id
stringlengths 9
10
| submitter
stringlengths 5
46
⌀ | authors
stringlengths 5
1.31k
| title
stringlengths 8
223
| comments
stringlengths 2
574
⌀ | journal-ref
stringclasses 587
values | doi
stringclasses 784
values | report-no
stringclasses 75
values | categories
stringlengths 5
72
| license
stringclasses 9
values | abstract
stringlengths 82
3.31k
| versions
listlengths 1
15
| update_date
timestamp[us] | authors_parsed
sequencelengths 1
76
| label
class label 2
classes |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1709.00268 | Santiago Hern\'andez Orozco | Santiago Hern\'andez-Orozco, Narsis A. Kiani and Hector Zenil | Algorithmically probable mutations reproduce aspects of evolution such
as convergence rate, genetic memory, and modularity | 13 pages, 10 figures | null | null | null | cs.NE cs.IT math.IT q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Natural selection explains how life has evolved over millions of years from
more primitive forms. The speed at which this happens, however, has sometimes
defied formal explanations when based on random (uniformly distributed)
mutations. Here we investigate the application of a simplicity bias based on a
natural but algorithmic distribution of mutations (no recombination) in various
examples, particularly binary matrices in order to compare evolutionary
convergence rates. Results both on synthetic and on small biological examples
indicate an accelerated rate when mutations are not statistical uniform but
\textit{algorithmic uniform}. We show that algorithmic distributions can evolve
modularity and genetic memory by preservation of structures when they first
occur sometimes leading to an accelerated production of diversity but also
population extinctions, possibly explaining naturally occurring phenomena such
as diversity explosions (e.g. the Cambrian) and massive extinctions (e.g. the
End Triassic) whose causes are currently a cause for debate. The natural
approach introduced here appears to be a better approximation to biological
evolution than models based exclusively upon random uniform mutations, and it
also approaches a formal version of open-ended evolution based on previous
formal results. These results validate some suggestions in the direction that
computation may be an equally important driver of evolution. We also show that
inducing the method on problems of optimization, such as genetic algorithms,
has the potential to accelerate convergence of artificial evolutionary
algorithms.
| [
{
"created": "Fri, 1 Sep 2017 12:12:02 GMT",
"version": "v1"
},
{
"created": "Tue, 5 Sep 2017 11:27:40 GMT",
"version": "v2"
},
{
"created": "Wed, 6 Sep 2017 00:51:01 GMT",
"version": "v3"
},
{
"created": "Thu, 14 Sep 2017 19:18:19 GMT",
"version": "v4"
},
{
"created": "Fri, 1 Dec 2017 00:06:20 GMT",
"version": "v5"
},
{
"created": "Thu, 1 Feb 2018 22:23:08 GMT",
"version": "v6"
},
{
"created": "Sat, 10 Mar 2018 19:36:29 GMT",
"version": "v7"
},
{
"created": "Wed, 20 Jun 2018 20:23:47 GMT",
"version": "v8"
}
] | 2018-06-22T00:00:00 | [
[
"Hernández-Orozco",
"Santiago",
""
],
[
"Kiani",
"Narsis A.",
""
],
[
"Zenil",
"Hector",
""
]
] | 0no_new_dataset
|
2310.00760 | Faraz Lotfi Dr | Faraz Lotfi, Khalil Virji, Farnoosh Faraji, Lucas Berry, Andrew
Holliday, David Meger, Gregory Dudek | Uncertainty-aware hybrid paradigm of nonlinear MPC and model-based RL
for offroad navigation: Exploration of transformers in the predictive model | null | null | null | null | cs.RO | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this paper, we investigate a hybrid scheme that combines nonlinear model
predictive control (MPC) and model-based reinforcement learning (RL) for
navigation planning of an autonomous model car across offroad, unstructured
terrains without relying on predefined maps. Our innovative approach takes
inspiration from BADGR, an LSTM-based network that primarily concentrates on
environment modeling, but distinguishes itself by substituting LSTM modules
with transformers to greatly elevate the performance our model. Addressing
uncertainty within the system, we train an ensemble of predictive models and
estimate the mutual information between model weights and outputs, facilitating
dynamic horizon planning through the introduction of variable speeds. Further
enhancing our methodology, we incorporate a nonlinear MPC controller that
accounts for the intricacies of the vehicle's model and states. The model-based
RL facet produces steering angles and quantifies inherent uncertainty. At the
same time, the nonlinear MPC suggests optimal throttle settings, striking a
balance between goal attainment speed and managing model uncertainty influenced
by velocity. In the conducted studies, our approach excels over the existing
baseline by consistently achieving higher metric values in predicting future
events and seamlessly integrating the vehicle's kinematic model for enhanced
decision-making. The code and the evaluation data are available at
https://github.com/FARAZLOTFI/offroad_autonomous_navigation/).
| [
{
"created": "Sun, 1 Oct 2023 18:47:02 GMT",
"version": "v1"
}
] | 2023-10-03T00:00:00 | [
[
"Lotfi",
"Faraz",
""
],
[
"Virji",
"Khalil",
""
],
[
"Faraji",
"Farnoosh",
""
],
[
"Berry",
"Lucas",
""
],
[
"Holliday",
"Andrew",
""
],
[
"Meger",
"David",
""
],
[
"Dudek",
"Gregory",
""
]
] | 0no_new_dataset
|
1802.07653 | Babajide Ayinde | Babajide O. Ayinde and Jacek M. Zurada | Building Efficient ConvNets using Redundant Feature Pruning | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an efficient technique to prune deep and/or wide
convolutional neural network models by eliminating redundant features (or
filters). Previous studies have shown that over-sized deep neural network
models tend to produce a lot of redundant features that are either shifted
version of one another or are very similar and show little or no variations;
thus resulting in filtering redundancy. We propose to prune these redundant
features along with their connecting feature maps according to their
differentiation and based on their relative cosine distances in the feature
space, thus yielding smaller network size with reduced inference costs and
competitive performance. We empirically show on select models and CIFAR-10
dataset that inference costs can be reduced by 40% for VGG-16, 27% for
ResNet-56, and 39% for ResNet-110.
| [
{
"created": "Wed, 21 Feb 2018 16:31:28 GMT",
"version": "v1"
}
] | 2018-02-22T00:00:00 | [
[
"Ayinde",
"Babajide O.",
""
],
[
"Zurada",
"Jacek M.",
""
]
] | 0no_new_dataset
|
2312.06886 | Mengwei Ren | Mengwei Ren, Wei Xiong, Jae Shin Yoon, Zhixin Shu, Jianming Zhang,
HyunJoon Jung, Guido Gerig, He Zhang | Relightful Harmonization: Lighting-aware Portrait Background Replacement | CVPR 2024 camera ready | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Portrait harmonization aims to composite a subject into a new background,
adjusting its lighting and color to ensure harmony with the background scene.
Existing harmonization techniques often only focus on adjusting the global
color and brightness of the foreground and ignore crucial illumination cues
from the background such as apparent lighting direction, leading to unrealistic
compositions. We introduce Relightful Harmonization, a lighting-aware diffusion
model designed to seamlessly harmonize sophisticated lighting effect for the
foreground portrait using any background image. Our approach unfolds in three
stages. First, we introduce a lighting representation module that allows our
diffusion model to encode lighting information from target image background.
Second, we introduce an alignment network that aligns lighting features learned
from image background with lighting features learned from panorama environment
maps, which is a complete representation for scene illumination. Last, to
further boost the photorealism of the proposed method, we introduce a novel
data simulation pipeline that generates synthetic training pairs from a diverse
range of natural images, which are used to refine the model. Our method
outperforms existing benchmarks in visual fidelity and lighting coherence,
showing superior generalization in real-world testing scenarios, highlighting
its versatility and practicality.
| [
{
"created": "Mon, 11 Dec 2023 23:20:31 GMT",
"version": "v1"
},
{
"created": "Sun, 7 Apr 2024 21:41:05 GMT",
"version": "v2"
}
] | 2024-04-09T00:00:00 | [
[
"Ren",
"Mengwei",
""
],
[
"Xiong",
"Wei",
""
],
[
"Yoon",
"Jae Shin",
""
],
[
"Shu",
"Zhixin",
""
],
[
"Zhang",
"Jianming",
""
],
[
"Jung",
"HyunJoon",
""
],
[
"Gerig",
"Guido",
""
],
[
"Zhang",
"He",
""
]
] | 1new_dataset
|
2207.01112 | Vahid Reza Khazaie | Vahid Reza Khazaie and Anthony Wong and Yalda Mohsenzadeh | Augment to Detect Anomalies with Continuous Labelling | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Anomaly detection is to recognize samples that differ in some respect from
the training observations. These samples which do not conform to the
distribution of normal data are called outliers or anomalies. In real-world
anomaly detection problems, the outliers are absent, not well defined, or have
a very limited number of instances. Recent state-of-the-art deep learning-based
anomaly detection methods suffer from high computational cost, complexity,
unstable training procedures, and non-trivial implementation, making them
difficult to deploy in real-world applications. To combat this problem, we
leverage a simple learning procedure that trains a lightweight convolutional
neural network, reaching state-of-the-art performance in anomaly detection. In
this paper, we propose to solve anomaly detection as a supervised regression
problem. We label normal and anomalous data using two separable distributions
of continuous values. To compensate for the unavailability of anomalous samples
during training time, we utilize straightforward image augmentation techniques
to create a distinct set of samples as anomalies. The distribution of the
augmented set is similar but slightly deviated from the normal data, whereas
real anomalies are expected to have an even further distribution. Therefore,
training a regressor on these augmented samples will result in more separable
distributions of labels for normal and real anomalous data points. Anomaly
detection experiments on image and video datasets show the superiority of the
proposed method over the state-of-the-art approaches.
| [
{
"created": "Sun, 3 Jul 2022 20:11:51 GMT",
"version": "v1"
}
] | 2022-07-05T00:00:00 | [
[
"Khazaie",
"Vahid Reza",
""
],
[
"Wong",
"Anthony",
""
],
[
"Mohsenzadeh",
"Yalda",
""
]
] | 1new_dataset
|
1910.10263 | Christopher Buss | Ben McCamish, Christopher Buss, Arash Termehchy, David Maier | Integrating Information About Entities Progressively | demonstration | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Users often have to integrate information about entities from multiple data
sources. This task is challenging as each data source may represent information
about the same entity in a distinct form, e.g., each data source may use a
different name for the same person. Currently, data from different
representations are translated into a unified one via lengthy and costly expert
attention and tuning. Such methods cannot scale to the rapidly increasing
number and variety of available data sources. We demonstrate ProgMap, a
entity-matching framework in which data sources learn to collaborate and
integrate information about entities on-demand and with minimal expert
intervention. The data sources leverage user feedback to improve the accuracy
of their collaboration and results. ProgMap also has techniques to reduce the
amount of required user feedback to achieve effective matchings.
| [
{
"created": "Tue, 22 Oct 2019 22:40:24 GMT",
"version": "v1"
}
] | 2019-10-24T00:00:00 | [
[
"McCamish",
"Ben",
""
],
[
"Buss",
"Christopher",
""
],
[
"Termehchy",
"Arash",
""
],
[
"Maier",
"David",
""
]
] | 0no_new_dataset
|
1603.08379 | Brian Ruttenberg | Brian Ruttenberg, Lee Kellogg, Avi Pfeffer | Probabilistic Programming for Malware Analysis | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constructing lineages of malware is an important cyber-defense task.
Performing this task is difficult, however, due to the amount of malware data
and obfuscation techniques by the authors. In this work, we formulate the
lineage task as a probabilistic model, and use a novel probabilistic
programming solution to jointly infer the lineage and creation times of
families of malware.
| [
{
"created": "Mon, 28 Mar 2016 13:40:29 GMT",
"version": "v1"
}
] | 2016-03-29T00:00:00 | [
[
"Ruttenberg",
"Brian",
""
],
[
"Kellogg",
"Lee",
""
],
[
"Pfeffer",
"Avi",
""
]
] | 0no_new_dataset
|
1812.09926 | Sirui Xie | Sirui Xie, Hehui Zheng, Chunxiao Liu, Liang Lin | SNAS: Stochastic Neural Architecture Search | ICLR 2019 | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose Stochastic Neural Architecture Search (SNAS), an economical
end-to-end solution to Neural Architecture Search (NAS) that trains neural
operation parameters and architecture distribution parameters in same round of
back-propagation, while maintaining the completeness and differentiability of
the NAS pipeline. In this work, NAS is reformulated as an optimization problem
on parameters of a joint distribution for the search space in a cell. To
leverage the gradient information in generic differentiable loss for
architecture search, a novel search gradient is proposed. We prove that this
search gradient optimizes the same objective as reinforcement-learning-based
NAS, but assigns credits to structural decisions more efficiently. This credit
assignment is further augmented with locally decomposable reward to enforce a
resource-efficient constraint. In experiments on CIFAR-10, SNAS takes less
epochs to find a cell architecture with state-of-the-art accuracy than
non-differentiable evolution-based and reinforcement-learning-based NAS, which
is also transferable to ImageNet. It is also shown that child networks of SNAS
can maintain the validation accuracy in searching, with which attention-based
NAS requires parameter retraining to compete, exhibiting potentials to stride
towards efficient NAS on big datasets. We have released our implementation at
https://github.com/SNAS-Series/SNAS-Series.
| [
{
"created": "Mon, 24 Dec 2018 14:13:16 GMT",
"version": "v1"
},
{
"created": "Sat, 12 Jan 2019 17:19:01 GMT",
"version": "v2"
},
{
"created": "Wed, 1 Apr 2020 00:44:35 GMT",
"version": "v3"
}
] | 2020-04-02T00:00:00 | [
[
"Xie",
"Sirui",
""
],
[
"Zheng",
"Hehui",
""
],
[
"Liu",
"Chunxiao",
""
],
[
"Lin",
"Liang",
""
]
] | 0no_new_dataset
|
2206.10059 | Qi Zheng | Qi Zheng, Chaoyue Wang, Dadong Wang | Bypass Network for Semantics Driven Image Paragraph Captioning | Under consideration at Computer Vision and Image Understanding | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Image paragraph captioning aims to describe a given image with a sequence of
coherent sentences. Most existing methods model the coherence through the topic
transition that dynamically infers a topic vector from preceding sentences.
However, these methods still suffer from immediate or delayed repetitions in
generated paragraphs because (i) the entanglement of syntax and semantics
distracts the topic vector from attending pertinent visual regions; (ii) there
are few constraints or rewards for learning long-range transitions. In this
paper, we propose a bypass network that separately models semantics and
linguistic syntax of preceding sentences. Specifically, the proposed model
consists of two main modules, i.e. a topic transition module and a sentence
generation module. The former takes previous semantic vectors as queries and
applies attention mechanism on regional features to acquire the next topic
vector, which reduces immediate repetition by eliminating linguistics. The
latter decodes the topic vector and the preceding syntax state to produce the
following sentence. To further reduce delayed repetition in generated
paragraphs, we devise a replacement-based reward for the REINFORCE training.
Comprehensive experiments on the widely used benchmark demonstrate the
superiority of the proposed model over the state of the art for coherence while
maintaining high accuracy.
| [
{
"created": "Tue, 21 Jun 2022 00:48:22 GMT",
"version": "v1"
}
] | 2022-06-22T00:00:00 | [
[
"Zheng",
"Qi",
""
],
[
"Wang",
"Chaoyue",
""
],
[
"Wang",
"Dadong",
""
]
] | 0no_new_dataset
|
2007.11318 | Kenneth Lai | K. Lai, S. Samoil, and S.N.Yanushkevich | Multi-Spectral Facial Biometrics in Access Control | null | 2014 IEEE Symposium on Computational Intelligence in Biometrics
and Identity Management (CIBIM), Orlando, FL, 2014, pp. 102-109 | 10.1109/CIBIM.2014.7015450 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study demonstrates how facial biometrics, acquired using multi-spectral
sensors, such as RGB, depth, and infrared, assist the data accumulation in the
process of authorizing users of automated and semi-automated access systems.
This data serves the purposes of person authentication, as well as facial
temperature estimation. We utilize depth data taken using an inexpensive RGB-D
sensor to find the head pose of a subject. This allows the selection of video
frames containing a frontal-view head pose for face recognition and face
temperature reading. Usage of the frontal-view frames improves the efficiency
of face recognition while the corresponding synchronized IR video frames allow
for more efficient temperature estimation for facial regions of interest. In
addition, this study reports emerging applications of biometrics in biomedical
and health care solutions. Including surveys of recent pilot projects,
involving new sensors of biometric data and new applications of human
physiological and behavioral biometrics. It also shows the new and promising
horizons of using biometrics in natural and contactless control interfaces for
surgical control, rehabilitation and accessibility.
| [
{
"created": "Wed, 22 Jul 2020 10:16:05 GMT",
"version": "v1"
}
] | 2020-07-23T00:00:00 | [
[
"Lai",
"K.",
""
],
[
"Samoil",
"S.",
""
],
[
"Yanushkevich",
"S. N.",
""
]
] | 1new_dataset
|
1811.10103 | Johanna Hansen | Johanna Hansen, Sandeep Manjanna, Alberto Quattrini Li, Ioannis
Rekleitis and Gregory Dudek | Autonomous Marine Sampling Enhanced by Strategically Deployed Drifters
in Marine Flow Fields | 7 pages, 7 figures, MTS/IEEE OCEANS 2018 Conference | null | 10.1109/OCEANS.2018.8604873 | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | We present a transportable system for ocean observations in which a small
autonomous surface vehicle (ASV) adaptively collects spatially diverse samples
with aid from a team of inexpensive, passive floating sensors known as
drifters. Drifters can provide an increase in spatial coverage at little cost
as they are propelled about the survey area by the ambient flow field instead
of with actuators. Our iterative planning approach demonstrates how we can use
the ASV to strategically deploy drifters into points of the flow field for high
expected information gain, while also adaptively sampling the space. In this
paper, we examine the performance of this heterogeneous sensing system in
simulated flow field experiments.
| [
{
"created": "Sun, 25 Nov 2018 21:44:41 GMT",
"version": "v1"
}
] | 2021-01-13T00:00:00 | [
[
"Hansen",
"Johanna",
""
],
[
"Manjanna",
"Sandeep",
""
],
[
"Li",
"Alberto Quattrini",
""
],
[
"Rekleitis",
"Ioannis",
""
],
[
"Dudek",
"Gregory",
""
]
] | 0no_new_dataset
|
2305.05576 | Pratyush Kumar | Pratyush Kumar | Large Language Models Humanize Technology | null | null | null | null | cs.CY cs.CL | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) have made rapid progress in recent months and
weeks, garnering significant public attention. This has sparked concerns about
aligning these models with human values, their impact on labor markets, and the
potential need for regulation in further research and development. However, the
discourse often lacks a focus on the imperative to widely diffuse the societal
benefits of LLMs. To qualify this societal benefit, we assert that LLMs exhibit
emergent abilities to humanize technology more effectively than previous
technologies, and for people across language, occupation, and accessibility
divides. We argue that they do so by addressing three mechanizing bottlenecks
in today's computing technologies: creating diverse and accessible content,
learning complex digital tools, and personalizing machine learning algorithms.
We adopt a case-based approach and illustrate each bottleneck with two examples
where current technology imposes bottlenecks that LLMs demonstrate the ability
to address. Given this opportunity to humanize technology widely, we advocate
for more widespread understanding of LLMs, tools and methods to simplify use of
LLMs, and cross-cutting institutional capacity.
| [
{
"created": "Tue, 9 May 2023 16:05:36 GMT",
"version": "v1"
}
] | 2023-05-10T00:00:00 | [
[
"Kumar",
"Pratyush",
""
]
] | 0no_new_dataset
|
cs/0611125 | Yasutada Oohama | Yasutada Oohama | Relay Channels with Confidential Messages | 20 pages, 6 figures, submitted to IEEE Transactions on Information
Theory, Special issue on Information Theoretic Security | null | null | null | cs.IT math.IT | null | We consider a relay channel where a relay helps the transmission of messages
from one sender to one receiver. The relay is considered not only as a sender
that helps the message transmission but as a wire-tapper who can obtain some
knowledge about the transmitted messages. In this paper we study the coding
problem of the relay channel under the situation that some of transmitted
messages are confidential to the relay. A security of such confidential
messages is measured by the conditional entropy. The rate region is defined by
the set of transmission rates for which messages are reliably transmitted and
the security of confidential messages is larger than a prescribed level. In
this paper we give two definition of the rate region. We first define the rate
region in the case of deterministic encoder and call it the deterministic rate
region. Next, we define the rate region in the case of stochastic encoder and
call it the stochastic rate region. We derive explicit inner and outer bounds
for the above two rate regions and present a class of relay channels where two
bounds match. Furthermore, we show that stochastic encoder can enlarge the rate
region. We also evaluate the deterministic rate region of the Gaussian relay
channel with confidential messages.
| [
{
"created": "Fri, 24 Nov 2006 12:39:46 GMT",
"version": "v1"
},
{
"created": "Mon, 27 Nov 2006 09:37:21 GMT",
"version": "v2"
},
{
"created": "Tue, 5 Dec 2006 11:15:29 GMT",
"version": "v3"
},
{
"created": "Thu, 21 Dec 2006 12:26:23 GMT",
"version": "v4"
},
{
"created": "Mon, 19 Feb 2007 13:22:09 GMT",
"version": "v5"
},
{
"created": "Wed, 21 Feb 2007 15:21:39 GMT",
"version": "v6"
},
{
"created": "Sat, 24 Mar 2007 12:22:17 GMT",
"version": "v7"
}
] | 2007-07-13T00:00:00 | [
[
"Oohama",
"Yasutada",
""
]
] | 0no_new_dataset
|
2202.10324 | Che Wang | Che Wang, Xufang Luo, Keith Ross, Dongsheng Li | VRL3: A Data-Driven Framework for Visual Deep Reinforcement Learning | 41 pages, camera-ready final version, accepted to NeurIPS 2022 | null | null | null | cs.CV cs.AI cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose VRL3, a powerful data-driven framework with a simple design for
solving challenging visual deep reinforcement learning (DRL) tasks. We analyze
a number of major obstacles in taking a data-driven approach, and present a
suite of design principles, novel findings, and critical insights about
data-driven visual DRL. Our framework has three stages: in stage 1, we leverage
non-RL datasets (e.g. ImageNet) to learn task-agnostic visual representations;
in stage 2, we use offline RL data (e.g. a limited number of expert
demonstrations) to convert the task-agnostic representations into more powerful
task-specific representations; in stage 3, we fine-tune the agent with online
RL. On a set of challenging hand manipulation tasks with sparse reward and
realistic visual inputs, compared to the previous SOTA, VRL3 achieves an
average of 780% better sample efficiency. And on the hardest task, VRL3 is
1220% more sample efficient (2440% when using a wider encoder) and solves the
task with only 10% of the computation. These significant results clearly
demonstrate the great potential of data-driven deep reinforcement learning.
| [
{
"created": "Thu, 17 Feb 2022 09:51:32 GMT",
"version": "v1"
},
{
"created": "Sat, 24 Sep 2022 09:45:01 GMT",
"version": "v2"
},
{
"created": "Fri, 31 Mar 2023 06:41:29 GMT",
"version": "v3"
}
] | 2023-04-03T00:00:00 | [
[
"Wang",
"Che",
""
],
[
"Luo",
"Xufang",
""
],
[
"Ross",
"Keith",
""
],
[
"Li",
"Dongsheng",
""
]
] | 0no_new_dataset
|
1808.03841 | Jia Pan | Tingxiang Fan, Pinxin Long, Wenxi Liu, Jia Pan | Fully Distributed Multi-Robot Collision Avoidance via Deep Reinforcement
Learning for Safe and Efficient Navigation in Complex Scenarios | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a decentralized sensor-level collision avoidance
policy for multi-robot systems, which shows promising results in practical
applications. In particular, our policy directly maps raw sensor measurements
to an agent's steering commands in terms of the movement velocity. As a first
step toward reducing the performance gap between decentralized and centralized
methods, we present a multi-scenario multi-stage training framework to learn an
optimal policy. The policy is trained over a large number of robots in rich,
complex environments simultaneously using a policy gradient based reinforcement
learning algorithm. The learning algorithm is also integrated into a hybrid
control framework to further improve the policy's robustness and effectiveness.
We validate the learned sensor-level collision avoidance policy in a variety
of simulated and real-world scenarios with thorough performance evaluations for
large-scale multi-robot systems. The generalization of the learned policy is
verified in a set of unseen scenarios including the navigation of a group of
heterogeneous robots and a large-scale scenario with 100 robots. Although the
policy is trained using simulation data only, we have successfully deployed it
on physical robots with shapes and dynamics characteristics that are different
from the simulated agents, in order to demonstrate the controller's robustness
against the sim-to-real modeling error. Finally, we show that the
collision-avoidance policy learned from multi-robot navigation tasks provides
an excellent solution to the safe and effective autonomous navigation for a
single robot working in a dense real human crowd. Our learned policy enables a
robot to make effective progress in a crowd without getting stuck. Videos are
available at https://sites.google.com/view/hybridmrca
| [
{
"created": "Sat, 11 Aug 2018 17:33:40 GMT",
"version": "v1"
}
] | 2018-08-14T00:00:00 | [
[
"Fan",
"Tingxiang",
""
],
[
"Long",
"Pinxin",
""
],
[
"Liu",
"Wenxi",
""
],
[
"Pan",
"Jia",
""
]
] | 0no_new_dataset
|
1401.3146 | Johannes Rauh | Nils Bertschinger, Johannes Rauh | The Blackwell relation defines no lattice | 5 pages, 1 figure | null | 10.1109/ISIT.2014.6875280 | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Blackwell's theorem shows the equivalence of two preorders on the set of
information channels. Here, we restate, and slightly generalize, his result in
terms of random variables. Furthermore, we prove that the corresponding partial
order is not a lattice; that is, least upper bounds and greatest lower bounds
do not exist.
| [
{
"created": "Tue, 14 Jan 2014 11:30:27 GMT",
"version": "v1"
}
] | 2015-03-05T00:00:00 | [
[
"Bertschinger",
"Nils",
""
],
[
"Rauh",
"Johannes",
""
]
] | 0no_new_dataset
|
1602.08128 | Zhenhao Ge | Zhenhao Ge, Sudhendu R. Sharma, Mark J. T. Smith | PCA Method for Automated Detection of Mispronounced Words | SPIE Defense, Security, and Sensing | null | 10.1117/12.884155 | null | cs.SD cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a method for detecting mispronunciations with the aim of
improving Computer Assisted Language Learning (CALL) tools used by foreign
language learners. The algorithm is based on Principle Component Analysis
(PCA). It is hierarchical with each successive step refining the estimate to
classify the test word as being either mispronounced or correct. Preprocessing
before detection, like normalization and time-scale modification, is
implemented to guarantee uniformity of the feature vectors input to the
detection system. The performance using various features including spectrograms
and Mel-Frequency Cepstral Coefficients (MFCCs) are compared and evaluated.
Best results were obtained using MFCCs, achieving up to 99% accuracy in word
verification and 93% in native/non-native classification. Compared with Hidden
Markov Models (HMMs) which are used pervasively in recognition application,
this particular approach is computational efficient and effective when training
data is limited.
| [
{
"created": "Thu, 25 Feb 2016 21:48:56 GMT",
"version": "v1"
}
] | 2016-02-29T00:00:00 | [
[
"Ge",
"Zhenhao",
""
],
[
"Sharma",
"Sudhendu R.",
""
],
[
"Smith",
"Mark J. T.",
""
]
] | 0no_new_dataset
|
1708.03604 | Alfio Lazzaro | Iain Bethune, Andeas Gloess, Juerg Hutter, Alfio Lazzaro, Hans Pabst,
Fiona Reid | Porting of the DBCSR library for Sparse Matrix-Matrix Multiplications to
Intel Xeon Phi systems | Submitted to the ParCo2017 conference, Bologna, Italy 12-15 September
2017 | Advances in Parallel Computing, Volume 32: Parallel Computing is
Everywhere, pp 47 - 56, 2018, IOS Press | 10.3233/978-1-61499-843-3-47 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiplication of two sparse matrices is a key operation in the simulation of
the electronic structure of systems containing thousands of atoms and
electrons. The highly optimized sparse linear algebra library DBCSR
(Distributed Block Compressed Sparse Row) has been specifically designed to
efficiently perform such sparse matrix-matrix multiplications. This library is
the basic building block for linear scaling electronic structure theory and low
scaling correlated methods in CP2K. It is parallelized using MPI and OpenMP,
and can exploit GPU accelerators by means of CUDA. We describe a performance
comparison of DBCSR on systems with Intel Xeon Phi Knights Landing (KNL)
processors, with respect to systems with Intel Xeon CPUs (including systems
with GPUs). We find that the DBCSR on Cray XC40 KNL-based systems is 11%-14%
slower than on a hybrid Cray XC50 with Nvidia P100 cards, at the same number of
nodes. When compared to a Cray XC40 system equipped with dual-socket Intel Xeon
CPUs, the KNL is up to 24% faster.
| [
{
"created": "Fri, 11 Aug 2017 16:35:59 GMT",
"version": "v1"
},
{
"created": "Mon, 21 Aug 2017 11:55:20 GMT",
"version": "v2"
}
] | 2018-03-13T00:00:00 | [
[
"Bethune",
"Iain",
""
],
[
"Gloess",
"Andeas",
""
],
[
"Hutter",
"Juerg",
""
],
[
"Lazzaro",
"Alfio",
""
],
[
"Pabst",
"Hans",
""
],
[
"Reid",
"Fiona",
""
]
] | 0no_new_dataset
|
2103.02309 | Ugur Gudukbay | Aytek Aman, Serkan Demirci, U\u{g}ur G\"ud\"ukbay | Compact Tetrahedralization-based Acceleration Structure for Ray Tracing | null | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a compact and efficient tetrahedral mesh representation to improve
the ray-tracing performance. We reorder tetrahedral mesh data using a
space-filling curve to improve cache locality. Most importantly, we propose an
efficient ray traversal algorithm. We provide details of common ray tracing
operations on tetrahedral meshes and give the GPU implementation of our
traversal method. We demonstrate our findings through a set of comprehensive
experiments. Our method outperforms existing tetrahedral mesh-based traversal
methods and yields comparable results to the traversal methods based on the
state of the art acceleration structures such as k-dimensional (k-d) trees and
Bounding Volume Hierarchies (BVHs).
| [
{
"created": "Wed, 3 Mar 2021 10:39:03 GMT",
"version": "v1"
}
] | 2021-03-04T00:00:00 | [
[
"Aman",
"Aytek",
""
],
[
"Demirci",
"Serkan",
""
],
[
"Güdükbay",
"Uğur",
""
]
] | 0no_new_dataset
|
1705.04108 | Mohammed Al-Imari | Mohammed Al-Imari, Pei Xiao, Muhammad Ali Imran, and Rahim Tafazolli | Uplink Non-Orthogonal Multiple Access for 5G Wireless Networks | Presented in the International Symposium on Wireless Communications
Systems (ISWCS), 2014 | null | 10.1109/ISWCS.2014.6933459 | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Orthogonal Frequency Division Multiple Access (OFDMA) as well as other
orthogonal multiple access techniques fail to achieve the system capacity limit
in the uplink due to the exclusivity in resource allocation. This issue is more
prominent when fairness among the users is considered in the system. Current
Non-Orthogonal Multiple Access (NOMA) techniques introduce redundancy by
coding/spreading to facilitate the users' signals separation at the receiver,
which degrade the system spectral efficiency. Hence, in order to achieve higher
capacity, more efficient NOMA schemes need to be developed. In this paper, we
propose a NOMA scheme for uplink that removes the resource allocation
exclusivity and allows more than one user to share the same subcarrier without
any coding/spreading redundancy. Joint processing is implemented at the
receiver to detect the users' signals. However, to control the receiver
complexity, an upper limit on the number of users per subcarrier needs to be
imposed. In addition, a novel subcarrier and power allocation algorithm is
proposed for the new NOMA scheme that maximizes the users' sum-rate. The
link-level performance evaluation has shown that the proposed scheme achieves
bit error rate close to the single-user case. Numerical results show that the
proposed NOMA scheme can significantly improve the system performance in terms
of spectral efficiency and fairness comparing to OFDMA.
| [
{
"created": "Thu, 11 May 2017 10:54:41 GMT",
"version": "v1"
}
] | 2017-05-12T00:00:00 | [
[
"Al-Imari",
"Mohammed",
""
],
[
"Xiao",
"Pei",
""
],
[
"Imran",
"Muhammad Ali",
""
],
[
"Tafazolli",
"Rahim",
""
]
] | 0no_new_dataset
|
2302.11982 | Boyang Zhang | Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang | A Plot is Worth a Thousand Words: Model Information Stealing Attacks via
Scientific Plots | To appear in the 32nd USENIX Security Symposium, August 2023,
Anaheim, CA, USA | null | null | null | cs.CR cs.LG | http://creativecommons.org/licenses/by/4.0/ | Building advanced machine learning (ML) models requires expert knowledge and
many trials to discover the best architecture and hyperparameter settings.
Previous work demonstrates that model information can be leveraged to assist
other attacks, such as membership inference, generating adversarial examples.
Therefore, such information, e.g., hyperparameters, should be kept
confidential. It is well known that an adversary can leverage a target ML
model's output to steal the model's information. In this paper, we discover a
new side channel for model information stealing attacks, i.e., models'
scientific plots which are extensively used to demonstrate model performance
and are easily accessible. Our attack is simple and straightforward. We
leverage the shadow model training techniques to generate training data for the
attack model which is essentially an image classifier. Extensive evaluation on
three benchmark datasets shows that our proposed attack can effectively infer
the architecture/hyperparameters of image classifiers based on convolutional
neural network (CNN) given the scientific plot generated from it. We also
reveal that the attack's success is mainly caused by the shape of the
scientific plots, and further demonstrate that the attacks are robust in
various scenarios. Given the simplicity and effectiveness of the attack method,
our study indicates scientific plots indeed constitute a valid side channel for
model information stealing attacks. To mitigate the attacks, we propose several
defense mechanisms that can reduce the original attacks' accuracy while
maintaining the plot utility. However, such defenses can still be bypassed by
adaptive attacks.
| [
{
"created": "Thu, 23 Feb 2023 12:57:34 GMT",
"version": "v1"
}
] | 2023-02-24T00:00:00 | [
[
"Zhang",
"Boyang",
""
],
[
"He",
"Xinlei",
""
],
[
"Shen",
"Yun",
""
],
[
"Wang",
"Tianhao",
""
],
[
"Zhang",
"Yang",
""
]
] | 0no_new_dataset
|
2406.18742 | Georgios Tziafas | Georgios Tziafas, Yucheng Xu, Zhibin Li, Hamidreza Kasaei | 3D Feature Distillation with Object-Centric Priors | null | null | null | null | cs.CV cs.RO | http://creativecommons.org/licenses/by/4.0/ | Grounding natural language to the physical world is a ubiquitous topic with a
wide range of applications in computer vision and robotics. Recently, 2D
vision-language models such as CLIP have been widely popularized, due to their
impressive capabilities for open-vocabulary grounding in 2D images. Recent
works aim to elevate 2D CLIP features to 3D via feature distillation, but
either learn neural fields that are scene-specific and hence lack
generalization, or focus on indoor room scan data that require access to
multiple camera views, which is not practical in robot manipulation scenarios.
Additionally, related methods typically fuse features at pixel-level and assume
that all camera views are equally informative. In this work, we show that this
approach leads to sub-optimal 3D features, both in terms of grounding accuracy,
as well as segmentation crispness. To alleviate this, we propose a multi-view
feature fusion strategy that employs object-centric priors to eliminate
uninformative views based on semantic information, and fuse features at
object-level via instance segmentation masks. To distill our object-centric 3D
features, we generate a large-scale synthetic multi-view dataset of cluttered
tabletop scenes, spawning 15k scenes from over 3300 unique object instances,
which we make publicly available. We show that our method reconstructs 3D CLIP
features with improved grounding capacity and spatial consistency, while doing
so from single-view RGB-D, thus departing from the assumption of multiple
camera views at test time. Finally, we show that our approach can generalize to
novel tabletop domains and be re-purposed for 3D instance segmentation without
fine-tuning, and demonstrate its utility for language-guided robotic grasping
in clutter
| [
{
"created": "Wed, 26 Jun 2024 20:16:49 GMT",
"version": "v1"
},
{
"created": "Mon, 1 Jul 2024 18:55:10 GMT",
"version": "v2"
}
] | 2024-07-03T00:00:00 | [
[
"Tziafas",
"Georgios",
""
],
[
"Xu",
"Yucheng",
""
],
[
"Li",
"Zhibin",
""
],
[
"Kasaei",
"Hamidreza",
""
]
] | 0no_new_dataset
|
1706.01133 | Tathagata Chakraborti | Tathagata Chakraborti and Siddharth Srivastava and Alessandro Pinto
and Subbarao Kambhampati | An ROS-based Shared Communication Middleware for Plug & Play Modular
Intelligent Design of Smart Systems | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Centralized architectures for systems such as smart offices and homes are
rapidly becoming obsolete due to inherent inflexibility in their design and
management. This is because such systems should not only be easily
re-configurable with the addition of newer capabilities over time but should
also have the ability to adapt to multiple points of failure. Fully harnessing
the capabilities of these massively integrated systems requires higher level
reasoning engines that allow them to plan for and achieve diverse long-term
goals, rather than being limited to a few predefined tasks. In this paper, we
propose a set of properties that will accommodate such capabilities, and
develop a general architecture for integrating automated planning components
into smart systems. We show how the reasoning capabilities are embedded in the
design and operation of the system and demonstrate the same on a real-world
implementation of a smart office.
| [
{
"created": "Sun, 4 Jun 2017 19:23:10 GMT",
"version": "v1"
}
] | 2017-06-06T00:00:00 | [
[
"Chakraborti",
"Tathagata",
""
],
[
"Srivastava",
"Siddharth",
""
],
[
"Pinto",
"Alessandro",
""
],
[
"Kambhampati",
"Subbarao",
""
]
] | 0no_new_dataset
|
1512.07146 | Steve Hanneke | Steve Hanneke | Refined Error Bounds for Several Learning Algorithms | null | Journal of Machine Learning Research, Vol. 17 (2016), No. 135, pp.
1-55 | null | null | cs.LG math.ST stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article studies the achievable guarantees on the error rates of certain
learning algorithms, with particular focus on refining logarithmic factors.
Many of the results are based on a general technique for obtaining bounds on
the error rates of sample-consistent classifiers with monotonic error regions,
in the realizable case. We prove bounds of this type expressed in terms of
either the VC dimension or the sample compression size. This general technique
also enables us to derive several new bounds on the error rates of general
sample-consistent learning algorithms, as well as refined bounds on the label
complexity of the CAL active learning algorithm. Additionally, we establish a
simple necessary and sufficient condition for the existence of a
distribution-free bound on the error rates of all sample-consistent learning
rules, converging at a rate inversely proportional to the sample size. We also
study learning in the presence of classification noise, deriving a new excess
error rate guarantee for general VC classes under Tsybakov's noise condition,
and establishing a simple and general necessary and sufficient condition for
the minimax excess risk under bounded noise to converge at a rate inversely
proportional to the sample size.
| [
{
"created": "Tue, 22 Dec 2015 16:17:43 GMT",
"version": "v1"
},
{
"created": "Sat, 10 Sep 2016 15:11:33 GMT",
"version": "v2"
}
] | 2016-09-13T00:00:00 | [
[
"Hanneke",
"Steve",
""
]
] | 0no_new_dataset
|
1709.08525 | Uri Erez | Uri Erez | Comments on Downlink Non-Orthogonal Multiple Access: Relative Gain
Subject to Near Sum-Rate Optimality | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-orthogonal access techniques have recently gained renewed interest in the
context of next generation wireless networks. As the relative gain, with
respect to traditionally employed orthogonal-access techniques depends on many
factors, it is of interest to obtain insights by considering the simplest
scenario, the two-user downlink (broadcast) channel where all nodes are
equipped with a single antenna. Further, we focus on rate pairs that are in the
vicinity of sum-rate optimalilty with respect to the capacity region of the
broadcast channel. A simple and explicit characterization of the relative gain
of non-orthogonal transmission with respect to orthogonal transmission is
obtained under these conditions as an immediate consequence of the capacity
regions of the two.
| [
{
"created": "Mon, 25 Sep 2017 14:44:34 GMT",
"version": "v1"
}
] | 2017-09-26T00:00:00 | [
[
"Erez",
"Uri",
""
]
] | 0no_new_dataset
|
1511.02465 | Lianwen Jin | Jie Xu, Lianwen Jin, Lingyu Liang, Ziyong Feng, Duorui Xie | A new humanlike facial attractiveness predictor with cascaded
fine-tuning deep learning model | 5 pages, 3 figures, 5 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a deep leaning method to address the challenging facial
attractiveness prediction problem. The method constructs a convolutional neural
network of facial beauty prediction using a new deep cascaded fine-turning
scheme with various face inputting channels, such as the original RGB face
image, the detail layer image, and the lighting layer image. With a carefully
designed CNN model of deep structure, large input size and small convolutional
kernels, we have achieved a high prediction correlation of 0.88. This result
convinces us that the problem of facial attractiveness prediction can be solved
by deep learning approach, and it also shows the important roles of the facial
smoothness, lightness, and color information that were involved in facial
beauty perception, which is consistent with the result of recent psychology
studies. Furthermore, we analyze the high-level features learnt by CNN through
visualization of its hidden layers, and some interesting phenomena were
observed. It is found that the contours and appearance of facial features,
especially eyes and moth, are the most significant facial attributes for facial
attractiveness prediction, which is also consistent with the visual perception
intuition of human.
| [
{
"created": "Sun, 8 Nov 2015 09:59:04 GMT",
"version": "v1"
}
] | 2015-11-10T00:00:00 | [
[
"Xu",
"Jie",
""
],
[
"Jin",
"Lianwen",
""
],
[
"Liang",
"Lingyu",
""
],
[
"Feng",
"Ziyong",
""
],
[
"Xie",
"Duorui",
""
]
] | 1new_dataset
|
1808.06114 | Taisir Elgorashi Dr | Opeyemi O. Ajibola, Taisir E. H. El-Gorashi, and Jaafar M. H.
Elmirghani | On Energy Efficiency of Networks for Composable Datacentre
Infrastructures | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper evaluates the optimal scale of datacentre (DC) resource
disaggregation for composable DC infrastructures and investigates the impact of
present day silicon photonics technologies on the energy efficiency of
different composable DC infrastructures. We formulated a mixed integer linear
programming (MILP) model to this end. Our results show that present day silicon
photonics technologies enable better network energy efficiency for rack-scale
composable DCs compared to pod-scale composable DCs despite reported
similarities in CPU and memory resource power consumption.
| [
{
"created": "Sat, 18 Aug 2018 19:00:01 GMT",
"version": "v1"
}
] | 2018-08-21T00:00:00 | [
[
"Ajibola",
"Opeyemi O.",
""
],
[
"El-Gorashi",
"Taisir E. H.",
""
],
[
"Elmirghani",
"Jaafar M. H.",
""
]
] | 0no_new_dataset
|
1801.00254 | Youngsam Kim | Youngsam Kim, Hyopil Shin | A New Approach for Measuring Sentiment Orientation based on
Multi-Dimensional Vector Space | 8 pages | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This study implements a vector space model approach to measure the sentiment
orientations of words. Two representative vectors for positive/negative
polarity are constructed using high-dimensional vec-tor space in both an
unsupervised and a semi-supervised manner. A sentiment ori-entation value per
word is determined by taking the difference between the cosine distances
against the two reference vec-tors. These two conditions (unsupervised and
semi-supervised) are compared against an existing unsupervised method (Turney,
2002). As a result of our experi-ment, we demonstrate that this novel ap-proach
significantly outperforms the pre-vious unsupervised approach and is more
practical and data efficient as well.
| [
{
"created": "Sun, 31 Dec 2017 08:44:51 GMT",
"version": "v1"
}
] | 2018-01-03T00:00:00 | [
[
"Kim",
"Youngsam",
""
],
[
"Shin",
"Hyopil",
""
]
] | 0no_new_dataset
|
1812.08769 | Maria De-Arteaga | Nathaniel Swinger, Maria De-Arteaga, Neil Thomas Heffernan IV, Mark DM
Leiserson, Adam Tauman Kalai | What are the biases in my word embedding? | At AIES 2019: the AAAI/ACM Conference on Artificial Intelligence,
Ethics, and Society | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an algorithm for enumerating biases in word embeddings.
The algorithm exposes a large number of offensive associations related to
sensitive features such as race and gender on publicly available embeddings,
including a supposedly "debiased" embedding. These biases are concerning in
light of the widespread use of word embeddings. The associations are identified
by geometric patterns in word embeddings that run parallel between people's
names and common lower-case tokens. The algorithm is highly unsupervised: it
does not even require the sensitive features to be pre-specified. This is
desirable because: (a) many forms of discrimination--such as racial
discrimination--are linked to social constructs that may vary depending on the
context, rather than to categories with fixed definitions; and (b) it makes it
easier to identify biases against intersectional groups, which depend on
combinations of sensitive features. The inputs to our algorithm are a list of
target tokens, e.g. names, and a word embedding. It outputs a number of Word
Embedding Association Tests (WEATs) that capture various biases present in the
data. We illustrate the utility of our approach on publicly available word
embeddings and lists of names, and evaluate its output using crowdsourcing. We
also show how removing names may not remove potential proxy bias.
| [
{
"created": "Thu, 20 Dec 2018 18:53:05 GMT",
"version": "v1"
},
{
"created": "Sat, 22 Dec 2018 07:58:38 GMT",
"version": "v2"
},
{
"created": "Fri, 17 May 2019 18:55:53 GMT",
"version": "v3"
},
{
"created": "Wed, 19 Jun 2019 19:52:15 GMT",
"version": "v4"
}
] | 2019-06-21T00:00:00 | [
[
"Swinger",
"Nathaniel",
""
],
[
"De-Arteaga",
"Maria",
""
],
[
"Heffernan",
"Neil Thomas",
"IV"
],
[
"Leiserson",
"Mark DM",
""
],
[
"Kalai",
"Adam Tauman",
""
]
] | 0no_new_dataset
|
1012.0955 | Soheil Feizi | Soheil Feizi, Muriel Medard and Michelle Effros | Compressive Sensing Over Networks | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we demonstrate some applications of compressive sensing over
networks. We make a connection between compressive sensing and traditional
information theoretic techniques in source coding and channel coding. Our
results provide an explicit trade-off between the rate and the decoding
complexity. The key difference of compressive sensing and traditional
information theoretic approaches is at their decoding side. Although optimal
decoders to recover the original signal, compressed by source coding have high
complexity, the compressive sensing decoder is a linear or convex optimization.
First, we investigate applications of compressive sensing on distributed
compression of correlated sources. Here, by using compressive sensing, we
propose a compression scheme for a family of correlated sources with a
modularized decoder, providing a trade-off between the compression rate and the
decoding complexity. We call this scheme Sparse Distributed Compression. We use
this compression scheme for a general multicast network with correlated
sources. Here, we first decode some of the sources by a network decoding
technique and then, we use a compressive sensing decoder to obtain the whole
sources. Then, we investigate applications of compressive sensing on channel
coding. We propose a coding scheme that combines compressive sensing and random
channel coding for a high-SNR point-to-point Gaussian channel. We call this
scheme Sparse Channel Coding. We propose a modularized decoder providing a
trade-off between the capacity loss and the decoding complexity. At the
receiver side, first, we use a compressive sensing decoder on a noisy signal to
obtain a noisy estimate of the original signal and then, we apply a traditional
channel coding decoder to find the original signal.
| [
{
"created": "Sat, 4 Dec 2010 22:54:18 GMT",
"version": "v1"
}
] | 2010-12-07T00:00:00 | [
[
"Feizi",
"Soheil",
""
],
[
"Medard",
"Muriel",
""
],
[
"Effros",
"Michelle",
""
]
] | 0no_new_dataset
|
1506.06558 | Tang Liu | Tang Liu, Daniela Tuninetti, Sae-Young Chung | On the DoF region of the two-user Interference Channel with an
Instantaneous Relay | Presented in ISIT 2015 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the Degrees of Freedom (DoF) of the two-user multi-antenna
Gaussian interference channel with an {\em instantaneous relay}, or relay
without delay, where the relay transmitted signal in channel use $t$ can depend
on all received signals up to and including that at channel use $t$. It is
assumed that the two transmitters and the two receivers have $M$ antennas,
while the relay receives through $N$ antennas and transmits through $L$
antennas. An achievable DoF region is derived, for all possible values of
$(M,N,L)$, based on a memoryless linear transmission strategy at the relay that
aims to {\it neutralize} as much interference as possible at the receivers. The
proposed scheme is shown to attain the largest sum DoF among all memoryless
linear transmission strategies at the relay and to actually be optimal for
certain values of $(M,N,L)$.
| [
{
"created": "Mon, 22 Jun 2015 11:39:47 GMT",
"version": "v1"
}
] | 2015-06-23T00:00:00 | [
[
"Liu",
"Tang",
""
],
[
"Tuninetti",
"Daniela",
""
],
[
"Chung",
"Sae-Young",
""
]
] | 0no_new_dataset
|
1405.5461 | Justin Kopinsky | Dan Alistarh, Justin Kopinsky, Alexander Matveev, Nir Shavit | The LevelArray: A Fast, Practical Long-Lived Renaming Algorithm | ICDCS 2014 | null | null | null | cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The long-lived renaming problem appears in shared-memory systems where a set
of threads need to register and deregister frequently from the computation,
while concurrent operations scan the set of currently registered threads.
Instances of this problem show up in concurrent implementations of
transactional memory, flat combining, thread barriers, and memory reclamation
schemes for lock-free data structures. In this paper, we analyze a randomized
solution for long-lived renaming. The algorithmic technique we consider, called
the LevelArray, has previously been used for hashing and one-shot (single-use)
renaming. Our main contribu- tion is to prove that, in long-lived executions,
where processes may register and deregister polynomially many times, the
technique guarantees constant steps on average and O(log log n) steps with high
probability for registering, unit cost for deregistering, and O(n) steps for
collect queries, where n is an upper bound on the number of processes that may
be active at any point in time. We also show that the algorithm has the
surprising property that it is self-healing: under reasonable assumptions on
the schedule, operations running while the data structure is in a degraded
state implicitly help the data structure re-balance itself. This subtle
mechanism obviates the need for expensive periodic rebuilding procedures. Our
benchmarks validate this approach, showing that, for typical use parameters,
the average number of steps a process takes to register is less than two and
the worst-case number of steps is bounded by six, even in executions with
billions of operations. We contrast this with other randomized implementations,
whose worst-case behavior we show to be unreliable, and with deterministic
implementations, whose cost is linear in n.
| [
{
"created": "Wed, 21 May 2014 15:57:58 GMT",
"version": "v1"
}
] | 2014-05-22T00:00:00 | [
[
"Alistarh",
"Dan",
""
],
[
"Kopinsky",
"Justin",
""
],
[
"Matveev",
"Alexander",
""
],
[
"Shavit",
"Nir",
""
]
] | 0no_new_dataset
|
cs/0312046 | Toni Urp\'i | Ernest Teniente and Toni Urpi | On the Abductive or Deductive Nature of Database Schema Validation and
Update Processing Problems | null | Theory and Practice of Logic Programming 3(3):287-327, may 2003 | null | null | cs.DB cs.LO | null | We show that database schema validation and update processing problems such
as view updating, materialized view maintenance, integrity constraint checking,
integrity constraint maintenance or condition monitoring can be classified as
problems of either abductive or deductive nature, according to the reasoning
paradigm that inherently suites them. This is done by performing abductive and
deductive reasoning on the event rules [Oli91], a set of rules that define the
difference between consecutive database states In this way, we show that it is
possible to provide methods able to deal with all these problems as a whole. We
also show how some existing general deductive and abductive procedures may be
used to reason on the event rules. In this way, we show that these procedures
can deal with all database schema validation and update processing problems
considered in this paper.
| [
{
"created": "Fri, 19 Dec 2003 15:25:53 GMT",
"version": "v1"
}
] | 2007-05-23T00:00:00 | [
[
"Teniente",
"Ernest",
""
],
[
"Urpi",
"Toni",
""
]
] | 0no_new_dataset
|
1805.04807 | Chang Liu | Qi-Zhi Cai, Min Du, Chang Liu, Dawn Song | Curriculum Adversarial Training | IJCAI 2018 | null | null | null | cs.LG cs.CR stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, deep learning has been applied to many security-sensitive
applications, such as facial authentication. The existence of adversarial
examples hinders such applications. The state-of-the-art result on defense
shows that adversarial training can be applied to train a robust model on MNIST
against adversarial examples; but it fails to achieve a high empirical
worst-case accuracy on a more complex task, such as CIFAR-10 and SVHN. In our
work, we propose curriculum adversarial training (CAT) to resolve this issue.
The basic idea is to develop a curriculum of adversarial examples generated by
attacks with a wide range of strengths. With two techniques to mitigate the
forgetting and the generalization issues, we demonstrate that CAT can improve
the prior art's empirical worst-case accuracy by a large margin of 25% on
CIFAR-10 and 35% on SVHN. At the same, the model's performance on
non-adversarial inputs is comparable to the state-of-the-art models.
| [
{
"created": "Sun, 13 May 2018 02:10:56 GMT",
"version": "v1"
}
] | 2018-05-15T00:00:00 | [
[
"Cai",
"Qi-Zhi",
""
],
[
"Du",
"Min",
""
],
[
"Liu",
"Chang",
""
],
[
"Song",
"Dawn",
""
]
] | 0no_new_dataset
|
2202.13662 | Jos\'e Mennesson | Sami Barchid, Jos\'e Mennesson and Chaabane Dj\'eraba | Bina-Rep Event Frames: a Simple and Effective Representation for
Event-based cameras | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents "Bina-Rep", a simple representation method that converts
asynchronous streams of events from event cameras to a sequence of sparse and
expressive event frames. By representing multiple binary event images as a
single frame of $N$-bit numbers, our method is able to obtain sparser and more
expressive event frames thanks to the retained information about event orders
in the original stream. Coupled with our proposed model based on a
convolutional neural network, the reported results achieve state-of-the-art
performance and repeatedly outperforms other common event representation
methods. Our approach also shows competitive robustness against common image
corruptions, compared to other representation techniques.
| [
{
"created": "Mon, 28 Feb 2022 10:23:09 GMT",
"version": "v1"
}
] | 2022-03-01T00:00:00 | [
[
"Barchid",
"Sami",
""
],
[
"Mennesson",
"José",
""
],
[
"Djéraba",
"Chaabane",
""
]
] | 0no_new_dataset
|
2207.06261 | Filip Ilic | Filip Ilic, Thomas Pock, Richard P. Wildes | Is Appearance Free Action Recognition Possible? | null | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Intuition might suggest that motion and dynamic information are key to
video-based action recognition. In contrast, there is evidence that
state-of-the-art deep-learning video understanding architectures are biased
toward static information available in single frames. Presently, a methodology
and corresponding dataset to isolate the effects of dynamic information in
video are missing. Their absence makes it difficult to understand how well
contemporary architectures capitalize on dynamic vs. static information. We
respond with a novel Appearance Free Dataset (AFD) for action recognition. AFD
is devoid of static information relevant to action recognition in a single
frame. Modeling of the dynamics is necessary for solving the task, as the
action is only apparent through consideration of the temporal dimension. We
evaluated 11 contemporary action recognition architectures on AFD as well as
its related RGB video. Our results show a notable decrease in performance for
all architectures on AFD compared to RGB. We also conducted a complimentary
study with humans that shows their recognition accuracy on AFD and RGB is very
similar and much better than the evaluated architectures on AFD. Our results
motivate a novel architecture that revives explicit recovery of optical flow,
within a contemporary design for best performance on AFD and RGB.
| [
{
"created": "Wed, 13 Jul 2022 15:04:53 GMT",
"version": "v1"
}
] | 2022-07-14T00:00:00 | [
[
"Ilic",
"Filip",
""
],
[
"Pock",
"Thomas",
""
],
[
"Wildes",
"Richard P.",
""
]
] | 1new_dataset
|
1602.05063 | Robin Ince | Robin A. A. Ince | Measuring multivariate redundant information with pointwise common
change in surprisal | v3: revisions based on review process at Entropy (expand game-theory
and max-ent motivation), v2: add game-theoretic operational definition for
maximum entropy constraints; remove thresholding and normalisation of values
on lattice | Entropy 2017, 19(7), 318 | 10.3390/e19070318 | null | cs.IT math.IT math.ST q-bio.NC q-bio.QM stat.ME stat.TH | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The problem of how to properly quantify redundant information is an open
question that has been the subject of much recent research. Redundant
information refers to information about a target variable S that is common to
two or more predictor variables Xi. It can be thought of as quantifying
overlapping information content or similarities in the representation of S
between the Xi. We present a new measure of redundancy which measures the
common change in surprisal shared between variables at the local or pointwise
level. We provide a game-theoretic operational definition of unique
information, and use this to derive constraints which are used to obtain a
maximum entropy distribution. Redundancy is then calculated from this maximum
entropy distribution by counting only those local co-information terms which
admit an unambiguous interpretation as redundant information. We show how this
redundancy measure can be used within the framework of the Partial Information
Decomposition (PID) to give an intuitive decomposition of the multivariate
mutual information into redundant, unique and synergistic contributions. We
compare our new measure to existing approaches over a range of example systems,
including continuous Gaussian variables. Matlab code for the measure is
provided, including all considered examples.
| [
{
"created": "Tue, 16 Feb 2016 15:57:36 GMT",
"version": "v1"
},
{
"created": "Tue, 2 May 2017 10:32:28 GMT",
"version": "v2"
},
{
"created": "Thu, 13 Jul 2017 16:54:30 GMT",
"version": "v3"
}
] | 2017-07-14T00:00:00 | [
[
"Ince",
"Robin A. A.",
""
]
] | 0no_new_dataset
|
2402.18393 | Mingfei Cheng | Mingfei Cheng, Yuan Zhou, Xiaofei Xie, Junjie Wang, Guozhu Meng,
Kairui Yang | Evaluating Decision Optimality of Autonomous Driving via Metamorphic
Testing | null | null | null | null | cs.AI cs.NE cs.RO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Autonomous Driving System (ADS) testing is crucial in ADS development, with
the current primary focus being on safety. However, the evaluation of
non-safety-critical performance, particularly the ADS's ability to make optimal
decisions and produce optimal paths for autonomous vehicles (AVs), is equally
vital to ensure the intelligence and reduce risks of AVs. Currently, there is
little work dedicated to assessing ADSs' optimal decision-making performance
due to the lack of corresponding oracles and the difficulty in generating
scenarios with non-optimal decisions. In this paper, we focus on evaluating the
decision-making quality of an ADS and propose the first method for detecting
non-optimal decision scenarios (NoDSs), where the ADS does not compute optimal
paths for AVs. Firstly, to deal with the oracle problem, we propose a novel
metamorphic relation (MR) aimed at exposing violations of optimal decisions.
The MR identifies the property that the ADS should retain optimal decisions
when the optimal path remains unaffected by non-invasive changes. Subsequently,
we develop a new framework, Decictor, designed to generate NoDSs efficiently.
Decictor comprises three main components: Non-invasive Mutation, MR Check, and
Feedback. The Non-invasive Mutation ensures that the original optimal path in
the mutated scenarios is not affected, while the MR Check is responsible for
determining whether non-optimal decisions are made. To enhance the
effectiveness of identifying NoDSs, we design a feedback metric that combines
both spatial and temporal aspects of the AV's movement. We evaluate Decictor on
Baidu Apollo, an open-source and production-grade ADS. The experimental results
validate the effectiveness of Decictor in detecting non-optimal decisions of
ADSs. Our work provides valuable and original insights into evaluating the
non-safety-critical performance of ADSs.
| [
{
"created": "Wed, 28 Feb 2024 15:13:33 GMT",
"version": "v1"
}
] | 2024-02-29T00:00:00 | [
[
"Cheng",
"Mingfei",
""
],
[
"Zhou",
"Yuan",
""
],
[
"Xie",
"Xiaofei",
""
],
[
"Wang",
"Junjie",
""
],
[
"Meng",
"Guozhu",
""
],
[
"Yang",
"Kairui",
""
]
] | 0no_new_dataset
|
2303.15379 | Heather Newman | Benjamin Moseley, Heather Newman, Kirk Pruhs | Online $k$-Median with Consistent Clusters | 28 pages, 7 figures | null | null | null | cs.DS | http://creativecommons.org/licenses/by/4.0/ | We consider the online $k$-median clustering problem in which $n$ points
arrive online and must be irrevocably assigned to a cluster on arrival. As
there are lower bound instances that show that an online algorithm cannot
achieve a competitive ratio that is a function of $n$ and $k$, we consider a
beyond worst-case analysis model in which the algorithm is provided a priori
with a predicted budget $B$ that upper bounds the optimal objective value. We
give an algorithm that achieves a competitive ratio that is exponential in the
the number $k$ of clusters, and show that the competitive ratio of every
algorithm must be linear in $k$. To the best of our knowledge this is the first
investigation in the literature that considers cluster consistency using
competitive analysis.
| [
{
"created": "Mon, 27 Mar 2023 16:53:04 GMT",
"version": "v1"
}
] | 2023-03-28T00:00:00 | [
[
"Moseley",
"Benjamin",
""
],
[
"Newman",
"Heather",
""
],
[
"Pruhs",
"Kirk",
""
]
] | 0no_new_dataset
|
2210.01657 | Samuel Baltz | Samuel Baltz | The probability of casting a pivotal vote in an Instant Runoff Voting
election | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I derive the probability that a vote cast in an Instant Runoff Voting
election will change the election winner. I phrase that probability in terms of
the candidates' expected vote totals, and then I estimate its magnitude for
different distributions of voter preferences. The result is very similar to the
probability of casting a pivotal vote in a Single-Member District Plurality
election, which suggests that Instant Runoff Voting does not actually increase
or decrease voters' incentives to vote strategically. The derivation uncovers a
counter-intuitive phenomenon that I call "indirect pivotality", in which a
voter can cause one candidate to win by ranking some other candidate on their
ballot.
| [
{
"created": "Tue, 4 Oct 2022 15:00:43 GMT",
"version": "v1"
},
{
"created": "Mon, 31 Jul 2023 13:46:33 GMT",
"version": "v2"
}
] | 2023-08-01T00:00:00 | [
[
"Baltz",
"Samuel",
""
]
] | 0no_new_dataset
|
2106.12138 | Tushar Athawale | Tushar M. Athawale, Alireza Entezari, Bei Wang, and Chris R. Johnson | Statistical Rendering for Visualization of Red Sea Eddy Simulation Data | null | null | null | null | cs.GR physics.ao-ph | http://creativecommons.org/licenses/by/4.0/ | Analyzing the effects of ocean eddies is important in oceanology for gaining
insights into transport of energy and biogeochemical particles. We present an
application of statistical visualization algorithms for the analysis of the Red
Sea eddy simulation ensemble. Specifically, we demonstrate the applications of
statistical volume rendering and statistical Morse complex summary maps to a
velocity magnitude field for studying the eddy positions in the flow dataset.
In statistical volume rendering, we model per-voxel data uncertainty using
noise models, such as parametric and nonparametric, and study the propagation
of uncertainty into the volume rendering pipeline. In the statistical Morse
complex summary maps, we derive histograms charactering uncertainty of gradient
flow destinations to understand Morse complex topological variations across the
ensemble. We demonstrate the utility of our statistical visualizations for an
effective analysis of the potential eddy positions and their spatial
uncertainty.
| [
{
"created": "Wed, 23 Jun 2021 03:09:10 GMT",
"version": "v1"
}
] | 2021-06-24T00:00:00 | [
[
"Athawale",
"Tushar M.",
""
],
[
"Entezari",
"Alireza",
""
],
[
"Wang",
"Bei",
""
],
[
"Johnson",
"Chris R.",
""
]
] | 0no_new_dataset
|
1510.04422 | Hung Nghiep Tran | Hung Nghiep Tran, Tin Huynh, Kiem Hoang | A Potential Approach to Overcome Data Limitation in Scientific
Publication Recommendation | null | International Conference on Knowledge and Systems Engineering (KSE
2015) | 10.1109/KSE.2015.76 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data are essential for the experiments of relevant scientific publication
recommendation methods but it is difficult to build ground truth data. A
naturally promising solution is using publications that are referenced by
researchers to build their ground truth data. Unfortunately, this approach has
not been explored in the literature, so its applicability is still a gap in our
knowledge. In this research, we systematically study this approach by
theoretical and empirical analyses. In general, the results show that this
approach is reasonable and has many advantages. However, the empirical analysis
shows both positive and negative results. We conclude that, in some situations,
this is a useful alternative approach toward overcoming data limitation. Based
on this approach, we build and publish a dataset in computer science domain to
help advancing other researches.
| [
{
"created": "Thu, 15 Oct 2015 07:13:50 GMT",
"version": "v1"
}
] | 2020-02-24T00:00:00 | [
[
"Tran",
"Hung Nghiep",
""
],
[
"Huynh",
"Tin",
""
],
[
"Hoang",
"Kiem",
""
]
] | 1new_dataset
|
2104.03347 | Frederick Vincent | Frederick M. Vincent and Dashiell E.A. Fryer | Top Score in Axelrod Tournament | null | null | null | null | cs.GT | http://creativecommons.org/publicdomain/zero/1.0/ | The focus of the project will be an examination of obtaining the highest
score in the Axelrod Tournament. The initial design of the highest score in the
Axelrod Tournament consisted of looking at the Cooperation rates of the top
strategies currently in the Axelrod Library. After creating an initial Finite
State Machine strategy that utilized the Cooperation Rates of the top players;
our ten-state FSM finished within the top 35 players out of 220 in the short
run time strategies in the Axelrod Library. After a quick evolutionary
algorithm, 50 generations, our original ten-state FSM was changed into an
eight-state FSM, which finished within the top 5 of the short run time
strategies in the Axelrod Library. This eight-state FSM was then evolved again
using a full evolutionary algortihm process, which lasted 500 generations,
where the eight-state FSM evolved into a another eight-state FSM which finishes
first in the Axelrod Library among the short run time strategies and the full
Axelrod Tournament. From that final FSM, two of the eight states are
inaccessible, so the final FSM strategy is a six-state FSM that finishes first
in the Full Axelrod Tournament, against the short run time strategies as well
as the long run time strategies.
| [
{
"created": "Wed, 7 Apr 2021 18:42:18 GMT",
"version": "v1"
}
] | 2021-04-09T00:00:00 | [
[
"Vincent",
"Frederick M.",
""
],
[
"Fryer",
"Dashiell E. A.",
""
]
] | 0no_new_dataset
|
1810.04606 | Sara Hosseinzadeh Kassani | Sara Hosseinzadeh Kassani, Peyman Hosseinzadeh Kassani | Building an Ontology for the Domain of Plant Science using Prot\'eg\'e | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to the rapid development of technology, large amounts of heterogeneous
data generated every day. Biological data is also growing in terms of the
quantity and quality of data considerably. Despite the attempts for building a
uniform platform to handle data management in Plant Science, researchers are
facing the challenge of not only accessing and integrating data stored in
heterogeneous data sources but also representing the implicit and explicit
domain knowledge based on the available plant genomic and phenomic data.
Ontologies provide a framework for describing the structures and vocabularies
to support the semantics of information and facilitate automated reasoning and
knowledge discovery. In this paper, we focus on building an ontology for
Arabidopsis Thaliana in Plant Science domain. The aim of this study is to
provide a conceptual model of Arabidopsis Thaliana as a reference plant for
botany and other plant sciences, including concepts and their relationships.
| [
{
"created": "Wed, 10 Oct 2018 16:02:55 GMT",
"version": "v1"
},
{
"created": "Thu, 11 Oct 2018 04:08:03 GMT",
"version": "v2"
}
] | 2018-10-12T00:00:00 | [
[
"Kassani",
"Sara Hosseinzadeh",
""
],
[
"Kassani",
"Peyman Hosseinzadeh",
""
]
] | 0no_new_dataset
|
2104.06719 | Fredrik Carlsson | Fredrik Carlsson Magnus Sahlgren | Sentence Embeddings by Ensemble Distillation | null | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | This paper contributes a new State Of The Art (SOTA) for Semantic Textual
Similarity (STS). We compare and combine a number of recently proposed sentence
embedding methods for STS, and propose a novel and simple ensemble knowledge
distillation scheme that improves on previous approaches. Our experiments
demonstrate that a model trained to learn the average embedding space from
multiple ensemble students outperforms all the other individual models with
high robustness. Utilizing our distillation method in combination with previous
methods, we significantly improve on the SOTA unsupervised STS, and by proper
hyperparameter tuning of previous methods we improve the supervised SOTA
scores.
| [
{
"created": "Wed, 14 Apr 2021 09:23:27 GMT",
"version": "v1"
}
] | 2021-04-15T00:00:00 | [
[
"Sahlgren",
"Fredrik Carlsson Magnus",
""
]
] | 0no_new_dataset
|
2402.19434 | Ahmed Alkhateeb | Shuaifeng Jiang and Ahmed Alkhateeb | Digital Twin Aided Massive MIMO: CSI Compression and Feedback | Accepted in ICC 2024. Dataset and code files will be available soon
on the DeepMIMO website https://www.deepmimo.net/ | null | null | null | cs.IT eess.SP math.IT | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Deep learning (DL) approaches have demonstrated high performance in
compressing and reconstructing the channel state information (CSI) and reducing
the CSI feedback overhead in massive MIMO systems. One key challenge, however,
with the DL approaches is the demand for extensive training data. Collecting
this real-world CSI data incurs significant overhead that hinders the DL
approaches from scaling to a large number of communication sites. To address
this challenge, we propose a novel direction that utilizes site-specific
\textit{digital twins} to aid the training of DL models. The proposed digital
twin approach generates site-specific synthetic CSI data from the EM 3D model
and ray tracing, which can then be used to train the DL model without
real-world data collection. To further improve the performance, we adopt online
data selection to refine the DL model training with a small real-world CSI
dataset. Results show that a DL model trained solely on the digital twin data
can achieve high performance when tested in a real-world deployment. Further,
leveraging domain adaptation techniques, the proposed approach requires orders
of magnitude less real-world data to approach the same performance of the model
trained completely on a real-world CSI dataset.
| [
{
"created": "Thu, 29 Feb 2024 18:35:12 GMT",
"version": "v1"
},
{
"created": "Fri, 1 Mar 2024 03:22:16 GMT",
"version": "v2"
}
] | 2024-03-04T00:00:00 | [
[
"Jiang",
"Shuaifeng",
""
],
[
"Alkhateeb",
"Ahmed",
""
]
] | 0no_new_dataset
|
2005.09714 | Stefan Hristozov | Manuel Huber, Stefan Hristozov, Simon Ott, Vasil Sarafov, Marcus
Peinado | The Lazarus Effect: Healing Compromised Devices in the Internet of Small
Things | In Proceedings of the 15th ACM Asia Conference on Computer and
Communications Security (ASIA CCS 20) | null | 10.1145/3320269.3384723 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We live in a time when billions of IoT devices are being deployed and
increasingly relied upon. This makes ensuring their availability and
recoverability in case of a compromise a paramount goal. The large and rapidly
growing number of deployed IoT devices make manual recovery impractical,
especially if the devices are dispersed over a large area. Thus, there is a
need for a reliable and scalable remote recovery mechanism that works even
after attackers have taken full control over devices, possibly misusing them or
trying to render them useless.
To tackle this problem, we present Lazarus, a system that enables the remote
recovery of compromised IoT devices. With Lazarus, an IoT administrator can
remotely control the code running on IoT devices unconditionally and within a
guaranteed time bound. This makes recovery possible even in case of severe
corruption of the devices' software stack. We impose only minimal hardware
requirements, making Lazarus applicable even for low-end constrained
off-the-shelf IoT devices. We isolate Lazarus's minimal recovery trusted
computing base from untrusted software both in time and by using a trusted
execution environment. The temporal isolation prevents secrets from being
leaked through side-channels to untrusted software. Inside the trusted
execution environment, we place minimal functionality that constrains untrusted
software at runtime.
We implement Lazarus on an ARM Cortex-M33-based microcontroller in a full
setup with an IoT hub, device provisioning and secure update functionality. Our
prototype can recover compromised embedded OSs and bare-metal applications and
prevents attackers from bricking devices, for example, through flash wear out.
We show this at the example of FreeRTOS, which requires no modifications but
only a single additional task. Our evaluation shows negligible runtime
performance impact and moderate memory requirements.
| [
{
"created": "Tue, 19 May 2020 19:21:29 GMT",
"version": "v1"
}
] | 2020-05-21T00:00:00 | [
[
"Huber",
"Manuel",
""
],
[
"Hristozov",
"Stefan",
""
],
[
"Ott",
"Simon",
""
],
[
"Sarafov",
"Vasil",
""
],
[
"Peinado",
"Marcus",
""
]
] | 0no_new_dataset
|
1908.08823 | Daniel Lehmann Prof. | Daniel Lehmann | Revealed Preferences for Matching with Contracts | 34 pages. Unpublished. In version 2 an incorrect claim about the
assignment game has been deleted and reference to prior work by Chambers and
Yenmez given. This work was developed independently | null | null | null | cs.GT econ.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many-to-many matching with contracts is studied in the framework of revealed
preferences. All preferences are described by choice functions that satisfy
natural conditions. Under a no-externality assumption individual preferences
can be aggregated into a single choice function expressing a collective
preference. In this framework, a two-sided matching problem may be described as
an agreement problem between two parties: the two parties must find a stable
agreement, i.e., a set of contracts from which no party will want to take away
any contract and to which the two parties cannot agree to add any contract. On
such stable agreements each party's preference relation is a partial order and
the two parties have inverse preferences. An algorithm is presented that
generalizes algorithms previously proposed in less general situations. This
algorithm provides a stable agreement that is preferred to all stable
agreements by one of the parties and therefore less preferred than all stable
agreements by the other party. The number of steps of the algorithm is linear
in the size of the set of contracts, i.e., polynomial in the size of the
problem. The algorithm provides a proof that stable agreements form a lattice
under the two inverse preference relations. Under additional assumptions on the
role of money in preferences, agreement problems can describe general two-sided
markets in which goods are exchanged for money. Stable agreements provide a
solution concept, including prices, that is more general than competitive
equilibria. They satisfy an almost one price law for identical items.
| [
{
"created": "Fri, 23 Aug 2019 13:46:43 GMT",
"version": "v1"
},
{
"created": "Wed, 4 Mar 2020 16:22:37 GMT",
"version": "v2"
}
] | 2020-03-05T00:00:00 | [
[
"Lehmann",
"Daniel",
""
]
] | 0no_new_dataset
|
2405.13081 | Eliza Kosoy | Eliza Kosoy, Soojin Jeong, Anoop Sinha, Alison Gopnik and Tanya
Kraljic | Children's Mental Models of Generative Visual and Text Based AI Models | 7 pages, 6 figures | null | null | null | cs.HC cs.AI | http://creativecommons.org/licenses/by/4.0/ | In this work we investigate how children ages 5-12 perceive, understand, and
use generative AI models such as a text-based LLMs ChatGPT and a visual-based
model DALL-E. Generative AI is newly being used widely since chatGPT. Children
are also building mental models of generative AI. Those haven't been studied
before and it is also the case that the children's models are dynamic as they
use the tools, even with just very short usage. Upon surveying and
experimentally observing over 40 children ages 5-12, we found that children
generally have a very positive outlook towards AI and are excited about the
ways AI may benefit and aid them in their everyday lives. In a forced choice,
children robustly associated AI with positive adjectives versus negative ones.
We also categorize what children are querying AI models for and find that
children search for more imaginative things that don't exist when using a
visual-based AI and not when using a text-based one. Our follow-up study
monitored children's responses and feelings towards AI before and after
interacting with GenAI models. We even find that children find AI to be less
scary after interacting with it. We hope that these findings will shine a light
on children's mental models of AI and provide insight for how to design the
best possible tools for children who will inevitably be using AI in their
lifetimes. The motivation of this work is to bridge the gap between
Human-Computer Interaction (HCI) and Psychology in an effort to study the
effects of AI on society. We aim to identify the gaps in humans' mental models
of what AI is and how it works. Previous work has investigated how both adults
and children perceive various kinds of robots, computers, and other
technological concepts. However, there is very little work investigating these
concepts for generative AI models and not simply embodied robots or physical
technology.
| [
{
"created": "Tue, 21 May 2024 06:18:00 GMT",
"version": "v1"
}
] | 2024-05-24T00:00:00 | [
[
"Kosoy",
"Eliza",
""
],
[
"Jeong",
"Soojin",
""
],
[
"Sinha",
"Anoop",
""
],
[
"Gopnik",
"Alison",
""
],
[
"Kraljic",
"Tanya",
""
]
] | 0no_new_dataset
|
2403.05280 | Chenglong Wang | Chenglong Wang, Yinqiao Yi, Yida Wang, Chengxiu Zhang, Yun Liu,
Kensaku Mori, Mei Yuan, Guang Yang | ContrastDiagnosis: Enhancing Interpretability in Lung Nodule Diagnosis
Using Contrastive Learning | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | With the ongoing development of deep learning, an increasing number of AI
models have surpassed the performance levels of human clinical practitioners.
However, the prevalence of AI diagnostic products in actual clinical practice
remains significantly lower than desired. One crucial reason for this gap is
the so-called `black box' nature of AI models. Clinicians' distrust of black
box models has directly hindered the clinical deployment of AI products. To
address this challenge, we propose ContrastDiagnosis, a straightforward yet
effective interpretable diagnosis framework. This framework is designed to
introduce inherent transparency and provide extensive post-hoc explainability
for deep learning model, making them more suitable for clinical medical
diagnosis. ContrastDiagnosis incorporates a contrastive learning mechanism to
provide a case-based reasoning diagnostic rationale, enhancing the model's
transparency and also offers post-hoc interpretability by highlighting similar
areas. High diagnostic accuracy was achieved with AUC of 0.977 while maintain a
high transparency and explainability.
| [
{
"created": "Fri, 8 Mar 2024 13:00:52 GMT",
"version": "v1"
}
] | 2024-03-11T00:00:00 | [
[
"Wang",
"Chenglong",
""
],
[
"Yi",
"Yinqiao",
""
],
[
"Wang",
"Yida",
""
],
[
"Zhang",
"Chengxiu",
""
],
[
"Liu",
"Yun",
""
],
[
"Mori",
"Kensaku",
""
],
[
"Yuan",
"Mei",
""
],
[
"Yang",
"Guang",
""
]
] | 0no_new_dataset
|
2203.10670 | Michael Soloveitchik | Michael Soloveitchik and Michael Werman | Fully Convolutional Fractional Scaling | null | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a fully convolutional fractional scaling component, FCFS. Fully
convolutional networks can be applied to any size input and previously did not
support non-integer scaling. Our architecture is simple with an efficient
single layer implementation. Examples and code implementations of three common
scaling methods are published.
| [
{
"created": "Sun, 20 Mar 2022 22:56:18 GMT",
"version": "v1"
}
] | 2022-03-22T00:00:00 | [
[
"Soloveitchik",
"Michael",
""
],
[
"Werman",
"Michael",
""
]
] | 0no_new_dataset
|
2102.06391 | Laria Reynolds | Laria Reynolds and Kyle McDonell | Multiversal views on language models | 10 pages, 7 figures | null | null | null | cs.HC cs.CL | http://creativecommons.org/licenses/by/4.0/ | The virtuosity of language models like GPT-3 opens a new world of possibility
for human-AI collaboration in writing. In this paper, we present a framework in
which generative language models are conceptualized as multiverse generators.
This framework also applies to human imagination and is core to how we read and
write fiction. We call for exploration into this commonality through new forms
of interfaces which allow humans to couple their imagination to AI to write,
explore, and understand non-linear fiction. We discuss the early insights we
have gained from actively pursuing this approach by developing and testing a
novel multiversal GPT-3-assisted writing interface.
| [
{
"created": "Fri, 12 Feb 2021 08:28:28 GMT",
"version": "v1"
},
{
"created": "Mon, 15 Feb 2021 05:25:35 GMT",
"version": "v2"
}
] | 2021-02-16T00:00:00 | [
[
"Reynolds",
"Laria",
""
],
[
"McDonell",
"Kyle",
""
]
] | 0no_new_dataset
|
2010.01453 | Xiaohao Cai | Wai-Tsun Yeung, Xiaohao Cai, Zizhen Liang, Byung-Ho Kang | 3D Orientation Field Transform | null | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The two-dimensional (2D) orientation field transform has been proved to be
effective at enhancing 2D contours and curves in images by means of top-down
processing. It, however, has no counterpart in three-dimensional (3D) images
due to the extremely complicated orientation in 3D compared to 2D. Practically
and theoretically, the demand and interest in 3D can only be increasing. In
this work, we modularise the concept and generalise it to 3D curves. Different
modular combinations are found to enhance curves to different extents and with
different sensitivity to the packing of the 3D curves. In principle, the
proposed 3D orientation field transform can naturally tackle any dimensions. As
a special case, it is also ideal for 2D images, owning simpler methodology
compared to the previous 2D orientation field transform. The proposed method is
demonstrated with several transmission electron microscopy tomograms ranging
from 2D curve enhancement to, the more important and interesting, 3D ones.
| [
{
"created": "Sun, 4 Oct 2020 00:29:46 GMT",
"version": "v1"
}
] | 2020-10-06T00:00:00 | [
[
"Yeung",
"Wai-Tsun",
""
],
[
"Cai",
"Xiaohao",
""
],
[
"Liang",
"Zizhen",
""
],
[
"Kang",
"Byung-Ho",
""
]
] | 0no_new_dataset
|
2111.14092 | Susannah Kate Devitt | S.K. Devitt | Cognitive factors that affect the adoption of autonomous agriculture | 20 pages, 4 figures, published in Farm Policy Journal | Farm Policy Journal. 15 (2):49-60 (2018) | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | Robotic and Autonomous Agricultural Technologies (RAAT) are increasingly
available yet may fail to be adopted. This paper focusses specifically on
cognitive factors that affect adoption including: inability to generate trust,
loss of farming knowledge and reduced social cognition. It is recommended that
agriculture develops its own framework for the performance and safety of RAAT
drawing on human factors research in aerospace engineering including human
inputs (individual variance in knowledge, skills, abilities, preferences, needs
and traits), trust, situational awareness and cognitive load. The kinds of
cognitive impacts depend on the RAATs level of autonomy, ie whether it has
automatic, partial autonomy and autonomous functionality and stage of adoption,
ie adoption, initial use or post-adoptive use. The more autonomous a system is,
the less a human needs to know to operate it and the less the cognitive load,
but it also means farmers have less situational awareness about on farm
activities that in turn may affect strategic decision-making about their
enterprise. Some cognitive factors may be hidden when RAAT is first adopted but
play a greater role during prolonged or intense post-adoptive use. Systems with
partial autonomy need intuitive user interfaces, engaging system information,
and clear signaling to be trusted with low level tasks; and to compliment and
augment high order decision-making on farm.
| [
{
"created": "Sun, 28 Nov 2021 10:15:15 GMT",
"version": "v1"
}
] | 2021-11-30T00:00:00 | [
[
"Devitt",
"S. K.",
""
]
] | 0no_new_dataset
|
2110.03921 | Hwanjun Song | Hwanjun Song, Deqing Sun, Sanghyuk Chun, Varun Jampani, Dongyoon Han,
Byeongho Heo, Wonjae Kim, Ming-Hsuan Yang | ViDT: An Efficient and Effective Fully Transformer-based Object Detector | This is a revised version on Nov. 29 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transformers are transforming the landscape of computer vision, especially
for recognition tasks. Detection transformers are the first fully end-to-end
learning systems for object detection, while vision transformers are the first
fully transformer-based architecture for image classification. In this paper,
we integrate Vision and Detection Transformers (ViDT) to build an effective and
efficient object detector. ViDT introduces a reconfigured attention module to
extend the recent Swin Transformer to be a standalone object detector, followed
by a computationally efficient transformer decoder that exploits multi-scale
features and auxiliary techniques essential to boost the detection performance
without much increase in computational load. Extensive evaluation results on
the Microsoft COCO benchmark dataset demonstrate that ViDT obtains the best AP
and latency trade-off among existing fully transformer-based object detectors,
and achieves 49.2AP owing to its high scalability for large models. We will
release the code and trained models at https://github.com/naver-ai/vidt
| [
{
"created": "Fri, 8 Oct 2021 06:32:05 GMT",
"version": "v1"
},
{
"created": "Mon, 29 Nov 2021 11:07:13 GMT",
"version": "v2"
}
] | 2021-11-30T00:00:00 | [
[
"Song",
"Hwanjun",
""
],
[
"Sun",
"Deqing",
""
],
[
"Chun",
"Sanghyuk",
""
],
[
"Jampani",
"Varun",
""
],
[
"Han",
"Dongyoon",
""
],
[
"Heo",
"Byeongho",
""
],
[
"Kim",
"Wonjae",
""
],
[
"Yang",
"Ming-Hsuan",
""
]
] | 0no_new_dataset
|
2310.11005 | Seung-Hyun Nam | Seung-Hyun Nam, Vincent Y. F. Tan, Si-Hyeon Lee | Optimal Private Discrete Distribution Estimation with One-bit
Communication | 13 pages, 5 figures, and 1 page of supplementary material | null | null | null | cs.IT cs.CR math.IT | http://creativecommons.org/licenses/by/4.0/ | We consider a private discrete distribution estimation problem with one-bit
communication constraint. The privacy constraints are imposed with respect to
the local differential privacy and the maximal leakage. The estimation error is
quantified by the worst-case mean squared error. We completely characterize the
first-order asymptotics of this privacy-utility trade-off under the one-bit
communication constraint for both types of privacy constraints by using ideas
from local asymptotic normality and the resolution of a block design mechanism.
These results demonstrate the optimal dependence of the privacy-utility
trade-off under the one-bit communication constraint in terms of the parameters
of the privacy constraint and the size of the alphabet of the discrete
distribution.
| [
{
"created": "Tue, 17 Oct 2023 05:21:19 GMT",
"version": "v1"
}
] | 2023-10-18T00:00:00 | [
[
"Nam",
"Seung-Hyun",
""
],
[
"Tan",
"Vincent Y. F.",
""
],
[
"Lee",
"Si-Hyeon",
""
]
] | 0no_new_dataset
|
2001.00336 | Thatchaphol Saranurak | Sayan Bhattacharya, Danupon Nanongkai, Thatchaphol Saranurak | Coarse-Grained Complexity for Dynamic Algorithms | Published at SODA 2020. The abstract is truncated | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To date, the only way to argue polynomial lower bounds for dynamic algorithms
is via fine-grained complexity arguments. These arguments rely on strong
assumptions about specific problems such as the Strong Exponential Time
Hypothesis (SETH) and the Online Matrix-Vector Multiplication Conjecture (OMv).
While they have led to many exciting discoveries, dynamic algorithms still miss
out some benefits and lessons from the traditional ``coarse-grained'' approach
that relates together classes of problems such as P and NP. In this paper we
initiate the study of coarse-grained complexity theory for dynamic algorithms.
Below are among questions that this theory can answer.
What if dynamic Orthogonal Vector (OV) is easy in the cell-probe model? A
research program for proving polynomial unconditional lower bounds for dynamic
OV in the cell-probe model is motivated by the fact that many conditional lower
bounds can be shown via reductions from the dynamic OV problem. Since the
cell-probe model is more powerful than word RAM and has historically allowed
smaller upper bounds, it might turn out that dynamic OV is easy in the
cell-probe model, making this research direction infeasible. Our theory implies
that if this is the case, there will be very interesting algorithmic
consequences: If dynamic OV can be maintained in polylogarithmic worst-case
update time in the cell-probe model, then so are several important dynamic
problems such as $k$-edge connectivity, $(1+\epsilon)$-approximate mincut,
$(1+\epsilon)$-approximate matching, planar nearest neighbors, Chan's subset
union and 3-vs-4 diameter. The same conclusion can be made when we replace
dynamic OV by, e.g., subgraph connectivity, single source reachability, Chan's
subset union, and 3-vs-4 diameter.
Lower bounds for $k$-edge connectivity via dynamic OV? (see the full abstract
in the pdf file).
| [
{
"created": "Thu, 2 Jan 2020 06:14:54 GMT",
"version": "v1"
},
{
"created": "Wed, 26 Jul 2023 13:55:49 GMT",
"version": "v2"
}
] | 2023-07-27T00:00:00 | [
[
"Bhattacharya",
"Sayan",
""
],
[
"Nanongkai",
"Danupon",
""
],
[
"Saranurak",
"Thatchaphol",
""
]
] | 0no_new_dataset
|
cs/0302037 | Ilia Toli | Ilia Toli | Hidden Polynomial(s) Cryptosystems | 17 pages | null | null | null | cs.CR cs.SC | null | We propose variations of the class of hidden monomial cryptosystems in order
to make it resistant to all known attacks. We use identities built upon a
single bivariate polynomial equation with coefficients in a finite field.
Indeed, it can be replaced by a ``small'' ideal, as well. Throughout, we set up
probabilistic encryption protocols, too. The same ideas extend to digital
signature algorithms, as well. Our schemes work as well on differential fields
of positive characteristic, and elsewhere.
| [
{
"created": "Wed, 26 Feb 2003 18:30:49 GMT",
"version": "v1"
},
{
"created": "Thu, 27 Feb 2003 20:21:31 GMT",
"version": "v2"
},
{
"created": "Tue, 11 Mar 2003 21:37:59 GMT",
"version": "v3"
},
{
"created": "Sat, 29 Mar 2003 14:00:51 GMT",
"version": "v4"
}
] | 2007-05-23T00:00:00 | [
[
"Toli",
"Ilia",
""
]
] | 0no_new_dataset
|
1308.1049 | Ardeshir Kianercy | Ardeshir Kianercy and Aram Galstyan | Coevolutionary networks of reinforcement-learning agents | null | Phys. Rev. E 88, 012815 (2013) | 10.1103/PhysRevE.88.012815 | null | cs.MA cs.LG nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a model of network formation in repeated games where the
players adapt their strategies and network ties simultaneously using a simple
reinforcement-learning scheme. It is demonstrated that the coevolutionary
dynamics of such systems can be described via coupled replicator equations. We
provide a comprehensive analysis for three-player two-action games, which is
the minimum system size with nontrivial structural dynamics. In particular, we
characterize the Nash equilibria (NE) in such games and examine the local
stability of the rest points corresponding to those equilibria. We also study
general n-player networks via both simulations and analytical methods and find
that in the absence of exploration, the stable equilibria consist of star
motifs as the main building blocks of the network. Furthermore, in all stable
equilibria the agents play pure strategies, even when the game allows mixed NE.
Finally, we study the impact of exploration on learning outcomes, and observe
that there is a critical exploration rate above which the symmetric and
uniformly connected network topology becomes stable.
| [
{
"created": "Mon, 5 Aug 2013 17:43:58 GMT",
"version": "v1"
}
] | 2013-08-06T00:00:00 | [
[
"Kianercy",
"Ardeshir",
""
],
[
"Galstyan",
"Aram",
""
]
] | 0no_new_dataset
|
1101.4063 | Hongda Xiao | Hongda Xiao and Edmund M. Yeh | The Impact of Incomplete Information on Games in Parallel Relay Networks | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the impact of incomplete information on incentives for node
cooperation in parallel relay networks with one source node, one destination
node, and multiple relay nodes. All nodes are selfish and strategic, interested
in maximizing their own profit instead of the social welfare. We consider the
practical situation where the channel state on any given relay path is not
observable to the source or to the other relays. We examine different
bargaining relationships between the source and the relays, and propose a
framework for analyzing the efficiency loss induced by incomplete information.
We analyze the source of the efficiency loss, and quantify the amount of
inefficiency which results.
| [
{
"created": "Fri, 21 Jan 2011 01:44:09 GMT",
"version": "v1"
}
] | 2011-01-24T00:00:00 | [
[
"Xiao",
"Hongda",
""
],
[
"Yeh",
"Edmund M.",
""
]
] | 0no_new_dataset
|
2212.02234 | Liqun Wang | X. Li (1), X. Zhang (1), X. Yi (1), D. Liu (1), H. Wang (1), B. Zhang
(1), B. Zhang (1), D. Zhao (2 and 3), L. Wang (1, 4) ((1) China University of
Petroleum, Beijing,(2) Institute of Computing Technology, Chinese Academy of
Sciences, (3) University of Chinese Academy of Sciences, (4) Beijing Key
Laboratory of Optical Detection Technology for Oil and Gas, China University
of Petroleum) | Review of medical data analysis based on spiking neural networks | null | null | null | null | cs.NE cs.LG | http://creativecommons.org/licenses/by/4.0/ | Medical data mainly includes various types of biomedical signals and medical
images, which can be used by professional doctors to make judgments on
patients' health conditions. However, the interpretation of medical data
requires a lot of human cost and there may be misjudgments, so many scholars
use neural networks and deep learning to classify and study medical data, which
can improve the efficiency and accuracy of doctors and detect diseases early
for early diagnosis, etc. Therefore, it has a wide range of application
prospects. However, traditional neural networks have disadvantages such as high
energy consumption and high latency (slow computation speed). This paper
presents recent research on signal classification and disease diagnosis based
on a third-generation neural network, the spiking neuron network, using medical
data including EEG signals, ECG signals, EMG signals and MRI images. The
advantages and disadvantages of pulsed neural networks compared with
traditional networks are summarized and its development orientation in the
future is prospected.
| [
{
"created": "Sun, 13 Nov 2022 03:23:54 GMT",
"version": "v1"
},
{
"created": "Sun, 13 Aug 2023 06:02:06 GMT",
"version": "v2"
}
] | 2023-08-15T00:00:00 | [
[
"Li",
"X.",
"",
"2 and 3"
],
[
"Zhang",
"X.",
"",
"2 and 3"
],
[
"Yi",
"X.",
"",
"2 and 3"
],
[
"Liu",
"D.",
"",
"2 and 3"
],
[
"Wang",
"H.",
"",
"2 and 3"
],
[
"Zhang",
"B.",
"",
"2 and 3"
],
[
"Zhang",
"B.",
"",
"2 and 3"
],
[
"Zhao",
"D.",
"",
"2 and 3"
],
[
"Wang",
"L.",
""
]
] | 0no_new_dataset
|
2104.03066 | Dvir Samuel | Dvir Samuel and Gal Chechik | Distributional Robustness Loss for Long-tail Learning | Accepted to ICCV 2021 | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by/4.0/ | Real-world data is often unbalanced and long-tailed, but deep models struggle
to recognize rare classes in the presence of frequent classes. To address
unbalanced data, most studies try balancing the data, the loss, or the
classifier to reduce classification bias towards head classes. Far less
attention has been given to the latent representations learned with unbalanced
data. We show that the feature extractor part of deep networks suffers greatly
from this bias. We propose a new loss based on robustness theory, which
encourages the model to learn high-quality representations for both head and
tail classes. While the general form of the robustness loss may be hard to
compute, we further derive an easy-to-compute upper bound that can be minimized
efficiently. This procedure reduces representation bias towards head classes in
the feature space and achieves new SOTA results on CIFAR100-LT, ImageNet-LT,
and iNaturalist long-tail benchmarks. We find that training with robustness
increases recognition accuracy of tail classes while largely maintaining the
accuracy of head classes. The new robustness loss can be combined with various
classifier balancing techniques and can be applied to representations at
several layers of the deep model.
| [
{
"created": "Wed, 7 Apr 2021 11:34:04 GMT",
"version": "v1"
},
{
"created": "Sat, 30 Oct 2021 22:31:51 GMT",
"version": "v2"
}
] | 2021-11-02T00:00:00 | [
[
"Samuel",
"Dvir",
""
],
[
"Chechik",
"Gal",
""
]
] | 0no_new_dataset
|
1806.10976 | Guillermo Ortiz-Jim\'enez | Guillermo Ortiz-Jim\'enez, Mario Coutino, Sundeep Prabhakar Chepuri,
and Geert Leus | Sparse Sampling for Inverse Problems with Tensors | 13 pages, 7 figures | null | 10.1109/TSP.2019.2914879 | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of designing sparse sampling strategies for
multidomain signals, which can be represented using tensors that admit a known
multilinear decomposition. We leverage the multidomain structure of tensor
signals and propose to acquire samples using a Kronecker-structured sensing
function, thereby circumventing the curse of dimensionality. For designing such
sensing functions, we develop low-complexity greedy algorithms based on
submodular optimization methods to compute near-optimal sampling sets. We
present several numerical examples, ranging from multi-antenna communications
to graph signal processing, to validate the developed theory.
| [
{
"created": "Thu, 28 Jun 2018 13:57:48 GMT",
"version": "v1"
}
] | 2019-06-26T00:00:00 | [
[
"Ortiz-Jiménez",
"Guillermo",
""
],
[
"Coutino",
"Mario",
""
],
[
"Chepuri",
"Sundeep Prabhakar",
""
],
[
"Leus",
"Geert",
""
]
] | 0no_new_dataset
|
1711.05497 | Thorsten Wissmann | Bram Westerbaan, Bas Westerbaan, Rutger Kuyper, Carst Tankink, Remy
Viehoff, Henk Barendregt | Statman's Hierarchy Theorem | null | Logical Methods in Computer Science, Volume 13, Issue 4 (November
27, 2017) lmcs:4074 | 10.23638/LMCS-13(4:19)2017 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the Simply Typed $\lambda$-calculus Statman investigates the reducibility
relation $\leq_{\beta\eta}$ between types: for $A,B \in \mathbb{T}^0$, types
freely generated using $\rightarrow$ and a single ground type $0$, define $A
\leq_{\beta\eta} B$ if there exists a $\lambda$-definable injection from the
closed terms of type $A$ into those of type $B$. Unexpectedly, the induced
partial order is the (linear) well-ordering (of order type) $\omega + 4$.
In the proof a finer relation $\leq_{h}$ is used, where the above injection
is required to be a B\"ohm transformation, and an (a posteriori) coarser
relation $\leq_{h^+}$, requiring a finite family of B\"ohm transformations that
is jointly injective.
We present this result in a self-contained, syntactic, constructive and
simplified manner. En route similar results for $\leq_h$ (order type $\omega +
5$) and $\leq_{h^+}$ (order type $8$) are obtained. Five of the equivalence
classes of $\leq_{h^+}$ correspond to canonical term models of Statman, one to
the trivial term model collapsing all elements of the same type, and one does
not even form a model by the lack of closed terms of many types.
| [
{
"created": "Wed, 15 Nov 2017 10:56:30 GMT",
"version": "v1"
},
{
"created": "Fri, 24 Nov 2017 13:14:20 GMT",
"version": "v2"
}
] | 2023-06-22T00:00:00 | [
[
"Westerbaan",
"Bram",
""
],
[
"Westerbaan",
"Bas",
""
],
[
"Kuyper",
"Rutger",
""
],
[
"Tankink",
"Carst",
""
],
[
"Viehoff",
"Remy",
""
],
[
"Barendregt",
"Henk",
""
]
] | 0no_new_dataset
|
1205.2653 | Corinna Cortes | Corinna Cortes, Mehryar Mohri, Afshin Rostamizadeh | L2 Regularization for Learning Kernels | Appears in Proceedings of the Twenty-Fifth Conference on Uncertainty
in Artificial Intelligence (UAI2009) | null | null | UAI-P-2009-PG-109-116 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The choice of the kernel is critical to the success of many learning
algorithms but it is typically left to the user. Instead, the training data can
be used to learn the kernel by selecting it out of a given family, such as that
of non-negative linear combinations of p base kernels, constrained by a trace
or L1 regularization. This paper studies the problem of learning kernels with
the same family of kernels but with an L2 regularization instead, and for
regression problems. We analyze the problem of learning kernels with ridge
regression. We derive the form of the solution of the optimization problem and
give an efficient iterative algorithm for computing that solution. We present a
novel theoretical analysis of the problem based on stability and give learning
bounds for orthogonal kernels that contain only an additive term O(pp/m) when
compared to the standard kernel ridge regression stability bound. We also
report the results of experiments indicating that L1 regularization can lead to
modest improvements for a small number of kernels, but to performance
degradations in larger-scale cases. In contrast, L2 regularization never
degrades performance and in fact achieves significant improvements with a large
number of kernels.
| [
{
"created": "Wed, 9 May 2012 15:01:22 GMT",
"version": "v1"
}
] | 2012-05-14T00:00:00 | [
[
"Cortes",
"Corinna",
""
],
[
"Mohri",
"Mehryar",
""
],
[
"Rostamizadeh",
"Afshin",
""
]
] | 0no_new_dataset
|
2305.20086 | Jonas Geiping | Gowthami Somepalli, Vasu Singla, Micah Goldblum, Jonas Geiping and Tom
Goldstein | Understanding and Mitigating Copying in Diffusion Models | 17 pages, preprint. Code is available at
https://github.com/somepago/DCR | null | null | null | cs.LG cs.CR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Images generated by diffusion models like Stable Diffusion are increasingly
widespread. Recent works and even lawsuits have shown that these models are
prone to replicating their training data, unbeknownst to the user. In this
paper, we first analyze this memorization problem in text-to-image diffusion
models. While it is widely believed that duplicated images in the training set
are responsible for content replication at inference time, we observe that the
text conditioning of the model plays a similarly important role. In fact, we
see in our experiments that data replication often does not happen for
unconditional models, while it is common in the text-conditional case.
Motivated by our findings, we then propose several techniques for reducing data
replication at both training and inference time by randomizing and augmenting
image captions in the training set.
| [
{
"created": "Wed, 31 May 2023 17:58:02 GMT",
"version": "v1"
}
] | 2023-06-01T00:00:00 | [
[
"Somepalli",
"Gowthami",
""
],
[
"Singla",
"Vasu",
""
],
[
"Goldblum",
"Micah",
""
],
[
"Geiping",
"Jonas",
""
],
[
"Goldstein",
"Tom",
""
]
] | 0no_new_dataset
|
1312.0510 | Andrey Demichev | A. Demichev, V. Ilyin, A. Kryukov and S. Polyakov | Fault Tolerance of Small-World Regular and Stochastic Interconnection
Networks | 9 pages, 5 figures; LaTeX; typos corrected, figures improved,
acknowledgements added | Vychisl. Metody Programm (Numerical Methods and Programming)
vol.15 (2014) 36 - 48 (in Russian) | null | null | cs.SI cs.DC physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Resilience of the most important properties of stochastic and regular
(deterministic) small-world interconnection networks is studied. It is shown
that in the broad range of values of the fraction of faulty nodes the networks
under consideration possess high fault tolerance, the deterministic networks
being slightly better than the stochastic ones.
| [
{
"created": "Thu, 21 Nov 2013 13:53:10 GMT",
"version": "v1"
},
{
"created": "Mon, 13 Jan 2014 07:09:35 GMT",
"version": "v2"
}
] | 2014-11-07T00:00:00 | [
[
"Demichev",
"A.",
""
],
[
"Ilyin",
"V.",
""
],
[
"Kryukov",
"A.",
""
],
[
"Polyakov",
"S.",
""
]
] | 0no_new_dataset
|
1205.2153 | Rourab Paul | Rourab Paul, Sangeet Saha, Suman Sau, Amlan Chakrabarti | Design and implementation of real time AES-128 on real time operating
system for multiple FPGA communication | 6 pages, IEMCON 12, Kolkata | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Security is the most important part in data communication system, where more
randomization in secret keys increases the security as well as complexity of
the cryptography algorithms. As a result in recent dates these algorithms are
compensating with enormous memory spaces and large execution time on hardware
platform. Field programmable gate arrays (FPGAs), provide one of the major
alternative in hardware platform scenario due to its reconfiguration nature,
low price and marketing speed. In FPGA based embedded system we can use
embedded processor to execute particular algorithm with the inclusion of a real
time operating System (RTOS), where threads may reduce resource utilization and
time consumption. A process in the runtime is separated in different smaller
tasks which are executed by the scheduler to meet the real time dead line using
RTOS. In this paper we demonstrate the design and implementation of a 128-bit
Advanced Encryption Standard (AES) both symmetric key encryption and decryption
algorithm by developing suitable hardware and software design on Xilinx
Spartan- 3E (XC3S500E-FG320) device using an Xilkernel RTOS, the implementation
has been tested successfully The system is optimized in terms of execution
speed and hardware utilization.
| [
{
"created": "Thu, 10 May 2012 04:04:45 GMT",
"version": "v1"
}
] | 2012-05-11T00:00:00 | [
[
"Paul",
"Rourab",
""
],
[
"Saha",
"Sangeet",
""
],
[
"Sau",
"Suman",
""
],
[
"Chakrabarti",
"Amlan",
""
]
] | 0no_new_dataset
|
2208.02672 | Tobias Runge | Tobias Runge, Alexander Kittelmann, Marco Servetto, Alex Potanin, Ina
Schaefer | Information Flow Control-by-Construction for an Object-Oriented Language
Using Type Modifiers | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In security-critical software applications, confidential information must be
prevented from leaking to unauthorized sinks. Static analysis techniques are
widespread to enforce a secure information flow by checking a program after
construction. A drawback of these systems is that incomplete programs during
construction cannot be checked properly. The user is not guided to a secure
program by most systems. We introduce IFbCOO, an approach that guides users
incrementally to a secure implementation by using refinement rules. In each
refinement step, confidentiality or integrity (or both) is guaranteed alongside
the functional correctness of the program, such that insecure programs are
declined by construction. In this work, we formalize IFbCOO and prove soundness
of the refinement rules. We implement IFbCOO in the tool CorC and conduct a
feasibility study by successfully implementing case studies.
| [
{
"created": "Thu, 4 Aug 2022 14:06:30 GMT",
"version": "v1"
}
] | 2022-08-05T00:00:00 | [
[
"Runge",
"Tobias",
""
],
[
"Kittelmann",
"Alexander",
""
],
[
"Servetto",
"Marco",
""
],
[
"Potanin",
"Alex",
""
],
[
"Schaefer",
"Ina",
""
]
] | 0no_new_dataset
|
2006.09609 | Qiyu Sun | Yaxu Li, Qiyu Sun and Jun Xian | Random sampling and reconstruction of concentrated signals in a
reproducing kernel space | null | null | null | null | cs.IT cs.NA math.IT math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider (random) sampling of signals concentrated on a
bounded Corkscrew domain $\Omega$ of a metric measure space, and reconstructing
concentrated signals approximately from their (un)corrupted sampling data taken
on a sampling set contained in $\Omega$. We establish a weighted stability of
bi-Lipschitz type for a (random) sampling scheme on the set of concentrated
signals in a reproducing kernel space. The weighted stability of bi-Lipschitz
type provides a weak robustness to the sampling scheme, however due to the
nonconvexity of the set of concentrated signals, it does not imply the unique
signal reconstruction. From (un)corrupted samples taken on a finite sampling
set contained in $\Omega$, we propose an algorithm to find approximations to
signals concentrated on a bounded Corkscrew domain $\Omega$. Random sampling is
a sampling scheme where sampling positions are randomly taken according to a
probability distribution. Next we show that, with high probability, signals
concentrated on a bounded Corkscrew domain $\Omega$ can be reconstructed
approximately from their uncorrupted (or randomly corrupted) samples taken at
i.i.d. random positions drawn on $\Omega$, provided that the sampling size is
at least of the order $\mu(\Omega) \ln (\mu(\Omega))$, where $\mu(\Omega)$ is
the measure of the concentrated domain $\Omega$. Finally, we demonstrate the
performance of proposed approximations to the original concentrated signal when
the sampling procedure is taken either with small density or randomly with
large size.
| [
{
"created": "Wed, 17 Jun 2020 02:30:52 GMT",
"version": "v1"
}
] | 2020-06-18T00:00:00 | [
[
"Li",
"Yaxu",
""
],
[
"Sun",
"Qiyu",
""
],
[
"Xian",
"Jun",
""
]
] | 0no_new_dataset
|
cs/9811022 | Ciprian Chelba | Ciprian Chelba, Frederick Jelinek (CLSP The Johns Hopkins University) | Expoiting Syntactic Structure for Language Modeling | changed ACM-class membership and buggy author names | Proceedings of ACL'98, Montreal, Canada | null | null | cs.CL | null | The paper presents a language model that develops syntactic structure and
uses it to extract meaningful information from the word history, thus enabling
the use of long distance dependencies. The model assigns probability to every
joint sequence of words--binary-parse-structure with headword annotation and
operates in a left-to-right manner --- therefore usable for automatic speech
recognition. The model, its probabilistic parameterization, and a set of
experiments meant to evaluate its predictive power are presented; an
improvement over standard trigram modeling is achieved.
| [
{
"created": "Thu, 12 Nov 1998 17:31:17 GMT",
"version": "v1"
},
{
"created": "Tue, 25 Jan 2000 15:37:36 GMT",
"version": "v2"
}
] | 2007-05-23T00:00:00 | [
[
"Chelba",
"Ciprian",
"",
"CLSP The Johns Hopkins University"
],
[
"Jelinek",
"Frederick",
"",
"CLSP The Johns Hopkins University"
]
] | 0no_new_dataset
|
2212.11922 | Evin P{\i}nar \"Ornek | Evin P{\i}nar \"Ornek, Aravindhan K Krishnan, Shreekant Gayaka,
Cheng-Hao Kuo, Arnie Sen, Nassir Navab, Federico Tombari | SupeRGB-D: Zero-shot Instance Segmentation in Cluttered Indoor
Environments | Accepted in Robotics and Automation Letters April 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Object instance segmentation is a key challenge for indoor robots navigating
cluttered environments with many small objects. Limitations in 3D sensing
capabilities often make it difficult to detect every possible object. While
deep learning approaches may be effective for this problem, manually annotating
3D data for supervised learning is time-consuming. In this work, we explore
zero-shot instance segmentation (ZSIS) from RGB-D data to identify unseen
objects in a semantic category-agnostic manner. We introduce a zero-shot split
for Tabletop Objects Dataset (TOD-Z) to enable this study and present a method
that uses annotated objects to learn the ``objectness'' of pixels and
generalize to unseen object categories in cluttered indoor environments. Our
method, SupeRGB-D, groups pixels into small patches based on geometric cues and
learns to merge the patches in a deep agglomerative clustering fashion.
SupeRGB-D outperforms existing baselines on unseen objects while achieving
similar performance on seen objects. We further show competitive results on the
real dataset OCID. With its lightweight design (0.4 MB memory requirement), our
method is extremely suitable for mobile and robotic applications. Additional
DINO features can increase performance with a higher memory requirement. The
dataset split and code are available at https://github.com/evinpinar/supergb-d.
| [
{
"created": "Thu, 22 Dec 2022 17:59:48 GMT",
"version": "v1"
},
{
"created": "Thu, 25 May 2023 12:25:24 GMT",
"version": "v2"
}
] | 2023-05-26T00:00:00 | [
[
"Örnek",
"Evin Pınar",
""
],
[
"Krishnan",
"Aravindhan K",
""
],
[
"Gayaka",
"Shreekant",
""
],
[
"Kuo",
"Cheng-Hao",
""
],
[
"Sen",
"Arnie",
""
],
[
"Navab",
"Nassir",
""
],
[
"Tombari",
"Federico",
""
]
] | 1new_dataset
|
2109.08042 | Yasamin Nazari | Greg Bodwin, Michael Dinitz, Yasamin Nazari | Vertex Fault-Tolerant Emulators | To appear in ITCS 2022 | null | null | null | cs.DS cs.DM | http://creativecommons.org/licenses/by/4.0/ | A $k$-spanner of a graph $G$ is a sparse subgraph that preserves its shortest
path distances up to a multiplicative stretch factor of $k$, and a $k$-emulator
is similar but not required to be a subgraph of $G$. A classic theorem by
Thorup and Zwick [JACM '05] shows that, despite the extra flexibility available
to emulators, the size/stretch tradeoffs for spanners and emulators are
equivalent. Our main result is that this equivalence in tradeoffs no longer
holds in the commonly-studied setting of graphs with vertex failures. That is:
we introduce a natural definition of vertex fault-tolerant emulators, and then
we show a three-way tradeoff between size, stretch, and fault-tolerance for
these emulators that polynomially surpasses the tradeoff known to be optimal
for spanners.
We complement our emulator upper bound with a lower bound construction that
is essentially tight (within $\log n$ factors of the upper bound) when the
stretch is $2k-1$ and $k$ is either a fixed odd integer or $2$. We also show
constructions of fault-tolerant emulators with additive error, demonstrating
that these also enjoy significantly improved tradeoffs over those available for
fault-tolerant additive spanners.
| [
{
"created": "Thu, 16 Sep 2021 15:12:25 GMT",
"version": "v1"
},
{
"created": "Fri, 19 Nov 2021 16:05:11 GMT",
"version": "v2"
}
] | 2021-11-22T00:00:00 | [
[
"Bodwin",
"Greg",
""
],
[
"Dinitz",
"Michael",
""
],
[
"Nazari",
"Yasamin",
""
]
] | 0no_new_dataset
|
2112.09859 | Liyu Chen | Liyu Chen, Rahul Jain, Haipeng Luo | Improved No-Regret Algorithms for Stochastic Shortest Path with Linear
MDP | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce two new no-regret algorithms for the stochastic shortest path
(SSP) problem with a linear MDP that significantly improve over the only
existing results of (Vial et al., 2021). Our first algorithm is computationally
efficient and achieves a regret bound
$\widetilde{O}\left(\sqrt{d^3B_{\star}^2T_{\star} K}\right)$, where $d$ is the
dimension of the feature space, $B_{\star}$ and $T_{\star}$ are upper bounds of
the expected costs and hitting time of the optimal policy respectively, and $K$
is the number of episodes. The same algorithm with a slight modification also
achieves logarithmic regret of order
$O\left(\frac{d^3B_{\star}^4}{c_{\min}^2\text{gap}_{\min}}\ln^5\frac{dB_{\star}
K}{c_{\min}} \right)$, where $\text{gap}_{\min}$ is the minimum sub-optimality
gap and $c_{\min}$ is the minimum cost over all state-action pairs. Our result
is obtained by developing a simpler and improved analysis for the
finite-horizon approximation of (Cohen et al., 2021) with a smaller
approximation error, which might be of independent interest. On the other hand,
using variance-aware confidence sets in a global optimization problem, our
second algorithm is computationally inefficient but achieves the first
"horizon-free" regret bound $\widetilde{O}(d^{3.5}B_{\star}\sqrt{K})$ with no
polynomial dependency on $T_{\star}$ or $1/c_{\min}$, almost matching the
$\Omega(dB_{\star}\sqrt{K})$ lower bound from (Min et al., 2021).
| [
{
"created": "Sat, 18 Dec 2021 06:47:31 GMT",
"version": "v1"
}
] | 2021-12-21T00:00:00 | [
[
"Chen",
"Liyu",
""
],
[
"Jain",
"Rahul",
""
],
[
"Luo",
"Haipeng",
""
]
] | 0no_new_dataset
|
2312.05616 | Chaofeng Chen | Chaofeng Chen, Shangchen Zhou, Liang Liao, Haoning Wu, Wenxiu Sun,
Qiong Yan, Weisi Lin | Iterative Token Evaluation and Refinement for Real-World
Super-Resolution | To appear in AAAI2024, https://github.com/chaofengc/ITER | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Real-world image super-resolution (RWSR) is a long-standing problem as
low-quality (LQ) images often have complex and unidentified degradations.
Existing methods such as Generative Adversarial Networks (GANs) or continuous
diffusion models present their own issues including GANs being difficult to
train while continuous diffusion models requiring numerous inference steps. In
this paper, we propose an Iterative Token Evaluation and Refinement (ITER)
framework for RWSR, which utilizes a discrete diffusion model operating in the
discrete token representation space, i.e., indexes of features extracted from a
VQGAN codebook pre-trained with high-quality (HQ) images. We show that ITER is
easier to train than GANs and more efficient than continuous diffusion models.
Specifically, we divide RWSR into two sub-tasks, i.e., distortion removal and
texture generation. Distortion removal involves simple HQ token prediction with
LQ images, while texture generation uses a discrete diffusion model to
iteratively refine the distortion removal output with a token refinement
network. In particular, we propose to include a token evaluation network in the
discrete diffusion process. It learns to evaluate which tokens are good
restorations and helps to improve the iterative refinement results. Moreover,
the evaluation network can first check status of the distortion removal output
and then adaptively select total refinement steps needed, thereby maintaining a
good balance between distortion removal and texture generation. Extensive
experimental results show that ITER is easy to train and performs well within
just 8 iterative steps. Our codes will be available publicly.
| [
{
"created": "Sat, 9 Dec 2023 17:07:32 GMT",
"version": "v1"
}
] | 2023-12-12T00:00:00 | [
[
"Chen",
"Chaofeng",
""
],
[
"Zhou",
"Shangchen",
""
],
[
"Liao",
"Liang",
""
],
[
"Wu",
"Haoning",
""
],
[
"Sun",
"Wenxiu",
""
],
[
"Yan",
"Qiong",
""
],
[
"Lin",
"Weisi",
""
]
] | 0no_new_dataset
|
2311.08172 | Chen Li | Chen Li, Yixiao Ge, Dian Li, and Ying Shan | Vision-Language Instruction Tuning: A Review and Analysis | 34 pages, 6 figures | null | null | null | cs.MM cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Instruction tuning is a crucial supervised training phase in Large Language
Models (LLMs), aiming to enhance the LLM's ability to generalize instruction
execution and adapt to user preferences. With the increasing integration of
multi-modal data into LLMs, there is growing interest in Vision-Language
Instruction Tuning (VLIT), which presents more complex characteristics compared
to pure text instruction tuning. In this paper, we systematically review the
latest VLIT settings and corresponding datasets in multi-modal LLMs and provide
insights into the intrinsic motivations behind their design. For the first
time, we offer a detailed multi-perspective categorization for existing VLIT
datasets and identify the characteristics that high-quality VLIT data should
possess. By incorporating these characteristics as guiding principles into the
existing VLIT data construction process, we conduct extensive experiments and
verify their positive impact on the performance of tuned multi-modal LLMs.
Furthermore, we discuss the current challenges and future research directions
of VLIT, providing insights for the continuous development of this field. The
code and dataset related to this paper have been open-sourced at
https://github.com/palchenli/VL-Instruction-Tuning.
| [
{
"created": "Tue, 14 Nov 2023 14:02:32 GMT",
"version": "v1"
},
{
"created": "Sat, 25 Nov 2023 07:59:48 GMT",
"version": "v2"
}
] | 2023-11-28T00:00:00 | [
[
"Li",
"Chen",
""
],
[
"Ge",
"Yixiao",
""
],
[
"Li",
"Dian",
""
],
[
"Shan",
"Ying",
""
]
] | 0no_new_dataset
|
1809.01087 | Muhammad Majid Butt | M. Majid Butt, Irene Macaluso, Carlo Galiotto and Nicola Marchetti | Fair Dynamic Spectrum Management in Licensed Shared Access Systems | null | IEEE Systems Journal, 2018 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Licensed Shared Access (LSA) is a spectrum sharing mechanism where bandwidth
is shared between a primary network, called incumbent, and a secondary mobile
network. In this work, we address dynamic spectrum management mechanisms for
LSA systems. We propose a fair spectrum management algorithm for distributing
incumbent's available spectrum among mobile networks. Then, we adapt the
proposed algorithm to take mobile network operator's regulatory compliance
aspect into account and penalize the misbehaving network operators in spectrum
allocation. We extend our results to the scenario where more than one incumbent
offer spectrum to the mobile operators in a service area and propose various
protocols, which ensure long term fair spectrum allocation within the
individual LSA networks. Finally, we numerically evaluate the performance of
the proposed spectrum allocation algorithms and compare them using various
performance metrics. For the single incumbent case, the numerical results show
that the spectrum allocation is fair when the mobile operators follow the
spectrum access regulations. We demonstrate the effect of our proposed penalty
functions on spectrum allocation when the operators do not comply with the
regulatory aspects. For the multi-incumbent scenario, the results show a
trade-off between efficient spectrum allocation and flexibility in spectrum
access for our proposed algorithms.
| [
{
"created": "Tue, 4 Sep 2018 16:47:39 GMT",
"version": "v1"
}
] | 2018-09-05T00:00:00 | [
[
"Butt",
"M. Majid",
""
],
[
"Macaluso",
"Irene",
""
],
[
"Galiotto",
"Carlo",
""
],
[
"Marchetti",
"Nicola",
""
]
] | 0no_new_dataset
|
2010.09624 | Guillermo Ortiz-Jimenez | Guillermo Ortiz-Jimenez, Apostolos Modas, Seyed-Mohsen
Moosavi-Dezfooli, Pascal Frossard | Optimism in the Face of Adversity: Understanding and Improving Deep
Learning through Adversarial Robustness | 24 pages, 14 figures | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Driven by massive amounts of data and important advances in computational
resources, new deep learning systems have achieved outstanding results in a
large spectrum of applications. Nevertheless, our current theoretical
understanding on the mathematical foundations of deep learning lags far behind
its empirical success. Towards solving the vulnerability of neural networks,
however, the field of adversarial robustness has recently become one of the
main sources of explanations of our deep models. In this article, we provide an
in-depth review of the field of adversarial robustness in deep learning, and
give a self-contained introduction to its main notions. But, in contrast to the
mainstream pessimistic perspective of adversarial robustness, we focus on the
main positive aspects that it entails. We highlight the intuitive connection
between adversarial examples and the geometry of deep neural networks, and
eventually explore how the geometric study of adversarial examples can serve as
a powerful tool to understand deep learning. Furthermore, we demonstrate the
broad applicability of adversarial robustness, providing an overview of the
main emerging applications of adversarial robustness beyond security. The goal
of this article is to provide readers with a set of new perspectives to
understand deep learning, and to supply them with intuitive tools and insights
on how to use adversarial robustness to improve it.
| [
{
"created": "Mon, 19 Oct 2020 16:03:46 GMT",
"version": "v1"
},
{
"created": "Thu, 28 Jan 2021 17:47:48 GMT",
"version": "v2"
}
] | 2021-01-29T00:00:00 | [
[
"Ortiz-Jimenez",
"Guillermo",
""
],
[
"Modas",
"Apostolos",
""
],
[
"Moosavi-Dezfooli",
"Seyed-Mohsen",
""
],
[
"Frossard",
"Pascal",
""
]
] | 0no_new_dataset
|
2106.01273 | Wenlong Tian | Xuming Ye, Xiaoye Xue, Wenlong Tian, Zhiyong Xu, Weijun Xiao, Ruixuan
Li | Chunk Content is not Enough: Chunk-Context Aware Resemblance Detection
for Deduplication Delta Compression | null | null | null | null | cs.DC | http://creativecommons.org/licenses/by/4.0/ | With the growing popularity of cloud storage, removing duplicated data across
users is getting more critical for service providers to reduce costs. Recently,
Data resemblance detection is a novel technology to detect redundancy among
similarity. It extracts feature from each chunk content and treat chunks with
high similarity as candidates for removing redundancy. However, popular
resemblance methods such as "N-transform" and "Finesse" use only the chunk data
for feature extraction. A minor modification on the data chunk could seriously
deteriorate its capability for resemblance detection. In this paper, we
proposes a novel chunk-context aware resemblance detection algorithm, called
CARD, to mitigate this issue. CARD introduces a BP-Neural network-based
chunk-context aware model, and uses N-sub-chunk shingles-based initial feature
extraction strategy. It effectively integrates each data chunk content's
internal structure with the context information for feature extraction, the
impact of small changes in data chunks is significantly reduced. To evaluate
its performance, we implement a CARD prototype and conduct extensive
experiments using real-world data sets. The results show that CARD can detect
up to 75.03% more redundant data and accelerate the resemblance detection
operations by 5.6 to 17.8 times faster compared with the state-of-the-art
resemblance detection approaches.
| [
{
"created": "Wed, 2 Jun 2021 16:34:07 GMT",
"version": "v1"
}
] | 2021-06-03T00:00:00 | [
[
"Ye",
"Xuming",
""
],
[
"Xue",
"Xiaoye",
""
],
[
"Tian",
"Wenlong",
""
],
[
"Xu",
"Zhiyong",
""
],
[
"Xiao",
"Weijun",
""
],
[
"Li",
"Ruixuan",
""
]
] | 0no_new_dataset
|
2303.11675 | Yongkang Cheng | Yongkang Cheng, Shaoli Huang, Jifeng Ning, Ying Shan | BoPR: Body-aware Part Regressor for Human Shape and Pose Estimation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel approach for estimating human body shape and pose
from monocular images that effectively addresses the challenges of occlusions
and depth ambiguity. Our proposed method BoPR, the Body-aware Part Regressor,
first extracts features of both the body and part regions using an
attention-guided mechanism. We then utilize these features to encode extra
part-body dependency for per-part regression, with part features as queries and
body feature as a reference. This allows our network to infer the spatial
relationship of occluded parts with the body by leveraging visible parts and
body reference information. Our method outperforms existing state-of-the-art
methods on two benchmark datasets, and our experiments show that it
significantly surpasses existing methods in terms of depth ambiguity and
occlusion handling. These results provide strong evidence of the effectiveness
of our approach.The code and data are available for research purposes at
https://github.com/cyk990422/BoPR.
| [
{
"created": "Tue, 21 Mar 2023 08:36:59 GMT",
"version": "v1"
},
{
"created": "Fri, 24 Mar 2023 08:41:24 GMT",
"version": "v2"
}
] | 2023-03-27T00:00:00 | [
[
"Cheng",
"Yongkang",
""
],
[
"Huang",
"Shaoli",
""
],
[
"Ning",
"Jifeng",
""
],
[
"Shan",
"Ying",
""
]
] | 1new_dataset
|
2112.02994 | Haozheng Luo | Ruiyang Qin, Haozheng Luo, Zheheng Fan, Ziang Ren | IBERT: Idiom Cloze-style reading comprehension with Attention | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Idioms are special fixed phrases usually derived from stories. They are
commonly used in casual conversations and literary writings. Their meanings are
usually highly non-compositional. The idiom cloze task is a challenge problem
in Natural Language Processing (NLP) research problem. Previous approaches to
this task are built on sequence-to-sequence (Seq2Seq) models and achieved
reasonably well performance on existing datasets. However, they fall short in
understanding the highly non-compositional meaning of idiomatic expressions.
They also do not consider both the local and global context at the same time.
In this paper, we proposed a BERT-based embedding Seq2Seq model that encodes
idiomatic expressions and considers them in both global and local context. Our
model uses XLNET as the encoder and RoBERTa for choosing the most probable
idiom for a given context. Experiments on the EPIE Static Corpus dataset show
that our model performs better than existing state-of-the-arts.
| [
{
"created": "Fri, 5 Nov 2021 21:37:15 GMT",
"version": "v1"
}
] | 2021-12-07T00:00:00 | [
[
"Qin",
"Ruiyang",
""
],
[
"Luo",
"Haozheng",
""
],
[
"Fan",
"Zheheng",
""
],
[
"Ren",
"Ziang",
""
]
] | 0no_new_dataset
|
1811.09720 | Chih-Kuan Yeh | Chih-Kuan Yeh, Joon Sik Kim, Ian E.H. Yen, Pradeep Ravikumar | Representer Point Selection for Explaining Deep Neural Networks | NIPS 2018 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose to explain the predictions of a deep neural network, by pointing
to the set of what we call representer points in the training set, for a given
test point prediction. Specifically, we show that we can decompose the
pre-activation prediction of a neural network into a linear combination of
activations of training points, with the weights corresponding to what we call
representer values, which thus capture the importance of that training point on
the learned parameters of the network. But it provides a deeper understanding
of the network than simply training point influence: with positive representer
values corresponding to excitatory training points, and negative values
corresponding to inhibitory points, which as we show provides considerably more
insight. Our method is also much more scalable, allowing for real-time feedback
in a manner not feasible with influence functions.
| [
{
"created": "Fri, 23 Nov 2018 22:34:17 GMT",
"version": "v1"
}
] | 2018-11-27T00:00:00 | [
[
"Yeh",
"Chih-Kuan",
""
],
[
"Kim",
"Joon Sik",
""
],
[
"Yen",
"Ian E. H.",
""
],
[
"Ravikumar",
"Pradeep",
""
]
] | 0no_new_dataset
|
cs/0701140 | Corina P?s?reanu | Corina S. Pasareanu, Radek Pelanek, Willem Visser | Predicate Abstraction with Under-approximation Refinement | 22 pages, 3 figures, accepted for publication in Logical Methods in
Computer Science journal (special issue CAV 2005) | Logical Methods in Computer Science, Volume 3, Issue 1 (February
26, 2007) lmcs:2227 | 10.2168/LMCS-3(1:5)2007 | null | cs.GT | null | We propose an abstraction-based model checking method which relies on
refinement of an under-approximation of the feasible behaviors of the system
under analysis. The method preserves errors to safety properties, since all
analyzed behaviors are feasible by definition. The method does not require an
abstract transition relation to be generated, but instead executes the concrete
transitions while storing abstract versions of the concrete states, as
specified by a set of abstraction predicates. For each explored transition the
method checks, with the help of a theorem prover, whether there is any loss of
precision introduced by abstraction. The results of these checks are used to
decide termination or to refine the abstraction by generating new abstraction
predicates. If the (possibly infinite) concrete system under analysis has a
finite bisimulation quotient, then the method is guaranteed to eventually
explore an equivalent finite bisimilar structure. We illustrate the application
of the approach for checking concurrent programs.
| [
{
"created": "Mon, 22 Jan 2007 21:29:37 GMT",
"version": "v1"
},
{
"created": "Mon, 26 Feb 2007 10:52:16 GMT",
"version": "v2"
}
] | 2017-01-11T00:00:00 | [
[
"Pasareanu",
"Corina S.",
""
],
[
"Pelanek",
"Radek",
""
],
[
"Visser",
"Willem",
""
]
] | 0no_new_dataset
|
1706.00409 | Guillaume Lample | Guillaume Lample, Neil Zeghidour, Nicolas Usunier, Antoine Bordes,
Ludovic Denoyer, Marc'Aurelio Ranzato | Fader Networks: Manipulating Images by Sliding Attributes | NIPS 2017 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a new encoder-decoder architecture that is trained to
reconstruct images by disentangling the salient information of the image and
the values of attributes directly in the latent space. As a result, after
training, our model can generate different realistic versions of an input image
by varying the attribute values. By using continuous attribute values, we can
choose how much a specific attribute is perceivable in the generated image.
This property could allow for applications where users can modify an image
using sliding knobs, like faders on a mixing console, to change the facial
expression of a portrait, or to update the color of some objects. Compared to
the state-of-the-art which mostly relies on training adversarial networks in
pixel space by altering attribute values at train time, our approach results in
much simpler training schemes and nicely scales to multiple attributes. We
present evidence that our model can significantly change the perceived value of
the attributes while preserving the naturalness of images.
| [
{
"created": "Thu, 1 Jun 2017 17:48:24 GMT",
"version": "v1"
},
{
"created": "Sun, 28 Jan 2018 16:12:14 GMT",
"version": "v2"
}
] | 2018-01-30T00:00:00 | [
[
"Lample",
"Guillaume",
""
],
[
"Zeghidour",
"Neil",
""
],
[
"Usunier",
"Nicolas",
""
],
[
"Bordes",
"Antoine",
""
],
[
"Denoyer",
"Ludovic",
""
],
[
"Ranzato",
"Marc'Aurelio",
""
]
] | 0no_new_dataset
|
1903.05862 | Yongliang Chen | Yongliang Chen | Learning Orientation-Estimation Convolutional Neural Network for
Building Detection in Optical Remote Sensing Image | Presented in DICTA2018; Further Improved including extra experiments | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Benefiting from the great success of deep learning in computer vision,
CNN-based object detection methods have drawn significant attentions. Various
frameworks have been proposed which show awesome and robust performance for a
large range of datasets. However, for building detection in remote sensing
images, buildings always pose a diversity of orientations which makes it a
challenge for the application of off-the-shelf methods to building detection.
In this work, we aim to integrate orientation regression into the popular
axis-aligned bounding-box detection method to tackle this problem. To adapt the
axis-aligned bounding boxes to arbitrarily orientated ones, we also develop an
algorithm to estimate the Intersection over Union (IoU) overlap between any two
arbitrarily oriented boxes which is convenient to implement in Graphics
Processing Unit (GPU) for accelerating computation. The proposed method
utilizes CNN for both robust feature extraction and rotated bounding box
regression. We present our modelin an end-to-end fashion making it easy to
train. The model is formulated and trained to predict orientation, location and
extent simultaneously obtaining tighter bounding box and hence, higher mean
average precision (mAP). Experiments on remote sensing images of different
scales shows a promising performance over the conventional one.
| [
{
"created": "Thu, 14 Mar 2019 09:02:59 GMT",
"version": "v1"
}
] | 2019-03-15T00:00:00 | [
[
"Chen",
"Yongliang",
""
]
] | 0no_new_dataset
|
2402.13946 | Satwik Patnaik | Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran | AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement
Learning | To appear in USENIX Security Symposium, 2024 | null | null | null | cs.LG cs.CR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Machine learning has shown great promise in addressing several critical
hardware security problems. In particular, researchers have developed novel
graph neural network (GNN)-based techniques for detecting intellectual property
(IP) piracy, detecting hardware Trojans (HTs), and reverse engineering
circuits, to name a few. These techniques have demonstrated outstanding
accuracy and have received much attention in the community. However, since
these techniques are used for security applications, it is imperative to
evaluate them thoroughly and ensure they are robust and do not compromise the
security of integrated circuits.
In this work, we propose AttackGNN, the first red-team attack on GNN-based
techniques in hardware security. To this end, we devise a novel reinforcement
learning (RL) agent that generates adversarial examples, i.e., circuits,
against the GNN-based techniques. We overcome three challenges related to
effectiveness, scalability, and generality to devise a potent RL agent. We
target five GNN-based techniques for four crucial classes of problems in
hardware security: IP piracy, detecting/localizing HTs, reverse engineering,
and hardware obfuscation. Through our approach, we craft circuits that fool all
GNNs considered in this work. For instance, to evade IP piracy detection, we
generate adversarial pirated circuits that fool the GNN-based defense into
classifying our crafted circuits as not pirated. For attacking HT localization
GNN, our attack generates HT-infested circuits that fool the defense on all
tested circuits. We obtain a similar 100% success rate against GNNs for all
classes of problems.
| [
{
"created": "Wed, 21 Feb 2024 17:18:25 GMT",
"version": "v1"
},
{
"created": "Mon, 26 Feb 2024 20:18:38 GMT",
"version": "v2"
}
] | 2024-02-28T00:00:00 | [
[
"Gohil",
"Vasudev",
""
],
[
"Patnaik",
"Satwik",
""
],
[
"Kalathil",
"Dileep",
""
],
[
"Rajendran",
"Jeyavijayan",
""
]
] | 0no_new_dataset
|
1808.03644 | Roman Yampolskiy | Micha\"el Trazzi, Roman V. Yampolskiy | Building Safer AGI by introducing Artificial Stupidity | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Intelligence (AI) achieved super-human performance in a broad
variety of domains. We say that an AI is made Artificially Stupid on a task
when some limitations are deliberately introduced to match a human's ability to
do the task. An Artificial General Intelligence (AGI) can be made safer by
limiting its computing power and memory, or by introducing Artificial Stupidity
on certain tasks. We survey human intellectual limits and give recommendations
for which limits to implement in order to build a safe AGI.
| [
{
"created": "Sat, 11 Aug 2018 00:14:33 GMT",
"version": "v1"
}
] | 2018-08-14T00:00:00 | [
[
"Trazzi",
"Michaël",
""
],
[
"Yampolskiy",
"Roman V.",
""
]
] | 0no_new_dataset
|
1009.2706 | Sergey Verlan | Artiom Alhazov, Sergey Verlan | Minimization Strategies for Maximally Parallel Multiset Rewriting
Systems | This article is an improved version of [1] | null | null | null | cs.FL cs.CC cs.CL cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximally parallel multiset rewriting systems (MPMRS) give a convenient way
to express relations between unstructured objects. The functioning of various
computational devices may be expressed in terms of MPMRS (e.g., register
machines and many variants of P systems). In particular, this means that MPMRS
are computationally complete; however, a direct translation leads to quite a
big number of rules. Like for other classes of computationally complete
devices, there is a challenge to find a universal system having the smallest
number of rules. In this article we present different rule minimization
strategies for MPMRS based on encodings and structural transformations. We
apply these strategies to the translation of a small universal register machine
(Korec, 1996) and we show that there exists a universal MPMRS with 23 rules.
Since MPMRS are identical to a restricted variant of P systems with antiport
rules, the results we obtained improve previously known results on the number
of rules for those systems.
| [
{
"created": "Tue, 14 Sep 2010 16:06:02 GMT",
"version": "v1"
}
] | 2010-09-15T00:00:00 | [
[
"Alhazov",
"Artiom",
""
],
[
"Verlan",
"Sergey",
""
]
] | 0no_new_dataset
|
2403.05229 | Nan Liu | Siqi Li, Yuqing Shang, Ziwen Wang, Qiming Wu, Chuan Hong, Yilin Ning,
Di Miao, Marcus Eng Hock Ong, Bibhas Chakraborty, Nan Liu | Developing Federated Time-to-Event Scores Using Heterogeneous Real-World
Survival Data | null | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | Survival analysis serves as a fundamental component in numerous healthcare
applications, where the determination of the time to specific events (such as
the onset of a certain disease or death) for patients is crucial for clinical
decision-making. Scoring systems are widely used for swift and efficient risk
prediction. However, existing methods for constructing survival scores presume
that data originates from a single source, posing privacy challenges in
collaborations with multiple data owners. We propose a novel framework for
building federated scoring systems for multi-site survival outcomes, ensuring
both privacy and communication efficiency. We applied our approach to sites
with heterogeneous survival data originating from emergency departments in
Singapore and the United States. Additionally, we independently developed local
scores at each site. In testing datasets from each participant site, our
proposed federated scoring system consistently outperformed all local models,
evidenced by higher integrated area under the receiver operating characteristic
curve (iAUC) values, with a maximum improvement of 11.6%. Additionally, the
federated score's time-dependent AUC(t) values showed advantages over local
scores, exhibiting narrower confidence intervals (CIs) across most time points.
The model developed through our proposed method exhibits effective performance
on each local site, signifying noteworthy implications for healthcare research.
Sites participating in our proposed federated scoring model training gained
benefits by acquiring survival models with enhanced prediction accuracy and
efficiency. This study demonstrates the effectiveness of our privacy-preserving
federated survival score generation framework and its applicability to
real-world heterogeneous survival data.
| [
{
"created": "Fri, 8 Mar 2024 11:32:00 GMT",
"version": "v1"
}
] | 2024-03-11T00:00:00 | [
[
"Li",
"Siqi",
""
],
[
"Shang",
"Yuqing",
""
],
[
"Wang",
"Ziwen",
""
],
[
"Wu",
"Qiming",
""
],
[
"Hong",
"Chuan",
""
],
[
"Ning",
"Yilin",
""
],
[
"Miao",
"Di",
""
],
[
"Ong",
"Marcus Eng Hock",
""
],
[
"Chakraborty",
"Bibhas",
""
],
[
"Liu",
"Nan",
""
]
] | 1new_dataset
|
1809.02659 | Thorsten Wissmann | Emma Kerinec, Giulio Manzonetto, Michele Pagani | Revisiting Call-by-value B\"ohm trees in light of their Taylor expansion | null | Logical Methods in Computer Science, Volume 16, Issue 3 (July 15,
2020) lmcs:4817 | 10.23638/LMCS-16(3:6)2020 | null | cs.LO | http://creativecommons.org/licenses/by/4.0/ | The call-by-value lambda calculus can be endowed with permutation rules,
arising from linear logic proof-nets, having the advantage of unblocking some
redexes that otherwise get stuck during the reduction. We show that such an
extension allows to define a satisfying notion of B\"ohm(-like) tree and a
theory of program approximation in the call-by-value setting. We prove that all
lambda terms having the same B\"ohm tree are observationally equivalent, and
characterize those B\"ohm-like trees arising as actual B\"ohm trees of lambda
terms.
We also compare this approach with Ehrhard's theory of program approximation
based on the Taylor expansion of lambda terms, translating each lambda term
into a possibly infinite set of so-called resource terms. We provide sufficient
and necessary conditions for a set of resource terms in order to be the Taylor
expansion of a lambda term. Finally, we show that the normal form of the Taylor
expansion of a lambda term can be computed by performing a normalized Taylor
expansion of its B\"ohm tree. From this it follows that two lambda terms have
the same B\"ohm tree if and only if the normal forms of their Taylor expansions
coincide.
| [
{
"created": "Fri, 7 Sep 2018 20:16:32 GMT",
"version": "v1"
},
{
"created": "Sat, 30 Nov 2019 21:11:19 GMT",
"version": "v2"
},
{
"created": "Sat, 11 Apr 2020 12:15:54 GMT",
"version": "v3"
},
{
"created": "Tue, 14 Jul 2020 10:13:35 GMT",
"version": "v4"
}
] | 2023-06-22T00:00:00 | [
[
"Kerinec",
"Emma",
""
],
[
"Manzonetto",
"Giulio",
""
],
[
"Pagani",
"Michele",
""
]
] | 0no_new_dataset
|
1907.06484 | Zeon Trevor Fernando | Zeon Trevor Fernando, Jaspreet Singh, Avishek Anand | A study on the Interpretability of Neural Retrieval Models using
DeepSHAP | 4 pages; SIGIR 2019 Short Paper | null | 10.1145/3331184.3331312 | null | cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A recent trend in IR has been the usage of neural networks to learn retrieval
models for text based adhoc search. While various approaches and architectures
have yielded significantly better performance than traditional retrieval models
such as BM25, it is still difficult to understand exactly why a document is
relevant to a query. In the ML community several approaches for explaining
decisions made by deep neural networks have been proposed -- including DeepSHAP
which modifies the DeepLift algorithm to estimate the relative importance
(shapley values) of input features for a given decision by comparing the
activations in the network for a given image against the activations caused by
a reference input. In image classification, the reference input tends to be a
plain black image. While DeepSHAP has been well studied for image
classification tasks, it remains to be seen how we can adapt it to explain the
output of Neural Retrieval Models (NRMs). In particular, what is a good "black"
image in the context of IR? In this paper we explored various reference input
document construction techniques. Additionally, we compared the explanations
generated by DeepSHAP to LIME (a model agnostic approach) and found that the
explanations differ considerably. Our study raises concerns regarding the
robustness and accuracy of explanations produced for NRMs. With this paper we
aim to shed light on interesting problems surrounding interpretability in NRMs
and highlight areas of future work.
| [
{
"created": "Mon, 15 Jul 2019 13:09:18 GMT",
"version": "v1"
}
] | 2019-07-16T00:00:00 | [
[
"Fernando",
"Zeon Trevor",
""
],
[
"Singh",
"Jaspreet",
""
],
[
"Anand",
"Avishek",
""
]
] | 0no_new_dataset
|
2309.16411 | Nou\'edyn Baspin | Nou\'edyn Baspin | On combinatorial structures in linear codes | null | null | null | null | cs.IT math.IT quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we show that given a connectivity graph $G$ of a $[[n,k,d]]$
quantum code, there exists $\{K_i\}_i, K_i \subset G$, such that $\sum_i
|K_i|\in \Omega(k), \ |K_i| \in \Omega(d)$, and the $K_i$'s are
$\tilde{\Omega}( \sqrt{{k}/{n}})$-expander. If the codes are classical we show
instead that the $K_i$'s are $\tilde{\Omega}\left({{k}/{n}}\right)$-expander.
We also show converses to these bounds. In particular, we show that the BPT
bound for classical codes is tight in all Euclidean dimensions. Finally, we
prove structural theorems for graphs with no "dense" subgraphs which might be
of independent interest.
| [
{
"created": "Thu, 28 Sep 2023 13:03:41 GMT",
"version": "v1"
}
] | 2023-09-29T00:00:00 | [
[
"Baspin",
"Nouédyn",
""
]
] | 0no_new_dataset
|
1806.03211 | Jordan Dworkin | Jordan D. Dworkin, Russell T. Shinohara, Danielle S. Bassett | The landscape of NeuroImage-ing research | null | null | 10.1016/j.neuroimage.2018.09.005 | null | cs.SI stat.AP | http://creativecommons.org/licenses/by-nc-sa/4.0/ | As the field of neuroimaging grows, it can be difficult for scientists within
the field to gain and maintain a detailed understanding of its ever-changing
landscape. While collaboration and citation networks highlight important
contributions within the field, the roles of and relations among specific areas
of study can remain quite opaque. Here, we apply techniques from network
science to map the landscape of neuroimaging research documented in the journal
NeuroImage over the past decade. We create a network in which nodes represent
research topics, and edges give the degree to which these topics tend to be
covered in tandem. The network displays small-world architecture, with
communities characterized by common imaging modalities and medical
applications, and with bridges that integrate these distinct subfields. Using
node-level analysis, we quantify the structural roles of individual topics
within the neuroimaging landscape, and find high levels of clustering within
the structural MRI subfield as well as increasing participation among topics
related to psychiatry. The overall prevalence of a topic is unrelated to the
prevalence of its neighbors, but the degree to which a topic becomes more or
less popular over time is strongly related to changes in the prevalence of its
neighbors. Broadly, this work presents a cohesive model for understanding the
landscape of neuroimaging research across the field, in broad subfields, and
within specific topic areas.
| [
{
"created": "Fri, 8 Jun 2018 15:14:06 GMT",
"version": "v1"
}
] | 2019-01-24T00:00:00 | [
[
"Dworkin",
"Jordan D.",
""
],
[
"Shinohara",
"Russell T.",
""
],
[
"Bassett",
"Danielle S.",
""
]
] | 0no_new_dataset
|
2403.08199 | Gantavya Bhatt | Gantavya Bhatt, Arnav Das, Jeff Bilmes | Deep Submodular Peripteral Networks | Preprint | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Submodular functions, crucial for various applications, often lack practical
learning methods for their acquisition. Seemingly unrelated, learning a scaling
from oracles offering graded pairwise preferences (GPC) is underexplored,
despite a rich history in psychometrics. In this paper, we introduce deep
submodular peripteral networks (DSPNs), a novel parametric family of submodular
functions, and methods for their training using a contrastive-learning inspired
GPC-ready strategy to connect and then tackle both of the above challenges. We
introduce newly devised GPC-style "peripteral" loss which leverages numerically
graded relationships between pairs of objects (sets in our case). Unlike
traditional contrastive learning, our method utilizes graded comparisons,
extracting more nuanced information than just binary-outcome comparisons, and
contrasts sets of any size (not just two). We also define a novel suite of
automatic sampling strategies for training, including active-learning inspired
submodular feedback. We demonstrate DSPNs' efficacy in learning submodularity
from a costly target submodular function showing superiority in downstream
tasks such as experimental design and streaming applications.
| [
{
"created": "Wed, 13 Mar 2024 02:53:52 GMT",
"version": "v1"
},
{
"created": "Sat, 16 Mar 2024 01:02:35 GMT",
"version": "v2"
}
] | 2024-03-19T00:00:00 | [
[
"Bhatt",
"Gantavya",
""
],
[
"Das",
"Arnav",
""
],
[
"Bilmes",
"Jeff",
""
]
] | 0no_new_dataset
|
1504.04930 | Wentao Huang | Wentao Huang and Michael Langberg and Joerg Kliewer | Connecting Multiple-unicast and Network Error Correction: Reduction and
Unachievability | ISIT 2015. arXiv admin note: text overlap with arXiv:1410.1905 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that solving a multiple-unicast network coding problem can be reduced
to solving a single-unicast network error correction problem, where an
adversary may jam at most a single edge in the network. Specifically, we
present an efficient reduction that maps a multiple-unicast network coding
instance to a network error correction instance while preserving feasibility.
The reduction holds for both the zero probability of error model and the
vanishing probability of error model. Previous reductions are restricted to the
zero-error case. As an application of the reduction, we present a constructive
example showing that the single-unicast network error correction capacity may
not be achievable, a result of separate interest.
| [
{
"created": "Mon, 20 Apr 2015 04:02:35 GMT",
"version": "v1"
}
] | 2015-04-21T00:00:00 | [
[
"Huang",
"Wentao",
""
],
[
"Langberg",
"Michael",
""
],
[
"Kliewer",
"Joerg",
""
]
] | 0no_new_dataset
|
2207.06553 | Xiaodong Yang | Tong Su, Xishun Wang, Xiaodong Yang | QML for Argoverse 2 Motion Forecasting Challenge | null | null | null | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To safely navigate in various complex traffic scenarios, autonomous driving
systems are generally equipped with a motion forecasting module to provide
vital information for the downstream planning module. For the real-world
onboard applications, both accuracy and latency of a motion forecasting model
are essential. In this report, we present an effective and efficient solution,
which ranks the 3rd place in the Argoverse 2 Motion Forecasting Challenge 2022.
| [
{
"created": "Wed, 13 Jul 2022 23:25:30 GMT",
"version": "v1"
}
] | 2022-07-15T00:00:00 | [
[
"Su",
"Tong",
""
],
[
"Wang",
"Xishun",
""
],
[
"Yang",
"Xiaodong",
""
]
] | 0no_new_dataset
|
1209.3356 | Rajkumar Buyya | Rajkumar Buyya, Rodrigo N. Calheiros, and Xiaorong Li | Autonomic Cloud Computing: Open Challenges and Architectural Elements | 8 pages, 6 figures, conference keynote paper | Proceedings of the Third International Conference of Emerging
Applications of Information Technology (EAIT 2012, IEEE Press, USA), Kolkata,
India, November 29-December 01, 2012 | 10.1109/EAIT.2012.6407847 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As Clouds are complex, large-scale, and heterogeneous distributed systems,
management of their resources is a challenging task. They need automated and
integrated intelligent strategies for provisioning of resources to offer
services that are secure, reliable, and cost-efficient. Hence, effective
management of services becomes fundamental in software platforms that
constitute the fabric of computing Clouds. In this direction, this paper
identifies open issues in autonomic resource provisioning and presents
innovative management techniques for supporting SaaS applications hosted on
Clouds. We present a conceptual architecture and early results evidencing the
benefits of autonomic management of Clouds.
| [
{
"created": "Sat, 15 Sep 2012 04:40:46 GMT",
"version": "v1"
}
] | 2016-11-17T00:00:00 | [
[
"Buyya",
"Rajkumar",
""
],
[
"Calheiros",
"Rodrigo N.",
""
],
[
"Li",
"Xiaorong",
""
]
] | 0no_new_dataset
|
2111.09444 | Max Hopkins | Mitali Bafna, Max Hopkins, Tali Kaufman, Shachar Lovett | Hypercontractivity on High Dimensional Expanders: a Local-to-Global
Approach for Higher Moments | New title to distinguish from independent work of Gur, Lifshitz, and
Liu | null | null | null | cs.DM cs.CC math.CO | http://creativecommons.org/licenses/by/4.0/ | Hypercontractivity is one of the most powerful tools in Boolean function
analysis. Originally studied over the discrete hypercube, recent years have
seen increasing interest in extensions to settings like the $p$-biased cube,
slice, or Grassmannian, where variants of hypercontractivity have found a
number of breakthrough applications including the resolution of Khot's 2-2
Games Conjecture (Khot, Minzer, Safra FOCS 2018). In this work, we develop a
new theory of hypercontractivity on high dimensional expanders (HDX), an
important class of expanding complexes that has recently seen similarly
impressive applications in both coding theory and approximate sampling. Our
results lead to a new understanding of the structure of Boolean functions on
HDX, including a tight analog of the KKL Theorem and a new characterization of
non-expanding sets.
Unlike previous settings satisfying hypercontractivity, HDX can be
asymmetric, sparse, and very far from products, which makes the application of
traditional proof techniques challenging. We handle these barriers with the
introduction of two new tools of independent interest: a new explicit
combinatorial Fourier basis for HDX that behaves well under restriction, and a
new local-to-global method for analyzing higher moments. Interestingly, unlike
analogous second moment methods that apply equally across all types of
expanding complexes, our tools rely inherently on simplicial structure. This
suggests a new distinction among high dimensional expanders based upon their
behavior beyond the second moment.
| [
{
"created": "Wed, 17 Nov 2021 23:17:16 GMT",
"version": "v1"
},
{
"created": "Wed, 24 Nov 2021 08:13:47 GMT",
"version": "v2"
}
] | 2021-11-29T00:00:00 | [
[
"Bafna",
"Mitali",
""
],
[
"Hopkins",
"Max",
""
],
[
"Kaufman",
"Tali",
""
],
[
"Lovett",
"Shachar",
""
]
] | 0no_new_dataset
|
1001.4137 | Sagar Shenvi | Sagar Shenvi and Bikash Kumar Dey | On the solvability of 3-source 3-terminal sum-networks | Major revision in the structure of the paper. 24 pages, 15 figures.
Shorter version accepted to ISIT 2010 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a directed acyclic network with three sources and three terminals
such that each source independently generates one symbol from a given field $F$
and each terminal wants to receive the sum (over $F$) of the source symbols.
Each link in the network is considered to be error-free and delay-free and can
carry one symbol from the field in each use. We call such a network a 3-source
3-terminal {\it $(3s/3t)$ sum-network}. In this paper, we give a necessary and
sufficient condition for a $3s/3t$ sum-network to allow all the terminals to
receive the sum of the source symbols over \textit{any} field. Some lemmas
provide interesting simpler sufficient conditions for the same. We show that
linear codes are sufficient for this problem for $3s/3t$ though they are known
to be insufficient for arbitrary number of sources and terminals. We further
show that in most cases, such networks are solvable by simple XOR coding. We
also prove a recent conjecture that if fractional coding is allowed, then the
coding capacity of a $3s/3t$ sum-network is either $0,2/3$ or $\geq 1$.
| [
{
"created": "Sat, 23 Jan 2010 07:59:53 GMT",
"version": "v1"
},
{
"created": "Tue, 9 Feb 2010 11:20:14 GMT",
"version": "v2"
},
{
"created": "Mon, 19 Apr 2010 12:50:25 GMT",
"version": "v3"
}
] | 2015-03-13T00:00:00 | [
[
"Shenvi",
"Sagar",
""
],
[
"Dey",
"Bikash Kumar",
""
]
] | 0no_new_dataset
|
1903.07097 | Abdullah Alomar | Anish Agarwal, Abdullah Alomar, Devavrat Shah | tspDB: Time Series Predict DB | null | null | null | null | cs.DB cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A major bottleneck of the current Machine Learning (ML) workflow is the time
consuming, error prone engineering required to get data from a datastore or a
database (DB) to the point an ML algorithm can be applied to it. Hence, we
explore the feasibility of directly integrating prediction functionality on top
of a data store or DB. Such a system ideally: (i) provides an intuitive
prediction query interface which alleviates the unwieldy data engineering; (ii)
provides state-of-the-art statistical accuracy while ensuring incremental model
update, low model training time and low latency for making predictions. As the
main contribution we explicitly instantiate a proof-of-concept, tspDB, which
directly integrates with PostgreSQL. We rigorously test tspDB's statistical and
computational performance against the state-of-the-art time series algorithms,
including a Long-Short-Term-Memory (LSTM) neural network and DeepAR (industry
standard deep learning library by Amazon). Statistically, on standard time
series benchmarks, tspDB outperforms LSTM and DeepAR with 1.1-1.3x higher
relative accuracy. Computationally, tspDB is 59-62x and 94-95x faster compared
to LSTM and DeepAR in terms of median ML model training time and prediction
query latency, respectively. Further, compared to PostgreSQL's bulk insert time
and its SELECT query latency, tspDB is slower only by 1.3x and 2.6x
respectively. That is, tspDB is a real-time prediction system in that its model
training / prediction query time is similar to just inserting / reading data
from a DB. As an algorithmic contribution, we introduce an incremental
multivariate matrix factorization based time series method, which tspDB is
built off. We show this method also allows one to produce reliable prediction
intervals by accurately estimating the time-varying variance of a time series,
thereby addressing an important problem in time series analysis.
| [
{
"created": "Sun, 17 Mar 2019 14:28:50 GMT",
"version": "v1"
},
{
"created": "Thu, 19 Sep 2019 00:43:53 GMT",
"version": "v2"
},
{
"created": "Tue, 24 Sep 2019 04:55:58 GMT",
"version": "v3"
},
{
"created": "Wed, 24 Jun 2020 03:12:35 GMT",
"version": "v4"
},
{
"created": "Fri, 10 Jul 2020 20:41:47 GMT",
"version": "v5"
},
{
"created": "Sat, 12 Dec 2020 20:31:12 GMT",
"version": "v6"
},
{
"created": "Sat, 13 Feb 2021 17:58:59 GMT",
"version": "v7"
}
] | 2021-02-16T00:00:00 | [
[
"Agarwal",
"Anish",
""
],
[
"Alomar",
"Abdullah",
""
],
[
"Shah",
"Devavrat",
""
]
] | 0no_new_dataset
|