou, Xiaofei Xie, Junjie Wang, Guozhu Meng, Kairui Yang
Evaluating Decision Optimality of Autonomous Driving via Metamorphic Testing
null
null
null
null
cs.AI cs.NE cs.RO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Autonomous Driving System (ADS) testing is crucial in ADS development, with the current primary focus being on safety. However, the evaluation of non-safety-critical performance, particularly the ADS's ability to make optimal decisions and produce optimal paths for autonomous vehicles (AVs), is equally vital to ensure the intelligence and reduce risks of AVs. Currently, there is little work dedicated to assessing ADSs' optimal decision-making performance due to the lack of corresponding oracles and the difficulty in generating scenarios with non-optimal decisions. In this paper, we focus on evaluating the decision-making quality of an ADS and propose the first method for detecting non-optimal decision scenarios (NoDSs), where the ADS does not compute optimal paths for AVs. Firstly, to deal with the oracle problem, we propose a novel metamorphic relation (MR) aimed at exposing violations of optimal decisions. The MR identifies the property that the ADS should retain optimal decisions when the optimal path remains unaffected by non-invasive changes. Subsequently, we develop a new framework, Decictor, designed to generate NoDSs efficiently. Decictor comprises three main components: Non-invasive Mutation, MR Check, and Feedback. The Non-invasive Mutation ensures that the original optimal path in the mutated scenarios is not affected, while the MR Check is responsible for determining whether non-optimal decisions are made. To enhance the effectiveness of identifying NoDSs, we design a feedback metric that combines both spatial and temporal aspects of the AV's movement. We evaluate Decictor on Baidu Apollo, an open-source and production-grade ADS. The experimental results validate the effectiveness of Decictor in detecting non-optimal decisions of ADSs. Our work provides valuable and original insights into evaluating the non-safety-critical performance of ADSs.
[ { "created": "Wed, 28 Feb 2024 15:13:33 GMT", "version": "v1" } ]
2024-02-29T00:00:00
[ [ "Cheng", "Mingfei", "" ], [ "Zhou", "Yuan", "" ], [ "Xie", "Xiaofei", "" ], [ "Wang", "Junjie", "" ], [ "Meng", "Guozhu", "" ], [ "Yang", "Kairui", "" ] ]
0no_new_dataset
2303.15379
Heather Newman
Benjamin Moseley, Heather Newman, Kirk Pruhs
Online $k$-Median with Consistent Clusters
28 pages, 7 figures
null
null
null
cs.DS
http://creativecommons.org/licenses/by/4.0/
We consider the online $k$-median clustering problem in which $n$ points arrive online and must be irrevocably assigned to a cluster on arrival. As there are lower bound instances that show that an online algorithm cannot achieve a competitive ratio that is a function of $n$ and $k$, we consider a beyond worst-case analysis model in which the algorithm is provided a priori with a predicted budget $B$ that upper bounds the optimal objective value. We give an algorithm that achieves a competitive ratio that is exponential in the the number $k$ of clusters, and show that the competitive ratio of every algorithm must be linear in $k$. To the best of our knowledge this is the first investigation in the literature that considers cluster consistency using competitive analysis.
[ { "created": "Mon, 27 Mar 2023 16:53:04 GMT", "version": "v1" } ]
2023-03-28T00:00:00
[ [ "Moseley", "Benjamin", "" ], [ "Newman", "Heather", "" ], [ "Pruhs", "Kirk", "" ] ]
0no_new_dataset
2210.01657
Samuel Baltz
Samuel Baltz
The probability of casting a pivotal vote in an Instant Runoff Voting election
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I derive the probability that a vote cast in an Instant Runoff Voting election will change the election winner. I phrase that probability in terms of the candidates' expected vote totals, and then I estimate its magnitude for different distributions of voter preferences. The result is very similar to the probability of casting a pivotal vote in a Single-Member District Plurality election, which suggests that Instant Runoff Voting does not actually increase or decrease voters' incentives to vote strategically. The derivation uncovers a counter-intuitive phenomenon that I call "indirect pivotality", in which a voter can cause one candidate to win by ranking some other candidate on their ballot.
[ { "created": "Tue, 4 Oct 2022 15:00:43 GMT", "version": "v1" }, { "created": "Mon, 31 Jul 2023 13:46:33 GMT", "version": "v2" } ]
2023-08-01T00:00:00
[ [ "Baltz", "Samuel", "" ] ]
0no_new_dataset
2106.12138
Tushar Athawale
Tushar M. Athawale, Alireza Entezari, Bei Wang, and Chris R. Johnson
Statistical Rendering for Visualization of Red Sea Eddy Simulation Data
null
null
null
null
cs.GR physics.ao-ph
http://creativecommons.org/licenses/by/4.0/
Analyzing the effects of ocean eddies is important in oceanology for gaining insights into transport of energy and biogeochemical particles. We present an application of statistical visualization algorithms for the analysis of the Red Sea eddy simulation ensemble. Specifically, we demonstrate the applications of statistical volume rendering and statistical Morse complex summary maps to a velocity magnitude field for studying the eddy positions in the flow dataset. In statistical volume rendering, we model per-voxel data uncertainty using noise models, such as parametric and nonparametric, and study the propagation of uncertainty into the volume rendering pipeline. In the statistical Morse complex summary maps, we derive histograms charactering uncertainty of gradient flow destinations to understand Morse complex topological variations across the ensemble. We demonstrate the utility of our statistical visualizations for an effective analysis of the potential eddy positions and their spatial uncertainty.
[ { "created": "Wed, 23 Jun 2021 03:09:10 GMT", "version": "v1" } ]
2021-06-24T00:00:00
[ [ "Athawale", "Tushar M.", "" ], [ "Entezari", "Alireza", "" ], [ "Wang", "Bei", "" ], [ "Johnson", "Chris R.", "" ] ]
0no_new_dataset
1510.04422
Hung Nghiep Tran
Hung Nghiep Tran, Tin Huynh, Kiem Hoang
A Potential Approach to Overcome Data Limitation in Scientific Publication Recommendation
null
International Conference on Knowledge and Systems Engineering (KSE 2015)
10.1109/KSE.2015.76
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data are essential for the experiments of relevant scientific publication recommendation methods but it is difficult to build ground truth data. A naturally promising solution is using publications that are referenced by researchers to build their ground truth data. Unfortunately, this approach has not been explored in the literature, so its applicability is still a gap in our knowledge. In this research, we systematically study this approach by theoretical and empirical analyses. In general, the results show that this approach is reasonable and has many advantages. However, the empirical analysis shows both positive and negative results. We conclude that, in some situations, this is a useful alternative approach toward overcoming data limitation. Based on this approach, we build and publish a dataset in computer science domain to help advancing other researches.
[ { "created": "Thu, 15 Oct 2015 07:13:50 GMT", "version": "v1" } ]
2020-02-24T00:00:00
[ [ "Tran", "Hung Nghiep", "" ], [ "Huynh", "Tin", "" ], [ "Hoang", "Kiem", "" ] ]
1new_dataset
2104.03347
Frederick Vincent
Frederick M. Vincent and Dashiell E.A. Fryer
Top Score in Axelrod Tournament
null
null
null
null
cs.GT
http://creativecommons.org/publicdomain/zero/1.0/
The focus of the project will be an examination of obtaining the highest score in the Axelrod Tournament. The initial design of the highest score in the Axelrod Tournament consisted of looking at the Cooperation rates of the top strategies currently in the Axelrod Library. After creating an initial Finite State Machine strategy that utilized the Cooperation Rates of the top players; our ten-state FSM finished within the top 35 players out of 220 in the short run time strategies in the Axelrod Library. After a quick evolutionary algorithm, 50 generations, our original ten-state FSM was changed into an eight-state FSM, which finished within the top 5 of the short run time strategies in the Axelrod Library. This eight-state FSM was then evolved again using a full evolutionary algortihm process, which lasted 500 generations, where the eight-state FSM evolved into a another eight-state FSM which finishes first in the Axelrod Library among the short run time strategies and the full Axelrod Tournament. From that final FSM, two of the eight states are inaccessible, so the final FSM strategy is a six-state FSM that finishes first in the Full Axelrod Tournament, against the short run time strategies as well as the long run time strategies.
[ { "created": "Wed, 7 Apr 2021 18:42:18 GMT", "version": "v1" } ]
2021-04-09T00:00:00
[ [ "Vincent", "Frederick M.", "" ], [ "Fryer", "Dashiell E. A.", "" ] ]
0no_new_dataset
1810.04606
Sara Hosseinzadeh Kassani
Sara Hosseinzadeh Kassani, Peyman Hosseinzadeh Kassani
Building an Ontology for the Domain of Plant Science using Prot\'eg\'e
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the rapid development of technology, large amounts of heterogeneous data generated every day. Biological data is also growing in terms of the quantity and quality of data considerably. Despite the attempts for building a uniform platform to handle data management in Plant Science, researchers are facing the challenge of not only accessing and integrating data stored in heterogeneous data sources but also representing the implicit and explicit domain knowledge based on the available plant genomic and phenomic data. Ontologies provide a framework for describing the structures and vocabularies to support the semantics of information and facilitate automated reasoning and knowledge discovery. In this paper, we focus on building an ontology for Arabidopsis Thaliana in Plant Science domain. The aim of this study is to provide a conceptual model of Arabidopsis Thaliana as a reference plant for botany and other plant sciences, including concepts and their relationships.
[ { "created": "Wed, 10 Oct 2018 16:02:55 GMT", "version": "v1" }, { "created": "Thu, 11 Oct 2018 04:08:03 GMT", "version": "v2" } ]
2018-10-12T00:00:00
[ [ "Kassani", "Sara Hosseinzadeh", "" ], [ "Kassani", "Peyman Hosseinzadeh", "" ] ]
0no_new_dataset
2104.06719
Fredrik Carlsson
Fredrik Carlsson Magnus Sahlgren
Sentence Embeddings by Ensemble Distillation
null
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by/4.0/
This paper contributes a new State Of The Art (SOTA) for Semantic Textual Similarity (STS). We compare and combine a number of recently proposed sentence embedding methods for STS, and propose a novel and simple ensemble knowledge distillation scheme that improves on previous approaches. Our experiments demonstrate that a model trained to learn the average embedding space from multiple ensemble students outperforms all the other individual models with high robustness. Utilizing our distillation method in combination with previous methods, we significantly improve on the SOTA unsupervised STS, and by proper hyperparameter tuning of previous methods we improve the supervised SOTA scores.
[ { "created": "Wed, 14 Apr 2021 09:23:27 GMT", "version": "v1" } ]
2021-04-15T00:00:00
[ [ "Sahlgren", "Fredrik Carlsson Magnus", "" ] ]
0no_new_dataset
2402.19434
Ahmed Alkhateeb
Shuaifeng Jiang and Ahmed Alkhateeb
Digital Twin Aided Massive MIMO: CSI Compression and Feedback
Accepted in ICC 2024. Dataset and code files will be available soon on the DeepMIMO website https://www.deepmimo.net/
null
null
null
cs.IT eess.SP math.IT
http://creativecommons.org/licenses/by-nc-sa/4.0/
Deep learning (DL) approaches have demonstrated high performance in compressing and reconstructing the channel state information (CSI) and reducing the CSI feedback overhead in massive MIMO systems. One key challenge, however, with the DL approaches is the demand for extensive training data. Collecting this real-world CSI data incurs significant overhead that hinders the DL approaches from scaling to a large number of communication sites. To address this challenge, we propose a novel direction that utilizes site-specific \textit{digital twins} to aid the training of DL models. The proposed digital twin approach generates site-specific synthetic CSI data from the EM 3D model and ray tracing, which can then be used to train the DL model without real-world data collection. To further improve the performance, we adopt online data selection to refine the DL model training with a small real-world CSI dataset. Results show that a DL model trained solely on the digital twin data can achieve high performance when tested in a real-world deployment. Further, leveraging domain adaptation techniques, the proposed approach requires orders of magnitude less real-world data to approach the same performance of the model trained completely on a real-world CSI dataset.
[ { "created": "Thu, 29 Feb 2024 18:35:12 GMT", "version": "v1" }, { "created": "Fri, 1 Mar 2024 03:22:16 GMT", "version": "v2" } ]
2024-03-04T00:00:00
[ [ "Jiang", "Shuaifeng", "" ], [ "Alkhateeb", "Ahmed", "" ] ]
0no_new_dataset
2005.09714
Stefan Hristozov
Manuel Huber, Stefan Hristozov, Simon Ott, Vasil Sarafov, Marcus Peinado
The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things
In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS 20)
null
10.1145/3320269.3384723
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We live in a time when billions of IoT devices are being deployed and increasingly relied upon. This makes ensuring their availability and recoverability in case of a compromise a paramount goal. The large and rapidly growing number of deployed IoT devices make manual recovery impractical, especially if the devices are dispersed over a large area. Thus, there is a need for a reliable and scalable remote recovery mechanism that works even after attackers have taken full control over devices, possibly misusing them or trying to render them useless. To tackle this problem, we present Lazarus, a system that enables the remote recovery of compromised IoT devices. With Lazarus, an IoT administrator can remotely control the code running on IoT devices unconditionally and within a guaranteed time bound. This makes recovery possible even in case of severe corruption of the devices' software stack. We impose only minimal hardware requirements, making Lazarus applicable even for low-end constrained off-the-shelf IoT devices. We isolate Lazarus's minimal recovery trusted computing base from untrusted software both in time and by using a trusted execution environment. The temporal isolation prevents secrets from being leaked through side-channels to untrusted software. Inside the trusted execution environment, we place minimal functionality that constrains untrusted software at runtime. We implement Lazarus on an ARM Cortex-M33-based microcontroller in a full setup with an IoT hub, device provisioning and secure update functionality. Our prototype can recover compromised embedded OSs and bare-metal applications and prevents attackers from bricking devices, for example, through flash wear out. We show this at the example of FreeRTOS, which requires no modifications but only a single additional task. Our evaluation shows negligible runtime performance impact and moderate memory requirements.
[ { "created": "Tue, 19 May 2020 19:21:29 GMT", "version": "v1" } ]
2020-05-21T00:00:00
[ [ "Huber", "Manuel", "" ], [ "Hristozov", "Stefan", "" ], [ "Ott", "Simon", "" ], [ "Sarafov", "Vasil", "" ], [ "Peinado", "Marcus", "" ] ]
0no_new_dataset
1908.08823
Daniel Lehmann Prof.
Daniel Lehmann
Revealed Preferences for Matching with Contracts
34 pages. Unpublished. In version 2 an incorrect claim about the assignment game has been deleted and reference to prior work by Chambers and Yenmez given. This work was developed independently
null
null
null
cs.GT econ.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many-to-many matching with contracts is studied in the framework of revealed preferences. All preferences are described by choice functions that satisfy natural conditions. Under a no-externality assumption individual preferences can be aggregated into a single choice function expressing a collective preference. In this framework, a two-sided matching problem may be described as an agreement problem between two parties: the two parties must find a stable agreement, i.e., a set of contracts from which no party will want to take away any contract and to which the two parties cannot agree to add any contract. On such stable agreements each party's preference relation is a partial order and the two parties have inverse preferences. An algorithm is presented that generalizes algorithms previously proposed in less general situations. This algorithm provides a stable agreement that is preferred to all stable agreements by one of the parties and therefore less preferred than all stable agreements by the other party. The number of steps of the algorithm is linear in the size of the set of contracts, i.e., polynomial in the size of the problem. The algorithm provides a proof that stable agreements form a lattice under the two inverse preference relations. Under additional assumptions on the role of money in preferences, agreement problems can describe general two-sided markets in which goods are exchanged for money. Stable agreements provide a solution concept, including prices, that is more general than competitive equilibria. They satisfy an almost one price law for identical items.
[ { "created": "Fri, 23 Aug 2019 13:46:43 GMT", "version": "v1" }, { "created": "Wed, 4 Mar 2020 16:22:37 GMT", "version": "v2" } ]
2020-03-05T00:00:00
[ [ "Lehmann", "Daniel", "" ] ]
0no_new_dataset
2405.13081
Eliza Kosoy
Eliza Kosoy, Soojin Jeong, Anoop Sinha, Alison Gopnik and Tanya Kraljic
Children's Mental Models of Generative Visual and Text Based AI Models
7 pages, 6 figures
null
null
null
cs.HC cs.AI
http://creativecommons.org/licenses/by/4.0/
In this work we investigate how children ages 5-12 perceive, understand, and use generative AI models such as a text-based LLMs ChatGPT and a visual-based model DALL-E. Generative AI is newly being used widely since chatGPT. Children are also building mental models of generative AI. Those haven't been studied before and it is also the case that the children's models are dynamic as they use the tools, even with just very short usage. Upon surveying and experimentally observing over 40 children ages 5-12, we found that children generally have a very positive outlook towards AI and are excited about the ways AI may benefit and aid them in their everyday lives. In a forced choice, children robustly associated AI with positive adjectives versus negative ones. We also categorize what children are querying AI models for and find that children search for more imaginative things that don't exist when using a visual-based AI and not when using a text-based one. Our follow-up study monitored children's responses and feelings towards AI before and after interacting with GenAI models. We even find that children find AI to be less scary after interacting with it. We hope that these findings will shine a light on children's mental models of AI and provide insight for how to design the best possible tools for children who will inevitably be using AI in their lifetimes. The motivation of this work is to bridge the gap between Human-Computer Interaction (HCI) and Psychology in an effort to study the effects of AI on society. We aim to identify the gaps in humans' mental models of what AI is and how it works. Previous work has investigated how both adults and children perceive various kinds of robots, computers, and other technological concepts. However, there is very little work investigating these concepts for generative AI models and not simply embodied robots or physical technology.
[ { "created": "Tue, 21 May 2024 06:18:00 GMT", "version": "v1" } ]
2024-05-24T00:00:00
[ [ "Kosoy", "Eliza", "" ], [ "Jeong", "Soojin", "" ], [ "Sinha", "Anoop", "" ], [ "Gopnik", "Alison", "" ], [ "Kraljic", "Tanya", "" ] ]
0no_new_dataset
2403.05280
Chenglong Wang
Chenglong Wang, Yinqiao Yi, Yida Wang, Chengxiu Zhang, Yun Liu, Kensaku Mori, Mei Yuan, Guang Yang
ContrastDiagnosis: Enhancing Interpretability in Lung Nodule Diagnosis Using Contrastive Learning
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
With the ongoing development of deep learning, an increasing number of AI models have surpassed the performance levels of human clinical practitioners. However, the prevalence of AI diagnostic products in actual clinical practice remains significantly lower than desired. One crucial reason for this gap is the so-called `black box' nature of AI models. Clinicians' distrust of black box models has directly hindered the clinical deployment of AI products. To address this challenge, we propose ContrastDiagnosis, a straightforward yet effective interpretable diagnosis framework. This framework is designed to introduce inherent transparency and provide extensive post-hoc explainability for deep learning model, making them more suitable for clinical medical diagnosis. ContrastDiagnosis incorporates a contrastive learning mechanism to provide a case-based reasoning diagnostic rationale, enhancing the model's transparency and also offers post-hoc interpretability by highlighting similar areas. High diagnostic accuracy was achieved with AUC of 0.977 while maintain a high transparency and explainability.
[ { "created": "Fri, 8 Mar 2024 13:00:52 GMT", "version": "v1" } ]
2024-03-11T00:00:00
[ [ "Wang", "Chenglong", "" ], [ "Yi", "Yinqiao", "" ], [ "Wang", "Yida", "" ], [ "Zhang", "Chengxiu", "" ], [ "Liu", "Yun", "" ], [ "Mori", "Kensaku", "" ], [ "Yuan", "Mei", "" ], [ "Yang", "Guang", "" ] ]
0no_new_dataset
2203.10670
Michael Soloveitchik
Michael Soloveitchik and Michael Werman
Fully Convolutional Fractional Scaling
null
null
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a fully convolutional fractional scaling component, FCFS. Fully convolutional networks can be applied to any size input and previously did not support non-integer scaling. Our architecture is simple with an efficient single layer implementation. Examples and code implementations of three common scaling methods are published.
[ { "created": "Sun, 20 Mar 2022 22:56:18 GMT", "version": "v1" } ]
2022-03-22T00:00:00
[ [ "Soloveitchik", "Michael", "" ], [ "Werman", "Michael", "" ] ]
0no_new_dataset
2102.06391
Laria Reynolds
Laria Reynolds and Kyle McDonell
Multiversal views on language models
10 pages, 7 figures
null
null
null
cs.HC cs.CL
http://creativecommons.org/licenses/by/4.0/
The virtuosity of language models like GPT-3 opens a new world of possibility for human-AI collaboration in writing. In this paper, we present a framework in which generative language models are conceptualized as multiverse generators. This framework also applies to human imagination and is core to how we read and write fiction. We call for exploration into this commonality through new forms of interfaces which allow humans to couple their imagination to AI to write, explore, and understand non-linear fiction. We discuss the early insights we have gained from actively pursuing this approach by developing and testing a novel multiversal GPT-3-assisted writing interface.
[ { "created": "Fri, 12 Feb 2021 08:28:28 GMT", "version": "v1" }, { "created": "Mon, 15 Feb 2021 05:25:35 GMT", "version": "v2" } ]
2021-02-16T00:00:00
[ [ "Reynolds", "Laria", "" ], [ "McDonell", "Kyle", "" ] ]
0no_new_dataset
2010.01453
Xiaohao Cai
Wai-Tsun Yeung, Xiaohao Cai, Zizhen Liang, Byung-Ho Kang
3D Orientation Field Transform
null
null
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The two-dimensional (2D) orientation field transform has been proved to be effective at enhancing 2D contours and curves in images by means of top-down processing. It, however, has no counterpart in three-dimensional (3D) images due to the extremely complicated orientation in 3D compared to 2D. Practically and theoretically, the demand and interest in 3D can only be increasing. In this work, we modularise the concept and generalise it to 3D curves. Different modular combinations are found to enhance curves to different extents and with different sensitivity to the packing of the 3D curves. In principle, the proposed 3D orientation field transform can naturally tackle any dimensions. As a special case, it is also ideal for 2D images, owning simpler methodology compared to the previous 2D orientation field transform. The proposed method is demonstrated with several transmission electron microscopy tomograms ranging from 2D curve enhancement to, the more important and interesting, 3D ones.
[ { "created": "Sun, 4 Oct 2020 00:29:46 GMT", "version": "v1" } ]
2020-10-06T00:00:00
[ [ "Yeung", "Wai-Tsun", "" ], [ "Cai", "Xiaohao", "" ], [ "Liang", "Zizhen", "" ], [ "Kang", "Byung-Ho", "" ] ]
0no_new_dataset
2111.14092
Susannah Kate Devitt
S.K. Devitt
Cognitive factors that affect the adoption of autonomous agriculture
20 pages, 4 figures, published in Farm Policy Journal
Farm Policy Journal. 15 (2):49-60 (2018)
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
Robotic and Autonomous Agricultural Technologies (RAAT) are increasingly available yet may fail to be adopted. This paper focusses specifically on cognitive factors that affect adoption including: inability to generate trust, loss of farming knowledge and reduced social cognition. It is recommended that agriculture develops its own framework for the performance and safety of RAAT drawing on human factors research in aerospace engineering including human inputs (individual variance in knowledge, skills, abilities, preferences, needs and traits), trust, situational awareness and cognitive load. The kinds of cognitive impacts depend on the RAATs level of autonomy, ie whether it has automatic, partial autonomy and autonomous functionality and stage of adoption, ie adoption, initial use or post-adoptive use. The more autonomous a system is, the less a human needs to know to operate it and the less the cognitive load, but it also means farmers have less situational awareness about on farm activities that in turn may affect strategic decision-making about their enterprise. Some cognitive factors may be hidden when RAAT is first adopted but play a greater role during prolonged or intense post-adoptive use. Systems with partial autonomy need intuitive user interfaces, engaging system information, and clear signaling to be trusted with low level tasks; and to compliment and augment high order decision-making on farm.
[ { "created": "Sun, 28 Nov 2021 10:15:15 GMT", "version": "v1" } ]
2021-11-30T00:00:00
[ [ "Devitt", "S. K.", "" ] ]
0no_new_dataset
2110.03921
Hwanjun Song
Hwanjun Song, Deqing Sun, Sanghyuk Chun, Varun Jampani, Dongyoon Han, Byeongho Heo, Wonjae Kim, Ming-Hsuan Yang
ViDT: An Efficient and Effective Fully Transformer-based Object Detector
This is a revised version on Nov. 29
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transformers are transforming the landscape of computer vision, especially for recognition tasks. Detection transformers are the first fully end-to-end learning systems for object detection, while vision transformers are the first fully transformer-based architecture for image classification. In this paper, we integrate Vision and Detection Transformers (ViDT) to build an effective and efficient object detector. ViDT introduces a reconfigured attention module to extend the recent Swin Transformer to be a standalone object detector, followed by a computationally efficient transformer decoder that exploits multi-scale features and auxiliary techniques essential to boost the detection performance without much increase in computational load. Extensive evaluation results on the Microsoft COCO benchmark dataset demonstrate that ViDT obtains the best AP and latency trade-off among existing fully transformer-based object detectors, and achieves 49.2AP owing to its high scalability for large models. We will release the code and trained models at https://github.com/naver-ai/vidt
[ { "created": "Fri, 8 Oct 2021 06:32:05 GMT", "version": "v1" }, { "created": "Mon, 29 Nov 2021 11:07:13 GMT", "version": "v2" } ]
2021-11-30T00:00:00
[ [ "Song", "Hwanjun", "" ], [ "Sun", "Deqing", "" ], [ "Chun", "Sanghyuk", "" ], [ "Jampani", "Varun", "" ], [ "Han", "Dongyoon", "" ], [ "Heo", "Byeongho", "" ], [ "Kim", "Wonjae", "" ], [ "Yang", "Ming-Hsuan", "" ] ]
0no_new_dataset
2310.11005
Seung-Hyun Nam
Seung-Hyun Nam, Vincent Y. F. Tan, Si-Hyeon Lee
Optimal Private Discrete Distribution Estimation with One-bit Communication
13 pages, 5 figures, and 1 page of supplementary material
null
null
null
cs.IT cs.CR math.IT
http://creativecommons.org/licenses/by/4.0/
We consider a private discrete distribution estimation problem with one-bit communication constraint. The privacy constraints are imposed with respect to the local differential privacy and the maximal leakage. The estimation error is quantified by the worst-case mean squared error. We completely characterize the first-order asymptotics of this privacy-utility trade-off under the one-bit communication constraint for both types of privacy constraints by using ideas from local asymptotic normality and the resolution of a block design mechanism. These results demonstrate the optimal dependence of the privacy-utility trade-off under the one-bit communication constraint in terms of the parameters of the privacy constraint and the size of the alphabet of the discrete distribution.
[ { "created": "Tue, 17 Oct 2023 05:21:19 GMT", "version": "v1" } ]
2023-10-18T00:00:00
[ [ "Nam", "Seung-Hyun", "" ], [ "Tan", "Vincent Y. F.", "" ], [ "Lee", "Si-Hyeon", "" ] ]
0no_new_dataset
2001.00336
Thatchaphol Saranurak
Sayan Bhattacharya, Danupon Nanongkai, Thatchaphol Saranurak
Coarse-Grained Complexity for Dynamic Algorithms
Published at SODA 2020. The abstract is truncated
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To date, the only way to argue polynomial lower bounds for dynamic algorithms is via fine-grained complexity arguments. These arguments rely on strong assumptions about specific problems such as the Strong Exponential Time Hypothesis (SETH) and the Online Matrix-Vector Multiplication Conjecture (OMv). While they have led to many exciting discoveries, dynamic algorithms still miss out some benefits and lessons from the traditional ``coarse-grained'' approach that relates together classes of problems such as P and NP. In this paper we initiate the study of coarse-grained complexity theory for dynamic algorithms. Below are among questions that this theory can answer. What if dynamic Orthogonal Vector (OV) is easy in the cell-probe model? A research program for proving polynomial unconditional lower bounds for dynamic OV in the cell-probe model is motivated by the fact that many conditional lower bounds can be shown via reductions from the dynamic OV problem. Since the cell-probe model is more powerful than word RAM and has historically allowed smaller upper bounds, it might turn out that dynamic OV is easy in the cell-probe model, making this research direction infeasible. Our theory implies that if this is the case, there will be very interesting algorithmic consequences: If dynamic OV can be maintained in polylogarithmic worst-case update time in the cell-probe model, then so are several important dynamic problems such as $k$-edge connectivity, $(1+\epsilon)$-approximate mincut, $(1+\epsilon)$-approximate matching, planar nearest neighbors, Chan's subset union and 3-vs-4 diameter. The same conclusion can be made when we replace dynamic OV by, e.g., subgraph connectivity, single source reachability, Chan's subset union, and 3-vs-4 diameter. Lower bounds for $k$-edge connectivity via dynamic OV? (see the full abstract in the pdf file).
[ { "created": "Thu, 2 Jan 2020 06:14:54 GMT", "version": "v1" }, { "created": "Wed, 26 Jul 2023 13:55:49 GMT", "version": "v2" } ]
2023-07-27T00:00:00
[ [ "Bhattacharya", "Sayan", "" ], [ "Nanongkai", "Danupon", "" ], [ "Saranurak", "Thatchaphol", "" ] ]
0no_new_dataset
cs/0302037
Ilia Toli
Ilia Toli
Hidden Polynomial(s) Cryptosystems
17 pages
null
null
null
cs.CR cs.SC
null
We propose variations of the class of hidden monomial cryptosystems in order to make it resistant to all known attacks. We use identities built upon a single bivariate polynomial equation with coefficients in a finite field. Indeed, it can be replaced by a ``small'' ideal, as well. Throughout, we set up probabilistic encryption protocols, too. The same ideas extend to digital signature algorithms, as well. Our schemes work as well on differential fields of positive characteristic, and elsewhere.
[ { "created": "Wed, 26 Feb 2003 18:30:49 GMT", "version": "v1" }, { "created": "Thu, 27 Feb 2003 20:21:31 GMT", "version": "v2" }, { "created": "Tue, 11 Mar 2003 21:37:59 GMT", "version": "v3" }, { "created": "Sat, 29 Mar 2003 14:00:51 GMT", "version": "v4" } ]
2007-05-23T00:00:00
[ [ "Toli", "Ilia", "" ] ]
0no_new_dataset
1308.1049
Ardeshir Kianercy
Ardeshir Kianercy and Aram Galstyan
Coevolutionary networks of reinforcement-learning agents
null
Phys. Rev. E 88, 012815 (2013)
10.1103/PhysRevE.88.012815
null
cs.MA cs.LG nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a model of network formation in repeated games where the players adapt their strategies and network ties simultaneously using a simple reinforcement-learning scheme. It is demonstrated that the coevolutionary dynamics of such systems can be described via coupled replicator equations. We provide a comprehensive analysis for three-player two-action games, which is the minimum system size with nontrivial structural dynamics. In particular, we characterize the Nash equilibria (NE) in such games and examine the local stability of the rest points corresponding to those equilibria. We also study general n-player networks via both simulations and analytical methods and find that in the absence of exploration, the stable equilibria consist of star motifs as the main building blocks of the network. Furthermore, in all stable equilibria the agents play pure strategies, even when the game allows mixed NE. Finally, we study the impact of exploration on learning outcomes, and observe that there is a critical exploration rate above which the symmetric and uniformly connected network topology becomes stable.
[ { "created": "Mon, 5 Aug 2013 17:43:58 GMT", "version": "v1" } ]
2013-08-06T00:00:00
[ [ "Kianercy", "Ardeshir", "" ], [ "Galstyan", "Aram", "" ] ]
0no_new_dataset
1101.4063
Hongda Xiao
Hongda Xiao and Edmund M. Yeh
The Impact of Incomplete Information on Games in Parallel Relay Networks
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the impact of incomplete information on incentives for node cooperation in parallel relay networks with one source node, one destination node, and multiple relay nodes. All nodes are selfish and strategic, interested in maximizing their own profit instead of the social welfare. We consider the practical situation where the channel state on any given relay path is not observable to the source or to the other relays. We examine different bargaining relationships between the source and the relays, and propose a framework for analyzing the efficiency loss induced by incomplete information. We analyze the source of the efficiency loss, and quantify the amount of inefficiency which results.
[ { "created": "Fri, 21 Jan 2011 01:44:09 GMT", "version": "v1" } ]
2011-01-24T00:00:00
[ [ "Xiao", "Hongda", "" ], [ "Yeh", "Edmund M.", "" ] ]
0no_new_dataset
2212.02234
Liqun Wang
X. Li (1), X. Zhang (1), X. Yi (1), D. Liu (1), H. Wang (1), B. Zhang (1), B. Zhang (1), D. Zhao (2 and 3), L. Wang (1, 4) ((1) China University of Petroleum, Beijing,(2) Institute of Computing Technology, Chinese Academy of Sciences, (3) University of Chinese Academy of Sciences, (4) Beijing Key Laboratory of Optical Detection Technology for Oil and Gas, China University of Petroleum)
Review of medical data analysis based on spiking neural networks
null
null
null
null
cs.NE cs.LG
http://creativecommons.org/licenses/by/4.0/
Medical data mainly includes various types of biomedical signals and medical images, which can be used by professional doctors to make judgments on patients' health conditions. However, the interpretation of medical data requires a lot of human cost and there may be misjudgments, so many scholars use neural networks and deep learning to classify and study medical data, which can improve the efficiency and accuracy of doctors and detect diseases early for early diagnosis, etc. Therefore, it has a wide range of application prospects. However, traditional neural networks have disadvantages such as high energy consumption and high latency (slow computation speed). This paper presents recent research on signal classification and disease diagnosis based on a third-generation neural network, the spiking neuron network, using medical data including EEG signals, ECG signals, EMG signals and MRI images. The advantages and disadvantages of pulsed neural networks compared with traditional networks are summarized and its development orientation in the future is prospected.
[ { "created": "Sun, 13 Nov 2022 03:23:54 GMT", "version": "v1" }, { "created": "Sun, 13 Aug 2023 06:02:06 GMT", "version": "v2" } ]
2023-08-15T00:00:00
[ [ "Li", "X.", "", "2 and 3" ], [ "Zhang", "X.", "", "2 and 3" ], [ "Yi", "X.", "", "2 and 3" ], [ "Liu", "D.", "", "2 and 3" ], [ "Wang", "H.", "", "2 and 3" ], [ "Zhang", "B.", "", "2 and 3" ], [ "Zhang", "B.", "", "2 and 3" ], [ "Zhao", "D.", "", "2 and 3" ], [ "Wang", "L.", "" ] ]
0no_new_dataset
2104.03066
Dvir Samuel
Dvir Samuel and Gal Chechik
Distributional Robustness Loss for Long-tail Learning
Accepted to ICCV 2021
null
null
null
cs.LG cs.CV
http://creativecommons.org/licenses/by/4.0/
Real-world data is often unbalanced and long-tailed, but deep models struggle to recognize rare classes in the presence of frequent classes. To address unbalanced data, most studies try balancing the data, the loss, or the classifier to reduce classification bias towards head classes. Far less attention has been given to the latent representations learned with unbalanced data. We show that the feature extractor part of deep networks suffers greatly from this bias. We propose a new loss based on robustness theory, which encourages the model to learn high-quality representations for both head and tail classes. While the general form of the robustness loss may be hard to compute, we further derive an easy-to-compute upper bound that can be minimized efficiently. This procedure reduces representation bias towards head classes in the feature space and achieves new SOTA results on CIFAR100-LT, ImageNet-LT, and iNaturalist long-tail benchmarks. We find that training with robustness increases recognition accuracy of tail classes while largely maintaining the accuracy of head classes. The new robustness loss can be combined with various classifier balancing techniques and can be applied to representations at several layers of the deep model.
[ { "created": "Wed, 7 Apr 2021 11:34:04 GMT", "version": "v1" }, { "created": "Sat, 30 Oct 2021 22:31:51 GMT", "version": "v2" } ]
2021-11-02T00:00:00
[ [ "Samuel", "Dvir", "" ], [ "Chechik", "Gal", "" ] ]
0no_new_dataset
1806.10976
Guillermo Ortiz-Jim\'enez
Guillermo Ortiz-Jim\'enez, Mario Coutino, Sundeep Prabhakar Chepuri, and Geert Leus
Sparse Sampling for Inverse Problems with Tensors
13 pages, 7 figures
null
10.1109/TSP.2019.2914879
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of designing sparse sampling strategies for multidomain signals, which can be represented using tensors that admit a known multilinear decomposition. We leverage the multidomain structure of tensor signals and propose to acquire samples using a Kronecker-structured sensing function, thereby circumventing the curse of dimensionality. For designing such sensing functions, we develop low-complexity greedy algorithms based on submodular optimization methods to compute near-optimal sampling sets. We present several numerical examples, ranging from multi-antenna communications to graph signal processing, to validate the developed theory.
[ { "created": "Thu, 28 Jun 2018 13:57:48 GMT", "version": "v1" } ]
2019-06-26T00:00:00
[ [ "Ortiz-Jiménez", "Guillermo", "" ], [ "Coutino", "Mario", "" ], [ "Chepuri", "Sundeep Prabhakar", "" ], [ "Leus", "Geert", "" ] ]
0no_new_dataset
1711.05497
Thorsten Wissmann
Bram Westerbaan, Bas Westerbaan, Rutger Kuyper, Carst Tankink, Remy Viehoff, Henk Barendregt
Statman's Hierarchy Theorem
null
Logical Methods in Computer Science, Volume 13, Issue 4 (November 27, 2017) lmcs:4074
10.23638/LMCS-13(4:19)2017
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Simply Typed $\lambda$-calculus Statman investigates the reducibility relation $\leq_{\beta\eta}$ between types: for $A,B \in \mathbb{T}^0$, types freely generated using $\rightarrow$ and a single ground type $0$, define $A \leq_{\beta\eta} B$ if there exists a $\lambda$-definable injection from the closed terms of type $A$ into those of type $B$. Unexpectedly, the induced partial order is the (linear) well-ordering (of order type) $\omega + 4$. In the proof a finer relation $\leq_{h}$ is used, where the above injection is required to be a B\"ohm transformation, and an (a posteriori) coarser relation $\leq_{h^+}$, requiring a finite family of B\"ohm transformations that is jointly injective. We present this result in a self-contained, syntactic, constructive and simplified manner. En route similar results for $\leq_h$ (order type $\omega + 5$) and $\leq_{h^+}$ (order type $8$) are obtained. Five of the equivalence classes of $\leq_{h^+}$ correspond to canonical term models of Statman, one to the trivial term model collapsing all elements of the same type, and one does not even form a model by the lack of closed terms of many types.
[ { "created": "Wed, 15 Nov 2017 10:56:30 GMT", "version": "v1" }, { "created": "Fri, 24 Nov 2017 13:14:20 GMT", "version": "v2" } ]
2023-06-22T00:00:00
[ [ "Westerbaan", "Bram", "" ], [ "Westerbaan", "Bas", "" ], [ "Kuyper", "Rutger", "" ], [ "Tankink", "Carst", "" ], [ "Viehoff", "Remy", "" ], [ "Barendregt", "Henk", "" ] ]
0no_new_dataset
1205.2653
Corinna Cortes
Corinna Cortes, Mehryar Mohri, Afshin Rostamizadeh
L2 Regularization for Learning Kernels
Appears in Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence (UAI2009)
null
null
UAI-P-2009-PG-109-116
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The choice of the kernel is critical to the success of many learning algorithms but it is typically left to the user. Instead, the training data can be used to learn the kernel by selecting it out of a given family, such as that of non-negative linear combinations of p base kernels, constrained by a trace or L1 regularization. This paper studies the problem of learning kernels with the same family of kernels but with an L2 regularization instead, and for regression problems. We analyze the problem of learning kernels with ridge regression. We derive the form of the solution of the optimization problem and give an efficient iterative algorithm for computing that solution. We present a novel theoretical analysis of the problem based on stability and give learning bounds for orthogonal kernels that contain only an additive term O(pp/m) when compared to the standard kernel ridge regression stability bound. We also report the results of experiments indicating that L1 regularization can lead to modest improvements for a small number of kernels, but to performance degradations in larger-scale cases. In contrast, L2 regularization never degrades performance and in fact achieves significant improvements with a large number of kernels.
[ { "created": "Wed, 9 May 2012 15:01:22 GMT", "version": "v1" } ]
2012-05-14T00:00:00
[ [ "Cortes", "Corinna", "" ], [ "Mohri", "Mehryar", "" ], [ "Rostamizadeh", "Afshin", "" ] ]
0no_new_dataset
2305.20086
Jonas Geiping
Gowthami Somepalli, Vasu Singla, Micah Goldblum, Jonas Geiping and Tom Goldstein
Understanding and Mitigating Copying in Diffusion Models
17 pages, preprint. Code is available at https://github.com/somepago/DCR
null
null
null
cs.LG cs.CR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Images generated by diffusion models like Stable Diffusion are increasingly widespread. Recent works and even lawsuits have shown that these models are prone to replicating their training data, unbeknownst to the user. In this paper, we first analyze this memorization problem in text-to-image diffusion models. While it is widely believed that duplicated images in the training set are responsible for content replication at inference time, we observe that the text conditioning of the model plays a similarly important role. In fact, we see in our experiments that data replication often does not happen for unconditional models, while it is common in the text-conditional case. Motivated by our findings, we then propose several techniques for reducing data replication at both training and inference time by randomizing and augmenting image captions in the training set.
[ { "created": "Wed, 31 May 2023 17:58:02 GMT", "version": "v1" } ]
2023-06-01T00:00:00
[ [ "Somepalli", "Gowthami", "" ], [ "Singla", "Vasu", "" ], [ "Goldblum", "Micah", "" ], [ "Geiping", "Jonas", "" ], [ "Goldstein", "Tom", "" ] ]
0no_new_dataset
1312.0510
Andrey Demichev
A. Demichev, V. Ilyin, A. Kryukov and S. Polyakov
Fault Tolerance of Small-World Regular and Stochastic Interconnection Networks
9 pages, 5 figures; LaTeX; typos corrected, figures improved, acknowledgements added
Vychisl. Metody Programm (Numerical Methods and Programming) vol.15 (2014) 36 - 48 (in Russian)
null
null
cs.SI cs.DC physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Resilience of the most important properties of stochastic and regular (deterministic) small-world interconnection networks is studied. It is shown that in the broad range of values of the fraction of faulty nodes the networks under consideration possess high fault tolerance, the deterministic networks being slightly better than the stochastic ones.
[ { "created": "Thu, 21 Nov 2013 13:53:10 GMT", "version": "v1" }, { "created": "Mon, 13 Jan 2014 07:09:35 GMT", "version": "v2" } ]
2014-11-07T00:00:00
[ [ "Demichev", "A.", "" ], [ "Ilyin", "V.", "" ], [ "Kryukov", "A.", "" ], [ "Polyakov", "S.", "" ] ]
0no_new_dataset
1205.2153
Rourab Paul
Rourab Paul, Sangeet Saha, Suman Sau, Amlan Chakrabarti
Design and implementation of real time AES-128 on real time operating system for multiple FPGA communication
6 pages, IEMCON 12, Kolkata
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security is the most important part in data communication system, where more randomization in secret keys increases the security as well as complexity of the cryptography algorithms. As a result in recent dates these algorithms are compensating with enormous memory spaces and large execution time on hardware platform. Field programmable gate arrays (FPGAs), provide one of the major alternative in hardware platform scenario due to its reconfiguration nature, low price and marketing speed. In FPGA based embedded system we can use embedded processor to execute particular algorithm with the inclusion of a real time operating System (RTOS), where threads may reduce resource utilization and time consumption. A process in the runtime is separated in different smaller tasks which are executed by the scheduler to meet the real time dead line using RTOS. In this paper we demonstrate the design and implementation of a 128-bit Advanced Encryption Standard (AES) both symmetric key encryption and decryption algorithm by developing suitable hardware and software design on Xilinx Spartan- 3E (XC3S500E-FG320) device using an Xilkernel RTOS, the implementation has been tested successfully The system is optimized in terms of execution speed and hardware utilization.
[ { "created": "Thu, 10 May 2012 04:04:45 GMT", "version": "v1" } ]
2012-05-11T00:00:00
[ [ "Paul", "Rourab", "" ], [ "Saha", "Sangeet", "" ], [ "Sau", "Suman", "" ], [ "Chakrabarti", "Amlan", "" ] ]
0no_new_dataset
2208.02672
Tobias Runge
Tobias Runge, Alexander Kittelmann, Marco Servetto, Alex Potanin, Ina Schaefer
Information Flow Control-by-Construction for an Object-Oriented Language Using Type Modifiers
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In security-critical software applications, confidential information must be prevented from leaking to unauthorized sinks. Static analysis techniques are widespread to enforce a secure information flow by checking a program after construction. A drawback of these systems is that incomplete programs during construction cannot be checked properly. The user is not guided to a secure program by most systems. We introduce IFbCOO, an approach that guides users incrementally to a secure implementation by using refinement rules. In each refinement step, confidentiality or integrity (or both) is guaranteed alongside the functional correctness of the program, such that insecure programs are declined by construction. In this work, we formalize IFbCOO and prove soundness of the refinement rules. We implement IFbCOO in the tool CorC and conduct a feasibility study by successfully implementing case studies.
[ { "created": "Thu, 4 Aug 2022 14:06:30 GMT", "version": "v1" } ]
2022-08-05T00:00:00
[ [ "Runge", "Tobias", "" ], [ "Kittelmann", "Alexander", "" ], [ "Servetto", "Marco", "" ], [ "Potanin", "Alex", "" ], [ "Schaefer", "Ina", "" ] ]
0no_new_dataset
2006.09609
Qiyu Sun
Yaxu Li, Qiyu Sun and Jun Xian
Random sampling and reconstruction of concentrated signals in a reproducing kernel space
null
null
null
null
cs.IT cs.NA math.IT math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider (random) sampling of signals concentrated on a bounded Corkscrew domain $\Omega$ of a metric measure space, and reconstructing concentrated signals approximately from their (un)corrupted sampling data taken on a sampling set contained in $\Omega$. We establish a weighted stability of bi-Lipschitz type for a (random) sampling scheme on the set of concentrated signals in a reproducing kernel space. The weighted stability of bi-Lipschitz type provides a weak robustness to the sampling scheme, however due to the nonconvexity of the set of concentrated signals, it does not imply the unique signal reconstruction. From (un)corrupted samples taken on a finite sampling set contained in $\Omega$, we propose an algorithm to find approximations to signals concentrated on a bounded Corkscrew domain $\Omega$. Random sampling is a sampling scheme where sampling positions are randomly taken according to a probability distribution. Next we show that, with high probability, signals concentrated on a bounded Corkscrew domain $\Omega$ can be reconstructed approximately from their uncorrupted (or randomly corrupted) samples taken at i.i.d. random positions drawn on $\Omega$, provided that the sampling size is at least of the order $\mu(\Omega) \ln (\mu(\Omega))$, where $\mu(\Omega)$ is the measure of the concentrated domain $\Omega$. Finally, we demonstrate the performance of proposed approximations to the original concentrated signal when the sampling procedure is taken either with small density or randomly with large size.
[ { "created": "Wed, 17 Jun 2020 02:30:52 GMT", "version": "v1" } ]
2020-06-18T00:00:00
[ [ "Li", "Yaxu", "" ], [ "Sun", "Qiyu", "" ], [ "Xian", "Jun", "" ] ]
0no_new_dataset
cs/9811022
Ciprian Chelba
Ciprian Chelba, Frederick Jelinek (CLSP The Johns Hopkins University)
Expoiting Syntactic Structure for Language Modeling
changed ACM-class membership and buggy author names
Proceedings of ACL'98, Montreal, Canada
null
null
cs.CL
null
The paper presents a language model that develops syntactic structure and uses it to extract meaningful information from the word history, thus enabling the use of long distance dependencies. The model assigns probability to every joint sequence of words--binary-parse-structure with headword annotation and operates in a left-to-right manner --- therefore usable for automatic speech recognition. The model, its probabilistic parameterization, and a set of experiments meant to evaluate its predictive power are presented; an improvement over standard trigram modeling is achieved.
[ { "created": "Thu, 12 Nov 1998 17:31:17 GMT", "version": "v1" }, { "created": "Tue, 25 Jan 2000 15:37:36 GMT", "version": "v2" } ]
2007-05-23T00:00:00
[ [ "Chelba", "Ciprian", "", "CLSP The Johns Hopkins University" ], [ "Jelinek", "Frederick", "", "CLSP The Johns Hopkins University" ] ]
0no_new_dataset
2212.11922
Evin P{\i}nar \"Ornek
Evin P{\i}nar \"Ornek, Aravindhan K Krishnan, Shreekant Gayaka, Cheng-Hao Kuo, Arnie Sen, Nassir Navab, Federico Tombari
SupeRGB-D: Zero-shot Instance Segmentation in Cluttered Indoor Environments
Accepted in Robotics and Automation Letters April 2023
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Object instance segmentation is a key challenge for indoor robots navigating cluttered environments with many small objects. Limitations in 3D sensing capabilities often make it difficult to detect every possible object. While deep learning approaches may be effective for this problem, manually annotating 3D data for supervised learning is time-consuming. In this work, we explore zero-shot instance segmentation (ZSIS) from RGB-D data to identify unseen objects in a semantic category-agnostic manner. We introduce a zero-shot split for Tabletop Objects Dataset (TOD-Z) to enable this study and present a method that uses annotated objects to learn the ``objectness'' of pixels and generalize to unseen object categories in cluttered indoor environments. Our method, SupeRGB-D, groups pixels into small patches based on geometric cues and learns to merge the patches in a deep agglomerative clustering fashion. SupeRGB-D outperforms existing baselines on unseen objects while achieving similar performance on seen objects. We further show competitive results on the real dataset OCID. With its lightweight design (0.4 MB memory requirement), our method is extremely suitable for mobile and robotic applications. Additional DINO features can increase performance with a higher memory requirement. The dataset split and code are available at https://github.com/evinpinar/supergb-d.
[ { "created": "Thu, 22 Dec 2022 17:59:48 GMT", "version": "v1" }, { "created": "Thu, 25 May 2023 12:25:24 GMT", "version": "v2" } ]
2023-05-26T00:00:00
[ [ "Örnek", "Evin Pınar", "" ], [ "Krishnan", "Aravindhan K", "" ], [ "Gayaka", "Shreekant", "" ], [ "Kuo", "Cheng-Hao", "" ], [ "Sen", "Arnie", "" ], [ "Navab", "Nassir", "" ], [ "Tombari", "Federico", "" ] ]
1new_dataset
2109.08042
Yasamin Nazari
Greg Bodwin, Michael Dinitz, Yasamin Nazari
Vertex Fault-Tolerant Emulators
To appear in ITCS 2022
null
null
null
cs.DS cs.DM
http://creativecommons.org/licenses/by/4.0/
A $k$-spanner of a graph $G$ is a sparse subgraph that preserves its shortest path distances up to a multiplicative stretch factor of $k$, and a $k$-emulator is similar but not required to be a subgraph of $G$. A classic theorem by Thorup and Zwick [JACM '05] shows that, despite the extra flexibility available to emulators, the size/stretch tradeoffs for spanners and emulators are equivalent. Our main result is that this equivalence in tradeoffs no longer holds in the commonly-studied setting of graphs with vertex failures. That is: we introduce a natural definition of vertex fault-tolerant emulators, and then we show a three-way tradeoff between size, stretch, and fault-tolerance for these emulators that polynomially surpasses the tradeoff known to be optimal for spanners. We complement our emulator upper bound with a lower bound construction that is essentially tight (within $\log n$ factors of the upper bound) when the stretch is $2k-1$ and $k$ is either a fixed odd integer or $2$. We also show constructions of fault-tolerant emulators with additive error, demonstrating that these also enjoy significantly improved tradeoffs over those available for fault-tolerant additive spanners.
[ { "created": "Thu, 16 Sep 2021 15:12:25 GMT", "version": "v1" }, { "created": "Fri, 19 Nov 2021 16:05:11 GMT", "version": "v2" } ]
2021-11-22T00:00:00
[ [ "Bodwin", "Greg", "" ], [ "Dinitz", "Michael", "" ], [ "Nazari", "Yasamin", "" ] ]
0no_new_dataset
2112.09859
Liyu Chen
Liyu Chen, Rahul Jain, Haipeng Luo
Improved No-Regret Algorithms for Stochastic Shortest Path with Linear MDP
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce two new no-regret algorithms for the stochastic shortest path (SSP) problem with a linear MDP that significantly improve over the only existing results of (Vial et al., 2021). Our first algorithm is computationally efficient and achieves a regret bound $\widetilde{O}\left(\sqrt{d^3B_{\star}^2T_{\star} K}\right)$, where $d$ is the dimension of the feature space, $B_{\star}$ and $T_{\star}$ are upper bounds of the expected costs and hitting time of the optimal policy respectively, and $K$ is the number of episodes. The same algorithm with a slight modification also achieves logarithmic regret of order $O\left(\frac{d^3B_{\star}^4}{c_{\min}^2\text{gap}_{\min}}\ln^5\frac{dB_{\star} K}{c_{\min}} \right)$, where $\text{gap}_{\min}$ is the minimum sub-optimality gap and $c_{\min}$ is the minimum cost over all state-action pairs. Our result is obtained by developing a simpler and improved analysis for the finite-horizon approximation of (Cohen et al., 2021) with a smaller approximation error, which might be of independent interest. On the other hand, using variance-aware confidence sets in a global optimization problem, our second algorithm is computationally inefficient but achieves the first "horizon-free" regret bound $\widetilde{O}(d^{3.5}B_{\star}\sqrt{K})$ with no polynomial dependency on $T_{\star}$ or $1/c_{\min}$, almost matching the $\Omega(dB_{\star}\sqrt{K})$ lower bound from (Min et al., 2021).
[ { "created": "Sat, 18 Dec 2021 06:47:31 GMT", "version": "v1" } ]
2021-12-21T00:00:00
[ [ "Chen", "Liyu", "" ], [ "Jain", "Rahul", "" ], [ "Luo", "Haipeng", "" ] ]
0no_new_dataset
2312.05616
Chaofeng Chen
Chaofeng Chen, Shangchen Zhou, Liang Liao, Haoning Wu, Wenxiu Sun, Qiong Yan, Weisi Lin
Iterative Token Evaluation and Refinement for Real-World Super-Resolution
To appear in AAAI2024, https://github.com/chaofengc/ITER
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
Real-world image super-resolution (RWSR) is a long-standing problem as low-quality (LQ) images often have complex and unidentified degradations. Existing methods such as Generative Adversarial Networks (GANs) or continuous diffusion models present their own issues including GANs being difficult to train while continuous diffusion models requiring numerous inference steps. In this paper, we propose an Iterative Token Evaluation and Refinement (ITER) framework for RWSR, which utilizes a discrete diffusion model operating in the discrete token representation space, i.e., indexes of features extracted from a VQGAN codebook pre-trained with high-quality (HQ) images. We show that ITER is easier to train than GANs and more efficient than continuous diffusion models. Specifically, we divide RWSR into two sub-tasks, i.e., distortion removal and texture generation. Distortion removal involves simple HQ token prediction with LQ images, while texture generation uses a discrete diffusion model to iteratively refine the distortion removal output with a token refinement network. In particular, we propose to include a token evaluation network in the discrete diffusion process. It learns to evaluate which tokens are good restorations and helps to improve the iterative refinement results. Moreover, the evaluation network can first check status of the distortion removal output and then adaptively select total refinement steps needed, thereby maintaining a good balance between distortion removal and texture generation. Extensive experimental results show that ITER is easy to train and performs well within just 8 iterative steps. Our codes will be available publicly.
[ { "created": "Sat, 9 Dec 2023 17:07:32 GMT", "version": "v1" } ]
2023-12-12T00:00:00
[ [ "Chen", "Chaofeng", "" ], [ "Zhou", "Shangchen", "" ], [ "Liao", "Liang", "" ], [ "Wu", "Haoning", "" ], [ "Sun", "Wenxiu", "" ], [ "Yan", "Qiong", "" ], [ "Lin", "Weisi", "" ] ]
0no_new_dataset
2311.08172
Chen Li
Chen Li, Yixiao Ge, Dian Li, and Ying Shan
Vision-Language Instruction Tuning: A Review and Analysis
34 pages, 6 figures
null
null
null
cs.MM cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Instruction tuning is a crucial supervised training phase in Large Language Models (LLMs), aiming to enhance the LLM's ability to generalize instruction execution and adapt to user preferences. With the increasing integration of multi-modal data into LLMs, there is growing interest in Vision-Language Instruction Tuning (VLIT), which presents more complex characteristics compared to pure text instruction tuning. In this paper, we systematically review the latest VLIT settings and corresponding datasets in multi-modal LLMs and provide insights into the intrinsic motivations behind their design. For the first time, we offer a detailed multi-perspective categorization for existing VLIT datasets and identify the characteristics that high-quality VLIT data should possess. By incorporating these characteristics as guiding principles into the existing VLIT data construction process, we conduct extensive experiments and verify their positive impact on the performance of tuned multi-modal LLMs. Furthermore, we discuss the current challenges and future research directions of VLIT, providing insights for the continuous development of this field. The code and dataset related to this paper have been open-sourced at https://github.com/palchenli/VL-Instruction-Tuning.
[ { "created": "Tue, 14 Nov 2023 14:02:32 GMT", "version": "v1" }, { "created": "Sat, 25 Nov 2023 07:59:48 GMT", "version": "v2" } ]
2023-11-28T00:00:00
[ [ "Li", "Chen", "" ], [ "Ge", "Yixiao", "" ], [ "Li", "Dian", "" ], [ "Shan", "Ying", "" ] ]
0no_new_dataset
1809.01087
Muhammad Majid Butt
M. Majid Butt, Irene Macaluso, Carlo Galiotto and Nicola Marchetti
Fair Dynamic Spectrum Management in Licensed Shared Access Systems
null
IEEE Systems Journal, 2018
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Licensed Shared Access (LSA) is a spectrum sharing mechanism where bandwidth is shared between a primary network, called incumbent, and a secondary mobile network. In this work, we address dynamic spectrum management mechanisms for LSA systems. We propose a fair spectrum management algorithm for distributing incumbent's available spectrum among mobile networks. Then, we adapt the proposed algorithm to take mobile network operator's regulatory compliance aspect into account and penalize the misbehaving network operators in spectrum allocation. We extend our results to the scenario where more than one incumbent offer spectrum to the mobile operators in a service area and propose various protocols, which ensure long term fair spectrum allocation within the individual LSA networks. Finally, we numerically evaluate the performance of the proposed spectrum allocation algorithms and compare them using various performance metrics. For the single incumbent case, the numerical results show that the spectrum allocation is fair when the mobile operators follow the spectrum access regulations. We demonstrate the effect of our proposed penalty functions on spectrum allocation when the operators do not comply with the regulatory aspects. For the multi-incumbent scenario, the results show a trade-off between efficient spectrum allocation and flexibility in spectrum access for our proposed algorithms.
[ { "created": "Tue, 4 Sep 2018 16:47:39 GMT", "version": "v1" } ]
2018-09-05T00:00:00
[ [ "Butt", "M. Majid", "" ], [ "Macaluso", "Irene", "" ], [ "Galiotto", "Carlo", "" ], [ "Marchetti", "Nicola", "" ] ]
0no_new_dataset
2010.09624
Guillermo Ortiz-Jimenez
Guillermo Ortiz-Jimenez, Apostolos Modas, Seyed-Mohsen Moosavi-Dezfooli, Pascal Frossard
Optimism in the Face of Adversity: Understanding and Improving Deep Learning through Adversarial Robustness
24 pages, 14 figures
null
null
null
cs.LG cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Driven by massive amounts of data and important advances in computational resources, new deep learning systems have achieved outstanding results in a large spectrum of applications. Nevertheless, our current theoretical understanding on the mathematical foundations of deep learning lags far behind its empirical success. Towards solving the vulnerability of neural networks, however, the field of adversarial robustness has recently become one of the main sources of explanations of our deep models. In this article, we provide an in-depth review of the field of adversarial robustness in deep learning, and give a self-contained introduction to its main notions. But, in contrast to the mainstream pessimistic perspective of adversarial robustness, we focus on the main positive aspects that it entails. We highlight the intuitive connection between adversarial examples and the geometry of deep neural networks, and eventually explore how the geometric study of adversarial examples can serve as a powerful tool to understand deep learning. Furthermore, we demonstrate the broad applicability of adversarial robustness, providing an overview of the main emerging applications of adversarial robustness beyond security. The goal of this article is to provide readers with a set of new perspectives to understand deep learning, and to supply them with intuitive tools and insights on how to use adversarial robustness to improve it.
[ { "created": "Mon, 19 Oct 2020 16:03:46 GMT", "version": "v1" }, { "created": "Thu, 28 Jan 2021 17:47:48 GMT", "version": "v2" } ]
2021-01-29T00:00:00
[ [ "Ortiz-Jimenez", "Guillermo", "" ], [ "Modas", "Apostolos", "" ], [ "Moosavi-Dezfooli", "Seyed-Mohsen", "" ], [ "Frossard", "Pascal", "" ] ]
0no_new_dataset
2106.01273
Wenlong Tian
Xuming Ye, Xiaoye Xue, Wenlong Tian, Zhiyong Xu, Weijun Xiao, Ruixuan Li
Chunk Content is not Enough: Chunk-Context Aware Resemblance Detection for Deduplication Delta Compression
null
null
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
With the growing popularity of cloud storage, removing duplicated data across users is getting more critical for service providers to reduce costs. Recently, Data resemblance detection is a novel technology to detect redundancy among similarity. It extracts feature from each chunk content and treat chunks with high similarity as candidates for removing redundancy. However, popular resemblance methods such as "N-transform" and "Finesse" use only the chunk data for feature extraction. A minor modification on the data chunk could seriously deteriorate its capability for resemblance detection. In this paper, we proposes a novel chunk-context aware resemblance detection algorithm, called CARD, to mitigate this issue. CARD introduces a BP-Neural network-based chunk-context aware model, and uses N-sub-chunk shingles-based initial feature extraction strategy. It effectively integrates each data chunk content's internal structure with the context information for feature extraction, the impact of small changes in data chunks is significantly reduced. To evaluate its performance, we implement a CARD prototype and conduct extensive experiments using real-world data sets. The results show that CARD can detect up to 75.03% more redundant data and accelerate the resemblance detection operations by 5.6 to 17.8 times faster compared with the state-of-the-art resemblance detection approaches.
[ { "created": "Wed, 2 Jun 2021 16:34:07 GMT", "version": "v1" } ]
2021-06-03T00:00:00
[ [ "Ye", "Xuming", "" ], [ "Xue", "Xiaoye", "" ], [ "Tian", "Wenlong", "" ], [ "Xu", "Zhiyong", "" ], [ "Xiao", "Weijun", "" ], [ "Li", "Ruixuan", "" ] ]
0no_new_dataset
2303.11675
Yongkang Cheng
Yongkang Cheng, Shaoli Huang, Jifeng Ning, Ying Shan
BoPR: Body-aware Part Regressor for Human Shape and Pose Estimation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel approach for estimating human body shape and pose from monocular images that effectively addresses the challenges of occlusions and depth ambiguity. Our proposed method BoPR, the Body-aware Part Regressor, first extracts features of both the body and part regions using an attention-guided mechanism. We then utilize these features to encode extra part-body dependency for per-part regression, with part features as queries and body feature as a reference. This allows our network to infer the spatial relationship of occluded parts with the body by leveraging visible parts and body reference information. Our method outperforms existing state-of-the-art methods on two benchmark datasets, and our experiments show that it significantly surpasses existing methods in terms of depth ambiguity and occlusion handling. These results provide strong evidence of the effectiveness of our approach.The code and data are available for research purposes at https://github.com/cyk990422/BoPR.
[ { "created": "Tue, 21 Mar 2023 08:36:59 GMT", "version": "v1" }, { "created": "Fri, 24 Mar 2023 08:41:24 GMT", "version": "v2" } ]
2023-03-27T00:00:00
[ [ "Cheng", "Yongkang", "" ], [ "Huang", "Shaoli", "" ], [ "Ning", "Jifeng", "" ], [ "Shan", "Ying", "" ] ]
1new_dataset
2112.02994
Haozheng Luo
Ruiyang Qin, Haozheng Luo, Zheheng Fan, Ziang Ren
IBERT: Idiom Cloze-style reading comprehension with Attention
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
Idioms are special fixed phrases usually derived from stories. They are commonly used in casual conversations and literary writings. Their meanings are usually highly non-compositional. The idiom cloze task is a challenge problem in Natural Language Processing (NLP) research problem. Previous approaches to this task are built on sequence-to-sequence (Seq2Seq) models and achieved reasonably well performance on existing datasets. However, they fall short in understanding the highly non-compositional meaning of idiomatic expressions. They also do not consider both the local and global context at the same time. In this paper, we proposed a BERT-based embedding Seq2Seq model that encodes idiomatic expressions and considers them in both global and local context. Our model uses XLNET as the encoder and RoBERTa for choosing the most probable idiom for a given context. Experiments on the EPIE Static Corpus dataset show that our model performs better than existing state-of-the-arts.
[ { "created": "Fri, 5 Nov 2021 21:37:15 GMT", "version": "v1" } ]
2021-12-07T00:00:00
[ [ "Qin", "Ruiyang", "" ], [ "Luo", "Haozheng", "" ], [ "Fan", "Zheheng", "" ], [ "Ren", "Ziang", "" ] ]
0no_new_dataset
1811.09720
Chih-Kuan Yeh
Chih-Kuan Yeh, Joon Sik Kim, Ian E.H. Yen, Pradeep Ravikumar
Representer Point Selection for Explaining Deep Neural Networks
NIPS 2018
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose to explain the predictions of a deep neural network, by pointing to the set of what we call representer points in the training set, for a given test point prediction. Specifically, we show that we can decompose the pre-activation prediction of a neural network into a linear combination of activations of training points, with the weights corresponding to what we call representer values, which thus capture the importance of that training point on the learned parameters of the network. But it provides a deeper understanding of the network than simply training point influence: with positive representer values corresponding to excitatory training points, and negative values corresponding to inhibitory points, which as we show provides considerably more insight. Our method is also much more scalable, allowing for real-time feedback in a manner not feasible with influence functions.
[ { "created": "Fri, 23 Nov 2018 22:34:17 GMT", "version": "v1" } ]
2018-11-27T00:00:00
[ [ "Yeh", "Chih-Kuan", "" ], [ "Kim", "Joon Sik", "" ], [ "Yen", "Ian E. H.", "" ], [ "Ravikumar", "Pradeep", "" ] ]
0no_new_dataset
cs/0701140
Corina P?s?reanu
Corina S. Pasareanu, Radek Pelanek, Willem Visser
Predicate Abstraction with Under-approximation Refinement
22 pages, 3 figures, accepted for publication in Logical Methods in Computer Science journal (special issue CAV 2005)
Logical Methods in Computer Science, Volume 3, Issue 1 (February 26, 2007) lmcs:2227
10.2168/LMCS-3(1:5)2007
null
cs.GT
null
We propose an abstraction-based model checking method which relies on refinement of an under-approximation of the feasible behaviors of the system under analysis. The method preserves errors to safety properties, since all analyzed behaviors are feasible by definition. The method does not require an abstract transition relation to be generated, but instead executes the concrete transitions while storing abstract versions of the concrete states, as specified by a set of abstraction predicates. For each explored transition the method checks, with the help of a theorem prover, whether there is any loss of precision introduced by abstraction. The results of these checks are used to decide termination or to refine the abstraction by generating new abstraction predicates. If the (possibly infinite) concrete system under analysis has a finite bisimulation quotient, then the method is guaranteed to eventually explore an equivalent finite bisimilar structure. We illustrate the application of the approach for checking concurrent programs.
[ { "created": "Mon, 22 Jan 2007 21:29:37 GMT", "version": "v1" }, { "created": "Mon, 26 Feb 2007 10:52:16 GMT", "version": "v2" } ]
2017-01-11T00:00:00
[ [ "Pasareanu", "Corina S.", "" ], [ "Pelanek", "Radek", "" ], [ "Visser", "Willem", "" ] ]
0no_new_dataset
1706.00409
Guillaume Lample
Guillaume Lample, Neil Zeghidour, Nicolas Usunier, Antoine Bordes, Ludovic Denoyer, Marc'Aurelio Ranzato
Fader Networks: Manipulating Images by Sliding Attributes
NIPS 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new encoder-decoder architecture that is trained to reconstruct images by disentangling the salient information of the image and the values of attributes directly in the latent space. As a result, after training, our model can generate different realistic versions of an input image by varying the attribute values. By using continuous attribute values, we can choose how much a specific attribute is perceivable in the generated image. This property could allow for applications where users can modify an image using sliding knobs, like faders on a mixing console, to change the facial expression of a portrait, or to update the color of some objects. Compared to the state-of-the-art which mostly relies on training adversarial networks in pixel space by altering attribute values at train time, our approach results in much simpler training schemes and nicely scales to multiple attributes. We present evidence that our model can significantly change the perceived value of the attributes while preserving the naturalness of images.
[ { "created": "Thu, 1 Jun 2017 17:48:24 GMT", "version": "v1" }, { "created": "Sun, 28 Jan 2018 16:12:14 GMT", "version": "v2" } ]
2018-01-30T00:00:00
[ [ "Lample", "Guillaume", "" ], [ "Zeghidour", "Neil", "" ], [ "Usunier", "Nicolas", "" ], [ "Bordes", "Antoine", "" ], [ "Denoyer", "Ludovic", "" ], [ "Ranzato", "Marc'Aurelio", "" ] ]
0no_new_dataset
1903.05862
Yongliang Chen
Yongliang Chen
Learning Orientation-Estimation Convolutional Neural Network for Building Detection in Optical Remote Sensing Image
Presented in DICTA2018; Further Improved including extra experiments
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Benefiting from the great success of deep learning in computer vision, CNN-based object detection methods have drawn significant attentions. Various frameworks have been proposed which show awesome and robust performance for a large range of datasets. However, for building detection in remote sensing images, buildings always pose a diversity of orientations which makes it a challenge for the application of off-the-shelf methods to building detection. In this work, we aim to integrate orientation regression into the popular axis-aligned bounding-box detection method to tackle this problem. To adapt the axis-aligned bounding boxes to arbitrarily orientated ones, we also develop an algorithm to estimate the Intersection over Union (IoU) overlap between any two arbitrarily oriented boxes which is convenient to implement in Graphics Processing Unit (GPU) for accelerating computation. The proposed method utilizes CNN for both robust feature extraction and rotated bounding box regression. We present our modelin an end-to-end fashion making it easy to train. The model is formulated and trained to predict orientation, location and extent simultaneously obtaining tighter bounding box and hence, higher mean average precision (mAP). Experiments on remote sensing images of different scales shows a promising performance over the conventional one.
[ { "created": "Thu, 14 Mar 2019 09:02:59 GMT", "version": "v1" } ]
2019-03-15T00:00:00
[ [ "Chen", "Yongliang", "" ] ]
0no_new_dataset
2402.13946
Satwik Patnaik
Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
To appear in USENIX Security Symposium, 2024
null
null
null
cs.LG cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
Machine learning has shown great promise in addressing several critical hardware security problems. In particular, researchers have developed novel graph neural network (GNN)-based techniques for detecting intellectual property (IP) piracy, detecting hardware Trojans (HTs), and reverse engineering circuits, to name a few. These techniques have demonstrated outstanding accuracy and have received much attention in the community. However, since these techniques are used for security applications, it is imperative to evaluate them thoroughly and ensure they are robust and do not compromise the security of integrated circuits. In this work, we propose AttackGNN, the first red-team attack on GNN-based techniques in hardware security. To this end, we devise a novel reinforcement learning (RL) agent that generates adversarial examples, i.e., circuits, against the GNN-based techniques. We overcome three challenges related to effectiveness, scalability, and generality to devise a potent RL agent. We target five GNN-based techniques for four crucial classes of problems in hardware security: IP piracy, detecting/localizing HTs, reverse engineering, and hardware obfuscation. Through our approach, we craft circuits that fool all GNNs considered in this work. For instance, to evade IP piracy detection, we generate adversarial pirated circuits that fool the GNN-based defense into classifying our crafted circuits as not pirated. For attacking HT localization GNN, our attack generates HT-infested circuits that fool the defense on all tested circuits. We obtain a similar 100% success rate against GNNs for all classes of problems.
[ { "created": "Wed, 21 Feb 2024 17:18:25 GMT", "version": "v1" }, { "created": "Mon, 26 Feb 2024 20:18:38 GMT", "version": "v2" } ]
2024-02-28T00:00:00
[ [ "Gohil", "Vasudev", "" ], [ "Patnaik", "Satwik", "" ], [ "Kalathil", "Dileep", "" ], [ "Rajendran", "Jeyavijayan", "" ] ]
0no_new_dataset
1808.03644
Roman Yampolskiy
Micha\"el Trazzi, Roman V. Yampolskiy
Building Safer AGI by introducing Artificial Stupidity
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial Intelligence (AI) achieved super-human performance in a broad variety of domains. We say that an AI is made Artificially Stupid on a task when some limitations are deliberately introduced to match a human's ability to do the task. An Artificial General Intelligence (AGI) can be made safer by limiting its computing power and memory, or by introducing Artificial Stupidity on certain tasks. We survey human intellectual limits and give recommendations for which limits to implement in order to build a safe AGI.
[ { "created": "Sat, 11 Aug 2018 00:14:33 GMT", "version": "v1" } ]
2018-08-14T00:00:00
[ [ "Trazzi", "Michaël", "" ], [ "Yampolskiy", "Roman V.", "" ] ]
0no_new_dataset
1009.2706
Sergey Verlan
Artiom Alhazov, Sergey Verlan
Minimization Strategies for Maximally Parallel Multiset Rewriting Systems
This article is an improved version of [1]
null
null
null
cs.FL cs.CC cs.CL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximally parallel multiset rewriting systems (MPMRS) give a convenient way to express relations between unstructured objects. The functioning of various computational devices may be expressed in terms of MPMRS (e.g., register machines and many variants of P systems). In particular, this means that MPMRS are computationally complete; however, a direct translation leads to quite a big number of rules. Like for other classes of computationally complete devices, there is a challenge to find a universal system having the smallest number of rules. In this article we present different rule minimization strategies for MPMRS based on encodings and structural transformations. We apply these strategies to the translation of a small universal register machine (Korec, 1996) and we show that there exists a universal MPMRS with 23 rules. Since MPMRS are identical to a restricted variant of P systems with antiport rules, the results we obtained improve previously known results on the number of rules for those systems.
[ { "created": "Tue, 14 Sep 2010 16:06:02 GMT", "version": "v1" } ]
2010-09-15T00:00:00
[ [ "Alhazov", "Artiom", "" ], [ "Verlan", "Sergey", "" ] ]
0no_new_dataset
2403.05229
Nan Liu
Siqi Li, Yuqing Shang, Ziwen Wang, Qiming Wu, Chuan Hong, Yilin Ning, Di Miao, Marcus Eng Hock Ong, Bibhas Chakraborty, Nan Liu
Developing Federated Time-to-Event Scores Using Heterogeneous Real-World Survival Data
null
null
null
null
cs.AI
http://creativecommons.org/licenses/by/4.0/
Survival analysis serves as a fundamental component in numerous healthcare applications, where the determination of the time to specific events (such as the onset of a certain disease or death) for patients is crucial for clinical decision-making. Scoring systems are widely used for swift and efficient risk prediction. However, existing methods for constructing survival scores presume that data originates from a single source, posing privacy challenges in collaborations with multiple data owners. We propose a novel framework for building federated scoring systems for multi-site survival outcomes, ensuring both privacy and communication efficiency. We applied our approach to sites with heterogeneous survival data originating from emergency departments in Singapore and the United States. Additionally, we independently developed local scores at each site. In testing datasets from each participant site, our proposed federated scoring system consistently outperformed all local models, evidenced by higher integrated area under the receiver operating characteristic curve (iAUC) values, with a maximum improvement of 11.6%. Additionally, the federated score's time-dependent AUC(t) values showed advantages over local scores, exhibiting narrower confidence intervals (CIs) across most time points. The model developed through our proposed method exhibits effective performance on each local site, signifying noteworthy implications for healthcare research. Sites participating in our proposed federated scoring model training gained benefits by acquiring survival models with enhanced prediction accuracy and efficiency. This study demonstrates the effectiveness of our privacy-preserving federated survival score generation framework and its applicability to real-world heterogeneous survival data.
[ { "created": "Fri, 8 Mar 2024 11:32:00 GMT", "version": "v1" } ]
2024-03-11T00:00:00
[ [ "Li", "Siqi", "" ], [ "Shang", "Yuqing", "" ], [ "Wang", "Ziwen", "" ], [ "Wu", "Qiming", "" ], [ "Hong", "Chuan", "" ], [ "Ning", "Yilin", "" ], [ "Miao", "Di", "" ], [ "Ong", "Marcus Eng Hock", "" ], [ "Chakraborty", "Bibhas", "" ], [ "Liu", "Nan", "" ] ]
1new_dataset
1809.02659
Thorsten Wissmann
Emma Kerinec, Giulio Manzonetto, Michele Pagani
Revisiting Call-by-value B\"ohm trees in light of their Taylor expansion
null
Logical Methods in Computer Science, Volume 16, Issue 3 (July 15, 2020) lmcs:4817
10.23638/LMCS-16(3:6)2020
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
The call-by-value lambda calculus can be endowed with permutation rules, arising from linear logic proof-nets, having the advantage of unblocking some redexes that otherwise get stuck during the reduction. We show that such an extension allows to define a satisfying notion of B\"ohm(-like) tree and a theory of program approximation in the call-by-value setting. We prove that all lambda terms having the same B\"ohm tree are observationally equivalent, and characterize those B\"ohm-like trees arising as actual B\"ohm trees of lambda terms. We also compare this approach with Ehrhard's theory of program approximation based on the Taylor expansion of lambda terms, translating each lambda term into a possibly infinite set of so-called resource terms. We provide sufficient and necessary conditions for a set of resource terms in order to be the Taylor expansion of a lambda term. Finally, we show that the normal form of the Taylor expansion of a lambda term can be computed by performing a normalized Taylor expansion of its B\"ohm tree. From this it follows that two lambda terms have the same B\"ohm tree if and only if the normal forms of their Taylor expansions coincide.
[ { "created": "Fri, 7 Sep 2018 20:16:32 GMT", "version": "v1" }, { "created": "Sat, 30 Nov 2019 21:11:19 GMT", "version": "v2" }, { "created": "Sat, 11 Apr 2020 12:15:54 GMT", "version": "v3" }, { "created": "Tue, 14 Jul 2020 10:13:35 GMT", "version": "v4" } ]
2023-06-22T00:00:00
[ [ "Kerinec", "Emma", "" ], [ "Manzonetto", "Giulio", "" ], [ "Pagani", "Michele", "" ] ]
0no_new_dataset
1907.06484
Zeon Trevor Fernando
Zeon Trevor Fernando, Jaspreet Singh, Avishek Anand
A study on the Interpretability of Neural Retrieval Models using DeepSHAP
4 pages; SIGIR 2019 Short Paper
null
10.1145/3331184.3331312
null
cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A recent trend in IR has been the usage of neural networks to learn retrieval models for text based adhoc search. While various approaches and architectures have yielded significantly better performance than traditional retrieval models such as BM25, it is still difficult to understand exactly why a document is relevant to a query. In the ML community several approaches for explaining decisions made by deep neural networks have been proposed -- including DeepSHAP which modifies the DeepLift algorithm to estimate the relative importance (shapley values) of input features for a given decision by comparing the activations in the network for a given image against the activations caused by a reference input. In image classification, the reference input tends to be a plain black image. While DeepSHAP has been well studied for image classification tasks, it remains to be seen how we can adapt it to explain the output of Neural Retrieval Models (NRMs). In particular, what is a good "black" image in the context of IR? In this paper we explored various reference input document construction techniques. Additionally, we compared the explanations generated by DeepSHAP to LIME (a model agnostic approach) and found that the explanations differ considerably. Our study raises concerns regarding the robustness and accuracy of explanations produced for NRMs. With this paper we aim to shed light on interesting problems surrounding interpretability in NRMs and highlight areas of future work.
[ { "created": "Mon, 15 Jul 2019 13:09:18 GMT", "version": "v1" } ]
2019-07-16T00:00:00
[ [ "Fernando", "Zeon Trevor", "" ], [ "Singh", "Jaspreet", "" ], [ "Anand", "Avishek", "" ] ]
0no_new_dataset
2309.16411
Nou\'edyn Baspin
Nou\'edyn Baspin
On combinatorial structures in linear codes
null
null
null
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we show that given a connectivity graph $G$ of a $[[n,k,d]]$ quantum code, there exists $\{K_i\}_i, K_i \subset G$, such that $\sum_i |K_i|\in \Omega(k), \ |K_i| \in \Omega(d)$, and the $K_i$'s are $\tilde{\Omega}( \sqrt{{k}/{n}})$-expander. If the codes are classical we show instead that the $K_i$'s are $\tilde{\Omega}\left({{k}/{n}}\right)$-expander. We also show converses to these bounds. In particular, we show that the BPT bound for classical codes is tight in all Euclidean dimensions. Finally, we prove structural theorems for graphs with no "dense" subgraphs which might be of independent interest.
[ { "created": "Thu, 28 Sep 2023 13:03:41 GMT", "version": "v1" } ]
2023-09-29T00:00:00
[ [ "Baspin", "Nouédyn", "" ] ]
0no_new_dataset
1806.03211
Jordan Dworkin
Jordan D. Dworkin, Russell T. Shinohara, Danielle S. Bassett
The landscape of NeuroImage-ing research
null
null
10.1016/j.neuroimage.2018.09.005
null
cs.SI stat.AP
http://creativecommons.org/licenses/by-nc-sa/4.0/
As the field of neuroimaging grows, it can be difficult for scientists within the field to gain and maintain a detailed understanding of its ever-changing landscape. While collaboration and citation networks highlight important contributions within the field, the roles of and relations among specific areas of study can remain quite opaque. Here, we apply techniques from network science to map the landscape of neuroimaging research documented in the journal NeuroImage over the past decade. We create a network in which nodes represent research topics, and edges give the degree to which these topics tend to be covered in tandem. The network displays small-world architecture, with communities characterized by common imaging modalities and medical applications, and with bridges that integrate these distinct subfields. Using node-level analysis, we quantify the structural roles of individual topics within the neuroimaging landscape, and find high levels of clustering within the structural MRI subfield as well as increasing participation among topics related to psychiatry. The overall prevalence of a topic is unrelated to the prevalence of its neighbors, but the degree to which a topic becomes more or less popular over time is strongly related to changes in the prevalence of its neighbors. Broadly, this work presents a cohesive model for understanding the landscape of neuroimaging research across the field, in broad subfields, and within specific topic areas.
[ { "created": "Fri, 8 Jun 2018 15:14:06 GMT", "version": "v1" } ]
2019-01-24T00:00:00
[ [ "Dworkin", "Jordan D.", "" ], [ "Shinohara", "Russell T.", "" ], [ "Bassett", "Danielle S.", "" ] ]
0no_new_dataset
2403.08199
Gantavya Bhatt
Gantavya Bhatt, Arnav Das, Jeff Bilmes
Deep Submodular Peripteral Networks
Preprint
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
Submodular functions, crucial for various applications, often lack practical learning methods for their acquisition. Seemingly unrelated, learning a scaling from oracles offering graded pairwise preferences (GPC) is underexplored, despite a rich history in psychometrics. In this paper, we introduce deep submodular peripteral networks (DSPNs), a novel parametric family of submodular functions, and methods for their training using a contrastive-learning inspired GPC-ready strategy to connect and then tackle both of the above challenges. We introduce newly devised GPC-style "peripteral" loss which leverages numerically graded relationships between pairs of objects (sets in our case). Unlike traditional contrastive learning, our method utilizes graded comparisons, extracting more nuanced information than just binary-outcome comparisons, and contrasts sets of any size (not just two). We also define a novel suite of automatic sampling strategies for training, including active-learning inspired submodular feedback. We demonstrate DSPNs' efficacy in learning submodularity from a costly target submodular function showing superiority in downstream tasks such as experimental design and streaming applications.
[ { "created": "Wed, 13 Mar 2024 02:53:52 GMT", "version": "v1" }, { "created": "Sat, 16 Mar 2024 01:02:35 GMT", "version": "v2" } ]
2024-03-19T00:00:00
[ [ "Bhatt", "Gantavya", "" ], [ "Das", "Arnav", "" ], [ "Bilmes", "Jeff", "" ] ]
0no_new_dataset
1504.04930
Wentao Huang
Wentao Huang and Michael Langberg and Joerg Kliewer
Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability
ISIT 2015. arXiv admin note: text overlap with arXiv:1410.1905
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that solving a multiple-unicast network coding problem can be reduced to solving a single-unicast network error correction problem, where an adversary may jam at most a single edge in the network. Specifically, we present an efficient reduction that maps a multiple-unicast network coding instance to a network error correction instance while preserving feasibility. The reduction holds for both the zero probability of error model and the vanishing probability of error model. Previous reductions are restricted to the zero-error case. As an application of the reduction, we present a constructive example showing that the single-unicast network error correction capacity may not be achievable, a result of separate interest.
[ { "created": "Mon, 20 Apr 2015 04:02:35 GMT", "version": "v1" } ]
2015-04-21T00:00:00
[ [ "Huang", "Wentao", "" ], [ "Langberg", "Michael", "" ], [ "Kliewer", "Joerg", "" ] ]
0no_new_dataset
2207.06553
Xiaodong Yang
Tong Su, Xishun Wang, Xiaodong Yang
QML for Argoverse 2 Motion Forecasting Challenge
null
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To safely navigate in various complex traffic scenarios, autonomous driving systems are generally equipped with a motion forecasting module to provide vital information for the downstream planning module. For the real-world onboard applications, both accuracy and latency of a motion forecasting model are essential. In this report, we present an effective and efficient solution, which ranks the 3rd place in the Argoverse 2 Motion Forecasting Challenge 2022.
[ { "created": "Wed, 13 Jul 2022 23:25:30 GMT", "version": "v1" } ]
2022-07-15T00:00:00
[ [ "Su", "Tong", "" ], [ "Wang", "Xishun", "" ], [ "Yang", "Xiaodong", "" ] ]
0no_new_dataset
1209.3356
Rajkumar Buyya
Rajkumar Buyya, Rodrigo N. Calheiros, and Xiaorong Li
Autonomic Cloud Computing: Open Challenges and Architectural Elements
8 pages, 6 figures, conference keynote paper
Proceedings of the Third International Conference of Emerging Applications of Information Technology (EAIT 2012, IEEE Press, USA), Kolkata, India, November 29-December 01, 2012
10.1109/EAIT.2012.6407847
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As Clouds are complex, large-scale, and heterogeneous distributed systems, management of their resources is a challenging task. They need automated and integrated intelligent strategies for provisioning of resources to offer services that are secure, reliable, and cost-efficient. Hence, effective management of services becomes fundamental in software platforms that constitute the fabric of computing Clouds. In this direction, this paper identifies open issues in autonomic resource provisioning and presents innovative management techniques for supporting SaaS applications hosted on Clouds. We present a conceptual architecture and early results evidencing the benefits of autonomic management of Clouds.
[ { "created": "Sat, 15 Sep 2012 04:40:46 GMT", "version": "v1" } ]
2016-11-17T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Calheiros", "Rodrigo N.", "" ], [ "Li", "Xiaorong", "" ] ]
0no_new_dataset
2111.09444
Max Hopkins
Mitali Bafna, Max Hopkins, Tali Kaufman, Shachar Lovett
Hypercontractivity on High Dimensional Expanders: a Local-to-Global Approach for Higher Moments
New title to distinguish from independent work of Gur, Lifshitz, and Liu
null
null
null
cs.DM cs.CC math.CO
http://creativecommons.org/licenses/by/4.0/
Hypercontractivity is one of the most powerful tools in Boolean function analysis. Originally studied over the discrete hypercube, recent years have seen increasing interest in extensions to settings like the $p$-biased cube, slice, or Grassmannian, where variants of hypercontractivity have found a number of breakthrough applications including the resolution of Khot's 2-2 Games Conjecture (Khot, Minzer, Safra FOCS 2018). In this work, we develop a new theory of hypercontractivity on high dimensional expanders (HDX), an important class of expanding complexes that has recently seen similarly impressive applications in both coding theory and approximate sampling. Our results lead to a new understanding of the structure of Boolean functions on HDX, including a tight analog of the KKL Theorem and a new characterization of non-expanding sets. Unlike previous settings satisfying hypercontractivity, HDX can be asymmetric, sparse, and very far from products, which makes the application of traditional proof techniques challenging. We handle these barriers with the introduction of two new tools of independent interest: a new explicit combinatorial Fourier basis for HDX that behaves well under restriction, and a new local-to-global method for analyzing higher moments. Interestingly, unlike analogous second moment methods that apply equally across all types of expanding complexes, our tools rely inherently on simplicial structure. This suggests a new distinction among high dimensional expanders based upon their behavior beyond the second moment.
[ { "created": "Wed, 17 Nov 2021 23:17:16 GMT", "version": "v1" }, { "created": "Wed, 24 Nov 2021 08:13:47 GMT", "version": "v2" } ]
2021-11-29T00:00:00
[ [ "Bafna", "Mitali", "" ], [ "Hopkins", "Max", "" ], [ "Kaufman", "Tali", "" ], [ "Lovett", "Shachar", "" ] ]
0no_new_dataset
1001.4137
Sagar Shenvi
Sagar Shenvi and Bikash Kumar Dey
On the solvability of 3-source 3-terminal sum-networks
Major revision in the structure of the paper. 24 pages, 15 figures. Shorter version accepted to ISIT 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a directed acyclic network with three sources and three terminals such that each source independently generates one symbol from a given field $F$ and each terminal wants to receive the sum (over $F$) of the source symbols. Each link in the network is considered to be error-free and delay-free and can carry one symbol from the field in each use. We call such a network a 3-source 3-terminal {\it $(3s/3t)$ sum-network}. In this paper, we give a necessary and sufficient condition for a $3s/3t$ sum-network to allow all the terminals to receive the sum of the source symbols over \textit{any} field. Some lemmas provide interesting simpler sufficient conditions for the same. We show that linear codes are sufficient for this problem for $3s/3t$ though they are known to be insufficient for arbitrary number of sources and terminals. We further show that in most cases, such networks are solvable by simple XOR coding. We also prove a recent conjecture that if fractional coding is allowed, then the coding capacity of a $3s/3t$ sum-network is either $0,2/3$ or $\geq 1$.
[ { "created": "Sat, 23 Jan 2010 07:59:53 GMT", "version": "v1" }, { "created": "Tue, 9 Feb 2010 11:20:14 GMT", "version": "v2" }, { "created": "Mon, 19 Apr 2010 12:50:25 GMT", "version": "v3" } ]
2015-03-13T00:00:00
[ [ "Shenvi", "Sagar", "" ], [ "Dey", "Bikash Kumar", "" ] ]
0no_new_dataset
1903.07097
Abdullah Alomar
Anish Agarwal, Abdullah Alomar, Devavrat Shah
tspDB: Time Series Predict DB
null
null
null
null
cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A major bottleneck of the current Machine Learning (ML) workflow is the time consuming, error prone engineering required to get data from a datastore or a database (DB) to the point an ML algorithm can be applied to it. Hence, we explore the feasibility of directly integrating prediction functionality on top of a data store or DB. Such a system ideally: (i) provides an intuitive prediction query interface which alleviates the unwieldy data engineering; (ii) provides state-of-the-art statistical accuracy while ensuring incremental model update, low model training time and low latency for making predictions. As the main contribution we explicitly instantiate a proof-of-concept, tspDB, which directly integrates with PostgreSQL. We rigorously test tspDB's statistical and computational performance against the state-of-the-art time series algorithms, including a Long-Short-Term-Memory (LSTM) neural network and DeepAR (industry standard deep learning library by Amazon). Statistically, on standard time series benchmarks, tspDB outperforms LSTM and DeepAR with 1.1-1.3x higher relative accuracy. Computationally, tspDB is 59-62x and 94-95x faster compared to LSTM and DeepAR in terms of median ML model training time and prediction query latency, respectively. Further, compared to PostgreSQL's bulk insert time and its SELECT query latency, tspDB is slower only by 1.3x and 2.6x respectively. That is, tspDB is a real-time prediction system in that its model training / prediction query time is similar to just inserting / reading data from a DB. As an algorithmic contribution, we introduce an incremental multivariate matrix factorization based time series method, which tspDB is built off. We show this method also allows one to produce reliable prediction intervals by accurately estimating the time-varying variance of a time series, thereby addressing an important problem in time series analysis.
[ { "created": "Sun, 17 Mar 2019 14:28:50 GMT", "version": "v1" }, { "created": "Thu, 19 Sep 2019 00:43:53 GMT", "version": "v2" }, { "created": "Tue, 24 Sep 2019 04:55:58 GMT", "version": "v3" }, { "created": "Wed, 24 Jun 2020 03:12:35 GMT", "version": "v4" }, { "created": "Fri, 10 Jul 2020 20:41:47 GMT", "version": "v5" }, { "created": "Sat, 12 Dec 2020 20:31:12 GMT", "version": "v6" }, { "created": "Sat, 13 Feb 2021 17:58:59 GMT", "version": "v7" } ]
2021-02-16T00:00:00
[ [ "Agarwal", "Anish", "" ], [ "Alomar", "Abdullah", "" ], [ "Shah", "Devavrat", "" ] ]
0no_new_dataset