id
stringlengths 9
10
| submitter
stringlengths 5
46
⌀ | authors
stringlengths 5
1.31k
| title
stringlengths 8
223
| comments
stringlengths 2
574
⌀ | journal-ref
stringclasses 587
values | doi
stringclasses 784
values | report-no
stringclasses 75
values | categories
stringlengths 5
72
| license
stringclasses 9
values | abstract
stringlengths 82
3.31k
| versions
listlengths 1
15
| update_date
unknown | authors_parsed
sequencelengths 1
76
| label
class label 2
classes |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1107.1161 | Jean-Luc Marichal | Miguel Couceiro, Jean-Luc Marichal, Tam\'as Waldhauser | Locally monotone Boolean and pseudo-Boolean functions | null | Discrete Applied Mathematics 160 (12) (2012) 1651-1660 | 10.1016/j.dam.2012.03.006 | null | cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose local versions of monotonicity for Boolean and pseudo-Boolean
functions: say that a pseudo-Boolean (Boolean) function is p-locally monotone
if none of its partial derivatives changes in sign on tuples which differ in
less than p positions. As it turns out, this parameterized notion provides a
hierarchy of monotonicities for pseudo-Boolean (Boolean) functions. Local
monotonicities are shown to be tightly related to lattice counterparts of
classical partial derivatives via the notion of permutable derivatives. More
precisely, p-locally monotone functions are shown to have p-permutable lattice
derivatives and, in the case of symmetric functions, these two notions
coincide. We provide further results relating these two notions, and present a
classification of p-locally monotone functions, as well as of functions having
p-permutable derivatives, in terms of certain forbidden "sections", i.e.,
functions which can be obtained by substituting constants for variables. This
description is made explicit in the special case when p=2.
| [
{
"created": "Wed, 6 Jul 2011 15:30:35 GMT",
"version": "v1"
},
{
"created": "Wed, 16 May 2012 11:47:52 GMT",
"version": "v2"
}
] | "2012-05-17T00:00:00" | [
[
"Couceiro",
"Miguel",
""
],
[
"Marichal",
"Jean-Luc",
""
],
[
"Waldhauser",
"Tamás",
""
]
] | 0no_new_dataset
|
1308.1971 | Ji Zhu | Ji Zhu and Bruce Hajek | Tree dynamics for peer-to-peer streaming | null | null | null | null | cs.DS cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an asynchronous distributed algorithm to manage multiple
trees for peer-to-peer streaming in a flow level model. It is assumed that
videos are cut into substreams, with or without source coding, to be
distributed to all nodes. The algorithm guarantees that each node receives
sufficiently many substreams within delay logarithmic in the number of peers.
The algorithm works by constantly updating the topology so that each substream
is distributed through trees to as many nodes as possible without interference.
Competition among trees for limited upload capacity is managed so that both
coverage and balance are achieved. The algorithm is robust in that it
efficiently eliminates cycles and maintains tree structures in a distributed
way. The algorithm favors nodes with higher degree, so it not only works for
live streaming and video on demand, but also in the case a few nodes with large
degree act as servers and other nodes act as clients.
A proof of convergence of the algorithm is given assuming instantaneous
update of depth information, and for the case of a single tree it is shown that
the convergence time is stochastically tightly bounded by a small constant
times the log of the number of nodes. These theoretical results are
complemented by simulations showing that the algorithm works well even when
most assumptions for the theoretical tractability do not hold.
| [
{
"created": "Thu, 8 Aug 2013 20:38:25 GMT",
"version": "v1"
}
] | "2013-08-12T00:00:00" | [
[
"Zhu",
"Ji",
""
],
[
"Hajek",
"Bruce",
""
]
] | 0no_new_dataset
|
2310.00576 | Xiaotian Han | Hongye Jin, Xiaotian Han, Jingfeng Yang, Zhimeng Jiang, Chia-Yuan
Chang, Xia Hu | GrowLength: Accelerating LLMs Pretraining by Progressively Growing
Training Length | null | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The evolving sophistication and intricacies of Large Language Models (LLMs)
yield unprecedented advancements, yet they simultaneously demand considerable
computational resources and incur significant costs. To alleviate these
challenges, this paper introduces a novel, simple, and effective method named
``\growlength'' to accelerate the pretraining process of LLMs. Our method
progressively increases the training length throughout the pretraining phase,
thereby mitigating computational costs and enhancing efficiency. For instance,
it begins with a sequence length of 128 and progressively extends to 4096. This
approach enables models to process a larger number of tokens within limited
time frames, potentially boosting their performance. In other words, the
efficiency gain is derived from training with shorter sequences optimizing the
utilization of resources. Our extensive experiments with various
state-of-the-art LLMs have revealed that models trained using our method not
only converge more swiftly but also exhibit superior performance metrics
compared to those trained with existing methods. Furthermore, our method for
LLMs pretraining acceleration does not require any additional engineering
efforts, making it a practical solution in the realm of LLMs.
| [
{
"created": "Sun, 1 Oct 2023 05:25:24 GMT",
"version": "v1"
}
] | "2023-10-03T00:00:00" | [
[
"Jin",
"Hongye",
""
],
[
"Han",
"Xiaotian",
""
],
[
"Yang",
"Jingfeng",
""
],
[
"Jiang",
"Zhimeng",
""
],
[
"Chang",
"Chia-Yuan",
""
],
[
"Hu",
"Xia",
""
]
] | 0no_new_dataset
|
1511.03524 | Buddhadeb Sau | B. Sau and S. Mukhopadhyaya and K. Mukhopadhyaya | MAINT: Localization of Mobile Sensors with Energy Control | null | null | null | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Localization is an important issue for Wireless Sensor Networks (WSN). A
mobile sensor may change its position rapidly and thus require localization
calls frequently. A localization may require network wide information and
increase traffic over the network. It dissipates valuable energy for message
communication. Thus localization is very costly. The control of the number of
localization calls may save energy consumption, as it is rather expensive. To
reduce the frequency of localization calls for a mobile sensor, we propose a
technique that involves \textit{Mobility Aware Interpolation} (MAINT) for
position estimation. It controls the number of localizations which gives much
better result than the existing localization control schemes using mobility
aware extrapolation. The proposed method involves very low arithmetic
computation overheads. We find analytical expressions for the expected error in
position estimation. A parameter, the time interval, has been introduced to
externally control the energy dissipation. Simulation studies are carried out
to compare the performances of the proposed method with some existing
localization control schemes as well as the theoretical results. The simulation
results shows that the expected error at any point of time may be computed from
this expression. We have seen that constant error limit can be maintained
increasing the time period of localization proportional to rate of change of
direction of its motion. Increasing time period, the energy may be saved with a
stable error limit.
| [
{
"created": "Tue, 10 Nov 2015 07:22:10 GMT",
"version": "v1"
}
] | "2015-11-12T00:00:00" | [
[
"Sau",
"B.",
""
],
[
"Mukhopadhyaya",
"S.",
""
],
[
"Mukhopadhyaya",
"K.",
""
]
] | 0no_new_dataset
|
2002.00252 | Kevin Vermeulen | Kevin Vermeulen, Burim Ljuma, Vamsi Addanki, Matthieu Gouel, Olivier
Fourmaux, Timur Friedman and Reza Rejaie | Alias Resolution Based on ICMP Rate Limiting | Preprint to appear in Proceedings of Passive and Active Measurement
(PAM 2020) Conference, Eugene, OR, March 2020 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Alias resolution techniques (e.g., Midar) associate, mostly through active
measurement, a set of IP addresses as belonging to a common router. These
techniques rely on distinct router features that can serve as a signature.
Their applicability is affected by router support of the features and the
robustness of the signature. This paper presents a new alias resolution tool
called Limited Ltd. that exploits ICMP rate limiting, a feature that is
increasingly supported by modern routers that has not previously been used for
alias resolution. It sends ICMP probes toward target interfaces in order to
trigger rate limiting, extracting features from the probe reply loss traces. It
uses a machine learning classifier to designate pairs of interfaces as aliases.
We describe the details of the algorithm used by Limited Ltd. and illustrate
its feasibility and accuracy. Limited Ltd. not only is the first tool that can
perform alias resolution on IPv6 routers that do not generate monotonically
increasing fragmentation IDs (e.g., Juniper routers) but it also complements
the state-of-the-art techniques for IPv4 alias resolution. All of our code and
the collected dataset are publicly available.
| [
{
"created": "Sat, 1 Feb 2020 18:11:19 GMT",
"version": "v1"
}
] | "2020-02-04T00:00:00" | [
[
"Vermeulen",
"Kevin",
""
],
[
"Ljuma",
"Burim",
""
],
[
"Addanki",
"Vamsi",
""
],
[
"Gouel",
"Matthieu",
""
],
[
"Fourmaux",
"Olivier",
""
],
[
"Friedman",
"Timur",
""
],
[
"Rejaie",
"Reza",
""
]
] | 1new_dataset
|
2009.11405 | Chen Zhao | Chen Zhao, Feng Chen | Rank-Based Multi-task Learning for Fair Regression | 2019 IEEE International Conference on Data Mining (ICDM) | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we develop a novel fairness learning approach for multi-task
regression models based on a biased training dataset, using a popular
rank-based non-parametric independence test, i.e., Mann Whitney U statistic,
for measuring the dependency between target variable and protected variables.
To solve this learning problem efficiently, we first reformulate the problem as
a new non-convex optimization problem, in which a non-convex constraint is
defined based on group-wise ranking functions of individual objects. We then
develop an efficient model-training algorithm based on the framework of
non-convex alternating direction method of multipliers (NC-ADMM), in which one
of the main challenges is to implement an efficient projection oracle to the
preceding non-convex set defined based on ranking functions. Through the
extensive experiments on both synthetic and real-world datasets, we validated
the out-performance of our new approach against several state-of-the-art
competitive methods on several popular metrics relevant to fairness learning.
| [
{
"created": "Wed, 23 Sep 2020 22:32:57 GMT",
"version": "v1"
}
] | "2020-09-25T00:00:00" | [
[
"Zhao",
"Chen",
""
],
[
"Chen",
"Feng",
""
]
] | 1new_dataset
|
1807.00313 | Andrii Striuk | Maryna Rassovytska and Andrii Striuk | Mechanical Engineers Training in Using Cloud and Mobile Services in
Professional Activity | null | CEUR Workshop Proceedings Vol. 1844 (2017) 348-359 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The purpose of this article is to identify mobile and cloud services of
mechanical engineers professional activity and the principles of their use in
higher technical education. There have been defined the criteria for evaluation
of the tools for edu-cational and professional activities. On the basis of this
criteria, more than 30 var-ious cloud services and mobile applications have
been analyzed. The analysis has shown that the use of Autodesk cloud services
and their integration with cloud services Google is appropriate for
professional and practical training of special-ists in applied mechanics, and
it promotes an effective development of mechanical engineers ICT competence.
The learning tools integrated system model was pro-posed.
| [
{
"created": "Sun, 1 Jul 2018 11:11:12 GMT",
"version": "v1"
}
] | "2018-07-03T00:00:00" | [
[
"Rassovytska",
"Maryna",
""
],
[
"Striuk",
"Andrii",
""
]
] | 0no_new_dataset
|
1511.03088 | Isabelle Augenstein | Leon Derczynski and Isabelle Augenstein and Kalina Bontcheva | USFD: Twitter NER with Drift Compensation and Linked Data | Paper in ACL anthology:
https://aclweb.org/anthology/W/W15/W15-4306.bib | Proceedings of the ACL Workshop on Noisy User-generated Text
(2015), pp. 48--53 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a pilot NER system for Twitter, comprising the USFD
system entry to the W-NUT 2015 NER shared task. The goal is to correctly label
entities in a tweet dataset, using an inventory of ten types. We employ
structured learning, drawing on gazetteers taken from Linked Data, and on
unsupervised clustering features, and attempting to compensate for stylistic
and topic drift - a key challenge in social media text. Our result is
competitive; we provide an analysis of the components of our methodology, and
an examination of the target dataset in the context of this task.
| [
{
"created": "Tue, 10 Nov 2015 12:34:47 GMT",
"version": "v1"
}
] | "2015-11-11T00:00:00" | [
[
"Derczynski",
"Leon",
""
],
[
"Augenstein",
"Isabelle",
""
],
[
"Bontcheva",
"Kalina",
""
]
] | 1new_dataset
|
2204.08651 | Atoosa Parsa | Atoosa Parsa, Dong Wang, Corey S. O'Hern, Mark D. Shattuck, Rebecca
Kramer-Bottiglio, Josh Bongard | Evolving Programmable Computational Metamaterials | Accepted to the Genetic and Evolutionary Computation Conference 2022
(GECCO '22) | null | 10.1145/3512290.3528861 | null | cs.ET cs.NE | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Granular metamaterials are a promising choice for the realization of
mechanical computing devices. As preliminary evidence of this, we demonstrate
here how to embed Boolean logic gates (AND and XOR) into a granular
metamaterial by evolving where particular grains are placed in the material.
Our results confirm the existence of gradients of increasing "AND-ness" and
"XOR-ness" within the space of possible materials that can be followed by
evolutionary search. We measure the computational functionality of a material
by probing how it transforms bits encoded as vibrations with zero or non-zero
amplitude. We compared the evolution of materials built from mass-contrasting
particles and materials built from stiffness-contrasting particles, and found
that the latter were more evolvable. We believe this work may pave the way
toward evolutionary design of increasingly sophisticated, programmable, and
computationally dense metamaterials with certain advantages over more
traditional computational substrates.
| [
{
"created": "Tue, 19 Apr 2022 04:09:53 GMT",
"version": "v1"
},
{
"created": "Sat, 4 Jun 2022 03:38:59 GMT",
"version": "v2"
}
] | "2022-06-07T00:00:00" | [
[
"Parsa",
"Atoosa",
""
],
[
"Wang",
"Dong",
""
],
[
"O'Hern",
"Corey S.",
""
],
[
"Shattuck",
"Mark D.",
""
],
[
"Kramer-Bottiglio",
"Rebecca",
""
],
[
"Bongard",
"Josh",
""
]
] | 0no_new_dataset
|
1801.00185 | Piero Mazzarisi | Piero Mazzarisi, Paolo Barucca, Fabrizio Lillo, Daniele Tantari | A dynamic network model with persistent links and node-specific latent
variables, with an application to the interbank market | 19 pages, 6 figures | null | null | null | cs.SI physics.soc-ph q-fin.ST stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a dynamic network model where two mechanisms control the
probability of a link between two nodes: (i) the existence or absence of this
link in the past, and (ii) node-specific latent variables (dynamic fitnesses)
describing the propensity of each node to create links. Assuming a Markov
dynamics for both mechanisms, we propose an Expectation-Maximization algorithm
for model estimation and inference of the latent variables. The estimated
parameters and fitnesses can be used to forecast the presence of a link in the
future. We apply our methodology to the e-MID interbank network for which the
two linkage mechanisms are associated with two different trading behaviors in
the process of network formation, namely preferential trading and trading
driven by node-specific characteristics. The empirical results allow to
recognise preferential lending in the interbank market and indicate how a
method that does not account for time-varying network topologies tends to
overestimate preferential linkage.
| [
{
"created": "Sat, 30 Dec 2017 19:57:35 GMT",
"version": "v1"
}
] | "2018-01-03T00:00:00" | [
[
"Mazzarisi",
"Piero",
""
],
[
"Barucca",
"Paolo",
""
],
[
"Lillo",
"Fabrizio",
""
],
[
"Tantari",
"Daniele",
""
]
] | 0no_new_dataset
|
1909.10750 | Salman Sherin | Javaria Imtiaz, Salman Sherin, Muhammad Uzair khan, Muhammad Zohaib
Iqbal | A Systematic Literature Review of Test Breakage Prevention and Repair
Techniques | null | Information and Software Technology 113 (2019): 1-19 | null | null | cs.SE | http://creativecommons.org/publicdomain/zero/1.0/ | Context: When an application evolves, some of the developed test cases break.
Discarding broken test cases causes a significant waste of effort and leads to
test suites that are less effective and have lower coverage. Test repair
approaches evolve test suites along with applications by repairing the broken
test cases. Objective: Numerous studies are published on test repair approaches
every year. It is important to summarise and consolidate the existing knowledge
in the area to provide directions to researchers and practitioners. This
research work provides a systematic literature review in the area of test case
repair and breakage prevention, aiming to guide researchers and practitioners
in the field of software testing. Method: We followed the standard protocol for
conducting a systematic literature review. First, research goals were defined
using the Goal Question Metric (GQM). Then we formulate research questions
corresponding to each goal. Finally, metrics are extracted from the included
papers. Based on the defined selection criteria a final set of 41 primary
studies are included for analysis. Results: The selection process resulted in 5
journal papers, and 36 conference papers. We present a taxonomy that lists the
causes of test case breakages extracted from the literature. We found that only
four proposed test repair tools are publicly available. Most studies evaluated
their approaches on open-source case studies. Conclusion: There is significant
room for future research on test repair techniques. Despite the positive trend
of evaluating approaches on large scale open-source studies, there is a clear
lack of results from studies done in a real industrial context. Few tools are
publicly available which lowers the potential of adaption by industry
practitioners.
| [
{
"created": "Tue, 24 Sep 2019 07:59:40 GMT",
"version": "v1"
}
] | "2019-09-25T00:00:00" | [
[
"Imtiaz",
"Javaria",
""
],
[
"Sherin",
"Salman",
""
],
[
"khan",
"Muhammad Uzair",
""
],
[
"Iqbal",
"Muhammad Zohaib",
""
]
] | 0no_new_dataset
|
0909.1774 | Georgia Koutrika | Georgia Koutrika (Stanford University), Benjamin Bercovitz (Stanford
University), Robert Ikeda (Stanford University), Filip Kaliszan (Stanford
University), Henry Liou (Stanford University), Zahra Mohammadi Zadeh
(Stanford University), Hector Garcia-Molina (Stanford University) | Social Systems: Can we Do More Than Just Poke Friends? | CIDR 2009 | null | null | null | cs.DB cs.CY | http://creativecommons.org/licenses/by/3.0/ | Social sites have become extremely popular among users but have they
attracted equal attention from the research community? Are they good only for
simple tasks, such as tagging and poking friends? Do they present any new or
interesting research challenges? In this paper, we describe the insights we
have obtained implementing CourseRank, a course evaluation and planning social
system. We argue that more attention should be given to social sites like ours
and that there are many challenges (though not the traditional DBMS ones) that
should be addressed by our community.
| [
{
"created": "Wed, 9 Sep 2009 18:10:01 GMT",
"version": "v1"
}
] | "2009-09-15T00:00:00" | [
[
"Koutrika",
"Georgia",
"",
"Stanford University"
],
[
"Bercovitz",
"Benjamin",
"",
"Stanford\n University"
],
[
"Ikeda",
"Robert",
"",
"Stanford University"
],
[
"Kaliszan",
"Filip",
"",
"Stanford\n University"
],
[
"Liou",
"Henry",
"",
"Stanford University"
],
[
"Zadeh",
"Zahra Mohammadi",
"",
"Stanford University"
],
[
"Garcia-Molina",
"Hector",
"",
"Stanford University"
]
] | 0no_new_dataset
|
2308.05734 | Haohe Liu | Haohe Liu, Yi Yuan, Xubo Liu, Xinhao Mei, Qiuqiang Kong, Qiao Tian,
Yuping Wang, Wenwu Wang, Yuxuan Wang, Mark D. Plumbley | AudioLDM 2: Learning Holistic Audio Generation with Self-supervised
Pretraining | Accepted by IEEE/ACM Transactions on Audio, Speech and Language
Processing. Project page is https://audioldm.github.io/audioldm2 | null | null | null | cs.SD cs.AI cs.MM eess.AS eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although audio generation shares commonalities across different types of
audio, such as speech, music, and sound effects, designing models for each type
requires careful consideration of specific objectives and biases that can
significantly differ from those of other types. To bring us closer to a unified
perspective of audio generation, this paper proposes a framework that utilizes
the same learning method for speech, music, and sound effect generation. Our
framework introduces a general representation of audio, called "language of
audio" (LOA). Any audio can be translated into LOA based on AudioMAE, a
self-supervised pre-trained representation learning model. In the generation
process, we translate any modalities into LOA by using a GPT-2 model, and we
perform self-supervised audio generation learning with a latent diffusion model
conditioned on LOA. The proposed framework naturally brings advantages such as
in-context learning abilities and reusable self-supervised pretrained AudioMAE
and latent diffusion models. Experiments on the major benchmarks of
text-to-audio, text-to-music, and text-to-speech demonstrate state-of-the-art
or competitive performance against previous approaches. Our code, pretrained
model, and demo are available at https://audioldm.github.io/audioldm2.
| [
{
"created": "Thu, 10 Aug 2023 17:55:13 GMT",
"version": "v1"
},
{
"created": "Sat, 9 Sep 2023 15:33:19 GMT",
"version": "v2"
},
{
"created": "Sat, 11 May 2024 11:24:51 GMT",
"version": "v3"
}
] | "2024-05-14T00:00:00" | [
[
"Liu",
"Haohe",
""
],
[
"Yuan",
"Yi",
""
],
[
"Liu",
"Xubo",
""
],
[
"Mei",
"Xinhao",
""
],
[
"Kong",
"Qiuqiang",
""
],
[
"Tian",
"Qiao",
""
],
[
"Wang",
"Yuping",
""
],
[
"Wang",
"Wenwu",
""
],
[
"Wang",
"Yuxuan",
""
],
[
"Plumbley",
"Mark D.",
""
]
] | 0no_new_dataset
|
1406.1881 | Leonid Pishchulin | Leonid Pishchulin, Mykhaylo Andriluka, Bernt Schiele | Fine-grained Activity Recognition with Holistic and Pose based Features | 12 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Holistic methods based on dense trajectories are currently the de facto
standard for recognition of human activities in video. Whether holistic
representations will sustain or will be superseded by higher level video
encoding in terms of body pose and motion is the subject of an ongoing debate.
In this paper we aim to clarify the underlying factors responsible for good
performance of holistic and pose-based representations. To that end we build on
our recent dataset leveraging the existing taxonomy of human activities. This
dataset includes 24,920 video snippets covering 410 human activities in total.
Our analysis reveals that holistic and pose-based methods are highly
complementary, and their performance varies significantly depending on the
activity. We find that holistic methods are mostly affected by the number and
speed of trajectories, whereas pose-based methods are mostly influenced by
viewpoint of the person. We observe striking performance differences across
activities: for certain activities results with pose-based features are more
than twice as accurate compared to holistic features, and vice versa. The best
performing approach in our comparison is based on the combination of holistic
and pose-based approaches, which again underlines their complementarity.
| [
{
"created": "Sat, 7 Jun 2014 10:07:24 GMT",
"version": "v1"
},
{
"created": "Mon, 28 Jul 2014 14:55:23 GMT",
"version": "v2"
}
] | "2014-07-29T00:00:00" | [
[
"Pishchulin",
"Leonid",
""
],
[
"Andriluka",
"Mykhaylo",
""
],
[
"Schiele",
"Bernt",
""
]
] | 1new_dataset
|
2109.03034 | Jianhao Shen | Jianhao Shen, Yichun Yin, Lin Li, Lifeng Shang, Xin Jiang, Ming Zhang,
Qun Liu | Generate & Rank: A Multi-task Framework for Math Word Problems | Findings of EMNLP2021 | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Math word problem (MWP) is a challenging and critical task in natural
language processing. Many recent studies formalize MWP as a generation task and
have adopted sequence-to-sequence models to transform problem descriptions to
mathematical expressions. However, mathematical expressions are prone to minor
mistakes while the generation objective does not explicitly handle such
mistakes. To address this limitation, we devise a new ranking task for MWP and
propose Generate & Rank, a multi-task framework based on a generative
pre-trained language model. By joint training with generation and ranking, the
model learns from its own mistakes and is able to distinguish between correct
and incorrect expressions. Meanwhile, we perform tree-based disturbance
specially designed for MWP and an online update to boost the ranker. We
demonstrate the effectiveness of our proposed method on the benchmark and the
results show that our method consistently outperforms baselines in all
datasets. Particularly, in the classical Math23k, our method is 7% (78.4%
$\rightarrow$ 85.4%) higher than the state-of-the-art.
| [
{
"created": "Tue, 7 Sep 2021 12:21:49 GMT",
"version": "v1"
}
] | "2021-09-08T00:00:00" | [
[
"Shen",
"Jianhao",
""
],
[
"Yin",
"Yichun",
""
],
[
"Li",
"Lin",
""
],
[
"Shang",
"Lifeng",
""
],
[
"Jiang",
"Xin",
""
],
[
"Zhang",
"Ming",
""
],
[
"Liu",
"Qun",
""
]
] | 0no_new_dataset
|
cs/0604003 | Petrus H Potgieter | Petrus H. Potgieter | Hypercomputing the Mandelbrot Set? | 11 pages, 2 figures | null | null | null | cs.CC | null | The Mandelbrot set is an extremely well-known mathematical object that can be
described in a quite simple way but has very interesting and non-trivial
properties. This paper surveys some results that are known concerning the
(non-)computability of the set. It considers two models of decidability over
the reals (which have been treated much more thoroughly and technically by
Hertling (2005), Blum, Shub and Smale, Brattka (2003) and Weihrauch (1999 and
2003) among others), two over the computable reals (the Russian school and
hypercomputation) and a model over the rationals.
| [
{
"created": "Sun, 2 Apr 2006 15:31:32 GMT",
"version": "v1"
}
] | "2007-05-23T00:00:00" | [
[
"Potgieter",
"Petrus H.",
""
]
] | 0no_new_dataset
|
1505.02862 | Fan Cheng | Fan Cheng and Vincent Y. F. Tan | A Numerical Study on the Wiretap Network with a Simple Network Topology | Submitted to IT | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study a security problem on a simple wiretap network,
consisting of a source node S, a destination node D, and an intermediate node
R. The intermediate node connects the source and the destination nodes via a
set of noiseless parallel channels, with sizes $n_1$ and $n_2$, respectively. A
message $M$ is to be sent from S to D. The information in the network may be
eavesdropped by a set of wiretappers. The wiretappers cannot communicate with
one another. Each wiretapper can access a subset of channels, called a wiretap
set. All the chosen wiretap sets form a wiretap pattern. A random key $K$ is
generated at S and a coding scheme on $(M, K)$ is employed to protect $M$. We
define two decoding classes at D: In Class-I, only $M$ is required to be
recovered and in Class-II, both $M$ and $K$ are required to be recovered. The
objective is to minimize $H(K)/H(M)$ {for a given wiretap pattern} under the
perfect secrecy constraint. The first question we address is whether routing is
optimal on this simple network. By enumerating all the wiretap patterns on the
Class-I/II $(3,3)$ networks and harnessing the power of Shannon-type
inequalities, we find that gaps exist between the bounds implied by routing and
the bounds implied by Shannon-type inequalities for a small fraction~($<2\%$)
of all the wiretap patterns. The second question we investigate is the
following: What is $\min H(K)/H(M)$ for the remaining wiretap patterns where
gaps exist? We study some simple wiretap patterns and find that their Shannon
bounds (i.e., the lower bound induced by Shannon-type inequalities) can be
achieved by linear codes, which means routing is not sufficient even for the
($3$, $3$) network. For some complicated wiretap patterns, we study the
structures of linear coding schemes under the assumption that they can achieve
the corresponding Shannon bounds....
| [
{
"created": "Tue, 12 May 2015 02:58:02 GMT",
"version": "v1"
},
{
"created": "Sat, 14 Nov 2015 15:13:05 GMT",
"version": "v2"
},
{
"created": "Fri, 15 Jan 2016 06:23:01 GMT",
"version": "v3"
}
] | "2016-01-18T00:00:00" | [
[
"Cheng",
"Fan",
""
],
[
"Tan",
"Vincent Y. F.",
""
]
] | 0no_new_dataset
|
1407.2147 | James Smith | James Smith | Gender Prediction in Social Media | null | null | null | null | cs.SI | http://creativecommons.org/licenses/by/3.0/ | In this paper, we explore the task of gender classification using limited
network data with an application to Fotolog. We take a heuristic approach to
automating gender inference based on username, followers and network structure.
We test our approach on a subset of 100,000 nodes and analyze our results to
find that there is a lot of value in these limited information and that there
is great promise in further pursuing this approach to classification.
| [
{
"created": "Tue, 8 Jul 2014 16:06:14 GMT",
"version": "v1"
}
] | "2014-07-09T00:00:00" | [
[
"Smith",
"James",
""
]
] | 0no_new_dataset
|
1201.6568 | Arlei Silva | Arlei Silva, Wagner Meira Jr., Mohammed J. Zaki | Mining Attribute-structure Correlated Patterns in Large Attributed
Graphs | VLDB2012 | Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 5, pp.
466-477 (2012) | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we study the correlation between attribute sets and the
occurrence of dense subgraphs in large attributed graphs, a task we call
structural correlation pattern mining. A structural correlation pattern is a
dense subgraph induced by a particular attribute set. Existing methods are not
able to extract relevant knowledge regarding how vertex attributes interact
with dense subgraphs. Structural correlation pattern mining combines aspects of
frequent itemset and quasi-clique mining problems. We propose statistical
significance measures that compare the structural correlation of attribute sets
against their expected values using null models. Moreover, we evaluate the
interestingness of structural correlation patterns in terms of size and
density. An efficient algorithm that combines search and pruning strategies in
the identification of the most relevant structural correlation patterns is
presented. We apply our method for the analysis of three real-world attributed
graphs: a collaboration, a music, and a citation network, verifying that it
provides valuable knowledge in a feasible time.
| [
{
"created": "Tue, 31 Jan 2012 15:10:13 GMT",
"version": "v1"
}
] | "2012-02-01T00:00:00" | [
[
"Silva",
"Arlei",
""
],
[
"Meira",
"Wagner",
"Jr."
],
[
"Zaki",
"Mohammed J.",
""
]
] | 1new_dataset
|
1704.03223 | Zahra Mousavi | Zahra Mousavi, Heshaam Faili | Persian Wordnet Construction using Supervised Learning | null | null | null | null | cs.CL cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an automated supervised method for Persian wordnet
construction. Using a Persian corpus and a bi-lingual dictionary, the initial
links between Persian words and Princeton WordNet synsets have been generated.
These links will be discriminated later as correct or incorrect by employing
seven features in a trained classification system. The whole method is just a
classification system, which has been trained on a train set containing FarsNet
as a set of correct instances. State of the art results on the automatically
derived Persian wordnet is achieved. The resulted wordnet with a precision of
91.18% includes more than 16,000 words and 22,000 synsets.
| [
{
"created": "Tue, 11 Apr 2017 09:47:28 GMT",
"version": "v1"
}
] | "2017-04-12T00:00:00" | [
[
"Mousavi",
"Zahra",
""
],
[
"Faili",
"Heshaam",
""
]
] | 0no_new_dataset
|
2012.08418 | Michael Herman | Michael Herman, J\"org Wagner, Vishnu Prabhakaran, Nicolas M\"oser,
Hanna Ziesche, Waleed Ahmed, Lutz B\"urkle, Ernst Kloppenburg, Claudius
Gl\"aser | Pedestrian Behavior Prediction for Automated Driving: Requirements,
Metrics, and Relevant Features | This work has been submitted to the IEEE Transactions on Intelligent
Transportation Systems for possible publication. Copyright may be transferred
without notice, after which this version may no longer be accessible.
Revision: Extended requirement analysis and evaluation. 16 pages | null | null | null | cs.RO cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automated vehicles require a comprehensive understanding of traffic
situations to ensure safe and anticipatory driving. In this context, the
prediction of pedestrians is particularly challenging as pedestrian behavior
can be influenced by multiple factors. In this paper, we thoroughly analyze the
requirements on pedestrian behavior prediction for automated driving via a
system-level approach. To this end we investigate real-world pedestrian-vehicle
interactions with human drivers. Based on human driving behavior we then derive
appropriate reaction patterns of an automated vehicle and determine
requirements for the prediction of pedestrians. This includes a novel metric
tailored to measure prediction performance from a system-level perspective. The
proposed metric is evaluated on a large-scale dataset comprising thousands of
real-world pedestrian-vehicle interactions. We furthermore conduct an ablation
study to evaluate the importance of different contextual cues and compare these
results to ones obtained using established performance metrics for pedestrian
prediction. Our results highlight the importance of a system-level approach to
pedestrian behavior prediction.
| [
{
"created": "Tue, 15 Dec 2020 16:52:49 GMT",
"version": "v1"
},
{
"created": "Sat, 16 Oct 2021 14:13:43 GMT",
"version": "v2"
}
] | "2021-10-19T00:00:00" | [
[
"Herman",
"Michael",
""
],
[
"Wagner",
"Jörg",
""
],
[
"Prabhakaran",
"Vishnu",
""
],
[
"Möser",
"Nicolas",
""
],
[
"Ziesche",
"Hanna",
""
],
[
"Ahmed",
"Waleed",
""
],
[
"Bürkle",
"Lutz",
""
],
[
"Kloppenburg",
"Ernst",
""
],
[
"Gläser",
"Claudius",
""
]
] | 1new_dataset
|
2105.10152 | Harsh Kohli Mr. | Harsh Kohli | Training Mixed-Objective Pointing Decoders for Block-Level Optimization
in Search Recommendation | 4 pages. Accepted at the 43rd International ACM SIGIR Conference on
Research and Development in Information Retrieval | null | 10.1145/3397271.3401236 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Related or ideal follow-up suggestions to a web query in search engines are
often optimized based on several different parameters -- relevance to the
original query, diversity, click probability etc. One or many rankers may be
trained to score each suggestion from a candidate pool based on these factors.
These scorers are usually pairwise classification tasks where each training
example consists of a user query and a single suggestion from the list of
candidates. We propose an architecture that takes all candidate suggestions
associated with a given query and outputs a suggestion block. We discuss the
benefits of such an architecture over traditional approaches and experiment
with further enforcing each individual metric through mixed-objective training.
| [
{
"created": "Fri, 21 May 2021 06:34:19 GMT",
"version": "v1"
}
] | "2021-05-24T00:00:00" | [
[
"Kohli",
"Harsh",
""
]
] | 0no_new_dataset
|
1709.08669 | Konstantina Christakopoulou | Konstantina Christakopoulou, Adam Tauman Kalai | Glass-Box Program Synthesis: A Machine Learning Approach | null | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently proposed models which learn to write computer programs from data use
either input/output examples or rich execution traces. Instead, we argue that a
novel alternative is to use a glass-box loss function, given as a program
itself that can be directly inspected. Glass-box optimization covers a wide
range of problems, from computing the greatest common divisor of two integers,
to learning-to-learn problems.
In this paper, we present an intelligent search system which learns, given
the partial program and the glass-box problem, the probabilities over the space
of programs. We empirically demonstrate that our informed search procedure
leads to significant improvements compared to brute-force program search, both
in terms of accuracy and time. For our experiments we use rich context free
grammars inspired by number theory, text processing, and algebra. Our results
show that (i) performing 4 rounds of our framework typically solves about 70%
of the target problems, (ii) our framework can improve itself even in domain
agnostic scenarios, and (iii) it can solve problems that would be otherwise too
slow to solve with brute-force search.
| [
{
"created": "Mon, 25 Sep 2017 18:43:56 GMT",
"version": "v1"
}
] | "2017-09-27T00:00:00" | [
[
"Christakopoulou",
"Konstantina",
""
],
[
"Kalai",
"Adam Tauman",
""
]
] | 0no_new_dataset
|
1907.12205 | Shashank Rajput | Shashank Rajput, Hongyi Wang, Zachary Charles and Dimitris
Papailiopoulos | DETOX: A Redundancy-based Framework for Faster and More Robust Gradient
Aggregation | null | null | null | null | cs.LG cs.DC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To improve the resilience of distributed training to worst-case, or Byzantine
node failures, several recent approaches have replaced gradient averaging with
robust aggregation methods. Such techniques can have high computational costs,
often quadratic in the number of compute nodes, and only have limited
robustness guarantees. Other methods have instead used redundancy to guarantee
robustness, but can only tolerate limited number of Byzantine failures. In this
work, we present DETOX, a Byzantine-resilient distributed training framework
that combines algorithmic redundancy with robust aggregation. DETOX operates in
two steps, a filtering step that uses limited redundancy to significantly
reduce the effect of Byzantine nodes, and a hierarchical aggregation step that
can be used in tandem with any state-of-the-art robust aggregation method. We
show theoretically that this leads to a substantial increase in robustness, and
has a per iteration runtime that can be nearly linear in the number of compute
nodes. We provide extensive experiments over real distributed setups across a
variety of large-scale machine learning tasks, showing that DETOX leads to
orders of magnitude accuracy and speedup improvements over many
state-of-the-art Byzantine-resilient approaches.
| [
{
"created": "Mon, 29 Jul 2019 04:02:35 GMT",
"version": "v1"
},
{
"created": "Sun, 8 Mar 2020 03:02:12 GMT",
"version": "v2"
}
] | "2020-03-10T00:00:00" | [
[
"Rajput",
"Shashank",
""
],
[
"Wang",
"Hongyi",
""
],
[
"Charles",
"Zachary",
""
],
[
"Papailiopoulos",
"Dimitris",
""
]
] | 0no_new_dataset
|
1712.03529 | Behrooz Omidvar-Tehrani | Sihem Amer-Yahia, Behrooz Omidvar-Tehrani, Joao Comba, Viviane
Moreira, Fabian Colque Zegarra | Exploration of User Groups in VEXUS | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce VEXUS, an interactive visualization framework for exploring user
data to fulfill tasks such as finding a set of experts, forming discussion
groups and analyzing collective behaviors. User data is characterized by a
combination of demographics like age and occupation, and actions such as rating
a movie, writing a paper, following a medical treatment or buying groceries.
The ubiquity of user data requires tools that help explorers, be they
specialists or novice users, acquire new insights. VEXUS lets explorers
interact with user data via visual primitives and builds an exploration profile
to recommend the next exploration steps. VEXUS combines state-of-the-art
visualization techniques with appropriate indexing of user data to provide fast
and relevant exploration.
| [
{
"created": "Sun, 10 Dec 2017 14:01:53 GMT",
"version": "v1"
}
] | "2017-12-12T00:00:00" | [
[
"Amer-Yahia",
"Sihem",
""
],
[
"Omidvar-Tehrani",
"Behrooz",
""
],
[
"Comba",
"Joao",
""
],
[
"Moreira",
"Viviane",
""
],
[
"Zegarra",
"Fabian Colque",
""
]
] | 1new_dataset
|
1405.0102 | Christian A. Naesseth | Christian A. Naesseth, Fredrik Lindsten, Thomas B. Sch\"on | Capacity estimation of two-dimensional channels using Sequential Monte
Carlo | null | null | null | null | cs.IT math.IT stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive a new Sequential-Monte-Carlo-based algorithm to estimate the
capacity of two-dimensional channel models. The focus is on computing the
noiseless capacity of the 2-D one-infinity run-length limited constrained
channel, but the underlying idea is generally applicable. The proposed
algorithm is profiled against a state-of-the-art method, yielding more than an
order of magnitude improvement in estimation accuracy for a given computation
time.
| [
{
"created": "Thu, 1 May 2014 06:06:45 GMT",
"version": "v1"
},
{
"created": "Mon, 11 Aug 2014 10:36:37 GMT",
"version": "v2"
}
] | "2014-08-12T00:00:00" | [
[
"Naesseth",
"Christian A.",
""
],
[
"Lindsten",
"Fredrik",
""
],
[
"Schön",
"Thomas B.",
""
]
] | 0no_new_dataset
|
1605.03389 | Markus Oberweger | Markus Oberweger, Gernot Riegler, Paul Wohlhart, Vincent Lepetit | Efficiently Creating 3D Training Data for Fine Hand Pose Estimation | added link to source https://github.com/moberweger/semi-auto-anno.
Appears in Proc. of CVPR 2016 | null | null | null | cs.CV cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While many recent hand pose estimation methods critically rely on a training
set of labelled frames, the creation of such a dataset is a challenging task
that has been overlooked so far. As a result, existing datasets are limited to
a few sequences and individuals, with limited accuracy, and this prevents these
methods from delivering their full potential. We propose a semi-automated
method for efficiently and accurately labeling each frame of a hand depth video
with the corresponding 3D locations of the joints: The user is asked to provide
only an estimate of the 2D reprojections of the visible joints in some
reference frames, which are automatically selected to minimize the labeling
work by efficiently optimizing a sub-modular loss function. We then exploit
spatial, temporal, and appearance constraints to retrieve the full 3D poses of
the hand over the complete sequence. We show that this data can be used to
train a recent state-of-the-art hand pose estimation method, leading to
increased accuracy. The code and dataset can be found on our website
https://cvarlab.icg.tugraz.at/projects/hand_detection/
| [
{
"created": "Wed, 11 May 2016 11:40:27 GMT",
"version": "v1"
},
{
"created": "Fri, 2 Dec 2016 15:45:38 GMT",
"version": "v2"
}
] | "2016-12-05T00:00:00" | [
[
"Oberweger",
"Markus",
""
],
[
"Riegler",
"Gernot",
""
],
[
"Wohlhart",
"Paul",
""
],
[
"Lepetit",
"Vincent",
""
]
] | 1new_dataset
|
1902.09887 | Qianyi Wu | Zi-Hang Jiang, Qianyi Wu, Keyu Chen and Juyong Zhang | Disentangled Representation Learning for 3D Face Shape | 15 pages, 8 figures. CVPR 2019 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a novel strategy to design disentangled 3D face
shape representation. Specifically, a given 3D face shape is decomposed into
identity part and expression part, which are both encoded and decoded in a
nonlinear way. To solve this problem, we propose an attribute decomposition
framework for 3D face mesh. To better represent face shapes which are usually
nonlinear deformed between each other, the face shapes are represented by a
vertex based deformation representation rather than Euclidean coordinates. The
experimental results demonstrate that our method has better performance than
existing methods on decomposing the identity and expression parts. Moreover,
more natural expression transfer results can be achieved with our method than
existing methods.
| [
{
"created": "Tue, 26 Feb 2019 12:22:18 GMT",
"version": "v1"
},
{
"created": "Sun, 3 Mar 2019 06:38:24 GMT",
"version": "v2"
}
] | "2019-03-05T00:00:00" | [
[
"Jiang",
"Zi-Hang",
""
],
[
"Wu",
"Qianyi",
""
],
[
"Chen",
"Keyu",
""
],
[
"Zhang",
"Juyong",
""
]
] | 0no_new_dataset
|
1302.1143 | Joel Lehman | Joel Lehman, Kenneth O. Stanley | Evolvability Is Inevitable: Increasing Evolvability Without the Pressure
to Adapt | null | null | 10.1371/journal.pone.0062186 | null | cs.NE q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Why evolvability appears to have increased over evolutionary time is an
important unresolved biological question. Unlike most candidate explanations,
this paper proposes that increasing evolvability can result without any
pressure to adapt. The insight is that if evolvability is heritable, then an
unbiased drifting process across genotypes can still create a distribution of
phenotypes biased towards evolvability, because evolvable organisms diffuse
more quickly through the space of possible phenotypes. Furthermore, because
phenotypic divergence often correlates with founding niches, niche founders may
on average be more evolvable, which through population growth provides a
genotypic bias towards evolvability. Interestingly, the combination of these
two mechanisms can lead to increasing evolvability without any pressure to
out-compete other organisms, as demonstrated through experiments with a series
of simulated models. Thus rather than from pressure to adapt, evolvability may
inevitably result from any drift through genotypic space combined with
evolution's passive tendency to accumulate niches.
| [
{
"created": "Tue, 5 Feb 2013 18:14:02 GMT",
"version": "v1"
}
] | "2015-06-12T00:00:00" | [
[
"Lehman",
"Joel",
""
],
[
"Stanley",
"Kenneth O.",
""
]
] | 0no_new_dataset
|
1707.01446 | Xerxes D. Arsiwalla | Xerxes D. Arsiwalla, Pedro A.M. Mediano, Paul F.M.J. Verschure | Spectral Modes of Network Dynamics Reveal Increased Informational
Complexity Near Criticality | null | null | null | null | cs.NE physics.soc-ph q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | What does the informational complexity of dynamical networked systems tell us
about intrinsic mechanisms and functions of these complex systems? Recent
complexity measures such as integrated information have sought to
operationalize this problem taking a whole-versus-parts perspective, wherein
one explicitly computes the amount of information generated by a network as a
whole over and above that generated by the sum of its parts during state
transitions. While several numerical schemes for estimating network integrated
information exist, it is instructive to pursue an analytic approach that
computes integrated information as a function of network weights. Our
formulation of integrated information uses a Kullback-Leibler divergence
between the multi-variate distribution on the set of network states versus the
corresponding factorized distribution over its parts. Implementing stochastic
Gaussian dynamics, we perform computations for several prototypical network
topologies. Our findings show increased informational complexity near
criticality, which remains consistent across network topologies. Spectral
decomposition of the system's dynamics reveals how informational complexity is
governed by eigenmodes of both, the network's covariance and adjacency
matrices. We find that as the dynamics of the system approach criticality, high
integrated information is exclusively driven by the eigenmode corresponding to
the leading eigenvalue of the covariance matrix, while sub-leading modes get
suppressed. The implication of this result is that it might be favorable for
complex dynamical networked systems such as the human brain or communication
systems to operate near criticality so that efficient information integration
might be achieved.
| [
{
"created": "Wed, 5 Jul 2017 15:48:48 GMT",
"version": "v1"
}
] | "2017-07-06T00:00:00" | [
[
"Arsiwalla",
"Xerxes D.",
""
],
[
"Mediano",
"Pedro A. M.",
""
],
[
"Verschure",
"Paul F. M. J.",
""
]
] | 0no_new_dataset
|
2304.11507 | Smrithi Ajit | Smrithi Ajit, Varsha R Mouli, Skylar Knickerbocker, Jonathan S. Wood | Machine learning framework for end-to-end implementation of Incident
duration prediction | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Traffic congestion caused by non-recurring incidents such as vehicle crashes
and debris is a key issue for Traffic Management Centers (TMCs). Clearing
incidents in a timely manner is essential for improving safety and reducing
delays and emissions for the traveling public. However, TMCs and other
responders face a challenge in predicting the duration of incidents (until the
roadway is clear), making decisions of what resources to deploy difficult. To
address this problem, this research developed an analytical framework and
end-to-end machine-learning solution for predicting incident duration based on
information available as soon as an incident report is received. Quality
predictions of incident duration can help TMCs and other responders take a
proactive approach in deploying responder services such as tow trucks,
maintenance crews or activating alternative routes. The predictions use a
combination of classification and regression machine learning modules. The
performance of the developed solution has been evaluated based on the Mean
Absolute Error (MAE), or deviation from the actual incident duration as well as
Area Under the Curve (AUC) and Mean Absolute Percentage Error (MAPE). The
results showed that the framework significantly improved incident duration
prediction compared to methods from previous research.
| [
{
"created": "Sun, 23 Apr 2023 00:55:19 GMT",
"version": "v1"
}
] | "2023-04-25T00:00:00" | [
[
"Ajit",
"Smrithi",
""
],
[
"Mouli",
"Varsha R",
""
],
[
"Knickerbocker",
"Skylar",
""
],
[
"Wood",
"Jonathan S.",
""
]
] | 0no_new_dataset
|
2406.05582 | Nathaniel Gordon | Nathaniel G. Gordon, Nesrine Benchoubane, Gunes Karabulut Kurt, and
Gregory Falco | On the Role of Communications for Space Domain Awareness | 12 pages, 3 figures | null | null | null | cs.ET cs.SI | http://creativecommons.org/licenses/by-sa/4.0/ | Space Domain Awareness (SDA) has become increasingly vital with the rapid
growth of commercial space activities and the expansion of New Space. This
paper stresses the necessity of transitioning from centralized to distributed
SDA architectures. The current architecture predominantly relies on individual
downhaul, which we propose to transition to on-orbit distribution. Our results
demonstrate that the individual downhaul architecture does not scale
efficiently with the increasing number of nodes, while on-orbit distribution
offers significant improvements. By comparing the centralized architecture with
the proposed distributed architecture, we highlight the advantages of enhanced
coverage and resilience. Our findings show that on-orbit distribution greatly
outperforms individual downhaul in terms of latency and scalability.
Specifically, the latency results for on-orbit distribution are substantially
lower and more consistent, even as the number of satellites increases. In
addition, we address the inherent challenges associated with on-orbit
distribution architecture, particularly cybersecurity concerns. We focus on
link security to ensure the availability and integrity of data transmission in
these advanced SDA systems. Future expectations include further refinement of
on-orbit distribution strategies and the development of robust cybersecurity
measures to support the scalability and resilience of SDA systems.
| [
{
"created": "Sat, 8 Jun 2024 21:49:52 GMT",
"version": "v1"
}
] | "2024-06-11T00:00:00" | [
[
"Gordon",
"Nathaniel G.",
""
],
[
"Benchoubane",
"Nesrine",
""
],
[
"Kurt",
"Gunes Karabulut",
""
],
[
"Falco",
"Gregory",
""
]
] | 0no_new_dataset
|
2008.11977 | Jonghyun Kim | Jonghyun Kim, Gen Li, Inyong Yun, Cheolkon Jung, and Joongkyu Kim | Edge and Identity Preserving Network for Face Super-Resolution | Neurocomputing'2021 | null | 10.1016/j.neucom.2021.03.048 | null | cs.CV eess.IV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Face super-resolution (SR) has become an indispensable function in security
solutions such as video surveillance and identification system, but the
distortion in facial components is a great challenge in it. Most
state-of-the-art methods have utilized facial priors with deep neural networks.
These methods require extra labels, longer training time, and larger
computation memory. In this paper, we propose a novel Edge and Identity
Preserving Network for Face SR Network, named as EIPNet, to minimize the
distortion by utilizing a lightweight edge block and identity information. We
present an edge block to extract perceptual edge information, and concatenate
it to the original feature maps in multiple scales. This structure
progressively provides edge information in reconstruction to aggregate local
and global structural information. Moreover, we define an identity loss
function to preserve identification of SR images. The identity loss function
compares feature distributions between SR images and their ground truth to
recover identities in SR images. In addition, we provide a
luminance-chrominance error (LCE) to separately infer brightness and color
information in SR images. The LCE method not only reduces the dependency of
color information by dividing brightness and color components but also enables
our network to reflect differences between SR images and their ground truth in
two color spaces of RGB and YUV. The proposed method facilitates the proposed
SR network to elaborately restore facial components and generate high quality
8x scaled SR images with a lightweight network structure. Furthermore, our
network is able to reconstruct an 128x128 SR image with 215 fps on a GTX 1080Ti
GPU. Extensive experiments demonstrate that our network qualitatively and
quantitatively outperforms state-of-the-art methods on two challenging
datasets: CelebA and VGGFace2.
| [
{
"created": "Thu, 27 Aug 2020 08:04:57 GMT",
"version": "v1"
},
{
"created": "Wed, 31 Mar 2021 02:17:03 GMT",
"version": "v2"
}
] | "2021-04-01T00:00:00" | [
[
"Kim",
"Jonghyun",
""
],
[
"Li",
"Gen",
""
],
[
"Yun",
"Inyong",
""
],
[
"Jung",
"Cheolkon",
""
],
[
"Kim",
"Joongkyu",
""
]
] | 1new_dataset
|
2405.13349 | Jialin Li | Guangda Sun, Tianyang Tao, Yanpei Guo, Michael Yiqing Hu, Jialin Li | Building a Verifiable Logical Clock for P2P Networks | null | null | null | null | cs.DC | http://creativecommons.org/licenses/by-sa/4.0/ | Logical clocks are a fundamental tool to establish causal ordering of events
in a distributed system. They have been applied in weakly consistent storage
systems, causally ordered broadcast, distributed snapshots, deadlock detection,
and distributed system debugging. However, prior logical clock constructs fail
to work in an open network with Byzantine participants. In this work, we
present Chrono, a novel logical clock system that targets such challenging
environment. We first redefine causality properties among distributed processes
under the Byzantine failure model. To enforce these properties, Chrono defines
a new validator abstraction for building fault-tolerant logical clocks.
Furthermore, our validator abstraction is customizable: Chrono includes
multiple backend implementations for the abstraction, each with different
security-performance trade-offs. We have applied Chrono to build two
decentralized applications, a mutual exclusive service and a weakly consistent
key-value store. Chrono adds only marginal overhead compared to systems that
tolerate no Byzantine faults. It also out-performs state-of-the-art BFT total
order protocols by significant margins.
| [
{
"created": "Wed, 22 May 2024 05:10:59 GMT",
"version": "v1"
}
] | "2024-05-24T00:00:00" | [
[
"Sun",
"Guangda",
""
],
[
"Tao",
"Tianyang",
""
],
[
"Guo",
"Yanpei",
""
],
[
"Hu",
"Michael Yiqing",
""
],
[
"Li",
"Jialin",
""
]
] | 0no_new_dataset
|
2401.08991 | John O'Connor | Andrew Ajemian and John Knight and Tommy Nguyen and John O'Connor | Knight Watch: Ubiquitous Computing Enhancements To Sleep Quality With
Acoustic Analysis | 6 Pages, 3 Figures | null | null | null | cs.HC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This project introduces a wearable, non-intrusive device for snoring
detection and remediation, designed to be placed under or alongside a pillow.
The device uses sensors and machine learning algorithms to detect snoring and
employs gentle vibrations to prompt positional changes, thereby reducing
snoring episodes. The device is capable of connecting via an API to a
cloud-based platform for the analysis of snoring sleep patterns and
environmental context. The paper details the development from concept to
prototype, emphasizing the technical challenges, solutions, and alignment with
ubiquitous computing in sleep quality improvement.
| [
{
"created": "Wed, 17 Jan 2024 05:58:25 GMT",
"version": "v1"
}
] | "2024-01-18T00:00:00" | [
[
"Ajemian",
"Andrew",
""
],
[
"Knight",
"John",
""
],
[
"Nguyen",
"Tommy",
""
],
[
"O'Connor",
"John",
""
]
] | 0no_new_dataset
|
2304.03917 | Zhu Zhimin | Zhimin Zhu, Jianguo Zhao, Tong Mu, Yuliang Yang, Mengyu Zhu | MC-MLP:Multiple Coordinate Frames in all-MLP Architecture for Vision | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In deep learning, Multi-Layer Perceptrons (MLPs) have once again garnered
attention from researchers. This paper introduces MC-MLP, a general MLP-like
backbone for computer vision that is composed of a series of fully-connected
(FC) layers. In MC-MLP, we propose that the same semantic information has
varying levels of difficulty in learning, depending on the coordinate frame of
features. To address this, we perform an orthogonal transform on the feature
information, equivalent to changing the coordinate frame of features. Through
this design, MC-MLP is equipped with multi-coordinate frame receptive fields
and the ability to learn information across different coordinate frames.
Experiments demonstrate that MC-MLP outperforms most MLPs in image
classification tasks, achieving better performance at the same parameter level.
The code will be available at: https://github.com/ZZM11/MC-MLP.
| [
{
"created": "Sat, 8 Apr 2023 05:23:25 GMT",
"version": "v1"
}
] | "2023-04-11T00:00:00" | [
[
"Zhu",
"Zhimin",
""
],
[
"Zhao",
"Jianguo",
""
],
[
"Mu",
"Tong",
""
],
[
"Yang",
"Yuliang",
""
],
[
"Zhu",
"Mengyu",
""
]
] | 0no_new_dataset
|
2405.02196 | Chenyang Ai | Chenyang Ai, Lechuan Zhao, Zhijie Huang, Cangyuan Li, Xinan Wang, Ying
Wang | GTA: a new General Tensor Accelerator with Better Area Efficiency and
Data Reuse | null | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, tensor algebra have witnessed significant applications across
various domains. Each operator in tensor algebra features different
computational workload and precision. However, current general accelerators,
such as VPU, GPGPU, and CGRA, support tensor operators with low energy and area
efficiency. This paper conducts an in-depth exploration of general accelerator
for tensor processing.
First, we find the similarity between matrix multiplication and precision
multiplication, and create a method classifying tensor operators. Then, we
implement two discoveries and introduce the systolic architecture into
general-purpose accelerator. Therefore, we propose a new General Tensor
Accelerator (GTA), which has a better area efficiency and data reuse.
Furthermore, we create a large hardware scheduling space consisting of
dataflow, precision and array resize. Our evaluation results demonstrate that
GTA is able to achieves 7.76X, 5.35X, 8.76X memory efficiency and 6.45X, 3.39X,
25.83X speedup over of VPU, GPGPU and CGRA.
| [
{
"created": "Fri, 3 May 2024 15:52:44 GMT",
"version": "v1"
}
] | "2024-05-06T00:00:00" | [
[
"Ai",
"Chenyang",
""
],
[
"Zhao",
"Lechuan",
""
],
[
"Huang",
"Zhijie",
""
],
[
"Li",
"Cangyuan",
""
],
[
"Wang",
"Xinan",
""
],
[
"Wang",
"Ying",
""
]
] | 1new_dataset
|
2401.14607 | Lynnette Hui Xian Ng | Lynnette Hui Xian Ng and Kathleen M. Carley | Assembling a Multi-Platform Ensemble Social Bot Detector with
Applications to US 2020 Elections | Accepted at Social Network Analysis and Mining | null | null | null | cs.SI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Bots have been in the spotlight for many social media studies, for they have
been observed to be participating in the manipulation of information and
opinions on social media. These studies analyzed the activity and influence of
bots in a variety of contexts: elections, protests, health communication and so
forth. Prior to this analyses is the identification of bot accounts to
segregate the class of social media users. In this work, we propose an ensemble
method for bot detection, designing a multi-platform bot detection architecture
to handle several problems along the bot detection pipeline: incomplete data
input, minimal feature engineering, optimized classifiers for each data field,
and also eliminate the need for a threshold value for classification
determination. With these design decisions, we generalize our bot detection
framework across Twitter, Reddit and Instagram. We also perform feature
importance analysis, observing that the entropy of names and number of
interactions (retweets/shares) are important factors in bot determination.
Finally, we apply our multi-platform bot detector to the US 2020 presidential
elections to identify and analyze bot activity across multiple social media
platforms, showcasing the difference in online discourse of bots from different
platforms.
| [
{
"created": "Fri, 26 Jan 2024 02:39:54 GMT",
"version": "v1"
},
{
"created": "Tue, 2 Apr 2024 00:11:16 GMT",
"version": "v2"
}
] | "2024-04-03T00:00:00" | [
[
"Ng",
"Lynnette Hui Xian",
""
],
[
"Carley",
"Kathleen M.",
""
]
] | 0no_new_dataset
|
2003.10685 | Jia-Qi Zhang | Min Shi, Jia-Qi Zhang, Shu-Yu Chen, Lin Gao, Yu-Kun Lai, Fang-Lue
Zhang | Deep Line Art Video Colorization with a Few References | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coloring line art images based on the colors of reference images is an
important stage in animation production, which is time-consuming and tedious.
In this paper, we propose a deep architecture to automatically color line art
videos with the same color style as the given reference images. Our framework
consists of a color transform network and a temporal constraint network. The
color transform network takes the target line art images as well as the line
art and color images of one or more reference images as input, and generates
corresponding target color images. To cope with larger differences between the
target line art image and reference color images, our architecture utilizes
non-local similarity matching to determine the region correspondences between
the target image and the reference images, which are used to transform the
local color information from the references to the target. To ensure global
color style consistency, we further incorporate Adaptive Instance Normalization
(AdaIN) with the transformation parameters obtained from a style embedding
vector that describes the global color style of the references, extracted by an
embedder. The temporal constraint network takes the reference images and the
target image together in chronological order, and learns the spatiotemporal
features through 3D convolution to ensure the temporal consistency of the
target image and the reference image. Our model can achieve even better
coloring results by fine-tuning the parameters with only a small amount of
samples when dealing with an animation of a new style. To evaluate our method,
we build a line art coloring dataset. Experiments show that our method achieves
the best performance on line art video coloring compared to the
state-of-the-art methods and other baselines.
| [
{
"created": "Tue, 24 Mar 2020 06:57:40 GMT",
"version": "v1"
},
{
"created": "Mon, 30 Mar 2020 07:34:55 GMT",
"version": "v2"
}
] | "2020-03-31T00:00:00" | [
[
"Shi",
"Min",
""
],
[
"Zhang",
"Jia-Qi",
""
],
[
"Chen",
"Shu-Yu",
""
],
[
"Gao",
"Lin",
""
],
[
"Lai",
"Yu-Kun",
""
],
[
"Zhang",
"Fang-Lue",
""
]
] | 1new_dataset
|
2104.14700 | Ewan Dunbar | Ewan Dunbar, Mathieu Bernard, Nicolas Hamilakis, Tu Anh Nguyen,
Maureen de Seyssel, Patricia Roz\'e, Morgane Rivi\`ere, Eugene Kharitonov,
Emmanuel Dupoux | The Zero Resource Speech Challenge 2021: Spoken language modelling | Submitted to Interspeech 2021. arXiv admin note: text overlap with
arXiv:2011.11588 | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | We present the Zero Resource Speech Challenge 2021, which asks participants
to learn a language model directly from audio, without any text or labels. The
challenge is based on the Libri-light dataset, which provides up to 60k hours
of audio from English audio books without any associated text. We provide a
pipeline baseline system consisting on an encoder based on contrastive
predictive coding (CPC), a quantizer ($k$-means) and a standard language model
(BERT or LSTM). The metrics evaluate the learned representations at the
acoustic (ABX discrimination), lexical (spot-the-word), syntactic
(acceptability judgment) and semantic levels (similarity judgment). We present
an overview of the eight submitted systems from four groups and discuss the
main results.
| [
{
"created": "Thu, 29 Apr 2021 23:53:37 GMT",
"version": "v1"
},
{
"created": "Mon, 9 Aug 2021 19:09:58 GMT",
"version": "v2"
}
] | "2021-08-11T00:00:00" | [
[
"Dunbar",
"Ewan",
""
],
[
"Bernard",
"Mathieu",
""
],
[
"Hamilakis",
"Nicolas",
""
],
[
"Nguyen",
"Tu Anh",
""
],
[
"de Seyssel",
"Maureen",
""
],
[
"Rozé",
"Patricia",
""
],
[
"Rivière",
"Morgane",
""
],
[
"Kharitonov",
"Eugene",
""
],
[
"Dupoux",
"Emmanuel",
""
]
] | 0no_new_dataset
|
2210.02516 | I. Elizabeth Kumar | I. Elizabeth Kumar, Keegan E. Hines, John P. Dickerson | Equalizing Credit Opportunity in Algorithms: Aligning Algorithmic
Fairness Research with U.S. Fair Lending Regulation | null | AIES '22: Proceedings of the 2022 AAAI/ACM Conference on AI,
Ethics, and Society | 10.1145/3514094.3534154 | null | cs.LG cs.CY | http://creativecommons.org/licenses/by/4.0/ | Credit is an essential component of financial wellbeing in America, and
unequal access to it is a large factor in the economic disparities between
demographic groups that exist today. Today, machine learning algorithms,
sometimes trained on alternative data, are increasingly being used to determine
access to credit, yet research has shown that machine learning can encode many
different versions of "unfairness," thus raising the concern that banks and
other financial institutions could -- potentially unwittingly -- engage in
illegal discrimination through the use of this technology. In the US, there are
laws in place to make sure discrimination does not happen in lending and
agencies charged with enforcing them. However, conversations around fair credit
models in computer science and in policy are often misaligned: fair machine
learning research often lacks legal and practical considerations specific to
existing fair lending policy, and regulators have yet to issue new guidance on
how, if at all, credit risk models should be utilizing practices and techniques
from the research community. This paper aims to better align these sides of the
conversation. We describe the current state of credit discrimination regulation
in the United States, contextualize results from fair ML research to identify
the specific fairness concerns raised by the use of machine learning in
lending, and discuss regulatory opportunities to address these concerns.
| [
{
"created": "Wed, 5 Oct 2022 19:23:29 GMT",
"version": "v1"
}
] | "2022-10-07T00:00:00" | [
[
"Kumar",
"I. Elizabeth",
""
],
[
"Hines",
"Keegan E.",
""
],
[
"Dickerson",
"John P.",
""
]
] | 0no_new_dataset
|
2010.09569 | Erwin Quiring | Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad
Rieck | Against All Odds: Winning the Defense Challenge in an Evasion
Competition with Diversification | null | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine learning-based systems for malware detection operate in a hostile
environment. Consequently, adversaries will also target the learning system and
use evasion attacks to bypass the detection of malware. In this paper, we
outline our learning-based system PEberus that got the first place in the
defender challenge of the Microsoft Evasion Competition, resisting a variety of
attacks from independent attackers. Our system combines multiple, diverse
defenses: we address the semantic gap, use various classification models, and
apply a stateful defense. This competition gives us the unique opportunity to
examine evasion attacks under a realistic scenario. It also highlights that
existing machine learning methods can be hardened against attacks by thoroughly
analyzing the attack surface and implementing concepts from adversarial
learning. Our defense can serve as an additional baseline in the future to
strengthen the research on secure learning.
| [
{
"created": "Mon, 19 Oct 2020 14:53:06 GMT",
"version": "v1"
}
] | "2020-10-20T00:00:00" | [
[
"Quiring",
"Erwin",
""
],
[
"Pirch",
"Lukas",
""
],
[
"Reimsbach",
"Michael",
""
],
[
"Arp",
"Daniel",
""
],
[
"Rieck",
"Konrad",
""
]
] | 0no_new_dataset
|
2012.05391 | Somaiyeh MahmoudZadeh | Amin Abbasi, Somaiyeh MahmoudZadeh, Amirmehdi Yazdani, Ata Jahangir
Moshayedi | Feasibility Assessment of a Cost-Effective Two-Wheel Kian-I Mobile Robot
for Autonomous Navigation | null | Robotics and Autonomous System 2020 | null | null | cs.RO | http://creativecommons.org/publicdomain/zero/1.0/ | A two-wheeled mobile robot, namely Kian-I, is designed and prototyped in this
research. The Kian-I is comparable with Khepera-IV in terms of dimensional
specifications, mounted sensors, and performance capabilities and can be used
for educational purposes and cost-effective experimental tests. A motion
control architecture is designed for Kian-I in this study to facilitate
accurate navigation for the robot in an immersive environment. The implemented
control structure consists of two main components of the path recommender
system and trajectory tracking controller. Given partial knowledge about the
operation field, the path recommender system adopts B-spline curves and
Particle Swarm Optimization (PSO) algorithm to determine a collision-free path
curve with translational velocity constraint. The provided optimal reference
path feeds into the trajectory tracking controller enabling Kian-I to navigate
autonomously in the operating field. The trajectory tracking module eliminate
the error between the desired path and the followed trajectory through
controlling the wheels' velocity. To assess the feasibility of the proposed
control architecture, the performance of Kian-I robot in autonomous navigation
from any arbitrary initial pose to a target of interest is evaluated through
numerous simulation and experimental studies. The experimental results
demonstrate the functional capacities and performance of the prototyped robot
to be used as a benchmark for investigation and verification of various mobile
robot algorithms in the laboratory environment.
| [
{
"created": "Thu, 10 Dec 2020 01:09:01 GMT",
"version": "v1"
}
] | "2020-12-11T00:00:00" | [
[
"Abbasi",
"Amin",
""
],
[
"MahmoudZadeh",
"Somaiyeh",
""
],
[
"Yazdani",
"Amirmehdi",
""
],
[
"Moshayedi",
"Ata Jahangir",
""
]
] | 0no_new_dataset
|
1304.2290 | Anton Salikhmetov | Anton Salikhmetov | Macro Lambda Calculus | 3 pages | null | null | null | cs.LO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of our Macro Lambda Calculus project (MLC) is to encode lambda terms
into interaction nets. Its software implementation will accept input in the
notation similar to lambda calculus allowing macro definitions. Output is
similar to interaction calculus and is suitable for our Interaction Nets
Compiler program (INC). In this paper, we describe the interaction system for
call-by-need evaluation and the mechanism of encoding lambda terms into this
system which MLC is based on.
| [
{
"created": "Mon, 8 Apr 2013 18:17:32 GMT",
"version": "v1"
},
{
"created": "Thu, 11 Apr 2013 15:28:37 GMT",
"version": "v2"
},
{
"created": "Sat, 13 Apr 2013 09:03:54 GMT",
"version": "v3"
},
{
"created": "Tue, 25 Jun 2013 18:22:25 GMT",
"version": "v4"
},
{
"created": "Wed, 30 Apr 2014 15:21:16 GMT",
"version": "v5"
},
{
"created": "Thu, 16 Apr 2015 19:18:29 GMT",
"version": "v6"
},
{
"created": "Fri, 17 Apr 2015 06:30:12 GMT",
"version": "v7"
},
{
"created": "Fri, 7 Aug 2015 08:37:32 GMT",
"version": "v8"
}
] | "2015-08-10T00:00:00" | [
[
"Salikhmetov",
"Anton",
""
]
] | 0no_new_dataset
|
2311.06095 | Thomas Mercier | Thomas M. Mercier, Marcin Budka, Martin R. Vasilev, Julie A. Kirkby,
Bernhard Angele, Timothy J. Slattery | Dual input stream transformer for vertical drift correction in
eye-tracking reading data | This work has been submitted to the IEEE Transactions on pattern
analysis and machine intelligence for possible publication. Copyright may be
transferred without notice, after which this version may no longer be
accessible | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a novel Dual Input Stream Transformer (DIST) for the challenging
problem of assigning fixation points from eye-tracking data collected during
passage reading to the line of text that the reader was actually focused on.
This post-processing step is crucial for analysis of the reading data due to
the presence of noise in the form of vertical drift. We evaluate DIST against
eleven classical approaches on a comprehensive suite of nine diverse datasets.
We demonstrate that combining multiple instances of the DIST model in an
ensemble achieves high accuracy across all datasets. Further combining the DIST
ensemble with the best classical approach yields an average accuracy of 98.17
%. Our approach presents a significant step towards addressing the bottleneck
of manual line assignment in reading research. Through extensive analysis and
ablation studies, we identify key factors that contribute to DIST's success,
including the incorporation of line overlap features and the use of a second
input stream. Via rigorous evaluation, we demonstrate that DIST is robust to
various experimental setups, making it a safe first choice for practitioners in
the field.
| [
{
"created": "Fri, 10 Nov 2023 14:53:39 GMT",
"version": "v1"
},
{
"created": "Thu, 15 Feb 2024 17:05:14 GMT",
"version": "v2"
}
] | "2024-02-16T00:00:00" | [
[
"Mercier",
"Thomas M.",
""
],
[
"Budka",
"Marcin",
""
],
[
"Vasilev",
"Martin R.",
""
],
[
"Kirkby",
"Julie A.",
""
],
[
"Angele",
"Bernhard",
""
],
[
"Slattery",
"Timothy J.",
""
]
] | 1new_dataset
|
0910.5744 | Olivier Spanjaard | Lucie Galand and Olivier Spanjaard | Exact algorithms for OWA-optimization in multiobjective spanning tree
problems | 17 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with the multiobjective version of the optimal spanning tree
problem. More precisely, we are interested in determining the optimal spanning
tree according to an Ordered Weighted Average (OWA) of its objective values. We
first show that the problem is weakly NP-hard. In the case where the weights of
the OWA are strictly decreasing, we then propose a mixed integer programming
formulation, and provide dedicated optimality conditions yielding an important
reduction of the size of the program. Next, we present two bounds that can be
used to prune subspaces of solutions either in a shaving phase or in a branch
and bound procedure. The validity of these bounds does not depend on specific
properties of the weights (apart from non-negativity). All these exact
resolution algorithms are compared on the basis of numerical experiments,
according to their respective validity scopes.
| [
{
"created": "Thu, 29 Oct 2009 23:17:24 GMT",
"version": "v1"
}
] | "2009-11-02T00:00:00" | [
[
"Galand",
"Lucie",
""
],
[
"Spanjaard",
"Olivier",
""
]
] | 0no_new_dataset
|
1311.7194 | Dmitry Trifonov | Dmitry Trifonov | Real-time High Resolution Fusion of Depth Maps on GPU | null | null | null | null | cs.GR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A system for live high quality surface reconstruction using a single moving
depth camera on a commodity hardware is presented. High accuracy and real-time
frame rate is achieved by utilizing graphics hardware computing capabilities
via OpenCL and by using sparse data structure for volumetric surface
representation. Depth sensor pose is estimated by combining serial texture
registration algorithm with iterative closest points algorithm (ICP) aligning
obtained depth map to the estimated scene model. Aligned surface is then fused
into the scene. Kalman filter is used to improve fusion quality. Truncated
signed distance function (TSDF) stored as block-based sparse buffer is used to
represent surface. Use of sparse data structure greatly increases accuracy of
scanned surfaces and maximum scanning area. Traditional GPU implementation of
volumetric rendering and fusion algorithms were modified to exploit sparsity to
achieve desired performance. Incorporation of texture registration for sensor
pose estimation and Kalman filter for measurement integration improved accuracy
and robustness of scanning process.
| [
{
"created": "Thu, 28 Nov 2013 03:17:03 GMT",
"version": "v1"
}
] | "2013-12-02T00:00:00" | [
[
"Trifonov",
"Dmitry",
""
]
] | 0no_new_dataset
|
1801.06144 | Erick Lavoie | Erick Lavoie and Laurie Hendren | A Formalization for Specifying and Implementing Correct Pull-Stream
Modules | null | null | null | null | cs.PL | http://creativecommons.org/licenses/by/4.0/ | Pull-stream is a JavaScript demand-driven functional design pattern based on
callback functions that enables the creation and easy composition of
independent modules that are used to create streaming applications. It is used
in popular open source projects and the community around it has created over a
hundred compatible modules. While the description of the pull-stream design
pattern may seem simple, it does exhibit complicated termination cases. Despite
the popularity and large uptake of the pull-stream design pattern, there was no
existing formal specification that could help programmers reason about the
correctness of their implementations.
Thus, the main contribution of this paper is to provide a formalization for
specifying and implementing correct pull-stream modules based on the following:
(1) we show the pull-stream design pattern is a form of declarative concurrent
programming; (2) we present an event-based protocol language that supports our
formalization, independently of JavaScript; (3) we provide the first precise
and explicit definition of the expected sequences of events that happen at the
interface of two modules, which we call the pull-stream protocol; (4) we
specify reference modules that exhibit the full range of behaviors of the
pull-stream protocol; (5) we validate our definitions against the community
expectations by testing the existing core pull-stream modules against them and
identify unspecified behaviors in existing modules.
Our approach helps to better understand the pull-stream protocol, to ensure
interoperability of community modules, and to concisely and precisely specify
new pull-stream abstractions in papers and documentation.
| [
{
"created": "Thu, 18 Jan 2018 17:48:52 GMT",
"version": "v1"
}
] | "2018-01-19T00:00:00" | [
[
"Lavoie",
"Erick",
""
],
[
"Hendren",
"Laurie",
""
]
] | 0no_new_dataset
|
1304.2759 | Eric J. Horvitz | Eric J. Horvitz | Reasoning About Beliefs and Actions Under Computational Resource
Constraints | Appears in Proceedings of the Third Conference on Uncertainty in
Artificial Intelligence (UAI1987) | null | null | UAI-P-1987-PG-429-447 | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although many investigators affirm a desire to build reasoning systems that
behave consistently with the axiomatic basis defined by probability theory and
utility theory, limited resources for engineering and computation can make a
complete normative analysis impossible. We attempt to move discussion beyond
the debate over the scope of problems that can be handled effectively to cases
where it is clear that there are insufficient computational resources to
perform an analysis deemed as complete. Under these conditions, we stress the
importance of considering the expected costs and benefits of applying
alternative approximation procedures and heuristics for computation and
knowledge acquisition. We discuss how knowledge about the structure of user
utility can be used to control value tradeoffs for tailoring inference to
alternative contexts. We address the notion of real-time rationality, focusing
on the application of knowledge about the expected timewise-refinement
abilities of reasoning strategies to balance the benefits of additional
computation with the costs of acting with a partial result. We discuss the
benefits of applying decision theory to control the solution of difficult
problems given limitations and uncertainty in reasoning resources.
| [
{
"created": "Wed, 27 Mar 2013 19:50:20 GMT",
"version": "v1"
}
] | "2013-04-11T00:00:00" | [
[
"Horvitz",
"Eric J.",
""
]
] | 0no_new_dataset
|
1401.6876 | Preslav Ivanov Nakov | Preslav Ivanov Nakov, Hwee Tou Ng | Improving Statistical Machine Translation for a Resource-Poor Language
Using Related Resource-Rich Languages | null | Journal Of Artificial Intelligence Research, Volume 44, pages
179-222, 2012 | 10.1613/jair.3540 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel language-independent approach for improving machine
translation for resource-poor languages by exploiting their similarity to
resource-rich ones. More precisely, we improve the translation from a
resource-poor source language X_1 into a resource-rich language Y given a
bi-text containing a limited number of parallel sentences for X_1-Y and a
larger bi-text for X_2-Y for some resource-rich language X_2 that is closely
related to X_1. This is achieved by taking advantage of the opportunities that
vocabulary overlap and similarities between the languages X_1 and X_2 in
spelling, word order, and syntax offer: (1) we improve the word alignments for
the resource-poor language, (2) we further augment it with additional
translation options, and (3) we take care of potential spelling differences
through appropriate transliteration. The evaluation for Indonesian- >English
using Malay and for Spanish -> English using Portuguese and pretending Spanish
is resource-poor shows an absolute gain of up to 1.35 and 3.37 BLEU points,
respectively, which is an improvement over the best rivaling approaches, while
using much less additional data. Overall, our method cuts the amount of
necessary "real training data by a factor of 2--5.
| [
{
"created": "Thu, 23 Jan 2014 02:42:12 GMT",
"version": "v1"
}
] | "2014-01-28T00:00:00" | [
[
"Nakov",
"Preslav Ivanov",
""
],
[
"Ng",
"Hwee Tou",
""
]
] | 0no_new_dataset
|
1910.08031 | Boyan Gao | Boyan Gao, Yongxin Yang, Henry Gouk, Timothy M. Hospedales | Deep clustering with concrete k-means | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of simultaneously learning a k-means clustering and
deep feature representation from unlabelled data, which is of interest due to
the potential of deep k-means to outperform traditional two-step feature
extraction and shallow-clustering strategies. We achieve this by developing a
gradient-estimator for the non-differentiable k-means objective via the
Gumbel-Softmax reparameterisation trick. In contrast to previous attempts at
deep clustering, our concrete k-means model can be optimised with respect to
the canonical k-means objective and is easily trained end-to-end without
resorting to alternating optimisation. We demonstrate the efficacy of our
method on standard clustering benchmarks.
| [
{
"created": "Thu, 17 Oct 2019 16:57:15 GMT",
"version": "v1"
}
] | "2019-10-18T00:00:00" | [
[
"Gao",
"Boyan",
""
],
[
"Yang",
"Yongxin",
""
],
[
"Gouk",
"Henry",
""
],
[
"Hospedales",
"Timothy M.",
""
]
] | 0no_new_dataset
|
1710.00683 | Xiao-Yong Yan | Xiaoyong Yan, Petter Minnhagen | The Dependence of Frequency Distributions on Multiple Meanings of Words,
Codes and Signs | 10 pages, 12 figures | Physica A 490, 554-564 (2018) | 10.1016/j.physa.2017.08.133 | null | cs.CL eess.AS physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dependence of the frequency distributions due to multiple meanings of
words in a text is investigated by deleting letters. By coding the words with
fewer letters the number of meanings per coded word increases. This increase is
measured and used as an input in a predictive theory. For a text written in
English, the word-frequency distribution is broad and fat-tailed, whereas if
the words are only represented by their first letter the distribution becomes
exponential. Both distribution are well predicted by the theory, as is the
whole sequence obtained by consecutively representing the words by the first
L=6,5,4,3,2,1 letters. Comparisons of texts written by Chinese characters and
the same texts written by letter-codes are made and the similarity of the
corresponding frequency-distributions are interpreted as a consequence of the
multiple meanings of Chinese characters. This further implies that the
difference of the shape for word-frequencies for an English text written by
letters and a Chinese text written by Chinese characters is due to the coding
and not to the language per se.
| [
{
"created": "Thu, 28 Sep 2017 00:39:25 GMT",
"version": "v1"
}
] | "2017-10-04T00:00:00" | [
[
"Yan",
"Xiaoyong",
""
],
[
"Minnhagen",
"Petter",
""
]
] | 0no_new_dataset
|
2107.00157 | Zhiming Li | Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu | Cross-Lingual Transfer Learning for Statistical Type Inference | null | null | null | null | cs.AI cs.LG | http://creativecommons.org/publicdomain/zero/1.0/ | Hitherto statistical type inference systems rely thoroughly on supervised
learning approaches, which require laborious manual effort to collect and label
large amounts of data. Most Turing-complete imperative languages share similar
control- and data-flow structures, which make it possible to transfer knowledge
learned from one language to another. In this paper, we propose a cross-lingual
transfer learning framework, PLATO, for statistical type inference, which
allows us to leverage prior knowledge learned from the labeled dataset of one
language and transfer it to the others, e.g., Python to JavaScript, Java to
JavaScript, etc. PLATO is powered by a novel kernelized attention mechanism to
constrain the attention scope of the backbone Transformer model such that the
model is forced to base its prediction on commonly shared features among
languages. In addition, we propose the syntax enhancement that augments the
learning on the feature overlap among language domains. Furthermore, PLATO can
also be used to improve the performance of the conventional supervised
learning-based type inference by introducing cross-lingual augmentation, which
enables the model to learn more general features across multiple languages. We
evaluated PLATO under two settings: 1) under the cross-domain scenario that the
target language data is not labeled or labeled partially, the results show that
PLATO outperforms the state-of-the-art domain transfer techniques by a large
margin, e.g., it improves the Python to TypeScript baseline by +5.40%@EM,
+5.40%@weighted-F1, and 2) under the conventional monolingual supervised
learning based scenario, PLATO improves the Python baseline by +4.40%@EM,
+3.20%@EM (parametric).
| [
{
"created": "Thu, 1 Jul 2021 00:20:24 GMT",
"version": "v1"
},
{
"created": "Sun, 26 Jun 2022 14:50:48 GMT",
"version": "v2"
},
{
"created": "Sat, 26 Nov 2022 04:15:02 GMT",
"version": "v3"
},
{
"created": "Sun, 4 Dec 2022 02:10:24 GMT",
"version": "v4"
},
{
"created": "Sat, 24 Dec 2022 03:27:08 GMT",
"version": "v5"
}
] | "2022-12-27T00:00:00" | [
[
"Li",
"Zhiming",
""
],
[
"Xie",
"Xiaofei",
""
],
[
"Li",
"Haoliang",
""
],
[
"Xu",
"Zhengzi",
""
],
[
"Li",
"Yi",
""
],
[
"Liu",
"Yang",
""
]
] | 1new_dataset
|
1911.00157 | Jennifer Paykin | Jennifer Paykin, Eric Mertens, Mark Tullsen, Luke Maurer, Beno\^it
Razet, Alexander Bakst, and Scott Moore | Weird Machines as Insecure Compilation | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Weird machines---the computational models accessible by exploiting security
vulnerabilities---arise from the difference between the model a programmer has
in her head of how her program should run and the implementation that actually
executes. Previous attempts to reason about or identify weird machines have
viewed these models through the lens of formal computational structures such as
state machines and Turing machines. But because programmers rarely think about
programs in this way, it is difficult to effectively apply insights about weird
machines to improve security.
We present a new view of weird machines based on techniques from programming
languages theory and secure compilation. Instead of an underspecified model
drawn from a programmers' head, we start with a program written in a high-level
source language that enforces security properties by design. Instead of state
machines to describe computation, we use the well-defined semantics of this
source language and a target language, into which the source program will be
compiled. Weird machines are the sets of behaviors that can be achieved by a
compiled source program in the target language that cannot be achieved in the
source language directly. That is, exploits are witnesses to insecure
compilation.
This paper develops a framework for characterizing weird machines as insecure
compilation, and illustrates the framework with examples of common exploits. We
study the classes of security properties that exploits violate, the
compositionality of exploits in a compiler stack, and the weird machines and
mitigations that arise.
| [
{
"created": "Fri, 1 Nov 2019 00:17:40 GMT",
"version": "v1"
}
] | "2019-11-04T00:00:00" | [
[
"Paykin",
"Jennifer",
""
],
[
"Mertens",
"Eric",
""
],
[
"Tullsen",
"Mark",
""
],
[
"Maurer",
"Luke",
""
],
[
"Razet",
"Benoît",
""
],
[
"Bakst",
"Alexander",
""
],
[
"Moore",
"Scott",
""
]
] | 0no_new_dataset
|
1602.03681 | Tomislav Slijep\v{c}evi\'c | Tomislav Slijep\v{c}evi\'c | Package equivalence in complex software network | null | null | null | null | cs.SI stat.ML | http://creativecommons.org/licenses/by/4.0/ | The public package registry npm is one of the biggest software registry. With
its 216 911 software packages, it forms a big network of software dependencies.
In this paper we evaluate various methods for finding similar packages in the
npm network, using only the structure of the graph. Namely, we want to find a
way of categorizing similar packages, which would be useful for recommendation
systems. This size enables us to compute meaningful results, as it softened the
particularities of the graph. Npm is also quite famous as it is the default
package repository of Node.js. We believe that it will make our results
interesting for more people than a less used package repository. This makes it
a good subject of analysis of software networks.
| [
{
"created": "Thu, 11 Feb 2016 11:26:01 GMT",
"version": "v1"
}
] | "2016-02-12T00:00:00" | [
[
"Slijepčević",
"Tomislav",
""
]
] | 0no_new_dataset
|
1611.05910 | Olga Galinina | Olga Galinina, Konstantin Mikhaylov, Kaibin Huang, Sergey Andreev,
Yevgeni Koucheryavy | Wirelessly Powered Urban Crowd Sensing over Wearables: Trading Energy
for Data | 8 pages, 5 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we put forward the mobile crowd sensing paradigm based on
ubiquitous wearable devices carried by human users. The key challenge for mass
user involvement into prospective urban crowd sending applications, such as
monitoring of large-scale phenomena (e.g., traffic congestion and air pollution
levels), is the appropriate sources of motivation. We thus advocate for the use
of wireless power transfer provided in exchange for sensed data to incentivize
the owners of wearables to participate in collaborative data collection. Based
on this construction, we develop the novel concept of wirelessly powered crowd
sensing and offer the corresponding network architecture considerations
together with a systematic review of wireless charging techniques to implement
it. Further, we contribute a detailed system-level feasibility study that
reports on the achievable performance levels for the envisioned setup. Finally,
the underlying energy-data trading mechanisms are discussed, and the work is
concluded with outlining open research opportunities.
| [
{
"created": "Thu, 17 Nov 2016 21:47:58 GMT",
"version": "v1"
}
] | "2016-11-21T00:00:00" | [
[
"Galinina",
"Olga",
""
],
[
"Mikhaylov",
"Konstantin",
""
],
[
"Huang",
"Kaibin",
""
],
[
"Andreev",
"Sergey",
""
],
[
"Koucheryavy",
"Yevgeni",
""
]
] | 0no_new_dataset
|
2009.14133 | David Calhas | David Calhas, Rui Henriques | EEG to fMRI Synthesis: Is Deep Learning a candidate? | null | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Advances on signal, image and video generation underly major breakthroughs on
generative medical imaging tasks, including Brain Image Synthesis. Still, the
extent to which functional Magnetic Ressonance Imaging (fMRI) can be mapped
from the brain electrophysiology remains largely unexplored. This work provides
the first comprehensive view on how to use state-of-the-art principles from
Neural Processing to synthesize fMRI data from electroencephalographic (EEG)
data. Given the distinct spatiotemporal nature of haemodynamic and
electrophysiological signals, this problem is formulated as the task of
learning a mapping function between multivariate time series with highly
dissimilar structures. A comparison of state-of-the-art synthesis approaches,
including Autoencoders, Generative Adversarial Networks and Pairwise Learning,
is undertaken. Results highlight the feasibility of EEG to fMRI brain image
mappings, pinpointing the role of current advances in Machine Learning and
showing the relevance of upcoming contributions to further improve performance.
EEG to fMRI synthesis offers a way to enhance and augment brain image data, and
guarantee access to more affordable, portable and long-lasting protocols of
brain activity monitoring. The code used in this manuscript is available in
Github and the datasets are open source.
| [
{
"created": "Tue, 29 Sep 2020 16:29:20 GMT",
"version": "v1"
}
] | "2020-09-30T00:00:00" | [
[
"Calhas",
"David",
""
],
[
"Henriques",
"Rui",
""
]
] | 0no_new_dataset
|
1905.05934 | Chaoqi Wang | Chaoqi Wang, Roger Grosse, Sanja Fidler, Guodong Zhang | EigenDamage: Structured Pruning in the Kronecker-Factored Eigenbasis | ICML 2019 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reducing the test time resource requirements of a neural network while
preserving test accuracy is crucial for running inference on
resource-constrained devices. To achieve this goal, we introduce a novel
network reparameterization based on the Kronecker-factored eigenbasis (KFE),
and then apply Hessian-based structured pruning methods in this basis. As
opposed to existing Hessian-based pruning algorithms which do pruning in
parameter coordinates, our method works in the KFE where different weights are
approximately independent, enabling accurate pruning and fast computation. We
demonstrate empirically the effectiveness of the proposed method through
extensive experiments. In particular, we highlight that the improvements are
especially significant for more challenging datasets and networks. With
negligible loss of accuracy, an iterative-pruning version gives a 10$\times$
reduction in model size and a 8$\times$ reduction in FLOPs on wide ResNet32.
| [
{
"created": "Wed, 15 May 2019 03:53:08 GMT",
"version": "v1"
}
] | "2019-05-16T00:00:00" | [
[
"Wang",
"Chaoqi",
""
],
[
"Grosse",
"Roger",
""
],
[
"Fidler",
"Sanja",
""
],
[
"Zhang",
"Guodong",
""
]
] | 0no_new_dataset
|
2401.14398 | Ege Ozguroglu | Ege Ozguroglu, Ruoshi Liu, D\'idac Sur\'is, Dian Chen, Achal Dave,
Pavel Tokmakov, Carl Vondrick | pix2gestalt: Amodal Segmentation by Synthesizing Wholes | Website: https://gestalt.cs.columbia.edu/ | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce pix2gestalt, a framework for zero-shot amodal segmentation,
which learns to estimate the shape and appearance of whole objects that are
only partially visible behind occlusions. By capitalizing on large-scale
diffusion models and transferring their representations to this task, we learn
a conditional diffusion model for reconstructing whole objects in challenging
zero-shot cases, including examples that break natural and physical priors,
such as art. As training data, we use a synthetically curated dataset
containing occluded objects paired with their whole counterparts. Experiments
show that our approach outperforms supervised baselines on established
benchmarks. Our model can furthermore be used to significantly improve the
performance of existing object recognition and 3D reconstruction methods in the
presence of occlusions.
| [
{
"created": "Thu, 25 Jan 2024 18:57:36 GMT",
"version": "v1"
}
] | "2024-01-26T00:00:00" | [
[
"Ozguroglu",
"Ege",
""
],
[
"Liu",
"Ruoshi",
""
],
[
"Surís",
"Dídac",
""
],
[
"Chen",
"Dian",
""
],
[
"Dave",
"Achal",
""
],
[
"Tokmakov",
"Pavel",
""
],
[
"Vondrick",
"Carl",
""
]
] | 1new_dataset
|
2402.03824 | Giuseppe Paolo Dr | Giuseppe Paolo, Jonas Gonzalez-Billandon, Bal\'azs K\'egl | A call for embodied AI | Published in ICML 2024 Position paper track | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose Embodied AI as the next fundamental step in the pursuit of
Artificial General Intelligence, juxtaposing it against current AI
advancements, particularly Large Language Models. We traverse the evolution of
the embodiment concept across diverse fields - philosophy, psychology,
neuroscience, and robotics - to highlight how EAI distinguishes itself from the
classical paradigm of static learning. By broadening the scope of Embodied AI,
we introduce a theoretical framework based on cognitive architectures,
emphasizing perception, action, memory, and learning as essential components of
an embodied agent. This framework is aligned with Friston's active inference
principle, offering a comprehensive approach to EAI development. Despite the
progress made in the field of AI, substantial challenges, such as the
formulation of a novel AI learning theory and the innovation of advanced
hardware, persist. Our discussion lays down a foundational guideline for future
Embodied AI research. Highlighting the importance of creating Embodied AI
agents capable of seamless communication, collaboration, and coexistence with
humans and other intelligent entities within real-world environments, we aim to
steer the AI community towards addressing the multifaceted challenges and
seizing the opportunities that lie ahead in the quest for AGI.
| [
{
"created": "Tue, 6 Feb 2024 09:11:20 GMT",
"version": "v1"
},
{
"created": "Tue, 28 May 2024 15:07:37 GMT",
"version": "v2"
}
] | "2024-05-29T00:00:00" | [
[
"Paolo",
"Giuseppe",
""
],
[
"Gonzalez-Billandon",
"Jonas",
""
],
[
"Kégl",
"Balázs",
""
]
] | 0no_new_dataset
|
2209.14262 | Donghua Wang | Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen | A Survey on Physical Adversarial Attack in Computer Vision | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Over the past decade, deep learning has revolutionized conventional tasks
that rely on hand-craft feature extraction with its strong feature learning
capability, leading to substantial enhancements in traditional tasks. However,
deep neural networks (DNNs) have been demonstrated to be vulnerable to
adversarial examples crafted by malicious tiny noise, which is imperceptible to
human observers but can make DNNs output the wrong result. Existing adversarial
attacks can be categorized into digital and physical adversarial attacks. The
former is designed to pursue strong attack performance in lab environments
while hardly remaining effective when applied to the physical world. In
contrast, the latter focus on developing physical deployable attacks, thus
exhibiting more robustness in complex physical environmental conditions.
Recently, with the increasing deployment of the DNN-based system in the real
world, strengthening the robustness of these systems is an emergency, while
exploring physical adversarial attacks exhaustively is the precondition. To
this end, this paper reviews the evolution of physical adversarial attacks
against DNN-based computer vision tasks, expecting to provide beneficial
information for developing stronger physical adversarial attacks. Specifically,
we first proposed a taxonomy to categorize the current physical adversarial
attacks and grouped them. Then, we discuss the existing physical attacks and
focus on the technique for improving the robustness of physical attacks under
complex physical environmental conditions. Finally, we discuss the issues of
the current physical adversarial attacks to be solved and give promising
directions.
| [
{
"created": "Wed, 28 Sep 2022 17:23:52 GMT",
"version": "v1"
},
{
"created": "Wed, 4 Jan 2023 16:17:42 GMT",
"version": "v2"
},
{
"created": "Mon, 18 Sep 2023 05:47:21 GMT",
"version": "v3"
}
] | "2023-09-19T00:00:00" | [
[
"Wang",
"Donghua",
""
],
[
"Yao",
"Wen",
""
],
[
"Jiang",
"Tingsong",
""
],
[
"Tang",
"Guijian",
""
],
[
"Chen",
"Xiaoqian",
""
]
] | 0no_new_dataset
|
2305.07571 | Harshad Khadilkar | Harshad Khadilkar | Supplementing Gradient-Based Reinforcement Learning with Simple
Evolutionary Ideas | 17 pages | null | null | null | cs.NE cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We present a simple, sample-efficient algorithm for introducing large but
directed learning steps in reinforcement learning (RL), through the use of
evolutionary operators. The methodology uses a population of RL agents training
with a common experience buffer, with occasional crossovers and mutations of
the agents in order to search efficiently through the policy space. Unlike
prior literature on combining evolutionary search (ES) with RL, this work does
not generate a distribution of agents from a common mean and covariance matrix.
Neither does it require the evaluation of the entire population of policies at
every time step. Instead, we focus on gradient-based training throughout the
life of every policy (individual), with a sparse amount of evolutionary
exploration. The resulting algorithm is shown to be robust to hyperparameter
variations. As a surprising corollary, we show that simply initialising and
training multiple RL agents with a common memory (with no further evolutionary
updates) outperforms several standard RL baselines.
| [
{
"created": "Wed, 10 May 2023 09:46:53 GMT",
"version": "v1"
}
] | "2023-05-15T00:00:00" | [
[
"Khadilkar",
"Harshad",
""
]
] | 0no_new_dataset
|
1812.00877 | Glib Kechyn | Glib Kechyn | Automatic lesion boundary detection in dermoscopy | null | null | null | null | cs.CV cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This manuscript addresses the problem of the automatic lesion boundary
detection in dermoscopy, using deep neural networks. An approach is based on
the adaptation of the U-net convolutional neural network with skip connections
for lesion boundary segmentation task. I hope this paper could serve, to some
extent, as an experiment of using deep convolutional networks in biomedical
segmentation task and as a guideline of the boundary detection benchmark,
inspiring further attempts and researches.
| [
{
"created": "Fri, 23 Nov 2018 22:36:36 GMT",
"version": "v1"
}
] | "2018-12-04T00:00:00" | [
[
"Kechyn",
"Glib",
""
]
] | 0no_new_dataset
|
cs/9712101 | null | J. Frank, P. Cheeseman, J. Stutz | When Gravity Fails: Local Search Topology | See http://www.jair.org/ for any accompanying files | Journal of Artificial Intelligence Research, Vol 7, (1997),
249-281 | null | null | cs.AI | null | Local search algorithms for combinatorial search problems frequently
encounter a sequence of states in which it is impossible to improve the value
of the objective function; moves through these regions, called plateau moves,
dominate the time spent in local search. We analyze and characterize plateaus
for three different classes of randomly generated Boolean Satisfiability
problems. We identify several interesting features of plateaus that impact the
performance of local search algorithms. We show that local minima tend to be
small but occasionally may be very large. We also show that local minima can be
escaped without unsatisfying a large number of clauses, but that systematically
searching for an escape route may be computationally expensive if the local
minimum is large. We show that plateaus with exits, called benches, tend to be
much larger than minima, and that some benches have very few exit states which
local search can use to escape. We show that the solutions (i.e., global
minima) of randomly generated problem instances form clusters, which behave
similarly to local minima. We revisit several enhancements of local search
algorithms and explain their performance in light of our results. Finally we
discuss strategies for creating the next generation of local search algorithms.
| [
{
"created": "Mon, 1 Dec 1997 00:00:00 GMT",
"version": "v1"
}
] | "2014-11-17T00:00:00" | [
[
"Frank",
"J.",
""
],
[
"Cheeseman",
"P.",
""
],
[
"Stutz",
"J.",
""
]
] | 0no_new_dataset
|
1911.06393 | Daniel Stoller | Daniel Stoller, Mi Tian, Sebastian Ewert, Simon Dixon | Seq-U-Net: A One-Dimensional Causal U-Net for Efficient Sequence
Modelling | Code available at https://github.com/f90/Seq-U-Net | null | null | null | cs.LG cs.SD eess.AS stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional neural networks (CNNs) with dilated filters such as the Wavenet
or the Temporal Convolutional Network (TCN) have shown good results in a
variety of sequence modelling tasks. However, efficiently modelling long-term
dependencies in these sequences is still challenging. Although the receptive
field of these models grows exponentially with the number of layers, computing
the convolutions over very long sequences of features in each layer is time and
memory-intensive, prohibiting the use of longer receptive fields in practice.
To increase efficiency, we make use of the "slow feature" hypothesis stating
that many features of interest are slowly varying over time. For this, we use a
U-Net architecture that computes features at multiple time-scales and adapt it
to our auto-regressive scenario by making convolutions causal. We apply our
model ("Seq-U-Net") to a variety of tasks including language and audio
generation. In comparison to TCN and Wavenet, our network consistently saves
memory and computation time, with speed-ups for training and inference of over
4x in the audio generation experiment in particular, while achieving a
comparable performance in all tasks.
| [
{
"created": "Thu, 14 Nov 2019 21:39:20 GMT",
"version": "v1"
}
] | "2019-11-18T00:00:00" | [
[
"Stoller",
"Daniel",
""
],
[
"Tian",
"Mi",
""
],
[
"Ewert",
"Sebastian",
""
],
[
"Dixon",
"Simon",
""
]
] | 0no_new_dataset
|
1712.04274 | Rick Fritschek | Rick Fritschek and Gerhard Wunder | On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap
Channel with a Helper: Achievable Schemes and Upper Bounds | 15 pages, submitted to IEEE Transactions on Information Forensics and
Security; Revision: changed the structure of the paper and improved
readability | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study deterministic approximations of the Gaussian two-user multiple
access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a
helper (G-WT-H). These approximations enable results beyond the recently shown
2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the
G-WT-H, respectively. While the s.d.o.f. were obtained by real interference
alignment, our approach uses signal-scale alignment. We show achievable schemes
which are independent of the rationality of the channel gains. Moreover, our
results can differentiate between channel strengths, in particular between both
users, and establishes secrecy rates dependent on this difference. We can show
that the resulting achievable secrecy rates tend to the s.d.o.f. for vanishing
channel gain differences. Moreover, we extend previous and develop new
techniques to prove general s.d.o.f. bounds for varying channel strengths and
show that our achievable schemes reach the bounds for certain channel gain
parameters. We believe that our analysis is the next step towards a
constant-gap analysis of the G-MAC-WT and the G-WT-H.
| [
{
"created": "Tue, 12 Dec 2017 13:04:56 GMT",
"version": "v1"
},
{
"created": "Mon, 23 Apr 2018 10:03:05 GMT",
"version": "v2"
}
] | "2018-04-24T00:00:00" | [
[
"Fritschek",
"Rick",
""
],
[
"Wunder",
"Gerhard",
""
]
] | 0no_new_dataset
|
2402.15929 | Isha Chaudhary | Isha Chaudhary, Vedaant V. Jain, Gagandeep Singh | QuaCer-C: Quantitative Certification of Knowledge Comprehension in LLMs | null | null | null | null | cs.AI cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) have demonstrated impressive performance on
several benchmarks. However, traditional studies do not provide formal
guarantees on the performance of LLMs. In this work, we propose a novel
certification framework for LLM, QuaCer-C, wherein we formally certify the
knowledge-comprehension capabilities of popular LLMs. Our certificates are
quantitative - they consist of high-confidence, tight bounds on the probability
that the target LLM gives the correct answer on any relevant knowledge
comprehension prompt. Our certificates for the Llama, Vicuna, and Mistral LLMs
indicate that the knowledge comprehension capability improves with an increase
in the number of parameters and that the Mistral model is less performant than
the rest in this evaluation.
| [
{
"created": "Sat, 24 Feb 2024 23:16:57 GMT",
"version": "v1"
}
] | "2024-02-27T00:00:00" | [
[
"Chaudhary",
"Isha",
""
],
[
"Jain",
"Vedaant V.",
""
],
[
"Singh",
"Gagandeep",
""
]
] | 0no_new_dataset
|
2406.07908 | Zheng Dai | Zheng Dai, David K Gifford | Ablation Based Counterfactuals | 11 pages, 7 figures, appendix included | null | null | null | cs.LG cs.AI stat.ML | http://creativecommons.org/licenses/by/4.0/ | Diffusion models are a class of generative models that generate high-quality
samples, but at present it is difficult to characterize how they depend upon
their training data. This difficulty raises scientific and regulatory
questions, and is a consequence of the complexity of diffusion models and their
sampling process. To analyze this dependence, we introduce Ablation Based
Counterfactuals (ABC), a method of performing counterfactual analysis that
relies on model ablation rather than model retraining. In our approach, we
train independent components of a model on different but overlapping splits of
a training set. These components are then combined into a single model, from
which the causal influence of any training sample can be removed by ablating a
combination of model components. We demonstrate how we can construct a model
like this using an ensemble of diffusion models. We then use this model to
study the limits of training data attribution by enumerating full
counterfactual landscapes, and show that single source attributability
diminishes with increasing training data size. Finally, we demonstrate the
existence of unattributable samples.
| [
{
"created": "Wed, 12 Jun 2024 06:22:51 GMT",
"version": "v1"
}
] | "2024-06-13T00:00:00" | [
[
"Dai",
"Zheng",
""
],
[
"Gifford",
"David K",
""
]
] | 0no_new_dataset
|
1804.02316 | Massimiliano De Leoni | Massimiliano de Leoni, Paolo Felli, and Marco Montali | A Holistic Approach for Soundness Verification of Decision-Aware Process
Models (extended version) | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The last decade has witnessed an increasing transformation in the design,
engineering, and mining of processes, moving from a pure control-flow
perspective to more integrated models where also data and decisions are
explicitly considered. This calls for methods and techniques able to ascertain
the correctness of such integrated models. Differently from previous
approaches, which mainly focused on the local interplay between decisions and
their corresponding outgoing branches, we introduce a holistic approach to
verify the end-to-end soundness of a Petri net-based process model, enriched
with case data and decisions. In particular, we present an effective,
implemented technique that verifies soundness by translating the input net into
a colored Petri net with bounded color domains, which can then be analyzed
using conventional tools. We prove correctness and termination of this
technique. In addition, we relate our contribution to recent results on
decision-aware soundness, showing that our approach can be readily applied
there.
| [
{
"created": "Fri, 6 Apr 2018 15:09:32 GMT",
"version": "v1"
}
] | "2018-04-09T00:00:00" | [
[
"de Leoni",
"Massimiliano",
""
],
[
"Felli",
"Paolo",
""
],
[
"Montali",
"Marco",
""
]
] | 0no_new_dataset
|
1506.08291 | Ananthanarayanan Chockalingam | T. Datta, H. S. Eshwaraiah, and A. Chockalingam | Generalized Space and Frequency Index Modulation | IEEE Trans. on Vehicular Technology, accepted | null | 10.1109/TVT.2015.2451095 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unlike in conventional modulation where information bits are conveyed only
through symbols from modulation alphabets defined in the complex plane (e.g.,
quadrature amplitude modulation (QAM), phase shift keying (PSK)), in index
modulation (IM), additional information bits are conveyed through indices of
certain transmit entities that get involved in the transmission. Transmit
antennas in multi-antenna systems and subcarriers in multi-carrier systems are
examples of such transmit entities that can be used to convey additional
information bits through indexing. In this paper, we introduce {\em generalized
space and frequency index modulation}, where the indices of active transmit
antennas and subcarriers convey information bits. We first introduce index
modulation in the spatial domain, referred to as generalized spatial index
modulation (GSIM). For GSIM, where bits are indexed only in the spatial domain,
we derive the expression for achievable rate as well as easy-to-compute upper
and lower bounds on this rate. We show that the achievable rate in GSIM can be
more than that in spatial multiplexing, and analytically establish the
condition under which this can happen. It is noted that GSIM achieves this
higher rate using fewer transmit radio frequency (RF) chains compared to
spatial multiplexing. We also propose a Gibbs sampling based detection
algorithm for GSIM and show that GSIM can achieve better bit error rate (BER)
performance than spatial multiplexing. For generalized space-frequency index
modulation (GSFIM), where bits are encoded through indexing in both active
antennas as well as subcarriers, we derive the achievable rate expression.
Numerical results show that GSFIM can achieve higher rates compared to
conventional MIMO-OFDM. Also, BER results show the potential for GSFIM
performing better than MIMO-OFDM.
| [
{
"created": "Sat, 27 Jun 2015 13:31:58 GMT",
"version": "v1"
}
] | "2016-11-18T00:00:00" | [
[
"Datta",
"T.",
""
],
[
"Eshwaraiah",
"H. S.",
""
],
[
"Chockalingam",
"A.",
""
]
] | 0no_new_dataset
|
2002.11385 | Xingbo Fu | Xingbo Fu, Feng Gao, Jiang Wu | When Do Drivers Concentrate? Attention-based Driver Behavior Modeling
With Deep Reinforcement Learning | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Driver distraction a significant risk to driving safety. Apart from spatial
domain, research on temporal inattention is also necessary. This paper aims to
figure out the pattern of drivers' temporal attention allocation. In this
paper, we propose an actor-critic method - Attention-based Twin Delayed Deep
Deterministic policy gradient (ATD3) algorithm to approximate a driver' s
action according to observations and measure the driver' s attention allocation
for consecutive time steps in car-following model. Considering reaction time,
we construct the attention mechanism in the actor network to capture temporal
dependencies of consecutive observations. In the critic network, we employ Twin
Delayed Deep Deterministic policy gradient algorithm (TD3) to address
overestimated value estimates persisting in the actor-critic algorithm. We
conduct experiments on real-world vehicle trajectory datasets and show that the
accuracy of our proposed approach outperforms seven baseline algorithms.
Moreover, the results reveal that the attention of the drivers in smooth
vehicles is uniformly distributed in previous observations while they keep
their attention to recent observations when sudden decreases of relative speeds
occur. This study is the first contribution to drivers' temporal attention and
provides scientific support for safety measures in transportation systems from
the perspective of data mining.
| [
{
"created": "Wed, 26 Feb 2020 09:56:36 GMT",
"version": "v1"
},
{
"created": "Sun, 7 Jun 2020 06:09:55 GMT",
"version": "v2"
}
] | "2020-06-09T00:00:00" | [
[
"Fu",
"Xingbo",
""
],
[
"Gao",
"Feng",
""
],
[
"Wu",
"Jiang",
""
]
] | 1new_dataset
|
2003.12319 | Xavier Porte | Louis Andreoli, Xavier Porte, St\'ephane Chr\'etien, Maxime Jacquot,
Laurent Larger and Daniel Brunner | Boolean learning under noise-perturbations in hardware neural networks | 8 pages, 5 figures | Nanophotonics (published online ahead of print), 20200171 (2020) | 10.1515/nanoph-2020-0171 | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A high efficiency hardware integration of neural networks benefits from
realizing nonlinearity, network connectivity and learning fully in a physical
substrate. Multiple systems have recently implemented some or all of these
operations, yet the focus was placed on addressing technological challenges.
Fundamental questions regarding learning in hardware neural networks remain
largely unexplored. Noise in particular is unavoidable in such architectures,
and here we investigate its interaction with a learning algorithm using an
opto-electronic recurrent neural network. We find that noise strongly modifies
the system's path during convergence, and surprisingly fully decorrelates the
final readout weight matrices. This highlights the importance of understanding
architecture, noise and learning algorithm as interacting players, and
therefore identifies the need for mathematical tools for noisy, analogue system
optimization.
| [
{
"created": "Fri, 27 Mar 2020 10:36:03 GMT",
"version": "v1"
},
{
"created": "Fri, 25 Jun 2021 09:41:21 GMT",
"version": "v2"
}
] | "2021-06-28T00:00:00" | [
[
"Andreoli",
"Louis",
""
],
[
"Porte",
"Xavier",
""
],
[
"Chrétien",
"Stéphane",
""
],
[
"Jacquot",
"Maxime",
""
],
[
"Larger",
"Laurent",
""
],
[
"Brunner",
"Daniel",
""
]
] | 0no_new_dataset
|
2308.10604 | Dongwook Lee Ph.D. | Dongwook Lee, Wonjun Choi, Seohyung Lee, ByungIn Yoo, Eunho Yang,
Seongju Hwang | BackTrack: Robust template update via Backward Tracking of candidate
template | 14 pages, 7 figures | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Variations of target appearance such as deformations, illumination variance,
occlusion, etc., are the major challenges of visual object tracking that
negatively impact the performance of a tracker. An effective method to tackle
these challenges is template update, which updates the template to reflect the
change of appearance in the target object during tracking. However, with
template updates, inadequate quality of new templates or inappropriate timing
of updates may induce a model drift problem, which severely degrades the
tracking performance. Here, we propose BackTrack, a robust and reliable method
to quantify the confidence of the candidate template by backward tracking it on
the past frames. Based on the confidence score of candidates from BackTrack, we
can update the template with a reliable candidate at the right time while
rejecting unreliable candidates. BackTrack is a generic template update scheme
and is applicable to any template-based trackers. Extensive experiments on
various tracking benchmarks verify the effectiveness of BackTrack over existing
template update algorithms, as it achieves SOTA performance on various tracking
benchmarks.
| [
{
"created": "Mon, 21 Aug 2023 10:00:59 GMT",
"version": "v1"
}
] | "2023-08-22T00:00:00" | [
[
"Lee",
"Dongwook",
""
],
[
"Choi",
"Wonjun",
""
],
[
"Lee",
"Seohyung",
""
],
[
"Yoo",
"ByungIn",
""
],
[
"Yang",
"Eunho",
""
],
[
"Hwang",
"Seongju",
""
]
] | 0no_new_dataset
|
2403.03822 | Jianing Hao | Zezheng Feng, Fang Zhu, Hongjun Wang, Jianing Hao, ShuangHua Yang, Wei
Zeng, Huamin Qu | HoLens: A Visual Analytics Design for Higher-order Movement Modeling and
Visualization | 20 pages, 18 figures, is accepted by computational visual media
journal | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Higher-order patterns reveal sequential multistep state transitions, which
are usually superior to origin-destination analysis, which depicts only
first-order geospatial movement patterns. Conventional methods for higher-order
movement modeling first construct a directed acyclic graph (DAG) of movements,
then extract higher-order patterns from the DAG. However, DAG-based methods
heavily rely on the identification of movement keypoints that are challenging
for sparse movements and fail to consider the temporal variants that are
critical for movements in urban environments. To overcome the limitations, we
propose HoLens, a novel approach for modeling and visualizing higher-order
movement patterns in the context of an urban environment. HoLens mainly makes
twofold contributions: first, we design an auto-adaptive movement aggregation
algorithm that self-organizes movements hierarchically by considering spatial
proximity, contextual information, and temporal variability; second, we develop
an interactive visual analytics interface consisting of well-established
visualization techniques, including the H-Flow for visualizing the higher-order
patterns on the map and the higher-order state sequence chart for representing
the higher-order state transitions. Two real-world case studies manifest that
the method can adaptively aggregate the data and exhibit the process of how to
explore the higher-order patterns by HoLens. We also demonstrate our approach's
feasibility, usability, and effectiveness through an expert interview with
three domain experts.
| [
{
"created": "Wed, 6 Mar 2024 16:08:51 GMT",
"version": "v1"
}
] | "2024-03-07T00:00:00" | [
[
"Feng",
"Zezheng",
""
],
[
"Zhu",
"Fang",
""
],
[
"Wang",
"Hongjun",
""
],
[
"Hao",
"Jianing",
""
],
[
"Yang",
"ShuangHua",
""
],
[
"Zeng",
"Wei",
""
],
[
"Qu",
"Huamin",
""
]
] | 1new_dataset
|
1007.0638 | Debotosh Bhattacharjee | Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak
Kumar Basu, and Mahantapas Kundu | Human Face Recognition using Line Features | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we investigate a novel approach to handle the challenges of face
recognition, which includes rotation, scale, occlusion, illumination etc. Here,
we have used thermal face images as those are capable to minimize the affect of
illumination changes and occlusion due to moustache, beards, adornments etc.
The proposed approach registers the training and testing thermal face images in
polar coordinate, which is capable to handle complicacies introduced by scaling
and rotation. Line features are extracted from thermal polar images and feature
vectors are constructed using these line. Feature vectors thus obtained passes
through principal component analysis (PCA) for the dimensionality reduction of
feature vectors. Finally, the images projected into eigenspace are classified
using a multi-layer perceptron. In the experiments we have used Object Tracking
and Classification Beyond Visible Spectrum (OTCBVS) database. Experimental
results show that the proposed approach significantly improves the verification
and identification performance and the success rate is 99.25%.
| [
{
"created": "Mon, 5 Jul 2010 08:10:30 GMT",
"version": "v1"
}
] | "2010-07-06T00:00:00" | [
[
"Bhowmik",
"Mrinal Kanti",
""
],
[
"Bhattacharjee",
"Debotosh",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"Dipak Kumar",
""
],
[
"Kundu",
"Mahantapas",
""
]
] | 1new_dataset
|
2201.07821 | Zhongyi Lin | Zhongyi Lin and Louis Feng and Ehsan K. Ardestani and Jaewon Lee and
John Lundell and Changkyu Kim and Arun Kejariwal and John D. Owens | Building a Performance Model for Deep Learning Recommendation Model
Training on GPUs | 11 pages, 11 figures. Appears in the 29th IEEE International
Conference on High-Performance Computing, Data, and Analytics (HiPC 2022) | null | null | null | cs.LG cs.PF | http://creativecommons.org/licenses/by/4.0/ | We devise a performance model for GPU training of Deep Learning
Recommendation Models (DLRM), whose GPU utilization is low compared to other
well-optimized CV and NLP models. We show that both the device active time (the
sum of kernel runtimes) but also the device idle time are important components
of the overall device time. We therefore tackle them separately by (1) flexibly
adopting heuristic-based and ML-based kernel performance models for operators
that dominate the device active time, and (2) categorizing operator overheads
into five types to determine quantitatively their contribution to the device
active time. Combining these two parts, we propose a critical-path-based
algorithm to predict the per-batch training time of DLRM by traversing its
execution graph. We achieve less than 10% geometric mean average error (GMAE)
in all kernel performance modeling, and 4.61% and 7.96% geomean errors for GPU
active time and overall E2E per-batch training time prediction with overheads
from individual workloads, respectively. A slight increase of 2.19% incurred in
E2E prediction error with shared overheads across workloads suggests the
feasibility of using shared overheads in large-scale prediction. We show that
our general performance model not only achieves low prediction error on DLRM,
which has highly customized configurations and is dominated by multiple factors
but also yields comparable accuracy on other compute-bound ML models targeted
by most previous methods. Using this performance model and graph-level data and
task dependency analysis, we show our system can provide more general
model-system co-design than previous methods.
| [
{
"created": "Wed, 19 Jan 2022 19:05:42 GMT",
"version": "v1"
},
{
"created": "Wed, 16 Nov 2022 23:25:25 GMT",
"version": "v2"
}
] | "2022-11-18T00:00:00" | [
[
"Lin",
"Zhongyi",
""
],
[
"Feng",
"Louis",
""
],
[
"Ardestani",
"Ehsan K.",
""
],
[
"Lee",
"Jaewon",
""
],
[
"Lundell",
"John",
""
],
[
"Kim",
"Changkyu",
""
],
[
"Kejariwal",
"Arun",
""
],
[
"Owens",
"John D.",
""
]
] | 0no_new_dataset
|
1911.08816 | Yuki Ueda | Dong Wang and Yuki Ueda and Raula Gaikovina Kula and Takashi Ishio and
Kenichi Matsumoto | Can We Benchmark Code Review Studies? A Systematic Mapping Study of
Methodology, Dataset, and Metric | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Code Review (CR) is the cornerstone for software quality assurance and a
crucial practice for software development. As CR research matures, it can be
difficult to keep track of the best practices and state-of-the-art in
methodology, dataset, and metric. This paper investigates the potential of
benchmarking by collecting methodology, dataset, and metric of CR studies. A
systematic mapping study was conducted. A total of 112 studies from 19,847
papers published in high-impact venues between the years 2011 and 2019 were
selected and analyzed. First, we find that empirical evaluation is the most
common methodology (65% of papers), with solution and experience being the
least common methodology. Second, we highlight 50% of papers that use the
quantitative method or mixed-method have the potential for replicability.
Third, we identify 457 metrics that are grouped into sixteen core metric sets,
applied to nine Software Engineering topics, showing different research topics
tend to use specific metric sets. We conclude that at this stage, we cannot
benchmark CR studies. Nevertheless, a common benchmark will facilitate new
researchers, including experts from other fields, to innovate new techniques
and build on top of already established methodologies. A full replication is
available at https://naist-se.github.io/code-review/.
| [
{
"created": "Wed, 20 Nov 2019 10:50:29 GMT",
"version": "v1"
},
{
"created": "Tue, 13 Apr 2021 04:45:47 GMT",
"version": "v2"
}
] | "2021-04-14T00:00:00" | [
[
"Wang",
"Dong",
""
],
[
"Ueda",
"Yuki",
""
],
[
"Kula",
"Raula Gaikovina",
""
],
[
"Ishio",
"Takashi",
""
],
[
"Matsumoto",
"Kenichi",
""
]
] | 1new_dataset
|
2403.16005 | Yucheng Suo | Yucheng Suo, Fan Ma, Linchao Zhu, Yi Yang | Knowledge-Enhanced Dual-stream Zero-shot Composed Image Retrieval | CVPR 2024 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the zero-shot Composed Image Retrieval (ZS-CIR) task, which is to
retrieve the target image given a reference image and a description without
training on the triplet datasets. Previous works generate pseudo-word tokens by
projecting the reference image features to the text embedding space. However,
they focus on the global visual representation, ignoring the representation of
detailed attributes, e.g., color, object number and layout. To address this
challenge, we propose a Knowledge-Enhanced Dual-stream zero-shot composed image
retrieval framework (KEDs). KEDs implicitly models the attributes of the
reference images by incorporating a database. The database enriches the
pseudo-word tokens by providing relevant images and captions, emphasizing
shared attribute information in various aspects. In this way, KEDs recognizes
the reference image from diverse perspectives. Moreover, KEDs adopts an extra
stream that aligns pseudo-word tokens with textual concepts, leveraging
pseudo-triplets mined from image-text pairs. The pseudo-word tokens generated
in this stream are explicitly aligned with fine-grained semantics in the text
embedding space. Extensive experiments on widely used benchmarks, i.e.
ImageNet-R, COCO object, Fashion-IQ and CIRR, show that KEDs outperforms
previous zero-shot composed image retrieval methods.
| [
{
"created": "Sun, 24 Mar 2024 04:23:56 GMT",
"version": "v1"
}
] | "2024-03-26T00:00:00" | [
[
"Suo",
"Yucheng",
""
],
[
"Ma",
"Fan",
""
],
[
"Zhu",
"Linchao",
""
],
[
"Yang",
"Yi",
""
]
] | 0no_new_dataset
|
2309.09467 | Michael Mislove | Younesse Kaddar and Sam Staton | A model of stochastic memoization and name generation in probabilistic
programming: categorical semantics via monads on presheaf categories | To be published in the MFPS 2023 Proceedings as part of the
Electronic Notes in Theoretical Informatics and Computer Science (ENTICS)
series | Electronic Notes in Theoretical Informatics and Computer Science,
Volume 3 - Proceedings of MFPS XXXIX (November 23, 2023) entics:12291 | 10.46298/entics.12291 | null | cs.PL | http://creativecommons.org/licenses/by-sa/4.0/ | Stochastic memoization is a higher-order construct of probabilistic
programming languages that is key in Bayesian nonparametrics, a modular
approach that allows us to extend models beyond their parametric limitations
and compose them in an elegant and principled manner. Stochastic memoization is
simple and useful in practice, but semantically elusive, particularly regarding
dataflow transformations. As the naive implementation resorts to the state
monad, which is not commutative, it is not clear if stochastic memoization
preserves the dataflow property -- i.e., whether we can reorder the lines of a
program without changing its semantics, provided the dataflow graph is
preserved. In this paper, we give an operational and categorical semantics to
stochastic memoization and name generation in the context of a minimal
probabilistic programming language, for a restricted class of functions. Our
contribution is a first model of stochastic memoization of constant Bernoulli
functions with a non-enumerable type, which validates data flow
transformations, bridging the gap between traditional probability theory and
higher-order probability models. Our model uses a presheaf category and a novel
probability monad on it.
| [
{
"created": "Mon, 18 Sep 2023 04:02:03 GMT",
"version": "v1"
},
{
"created": "Tue, 21 Nov 2023 14:28:35 GMT",
"version": "v2"
}
] | "2024-02-14T00:00:00" | [
[
"Kaddar",
"Younesse",
""
],
[
"Staton",
"Sam",
""
]
] | 0no_new_dataset
|
1812.04199 | Haruna Isah | Dev Shah, Haruna Isah, Farhana Zulkernine | Predicting the Effects of News Sentiments on the Stock Market | 4 pages | null | 10.1109/BigData.2018.8621884 | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stock market forecasting is very important in the planning of business
activities. Stock price prediction has attracted many researchers in multiple
disciplines including computer science, statistics, economics, finance, and
operations research. Recent studies have shown that the vast amount of online
information in the public domain such as Wikipedia usage pattern, news stories
from the mainstream media, and social media discussions can have an observable
effect on investors opinions towards financial markets. The reliability of the
computational models on stock market prediction is important as it is very
sensitive to the economy and can directly lead to financial loss. In this
paper, we retrieved, extracted, and analyzed the effects of news sentiments on
the stock market. Our main contributions include the development of a sentiment
analysis dictionary for the financial sector, the development of a
dictionary-based sentiment analysis model, and the evaluation of the model for
gauging the effects of news sentiments on stocks for the pharmaceutical market.
Using only news sentiments, we achieved a directional accuracy of 70.59% in
predicting the trends in short-term stock price movement.
| [
{
"created": "Tue, 11 Dec 2018 03:06:02 GMT",
"version": "v1"
}
] | "2019-07-23T00:00:00" | [
[
"Shah",
"Dev",
""
],
[
"Isah",
"Haruna",
""
],
[
"Zulkernine",
"Farhana",
""
]
] | 0no_new_dataset
|
2205.15608 | Wei Mao | Wei Mao and Miaomiao Liu and Mathieu Salzmann | Weakly-supervised Action Transition Learning for Stochastic Human Motion
Prediction | CVPR2022 (Oral) | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the task of action-driven stochastic human motion prediction,
which aims to predict multiple plausible future motions given a sequence of
action labels and a short motion history. This differs from existing works,
which predict motions that either do not respect any specific action category,
or follow a single action label. In particular, addressing this task requires
tackling two challenges: The transitions between the different actions must be
smooth; the length of the predicted motion depends on the action sequence and
varies significantly across samples. As we cannot realistically expect training
data to cover sufficiently diverse action transitions and motion lengths, we
propose an effective training strategy consisting of combining multiple motions
from different actions and introducing a weak form of supervision to encourage
smooth transitions. We then design a VAE-based model conditioned on both the
observed motion and the action label sequence, allowing us to generate multiple
plausible future motions of varying length. We illustrate the generality of our
approach by exploring its use with two different temporal encoding models,
namely RNNs and Transformers. Our approach outperforms baseline models
constructed by adapting state-of-the-art single action-conditioned motion
generation methods and stochastic human motion prediction approaches to our new
task of action-driven stochastic motion prediction. Our code is available at
https://github.com/wei-mao-2019/WAT.
| [
{
"created": "Tue, 31 May 2022 08:38:07 GMT",
"version": "v1"
}
] | "2022-06-01T00:00:00" | [
[
"Mao",
"Wei",
""
],
[
"Liu",
"Miaomiao",
""
],
[
"Salzmann",
"Mathieu",
""
]
] | 0no_new_dataset
|
2002.07784 | Julian Portmann | Davin Choo, Christoph Grunau, Julian Portmann, V\'aclav Rozho\v{n} | k-means++: few more steps yield constant approximation | null | null | null | null | cs.DS cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The k-means++ algorithm of Arthur and Vassilvitskii (SODA 2007) is a
state-of-the-art algorithm for solving the k-means clustering problem and is
known to give an O(log k)-approximation in expectation. Recently, Lattanzi and
Sohler (ICML 2019) proposed augmenting k-means++ with O(k log log k) local
search steps to yield a constant approximation (in expectation) to the k-means
clustering problem. In this paper, we improve their analysis to show that, for
any arbitrarily small constant $\eps > 0$, with only $\eps k$ additional local
search steps, one can achieve a constant approximation guarantee (with high
probability in k), resolving an open problem in their paper.
| [
{
"created": "Tue, 18 Feb 2020 18:28:25 GMT",
"version": "v1"
}
] | "2020-02-19T00:00:00" | [
[
"Choo",
"Davin",
""
],
[
"Grunau",
"Christoph",
""
],
[
"Portmann",
"Julian",
""
],
[
"Rozhoň",
"Václav",
""
]
] | 0no_new_dataset
|
1008.1338 | Zeeshan Ahmed Mr. | Zeeshan Ahmed | Intelligent Human Machine Interface Design for Advanced Product Life
Cycle Management Systems | In International Conference on Frontiers of Information Technology,
ACM - FIT09, Session 5: Computational Science/Artificial Intelligence, 16-18
December, 2009 | ACM Special Interest Group on Artificial Intelligence (SIGART),
2009 | 10.1145/1838002.1838058 | null | cs.HC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Designing and implementing an intelligent and user friendly human machine
interface for any kind of software or hardware oriented application is always
be a challenging task for the designers and developers because it is very
difficult to understand the psychology of the user, nature of the work and best
suit of the environment. This research paper is basically about to propose an
intelligent, flexible and user friendly machine interface for Product Life
Cycle Management products or PDM Systems since studies show that usability and
human computer interaction issues are a major cause of acceptance problems
introducing or using such systems. Going into details of the proposition, we
present prototype implementations about theme based on design requirements,
designed designs and technologies involved for the development of human machine
interface.
| [
{
"created": "Sat, 7 Aug 2010 12:58:13 GMT",
"version": "v1"
}
] | "2010-08-26T00:00:00" | [
[
"Ahmed",
"Zeeshan",
""
]
] | 0no_new_dataset
|
2209.04075 | Sagar Dasgupta | Finley Walden, Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam | Improving the Environmental Perception of Autonomous Vehicles using Deep
Learning-based Audio Classification | null | null | null | null | cs.SD cs.AI eess.AS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Sense of hearing is crucial for autonomous vehicles (AVs) to better perceive
its surrounding environment. Although visual sensors of an AV, such as camera,
lidar, and radar, help to see its surrounding environment, an AV cannot see
beyond those sensors line of sight. On the other hand, an AV s sense of hearing
cannot be obstructed by line of sight. For example, an AV can identify an
emergency vehicle s siren through audio classification even though the
emergency vehicle is not within the line of sight of the AV. Thus, auditory
perception is complementary to the camera, lidar, and radar-based perception
systems. This paper presents a deep learning-based robust audio classification
framework aiming to achieve improved environmental perception for AVs. The
presented framework leverages a deep Convolution Neural Network (CNN) to
classify different audio classes. UrbanSound8k, an urban environment dataset,
is used to train and test the developed framework. Seven audio classes i.e.,
air conditioner, car horn, children playing, dog bark, engine idling, gunshot,
and siren, are identified from the UrbanSound8k dataset because of their
relevancy related to AVs. Our framework can classify different audio classes
with 97.82% accuracy. Moreover, the audio classification accuracies with all
ten classes are presented, which proves that our framework performed better in
the case of AV-related sounds compared to the existing audio classification
frameworks.
| [
{
"created": "Fri, 9 Sep 2022 01:23:13 GMT",
"version": "v1"
}
] | "2022-09-12T00:00:00" | [
[
"Walden",
"Finley",
""
],
[
"Dasgupta",
"Sagar",
""
],
[
"Rahman",
"Mizanur",
""
],
[
"Islam",
"Mhafuzul",
""
]
] | 1new_dataset
|
2402.15043 | Zhuohao Yu | Zhuohao Yu, Chang Gao, Wenjin Yao, Yidong Wang, Wei Ye, Jindong Wang,
Xing Xie, Yue Zhang, Shikun Zhang | KIEval: A Knowledge-grounded Interactive Evaluation Framework for Large
Language Models | Accepted to ACL 2024 (main conference); 19 pages, 5 figures, 19
tables, code is available at: https://github.com/zhuohaoyu/KIEval | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Automatic evaluation methods for large language models (LLMs) are hindered by
data contamination, leading to inflated assessments of their effectiveness.
Existing strategies, which aim to detect contaminated texts, focus on
quantifying contamination status instead of accurately gauging model
performance. In this paper, we introduce KIEval, a Knowledge-grounded
Interactive Evaluation framework, which incorporates an LLM-powered
"interactor" role for the first time to accomplish a dynamic
contamination-resilient evaluation. Starting with a question in a conventional
LLM benchmark involving domain-specific knowledge, KIEval utilizes dynamically
generated, multi-round, and knowledge-focused dialogues to determine whether a
model's response is merely a recall of benchmark answers or demonstrates a deep
comprehension to apply knowledge in more complex conversations. Extensive
experiments on seven leading LLMs across five datasets validate KIEval's
effectiveness and generalization. We also reveal that data contamination brings
no contribution or even negative effect to models' real-world applicability and
understanding, and existing contamination detection methods for LLMs can only
identify contamination in pre-training but not during supervised fine-tuning.
| [
{
"created": "Fri, 23 Feb 2024 01:30:39 GMT",
"version": "v1"
},
{
"created": "Mon, 3 Jun 2024 06:02:39 GMT",
"version": "v2"
}
] | "2024-06-04T00:00:00" | [
[
"Yu",
"Zhuohao",
""
],
[
"Gao",
"Chang",
""
],
[
"Yao",
"Wenjin",
""
],
[
"Wang",
"Yidong",
""
],
[
"Ye",
"Wei",
""
],
[
"Wang",
"Jindong",
""
],
[
"Xie",
"Xing",
""
],
[
"Zhang",
"Yue",
""
],
[
"Zhang",
"Shikun",
""
]
] | 0no_new_dataset
|
2110.07872 | Qi Bao | Qi Bao, Zhongzhi Zhang, Haibin Kan | Role Similarity Metric Based on Spanning Rooted Forest | 10 pages, 5 figures | null | null | null | cs.SI cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a fundamental issue in network analysis, structural node similarity has
received much attention in academia and is adopted in a wide range of
applications. Among these proposed structural node similarity measures, role
similarity stands out because of satisfying several axiomatic properties
including automorphism conformation. Existing role similarity metrics cannot
handle top-k queries on large real-world networks due to the high time and
space cost. In this paper, we propose a new role similarity metric, namely
\textsf{ForestSim}. We prove that \textsf{ForestSim} is an admissible role
similarity metric and devise the corresponding top-k similarity search
algorithm, namely \textsf{ForestSimSearch}, which is able to process a top-k
query in $O(k)$ time once the precomputation is finished. Moreover, we speed up
the precomputation by using a fast approximate algorithm to compute the
diagonal entries of the forest matrix, which reduces the time and space
complexity of the precomputation to
$O(\epsilon^{-2}m\log^5{n}\log{\frac{1}{\epsilon}})$ and $O(m\log^3{n})$,
respectively. Finally, we conduct extensive experiments on 26 real-world
networks. The results show that \textsf{ForestSim} works efficiently on
million-scale networks and achieves comparable performance to the state-of-art
methods.
| [
{
"created": "Fri, 15 Oct 2021 05:50:10 GMT",
"version": "v1"
},
{
"created": "Mon, 1 Apr 2024 04:51:37 GMT",
"version": "v2"
}
] | "2024-04-02T00:00:00" | [
[
"Bao",
"Qi",
""
],
[
"Zhang",
"Zhongzhi",
""
],
[
"Kan",
"Haibin",
""
]
] | 0no_new_dataset
|
2212.14530 | Khimya Khetarpal | Khimya Khetarpal, Claire Vernade, Brendan O'Donoghue, Satinder Singh,
Tom Zahavy | POMRL: No-Regret Learning-to-Plan with Increasing Horizons | 24 pages, 6 figures | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of planning under model uncertainty in an online
meta-reinforcement learning (RL) setting where an agent is presented with a
sequence of related tasks with limited interactions per task. The agent can use
its experience in each task and across tasks to estimate both the transition
model and the distribution over tasks. We propose an algorithm to meta-learn
the underlying structure across tasks, utilize it to plan in each task, and
upper-bound the regret of the planning loss. Our bound suggests that the
average regret over tasks decreases as the number of tasks increases and as the
tasks are more similar. In the classical single-task setting, it is known that
the planning horizon should depend on the estimated model's accuracy, that is,
on the number of samples within task. We generalize this finding to meta-RL and
study this dependence of planning horizons on the number of tasks. Based on our
theoretical findings, we derive heuristics for selecting slowly increasing
discount factors, and we validate its significance empirically.
| [
{
"created": "Fri, 30 Dec 2022 03:09:45 GMT",
"version": "v1"
}
] | "2023-01-02T00:00:00" | [
[
"Khetarpal",
"Khimya",
""
],
[
"Vernade",
"Claire",
""
],
[
"O'Donoghue",
"Brendan",
""
],
[
"Singh",
"Satinder",
""
],
[
"Zahavy",
"Tom",
""
]
] | 0no_new_dataset
|
0904.1752 | Fran\c{c}ois Nicolas | Julien Cassaigne and Francois Nicolas | On polynomial growth functions of D0L-systems | Not intended to be published | null | null | null | cs.DM cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to prove that every polynomial function that maps
the natural integers to the positive integers is the growth function of some
D0L-system.
| [
{
"created": "Sat, 11 Apr 2009 11:52:41 GMT",
"version": "v1"
},
{
"created": "Wed, 12 Aug 2009 14:34:22 GMT",
"version": "v2"
},
{
"created": "Tue, 3 Jan 2012 21:52:10 GMT",
"version": "v3"
}
] | "2012-01-05T00:00:00" | [
[
"Cassaigne",
"Julien",
""
],
[
"Nicolas",
"Francois",
""
]
] | 0no_new_dataset
|
2008.12197 | Ke Mei | Ke Mei, Chuang Zhu, Jiaqi Zou, Shanghang Zhang | Instance Adaptive Self-Training for Unsupervised Domain Adaptation | ECCV 2020 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The divergence between labeled training data and unlabeled testing data is a
significant challenge for recent deep learning models. Unsupervised domain
adaptation (UDA) attempts to solve such a problem. Recent works show that
self-training is a powerful approach to UDA. However, existing methods have
difficulty in balancing scalability and performance. In this paper, we propose
an instance adaptive self-training framework for UDA on the task of semantic
segmentation. To effectively improve the quality of pseudo-labels, we develop a
novel pseudo-label generation strategy with an instance adaptive selector.
Besides, we propose the region-guided regularization to smooth the pseudo-label
region and sharpen the non-pseudo-label region. Our method is so concise and
efficient that it is easy to be generalized to other unsupervised domain
adaptation methods. Experiments on 'GTA5 to Cityscapes' and 'SYNTHIA to
Cityscapes' demonstrate the superior performance of our approach compared with
the state-of-the-art methods.
| [
{
"created": "Thu, 27 Aug 2020 15:50:27 GMT",
"version": "v1"
}
] | "2020-08-28T00:00:00" | [
[
"Mei",
"Ke",
""
],
[
"Zhu",
"Chuang",
""
],
[
"Zou",
"Jiaqi",
""
],
[
"Zhang",
"Shanghang",
""
]
] | 0no_new_dataset
|
2307.07683 | Hany Farid | Sarah Barrington, Romit Barua, Gautham Koorma, Hany Farid | Single and Multi-Speaker Cloned Voice Detection: From Perceptual to
Learned Features | S. Barrington, R. Barua, G. Koorma, and Hany Farid. Single and
Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features.
Workshop on Image Forensics and Security, Nuremberg, Germany, 2023 | null | null | null | cs.SD cs.CL eess.AS | http://creativecommons.org/licenses/by/4.0/ | Synthetic-voice cloning technologies have seen significant advances in recent
years, giving rise to a range of potential harms. From small- and large-scale
financial fraud to disinformation campaigns, the need for reliable methods to
differentiate real and synthesized voices is imperative. We describe three
techniques for differentiating a real from a cloned voice designed to
impersonate a specific person. These three approaches differ in their feature
extraction stage with low-dimensional perceptual features offering high
interpretability but lower accuracy, to generic spectral features, and
end-to-end learned features offering less interpretability but higher accuracy.
We show the efficacy of these approaches when trained on a single speaker's
voice and when trained on multiple voices. The learned features consistently
yield an equal error rate between 0% and 4%, and are reasonably robust to
adversarial laundering.
| [
{
"created": "Sat, 15 Jul 2023 02:20:26 GMT",
"version": "v1"
},
{
"created": "Wed, 27 Sep 2023 16:50:15 GMT",
"version": "v2"
}
] | "2023-09-28T00:00:00" | [
[
"Barrington",
"Sarah",
""
],
[
"Barua",
"Romit",
""
],
[
"Koorma",
"Gautham",
""
],
[
"Farid",
"Hany",
""
]
] | 0no_new_dataset
|
2110.15460 | Scott Davidoff | Thomas Chan, Jeremy Argueta, Jazlyn Armendariz, Allison Graham, Sarah
Hwang, Basak Ramaswamy, So Young Kim, Scott Davidoff | Human-Computer Interaction Glow Up: Examining Operational Trust and
Intention Towards Mars Autonomous Systems | 9 pages, 1 figure, to appear in Proceedings of the 2021 American
Institute of Aeronautics and Astronautics ASCEND Conference (AIAA ASCEND
2021) | null | 10.2514/6.2021-4117 | null | cs.RO cs.HC | http://creativecommons.org/licenses/by/4.0/ | Tactful coordination on earth between hundreds of operators from diverse
disciplines and backgrounds is needed to ensure that Martian rovers have a high
likelihood of achieving their science goals while enduring the harsh
environment of the red planet. The operations team includes many individuals,
each with independent and overlapping objectives, working to decide what to
execute on the Mars surface during the next planning period. The team must work
together to understand each other's objectives and constraints within a fixed
time period, often requiring frequent revision. This study examines the
challenges faced during Mars surface operations, from high-level science
objectives to formulating a valid, safe, and optimal activity plan that is
ready to be radiated to the rover. Through this examination, we aim to
illuminate how planning intent can be formulated and effectively communicated
to future spacecrafts that will become more and more autonomous. Our findings
reveal the intricate nature of human-to-human interactions that require a large
array of soft skills and core competencies to communicate concurrently with
science and engineering teams during plan formulation. Additionally, our
findings exposed significant challenges in eliciting planning intent from
operators, which will intensify in the future, as operators on the ground
asynchronously co-operate the rover with the on board autonomy. Building a
marvellous robot and landing it onto the Mars surface are remarkable feats
-however, ensuring that scientists can get the best out of the mission is an
ongoing challenge and will not cease to be a difficult task with increased
autonomy.
| [
{
"created": "Thu, 28 Oct 2021 22:55:23 GMT",
"version": "v1"
}
] | "2021-11-05T00:00:00" | [
[
"Chan",
"Thomas",
""
],
[
"Argueta",
"Jeremy",
""
],
[
"Armendariz",
"Jazlyn",
""
],
[
"Graham",
"Allison",
""
],
[
"Hwang",
"Sarah",
""
],
[
"Ramaswamy",
"Basak",
""
],
[
"Kim",
"So Young",
""
],
[
"Davidoff",
"Scott",
""
]
] | 0no_new_dataset
|
2310.04955 | Jiazhi Li | Jiazhi Li, Mahyar Khayatkhoei, Jiageng Zhu, Hanchen Xie, Mohamed E.
Hussein, Wael AbdAlmageed | Information-Theoretic Bounds on The Removal of Attribute-Specific Bias
From Neural Networks | 15 pages, 4 figures, 3 tables. To appear in Algorithmic Fairness
through the Lens of Time Workshop at NeurIPS 2023 | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Ensuring a neural network is not relying on protected attributes (e.g., race,
sex, age) for predictions is crucial in advancing fair and trustworthy AI.
While several promising methods for removing attribute bias in neural networks
have been proposed, their limitations remain under-explored. In this work, we
mathematically and empirically reveal an important limitation of attribute bias
removal methods in presence of strong bias. Specifically, we derive a general
non-vacuous information-theoretical upper bound on the performance of any
attribute bias removal method in terms of the bias strength. We provide
extensive experiments on synthetic, image, and census datasets to verify the
theoretical bound and its consequences in practice. Our findings show that
existing attribute bias removal methods are effective only when the inherent
bias in the dataset is relatively weak, thus cautioning against the use of
these methods in smaller datasets where strong attribute bias can occur, and
advocating the need for methods that can overcome this limitation.
| [
{
"created": "Sun, 8 Oct 2023 00:39:11 GMT",
"version": "v1"
},
{
"created": "Thu, 16 Nov 2023 17:57:45 GMT",
"version": "v2"
}
] | "2023-11-17T00:00:00" | [
[
"Li",
"Jiazhi",
""
],
[
"Khayatkhoei",
"Mahyar",
""
],
[
"Zhu",
"Jiageng",
""
],
[
"Xie",
"Hanchen",
""
],
[
"Hussein",
"Mohamed E.",
""
],
[
"AbdAlmageed",
"Wael",
""
]
] | 1new_dataset
|
1902.04779 | Lin Yang | Lin F. Yang, Mengdi Wang | Sample-Optimal Parametric Q-Learning Using Linearly Additive Features | Accepted to ICML, 2019 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a Markov decision process (MDP) that admits a set of state-action
features, which can linearly express the process's probabilistic transition
model. We propose a parametric Q-learning algorithm that finds an
approximate-optimal policy using a sample size proportional to the feature
dimension $K$ and invariant with respect to the size of the state space. To
further improve its sample efficiency, we exploit the monotonicity property and
intrinsic noise structure of the Bellman operator, provided the existence of
anchor state-actions that imply implicit non-negativity in the feature space.
We augment the algorithm using techniques of variance reduction, monotonicity
preservation, and confidence bounds. It is proved to find a policy which is
$\epsilon$-optimal from any initial state with high probability using
$\widetilde{O}(K/\epsilon^2(1-\gamma)^3)$ sample transitions for arbitrarily
large-scale MDP with a discount factor $\gamma\in(0,1)$. A matching
information-theoretical lower bound is proved, confirming the sample optimality
of the proposed method with respect to all parameters (up to polylog factors).
| [
{
"created": "Wed, 13 Feb 2019 08:26:47 GMT",
"version": "v1"
},
{
"created": "Wed, 5 Jun 2019 20:20:23 GMT",
"version": "v2"
}
] | "2019-06-07T00:00:00" | [
[
"Yang",
"Lin F.",
""
],
[
"Wang",
"Mengdi",
""
]
] | 0no_new_dataset
|
2005.09436 | Siamak Parhizkari | Siamak Parhizkari, Mohammad Bagher Menhaj, Atena Sajedin | A cognitive based Intrusion detection system | 17 pages, 6 figures | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Intrusion detection is one of the important mechanisms that provide computer
networks security. Due to an increase in attacks and growing dependence upon
other fields such as medicine, commerce, and engineering, offering services
over a network and maintaining network security have become a significant
issue. The purpose of Intrusion Detection Systems (IDS) is to develop models
which are able to distinguish regular communications from abnormal ones, and
take the necessary actions. Among different methods in this field, Artificial
Neural Networks (ANNs) have been widely used. However, ANN-based IDS
encountered two main problems: low detection precision and weak detection
stability. To overcome these problems, this paper proposes a new approach based
on Deep Neural Network ans Support vector machine classifier, which inspired by
"divide and conquer" philosophy. The proposed model predicts the attacks with
better accuracy for intrusion detection rather similar methods. For our
empirical study, we were taking advantage of the KDD99 dataset. Our
experimental results suggest that the new approach enhance to 95.4 percent
classification accuracy.
| [
{
"created": "Tue, 19 May 2020 13:30:30 GMT",
"version": "v1"
},
{
"created": "Sun, 12 Jun 2022 07:14:11 GMT",
"version": "v2"
}
] | "2022-06-14T00:00:00" | [
[
"Parhizkari",
"Siamak",
""
],
[
"Menhaj",
"Mohammad Bagher",
""
],
[
"Sajedin",
"Atena",
""
]
] | 1new_dataset
|
2104.01290 | Jonathan Dunn | Jonathan Dunn and Tom Coupe and Benjamin Adams | Measuring Linguistic Diversity During COVID-19 | null | Proceedings of the 4th Workshop on NLP and Computational Social
Science (2020) | 10.18653/v1/P17 | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Computational measures of linguistic diversity help us understand the
linguistic landscape using digital language data. The contribution of this
paper is to calibrate measures of linguistic diversity using restrictions on
international travel resulting from the COVID-19 pandemic. Previous work has
mapped the distribution of languages using geo-referenced social media and web
data. The goal, however, has been to describe these corpora themselves rather
than to make inferences about underlying populations. This paper shows that a
difference-in-differences method based on the Herfindahl-Hirschman Index can
identify the bias in digital corpora that is introduced by non-local
populations. These methods tell us where significant changes have taken place
and whether this leads to increased or decreased diversity. This is an
important step in aligning digital corpora like social media with the
real-world populations that have produced them.
| [
{
"created": "Sat, 3 Apr 2021 02:09:37 GMT",
"version": "v1"
}
] | "2021-04-06T00:00:00" | [
[
"Dunn",
"Jonathan",
""
],
[
"Coupe",
"Tom",
""
],
[
"Adams",
"Benjamin",
""
]
] | 0no_new_dataset
|
2105.13695 | Ming Sun | Ming Sun, Haoxuan Dou, Baopu Li, Lei Cui, Junjie Yan, Wanli Ouyang | AutoSampling: Search for Effective Data Sampling Schedules | Automl for sampling firstly without any assumpation | ICML 2021 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data sampling acts as a pivotal role in training deep learning models.
However, an effective sampling schedule is difficult to learn due to the
inherently high dimension of parameters in learning the sampling schedule. In
this paper, we propose an AutoSampling method to automatically learn sampling
schedules for model training, which consists of the multi-exploitation step
aiming for optimal local sampling schedules and the exploration step for the
ideal sampling distribution. More specifically, we achieve sampling schedule
search with shortened exploitation cycle to provide enough supervision. In
addition, we periodically estimate the sampling distribution from the learned
sampling schedules and perturb it to search in the distribution space. The
combination of two searches allows us to learn a robust sampling schedule. We
apply our AutoSampling method to a variety of image classification tasks
illustrating the effectiveness of the proposed method.
| [
{
"created": "Fri, 28 May 2021 09:39:41 GMT",
"version": "v1"
}
] | "2021-05-31T00:00:00" | [
[
"Sun",
"Ming",
""
],
[
"Dou",
"Haoxuan",
""
],
[
"Li",
"Baopu",
""
],
[
"Cui",
"Lei",
""
],
[
"Yan",
"Junjie",
""
],
[
"Ouyang",
"Wanli",
""
]
] | 0no_new_dataset
|
2106.04221 | Florian Buettner | Yinchong Yang, Florian Buettner | Multi-output Gaussian Processes for Uncertainty-aware Recommender
Systems | Published at UAI 2021 | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Recommender systems are often designed based on a collaborative filtering
approach, where user preferences are predicted by modelling interactions
between users and items. Many common approaches to solve the collaborative
filtering task are based on learning representations of users and items,
including simple matrix factorization, Gaussian process latent variable models,
and neural-network based embeddings. While matrix factorization approaches fail
to model nonlinear relations, neural networks can potentially capture such
complex relations with unprecedented predictive power and are highly scalable.
However, neither of them is able to model predictive uncertainties. In
contrast, Gaussian Process based models can generate a predictive distribution,
but cannot scale to large amounts of data. In this manuscript, we propose a
novel approach combining the representation learning paradigm of collaborative
filtering with multi-output Gaussian processes in a joint framework to generate
uncertainty-aware recommendations. We introduce an efficient strategy for model
training and inference, resulting in a model that scales to very large and
sparse datasets and achieves competitive performance in terms of classical
metrics quantifying the reconstruction error. In addition to accurately
predicting user preferences, our model also provides meaningful uncertainty
estimates about that prediction.
| [
{
"created": "Tue, 8 Jun 2021 10:01:14 GMT",
"version": "v1"
},
{
"created": "Fri, 8 Oct 2021 15:53:08 GMT",
"version": "v2"
}
] | "2021-10-11T00:00:00" | [
[
"Yang",
"Yinchong",
""
],
[
"Buettner",
"Florian",
""
]
] | 0no_new_dataset
|
2402.07529 | Haoyu Li | Haoyu Li, Yuchen Xu, Jiayi Chen, Rohit Dwivedula, Wenfei Wu, Keqiang
He, Aditya Akella, Daehyeok Kim | Accelerating Distributed Deep Learning using Lossless Homomorphic
Compression | null | null | null | null | cs.DC cs.DS cs.LG cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As deep neural networks (DNNs) grow in complexity and size, the resultant
increase in communication overhead during distributed training has become a
significant bottleneck, challenging the scalability of distributed training
systems. Existing solutions, while aiming to mitigate this bottleneck through
worker-level compression and in-network aggregation, fall short due to their
inability to efficiently reconcile the trade-offs between compression
effectiveness and computational overhead, hindering overall performance and
scalability. In this paper, we introduce a novel compression algorithm that
effectively merges worker-level compression with in-network aggregation. Our
solution is both homomorphic, allowing for efficient in-network aggregation
without CPU/GPU processing, and lossless, ensuring no compromise on training
accuracy. Theoretically optimal in compression and computational efficiency,
our approach is empirically validated across diverse DNN models such as NCF,
LSTM, VGG19, and BERT-base, showing up to a 6.33$\times$ improvement in
aggregation throughput and a 3.74$\times$ increase in per-iteration training
speed.
| [
{
"created": "Mon, 12 Feb 2024 09:57:47 GMT",
"version": "v1"
}
] | "2024-02-13T00:00:00" | [
[
"Li",
"Haoyu",
""
],
[
"Xu",
"Yuchen",
""
],
[
"Chen",
"Jiayi",
""
],
[
"Dwivedula",
"Rohit",
""
],
[
"Wu",
"Wenfei",
""
],
[
"He",
"Keqiang",
""
],
[
"Akella",
"Aditya",
""
],
[
"Kim",
"Daehyeok",
""
]
] | 0no_new_dataset
|
1603.03610 | Mark-Jan Nederhof | Mark-Jan Nederhof | A short proof that $O_2$ is an MCFL | 9 pages | null | null | null | cs.FL cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new proof that $O_2$ is a multiple context-free language. It
contrasts with a recent proof by Salvati (2015) in its avoidance of concepts
that seem specific to two-dimensional geometry, such as the complex exponential
function. Our simple proof creates realistic prospects of widening the results
to higher dimensions. This finding is of central importance to the relation
between extreme free word order and classes of grammars used to describe the
syntax of natural language.
| [
{
"created": "Fri, 11 Mar 2016 12:32:29 GMT",
"version": "v1"
}
] | "2016-03-14T00:00:00" | [
[
"Nederhof",
"Mark-Jan",
""
]
] | 0no_new_dataset
|
2311.06697 | Vasilisa Bashlovkina | Vasilisa Bashlovkina, Zhaobin Kuang, Riley Matthews, Edward Clifford,
Yennie Jun, William W. Cohen, Simon Baumgartner | Trusted Source Alignment in Large Language Models | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Large language models (LLMs) are trained on web-scale corpora that inevitably
include contradictory factual information from sources of varying reliability.
In this paper, we propose measuring an LLM property called trusted source
alignment (TSA): the model's propensity to align with content produced by
trusted publishers in the face of uncertainty or controversy. We present
FactCheckQA, a TSA evaluation dataset based on a corpus of fact checking
articles. We describe a simple protocol for evaluating TSA and offer a detailed
analysis of design considerations including response extraction, claim
contextualization, and bias in prompt formulation. Applying the protocol to
PaLM-2, we find that as we scale up the model size, the model performance on
FactCheckQA improves from near-random to up to 80% balanced accuracy in
aligning with trusted sources.
| [
{
"created": "Sun, 12 Nov 2023 00:25:25 GMT",
"version": "v1"
}
] | "2023-11-14T00:00:00" | [
[
"Bashlovkina",
"Vasilisa",
""
],
[
"Kuang",
"Zhaobin",
""
],
[
"Matthews",
"Riley",
""
],
[
"Clifford",
"Edward",
""
],
[
"Jun",
"Yennie",
""
],
[
"Cohen",
"William W.",
""
],
[
"Baumgartner",
"Simon",
""
]
] | 0no_new_dataset
|