id
stringlengths
9
10
submitter
stringlengths
5
46
authors
stringlengths
5
1.31k
title
stringlengths
8
223
comments
stringlengths
2
574
journal-ref
stringclasses
587 values
doi
stringclasses
784 values
report-no
stringclasses
75 values
categories
stringlengths
5
72
license
stringclasses
9 values
abstract
stringlengths
82
3.31k
versions
listlengths
1
15
update_date
unknown
authors_parsed
sequencelengths
1
76
label
class label
2 classes
1107.1161
Jean-Luc Marichal
Miguel Couceiro, Jean-Luc Marichal, Tam\'as Waldhauser
Locally monotone Boolean and pseudo-Boolean functions
null
Discrete Applied Mathematics 160 (12) (2012) 1651-1660
10.1016/j.dam.2012.03.006
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose local versions of monotonicity for Boolean and pseudo-Boolean functions: say that a pseudo-Boolean (Boolean) function is p-locally monotone if none of its partial derivatives changes in sign on tuples which differ in less than p positions. As it turns out, this parameterized notion provides a hierarchy of monotonicities for pseudo-Boolean (Boolean) functions. Local monotonicities are shown to be tightly related to lattice counterparts of classical partial derivatives via the notion of permutable derivatives. More precisely, p-locally monotone functions are shown to have p-permutable lattice derivatives and, in the case of symmetric functions, these two notions coincide. We provide further results relating these two notions, and present a classification of p-locally monotone functions, as well as of functions having p-permutable derivatives, in terms of certain forbidden "sections", i.e., functions which can be obtained by substituting constants for variables. This description is made explicit in the special case when p=2.
[ { "created": "Wed, 6 Jul 2011 15:30:35 GMT", "version": "v1" }, { "created": "Wed, 16 May 2012 11:47:52 GMT", "version": "v2" } ]
"2012-05-17T00:00:00"
[ [ "Couceiro", "Miguel", "" ], [ "Marichal", "Jean-Luc", "" ], [ "Waldhauser", "Tamás", "" ] ]
0no_new_dataset
1308.1971
Ji Zhu
Ji Zhu and Bruce Hajek
Tree dynamics for peer-to-peer streaming
null
null
null
null
cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an asynchronous distributed algorithm to manage multiple trees for peer-to-peer streaming in a flow level model. It is assumed that videos are cut into substreams, with or without source coding, to be distributed to all nodes. The algorithm guarantees that each node receives sufficiently many substreams within delay logarithmic in the number of peers. The algorithm works by constantly updating the topology so that each substream is distributed through trees to as many nodes as possible without interference. Competition among trees for limited upload capacity is managed so that both coverage and balance are achieved. The algorithm is robust in that it efficiently eliminates cycles and maintains tree structures in a distributed way. The algorithm favors nodes with higher degree, so it not only works for live streaming and video on demand, but also in the case a few nodes with large degree act as servers and other nodes act as clients. A proof of convergence of the algorithm is given assuming instantaneous update of depth information, and for the case of a single tree it is shown that the convergence time is stochastically tightly bounded by a small constant times the log of the number of nodes. These theoretical results are complemented by simulations showing that the algorithm works well even when most assumptions for the theoretical tractability do not hold.
[ { "created": "Thu, 8 Aug 2013 20:38:25 GMT", "version": "v1" } ]
"2013-08-12T00:00:00"
[ [ "Zhu", "Ji", "" ], [ "Hajek", "Bruce", "" ] ]
0no_new_dataset
2310.00576
Xiaotian Han
Hongye Jin, Xiaotian Han, Jingfeng Yang, Zhimeng Jiang, Chia-Yuan Chang, Xia Hu
GrowLength: Accelerating LLMs Pretraining by Progressively Growing Training Length
null
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The evolving sophistication and intricacies of Large Language Models (LLMs) yield unprecedented advancements, yet they simultaneously demand considerable computational resources and incur significant costs. To alleviate these challenges, this paper introduces a novel, simple, and effective method named ``\growlength'' to accelerate the pretraining process of LLMs. Our method progressively increases the training length throughout the pretraining phase, thereby mitigating computational costs and enhancing efficiency. For instance, it begins with a sequence length of 128 and progressively extends to 4096. This approach enables models to process a larger number of tokens within limited time frames, potentially boosting their performance. In other words, the efficiency gain is derived from training with shorter sequences optimizing the utilization of resources. Our extensive experiments with various state-of-the-art LLMs have revealed that models trained using our method not only converge more swiftly but also exhibit superior performance metrics compared to those trained with existing methods. Furthermore, our method for LLMs pretraining acceleration does not require any additional engineering efforts, making it a practical solution in the realm of LLMs.
[ { "created": "Sun, 1 Oct 2023 05:25:24 GMT", "version": "v1" } ]
"2023-10-03T00:00:00"
[ [ "Jin", "Hongye", "" ], [ "Han", "Xiaotian", "" ], [ "Yang", "Jingfeng", "" ], [ "Jiang", "Zhimeng", "" ], [ "Chang", "Chia-Yuan", "" ], [ "Hu", "Xia", "" ] ]
0no_new_dataset
1511.03524
Buddhadeb Sau
B. Sau and S. Mukhopadhyaya and K. Mukhopadhyaya
MAINT: Localization of Mobile Sensors with Energy Control
null
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Localization is an important issue for Wireless Sensor Networks (WSN). A mobile sensor may change its position rapidly and thus require localization calls frequently. A localization may require network wide information and increase traffic over the network. It dissipates valuable energy for message communication. Thus localization is very costly. The control of the number of localization calls may save energy consumption, as it is rather expensive. To reduce the frequency of localization calls for a mobile sensor, we propose a technique that involves \textit{Mobility Aware Interpolation} (MAINT) for position estimation. It controls the number of localizations which gives much better result than the existing localization control schemes using mobility aware extrapolation. The proposed method involves very low arithmetic computation overheads. We find analytical expressions for the expected error in position estimation. A parameter, the time interval, has been introduced to externally control the energy dissipation. Simulation studies are carried out to compare the performances of the proposed method with some existing localization control schemes as well as the theoretical results. The simulation results shows that the expected error at any point of time may be computed from this expression. We have seen that constant error limit can be maintained increasing the time period of localization proportional to rate of change of direction of its motion. Increasing time period, the energy may be saved with a stable error limit.
[ { "created": "Tue, 10 Nov 2015 07:22:10 GMT", "version": "v1" } ]
"2015-11-12T00:00:00"
[ [ "Sau", "B.", "" ], [ "Mukhopadhyaya", "S.", "" ], [ "Mukhopadhyaya", "K.", "" ] ]
0no_new_dataset
2002.00252
Kevin Vermeulen
Kevin Vermeulen, Burim Ljuma, Vamsi Addanki, Matthieu Gouel, Olivier Fourmaux, Timur Friedman and Reza Rejaie
Alias Resolution Based on ICMP Rate Limiting
Preprint to appear in Proceedings of Passive and Active Measurement (PAM 2020) Conference, Eugene, OR, March 2020
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alias resolution techniques (e.g., Midar) associate, mostly through active measurement, a set of IP addresses as belonging to a common router. These techniques rely on distinct router features that can serve as a signature. Their applicability is affected by router support of the features and the robustness of the signature. This paper presents a new alias resolution tool called Limited Ltd. that exploits ICMP rate limiting, a feature that is increasingly supported by modern routers that has not previously been used for alias resolution. It sends ICMP probes toward target interfaces in order to trigger rate limiting, extracting features from the probe reply loss traces. It uses a machine learning classifier to designate pairs of interfaces as aliases. We describe the details of the algorithm used by Limited Ltd. and illustrate its feasibility and accuracy. Limited Ltd. not only is the first tool that can perform alias resolution on IPv6 routers that do not generate monotonically increasing fragmentation IDs (e.g., Juniper routers) but it also complements the state-of-the-art techniques for IPv4 alias resolution. All of our code and the collected dataset are publicly available.
[ { "created": "Sat, 1 Feb 2020 18:11:19 GMT", "version": "v1" } ]
"2020-02-04T00:00:00"
[ [ "Vermeulen", "Kevin", "" ], [ "Ljuma", "Burim", "" ], [ "Addanki", "Vamsi", "" ], [ "Gouel", "Matthieu", "" ], [ "Fourmaux", "Olivier", "" ], [ "Friedman", "Timur", "" ], [ "Rejaie", "Reza", "" ] ]
1new_dataset
2009.11405
Chen Zhao
Chen Zhao, Feng Chen
Rank-Based Multi-task Learning for Fair Regression
2019 IEEE International Conference on Data Mining (ICDM)
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we develop a novel fairness learning approach for multi-task regression models based on a biased training dataset, using a popular rank-based non-parametric independence test, i.e., Mann Whitney U statistic, for measuring the dependency between target variable and protected variables. To solve this learning problem efficiently, we first reformulate the problem as a new non-convex optimization problem, in which a non-convex constraint is defined based on group-wise ranking functions of individual objects. We then develop an efficient model-training algorithm based on the framework of non-convex alternating direction method of multipliers (NC-ADMM), in which one of the main challenges is to implement an efficient projection oracle to the preceding non-convex set defined based on ranking functions. Through the extensive experiments on both synthetic and real-world datasets, we validated the out-performance of our new approach against several state-of-the-art competitive methods on several popular metrics relevant to fairness learning.
[ { "created": "Wed, 23 Sep 2020 22:32:57 GMT", "version": "v1" } ]
"2020-09-25T00:00:00"
[ [ "Zhao", "Chen", "" ], [ "Chen", "Feng", "" ] ]
1new_dataset
1807.00313
Andrii Striuk
Maryna Rassovytska and Andrii Striuk
Mechanical Engineers Training in Using Cloud and Mobile Services in Professional Activity
null
CEUR Workshop Proceedings Vol. 1844 (2017) 348-359
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of this article is to identify mobile and cloud services of mechanical engineers professional activity and the principles of their use in higher technical education. There have been defined the criteria for evaluation of the tools for edu-cational and professional activities. On the basis of this criteria, more than 30 var-ious cloud services and mobile applications have been analyzed. The analysis has shown that the use of Autodesk cloud services and their integration with cloud services Google is appropriate for professional and practical training of special-ists in applied mechanics, and it promotes an effective development of mechanical engineers ICT competence. The learning tools integrated system model was pro-posed.
[ { "created": "Sun, 1 Jul 2018 11:11:12 GMT", "version": "v1" } ]
"2018-07-03T00:00:00"
[ [ "Rassovytska", "Maryna", "" ], [ "Striuk", "Andrii", "" ] ]
0no_new_dataset
1511.03088
Isabelle Augenstein
Leon Derczynski and Isabelle Augenstein and Kalina Bontcheva
USFD: Twitter NER with Drift Compensation and Linked Data
Paper in ACL anthology: https://aclweb.org/anthology/W/W15/W15-4306.bib
Proceedings of the ACL Workshop on Noisy User-generated Text (2015), pp. 48--53
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a pilot NER system for Twitter, comprising the USFD system entry to the W-NUT 2015 NER shared task. The goal is to correctly label entities in a tweet dataset, using an inventory of ten types. We employ structured learning, drawing on gazetteers taken from Linked Data, and on unsupervised clustering features, and attempting to compensate for stylistic and topic drift - a key challenge in social media text. Our result is competitive; we provide an analysis of the components of our methodology, and an examination of the target dataset in the context of this task.
[ { "created": "Tue, 10 Nov 2015 12:34:47 GMT", "version": "v1" } ]
"2015-11-11T00:00:00"
[ [ "Derczynski", "Leon", "" ], [ "Augenstein", "Isabelle", "" ], [ "Bontcheva", "Kalina", "" ] ]
1new_dataset
2204.08651
Atoosa Parsa
Atoosa Parsa, Dong Wang, Corey S. O'Hern, Mark D. Shattuck, Rebecca Kramer-Bottiglio, Josh Bongard
Evolving Programmable Computational Metamaterials
Accepted to the Genetic and Evolutionary Computation Conference 2022 (GECCO '22)
null
10.1145/3512290.3528861
null
cs.ET cs.NE
http://creativecommons.org/licenses/by-nc-nd/4.0/
Granular metamaterials are a promising choice for the realization of mechanical computing devices. As preliminary evidence of this, we demonstrate here how to embed Boolean logic gates (AND and XOR) into a granular metamaterial by evolving where particular grains are placed in the material. Our results confirm the existence of gradients of increasing "AND-ness" and "XOR-ness" within the space of possible materials that can be followed by evolutionary search. We measure the computational functionality of a material by probing how it transforms bits encoded as vibrations with zero or non-zero amplitude. We compared the evolution of materials built from mass-contrasting particles and materials built from stiffness-contrasting particles, and found that the latter were more evolvable. We believe this work may pave the way toward evolutionary design of increasingly sophisticated, programmable, and computationally dense metamaterials with certain advantages over more traditional computational substrates.
[ { "created": "Tue, 19 Apr 2022 04:09:53 GMT", "version": "v1" }, { "created": "Sat, 4 Jun 2022 03:38:59 GMT", "version": "v2" } ]
"2022-06-07T00:00:00"
[ [ "Parsa", "Atoosa", "" ], [ "Wang", "Dong", "" ], [ "O'Hern", "Corey S.", "" ], [ "Shattuck", "Mark D.", "" ], [ "Kramer-Bottiglio", "Rebecca", "" ], [ "Bongard", "Josh", "" ] ]
0no_new_dataset
1801.00185
Piero Mazzarisi
Piero Mazzarisi, Paolo Barucca, Fabrizio Lillo, Daniele Tantari
A dynamic network model with persistent links and node-specific latent variables, with an application to the interbank market
19 pages, 6 figures
null
null
null
cs.SI physics.soc-ph q-fin.ST stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a dynamic network model where two mechanisms control the probability of a link between two nodes: (i) the existence or absence of this link in the past, and (ii) node-specific latent variables (dynamic fitnesses) describing the propensity of each node to create links. Assuming a Markov dynamics for both mechanisms, we propose an Expectation-Maximization algorithm for model estimation and inference of the latent variables. The estimated parameters and fitnesses can be used to forecast the presence of a link in the future. We apply our methodology to the e-MID interbank network for which the two linkage mechanisms are associated with two different trading behaviors in the process of network formation, namely preferential trading and trading driven by node-specific characteristics. The empirical results allow to recognise preferential lending in the interbank market and indicate how a method that does not account for time-varying network topologies tends to overestimate preferential linkage.
[ { "created": "Sat, 30 Dec 2017 19:57:35 GMT", "version": "v1" } ]
"2018-01-03T00:00:00"
[ [ "Mazzarisi", "Piero", "" ], [ "Barucca", "Paolo", "" ], [ "Lillo", "Fabrizio", "" ], [ "Tantari", "Daniele", "" ] ]
0no_new_dataset
1909.10750
Salman Sherin
Javaria Imtiaz, Salman Sherin, Muhammad Uzair khan, Muhammad Zohaib Iqbal
A Systematic Literature Review of Test Breakage Prevention and Repair Techniques
null
Information and Software Technology 113 (2019): 1-19
null
null
cs.SE
http://creativecommons.org/publicdomain/zero/1.0/
Context: When an application evolves, some of the developed test cases break. Discarding broken test cases causes a significant waste of effort and leads to test suites that are less effective and have lower coverage. Test repair approaches evolve test suites along with applications by repairing the broken test cases. Objective: Numerous studies are published on test repair approaches every year. It is important to summarise and consolidate the existing knowledge in the area to provide directions to researchers and practitioners. This research work provides a systematic literature review in the area of test case repair and breakage prevention, aiming to guide researchers and practitioners in the field of software testing. Method: We followed the standard protocol for conducting a systematic literature review. First, research goals were defined using the Goal Question Metric (GQM). Then we formulate research questions corresponding to each goal. Finally, metrics are extracted from the included papers. Based on the defined selection criteria a final set of 41 primary studies are included for analysis. Results: The selection process resulted in 5 journal papers, and 36 conference papers. We present a taxonomy that lists the causes of test case breakages extracted from the literature. We found that only four proposed test repair tools are publicly available. Most studies evaluated their approaches on open-source case studies. Conclusion: There is significant room for future research on test repair techniques. Despite the positive trend of evaluating approaches on large scale open-source studies, there is a clear lack of results from studies done in a real industrial context. Few tools are publicly available which lowers the potential of adaption by industry practitioners.
[ { "created": "Tue, 24 Sep 2019 07:59:40 GMT", "version": "v1" } ]
"2019-09-25T00:00:00"
[ [ "Imtiaz", "Javaria", "" ], [ "Sherin", "Salman", "" ], [ "khan", "Muhammad Uzair", "" ], [ "Iqbal", "Muhammad Zohaib", "" ] ]
0no_new_dataset
0909.1774
Georgia Koutrika
Georgia Koutrika (Stanford University), Benjamin Bercovitz (Stanford University), Robert Ikeda (Stanford University), Filip Kaliszan (Stanford University), Henry Liou (Stanford University), Zahra Mohammadi Zadeh (Stanford University), Hector Garcia-Molina (Stanford University)
Social Systems: Can we Do More Than Just Poke Friends?
CIDR 2009
null
null
null
cs.DB cs.CY
http://creativecommons.org/licenses/by/3.0/
Social sites have become extremely popular among users but have they attracted equal attention from the research community? Are they good only for simple tasks, such as tagging and poking friends? Do they present any new or interesting research challenges? In this paper, we describe the insights we have obtained implementing CourseRank, a course evaluation and planning social system. We argue that more attention should be given to social sites like ours and that there are many challenges (though not the traditional DBMS ones) that should be addressed by our community.
[ { "created": "Wed, 9 Sep 2009 18:10:01 GMT", "version": "v1" } ]
"2009-09-15T00:00:00"
[ [ "Koutrika", "Georgia", "", "Stanford University" ], [ "Bercovitz", "Benjamin", "", "Stanford\n University" ], [ "Ikeda", "Robert", "", "Stanford University" ], [ "Kaliszan", "Filip", "", "Stanford\n University" ], [ "Liou", "Henry", "", "Stanford University" ], [ "Zadeh", "Zahra Mohammadi", "", "Stanford University" ], [ "Garcia-Molina", "Hector", "", "Stanford University" ] ]
0no_new_dataset
2308.05734
Haohe Liu
Haohe Liu, Yi Yuan, Xubo Liu, Xinhao Mei, Qiuqiang Kong, Qiao Tian, Yuping Wang, Wenwu Wang, Yuxuan Wang, Mark D. Plumbley
AudioLDM 2: Learning Holistic Audio Generation with Self-supervised Pretraining
Accepted by IEEE/ACM Transactions on Audio, Speech and Language Processing. Project page is https://audioldm.github.io/audioldm2
null
null
null
cs.SD cs.AI cs.MM eess.AS eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although audio generation shares commonalities across different types of audio, such as speech, music, and sound effects, designing models for each type requires careful consideration of specific objectives and biases that can significantly differ from those of other types. To bring us closer to a unified perspective of audio generation, this paper proposes a framework that utilizes the same learning method for speech, music, and sound effect generation. Our framework introduces a general representation of audio, called "language of audio" (LOA). Any audio can be translated into LOA based on AudioMAE, a self-supervised pre-trained representation learning model. In the generation process, we translate any modalities into LOA by using a GPT-2 model, and we perform self-supervised audio generation learning with a latent diffusion model conditioned on LOA. The proposed framework naturally brings advantages such as in-context learning abilities and reusable self-supervised pretrained AudioMAE and latent diffusion models. Experiments on the major benchmarks of text-to-audio, text-to-music, and text-to-speech demonstrate state-of-the-art or competitive performance against previous approaches. Our code, pretrained model, and demo are available at https://audioldm.github.io/audioldm2.
[ { "created": "Thu, 10 Aug 2023 17:55:13 GMT", "version": "v1" }, { "created": "Sat, 9 Sep 2023 15:33:19 GMT", "version": "v2" }, { "created": "Sat, 11 May 2024 11:24:51 GMT", "version": "v3" } ]
"2024-05-14T00:00:00"
[ [ "Liu", "Haohe", "" ], [ "Yuan", "Yi", "" ], [ "Liu", "Xubo", "" ], [ "Mei", "Xinhao", "" ], [ "Kong", "Qiuqiang", "" ], [ "Tian", "Qiao", "" ], [ "Wang", "Yuping", "" ], [ "Wang", "Wenwu", "" ], [ "Wang", "Yuxuan", "" ], [ "Plumbley", "Mark D.", "" ] ]
0no_new_dataset
1406.1881
Leonid Pishchulin
Leonid Pishchulin, Mykhaylo Andriluka, Bernt Schiele
Fine-grained Activity Recognition with Holistic and Pose based Features
12 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Holistic methods based on dense trajectories are currently the de facto standard for recognition of human activities in video. Whether holistic representations will sustain or will be superseded by higher level video encoding in terms of body pose and motion is the subject of an ongoing debate. In this paper we aim to clarify the underlying factors responsible for good performance of holistic and pose-based representations. To that end we build on our recent dataset leveraging the existing taxonomy of human activities. This dataset includes 24,920 video snippets covering 410 human activities in total. Our analysis reveals that holistic and pose-based methods are highly complementary, and their performance varies significantly depending on the activity. We find that holistic methods are mostly affected by the number and speed of trajectories, whereas pose-based methods are mostly influenced by viewpoint of the person. We observe striking performance differences across activities: for certain activities results with pose-based features are more than twice as accurate compared to holistic features, and vice versa. The best performing approach in our comparison is based on the combination of holistic and pose-based approaches, which again underlines their complementarity.
[ { "created": "Sat, 7 Jun 2014 10:07:24 GMT", "version": "v1" }, { "created": "Mon, 28 Jul 2014 14:55:23 GMT", "version": "v2" } ]
"2014-07-29T00:00:00"
[ [ "Pishchulin", "Leonid", "" ], [ "Andriluka", "Mykhaylo", "" ], [ "Schiele", "Bernt", "" ] ]
1new_dataset
2109.03034
Jianhao Shen
Jianhao Shen, Yichun Yin, Lin Li, Lifeng Shang, Xin Jiang, Ming Zhang, Qun Liu
Generate & Rank: A Multi-task Framework for Math Word Problems
Findings of EMNLP2021
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Math word problem (MWP) is a challenging and critical task in natural language processing. Many recent studies formalize MWP as a generation task and have adopted sequence-to-sequence models to transform problem descriptions to mathematical expressions. However, mathematical expressions are prone to minor mistakes while the generation objective does not explicitly handle such mistakes. To address this limitation, we devise a new ranking task for MWP and propose Generate & Rank, a multi-task framework based on a generative pre-trained language model. By joint training with generation and ranking, the model learns from its own mistakes and is able to distinguish between correct and incorrect expressions. Meanwhile, we perform tree-based disturbance specially designed for MWP and an online update to boost the ranker. We demonstrate the effectiveness of our proposed method on the benchmark and the results show that our method consistently outperforms baselines in all datasets. Particularly, in the classical Math23k, our method is 7% (78.4% $\rightarrow$ 85.4%) higher than the state-of-the-art.
[ { "created": "Tue, 7 Sep 2021 12:21:49 GMT", "version": "v1" } ]
"2021-09-08T00:00:00"
[ [ "Shen", "Jianhao", "" ], [ "Yin", "Yichun", "" ], [ "Li", "Lin", "" ], [ "Shang", "Lifeng", "" ], [ "Jiang", "Xin", "" ], [ "Zhang", "Ming", "" ], [ "Liu", "Qun", "" ] ]
0no_new_dataset
cs/0604003
Petrus H Potgieter
Petrus H. Potgieter
Hypercomputing the Mandelbrot Set?
11 pages, 2 figures
null
null
null
cs.CC
null
The Mandelbrot set is an extremely well-known mathematical object that can be described in a quite simple way but has very interesting and non-trivial properties. This paper surveys some results that are known concerning the (non-)computability of the set. It considers two models of decidability over the reals (which have been treated much more thoroughly and technically by Hertling (2005), Blum, Shub and Smale, Brattka (2003) and Weihrauch (1999 and 2003) among others), two over the computable reals (the Russian school and hypercomputation) and a model over the rationals.
[ { "created": "Sun, 2 Apr 2006 15:31:32 GMT", "version": "v1" } ]
"2007-05-23T00:00:00"
[ [ "Potgieter", "Petrus H.", "" ] ]
0no_new_dataset
1505.02862
Fan Cheng
Fan Cheng and Vincent Y. F. Tan
A Numerical Study on the Wiretap Network with a Simple Network Topology
Submitted to IT
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study a security problem on a simple wiretap network, consisting of a source node S, a destination node D, and an intermediate node R. The intermediate node connects the source and the destination nodes via a set of noiseless parallel channels, with sizes $n_1$ and $n_2$, respectively. A message $M$ is to be sent from S to D. The information in the network may be eavesdropped by a set of wiretappers. The wiretappers cannot communicate with one another. Each wiretapper can access a subset of channels, called a wiretap set. All the chosen wiretap sets form a wiretap pattern. A random key $K$ is generated at S and a coding scheme on $(M, K)$ is employed to protect $M$. We define two decoding classes at D: In Class-I, only $M$ is required to be recovered and in Class-II, both $M$ and $K$ are required to be recovered. The objective is to minimize $H(K)/H(M)$ {for a given wiretap pattern} under the perfect secrecy constraint. The first question we address is whether routing is optimal on this simple network. By enumerating all the wiretap patterns on the Class-I/II $(3,3)$ networks and harnessing the power of Shannon-type inequalities, we find that gaps exist between the bounds implied by routing and the bounds implied by Shannon-type inequalities for a small fraction~($<2\%$) of all the wiretap patterns. The second question we investigate is the following: What is $\min H(K)/H(M)$ for the remaining wiretap patterns where gaps exist? We study some simple wiretap patterns and find that their Shannon bounds (i.e., the lower bound induced by Shannon-type inequalities) can be achieved by linear codes, which means routing is not sufficient even for the ($3$, $3$) network. For some complicated wiretap patterns, we study the structures of linear coding schemes under the assumption that they can achieve the corresponding Shannon bounds....
[ { "created": "Tue, 12 May 2015 02:58:02 GMT", "version": "v1" }, { "created": "Sat, 14 Nov 2015 15:13:05 GMT", "version": "v2" }, { "created": "Fri, 15 Jan 2016 06:23:01 GMT", "version": "v3" } ]
"2016-01-18T00:00:00"
[ [ "Cheng", "Fan", "" ], [ "Tan", "Vincent Y. F.", "" ] ]
0no_new_dataset
1407.2147
James Smith
James Smith
Gender Prediction in Social Media
null
null
null
null
cs.SI
http://creativecommons.org/licenses/by/3.0/
In this paper, we explore the task of gender classification using limited network data with an application to Fotolog. We take a heuristic approach to automating gender inference based on username, followers and network structure. We test our approach on a subset of 100,000 nodes and analyze our results to find that there is a lot of value in these limited information and that there is great promise in further pursuing this approach to classification.
[ { "created": "Tue, 8 Jul 2014 16:06:14 GMT", "version": "v1" } ]
"2014-07-09T00:00:00"
[ [ "Smith", "James", "" ] ]
0no_new_dataset
1201.6568
Arlei Silva
Arlei Silva, Wagner Meira Jr., Mohammed J. Zaki
Mining Attribute-structure Correlated Patterns in Large Attributed Graphs
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 5, pp. 466-477 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we study the correlation between attribute sets and the occurrence of dense subgraphs in large attributed graphs, a task we call structural correlation pattern mining. A structural correlation pattern is a dense subgraph induced by a particular attribute set. Existing methods are not able to extract relevant knowledge regarding how vertex attributes interact with dense subgraphs. Structural correlation pattern mining combines aspects of frequent itemset and quasi-clique mining problems. We propose statistical significance measures that compare the structural correlation of attribute sets against their expected values using null models. Moreover, we evaluate the interestingness of structural correlation patterns in terms of size and density. An efficient algorithm that combines search and pruning strategies in the identification of the most relevant structural correlation patterns is presented. We apply our method for the analysis of three real-world attributed graphs: a collaboration, a music, and a citation network, verifying that it provides valuable knowledge in a feasible time.
[ { "created": "Tue, 31 Jan 2012 15:10:13 GMT", "version": "v1" } ]
"2012-02-01T00:00:00"
[ [ "Silva", "Arlei", "" ], [ "Meira", "Wagner", "Jr." ], [ "Zaki", "Mohammed J.", "" ] ]
1new_dataset
1704.03223
Zahra Mousavi
Zahra Mousavi, Heshaam Faili
Persian Wordnet Construction using Supervised Learning
null
null
null
null
cs.CL cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an automated supervised method for Persian wordnet construction. Using a Persian corpus and a bi-lingual dictionary, the initial links between Persian words and Princeton WordNet synsets have been generated. These links will be discriminated later as correct or incorrect by employing seven features in a trained classification system. The whole method is just a classification system, which has been trained on a train set containing FarsNet as a set of correct instances. State of the art results on the automatically derived Persian wordnet is achieved. The resulted wordnet with a precision of 91.18% includes more than 16,000 words and 22,000 synsets.
[ { "created": "Tue, 11 Apr 2017 09:47:28 GMT", "version": "v1" } ]
"2017-04-12T00:00:00"
[ [ "Mousavi", "Zahra", "" ], [ "Faili", "Heshaam", "" ] ]
0no_new_dataset
2012.08418
Michael Herman
Michael Herman, J\"org Wagner, Vishnu Prabhakaran, Nicolas M\"oser, Hanna Ziesche, Waleed Ahmed, Lutz B\"urkle, Ernst Kloppenburg, Claudius Gl\"aser
Pedestrian Behavior Prediction for Automated Driving: Requirements, Metrics, and Relevant Features
This work has been submitted to the IEEE Transactions on Intelligent Transportation Systems for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. Revision: Extended requirement analysis and evaluation. 16 pages
null
null
null
cs.RO cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated vehicles require a comprehensive understanding of traffic situations to ensure safe and anticipatory driving. In this context, the prediction of pedestrians is particularly challenging as pedestrian behavior can be influenced by multiple factors. In this paper, we thoroughly analyze the requirements on pedestrian behavior prediction for automated driving via a system-level approach. To this end we investigate real-world pedestrian-vehicle interactions with human drivers. Based on human driving behavior we then derive appropriate reaction patterns of an automated vehicle and determine requirements for the prediction of pedestrians. This includes a novel metric tailored to measure prediction performance from a system-level perspective. The proposed metric is evaluated on a large-scale dataset comprising thousands of real-world pedestrian-vehicle interactions. We furthermore conduct an ablation study to evaluate the importance of different contextual cues and compare these results to ones obtained using established performance metrics for pedestrian prediction. Our results highlight the importance of a system-level approach to pedestrian behavior prediction.
[ { "created": "Tue, 15 Dec 2020 16:52:49 GMT", "version": "v1" }, { "created": "Sat, 16 Oct 2021 14:13:43 GMT", "version": "v2" } ]
"2021-10-19T00:00:00"
[ [ "Herman", "Michael", "" ], [ "Wagner", "Jörg", "" ], [ "Prabhakaran", "Vishnu", "" ], [ "Möser", "Nicolas", "" ], [ "Ziesche", "Hanna", "" ], [ "Ahmed", "Waleed", "" ], [ "Bürkle", "Lutz", "" ], [ "Kloppenburg", "Ernst", "" ], [ "Gläser", "Claudius", "" ] ]
1new_dataset
2105.10152
Harsh Kohli Mr.
Harsh Kohli
Training Mixed-Objective Pointing Decoders for Block-Level Optimization in Search Recommendation
4 pages. Accepted at the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval
null
10.1145/3397271.3401236
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Related or ideal follow-up suggestions to a web query in search engines are often optimized based on several different parameters -- relevance to the original query, diversity, click probability etc. One or many rankers may be trained to score each suggestion from a candidate pool based on these factors. These scorers are usually pairwise classification tasks where each training example consists of a user query and a single suggestion from the list of candidates. We propose an architecture that takes all candidate suggestions associated with a given query and outputs a suggestion block. We discuss the benefits of such an architecture over traditional approaches and experiment with further enforcing each individual metric through mixed-objective training.
[ { "created": "Fri, 21 May 2021 06:34:19 GMT", "version": "v1" } ]
"2021-05-24T00:00:00"
[ [ "Kohli", "Harsh", "" ] ]
0no_new_dataset
1709.08669
Konstantina Christakopoulou
Konstantina Christakopoulou, Adam Tauman Kalai
Glass-Box Program Synthesis: A Machine Learning Approach
null
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently proposed models which learn to write computer programs from data use either input/output examples or rich execution traces. Instead, we argue that a novel alternative is to use a glass-box loss function, given as a program itself that can be directly inspected. Glass-box optimization covers a wide range of problems, from computing the greatest common divisor of two integers, to learning-to-learn problems. In this paper, we present an intelligent search system which learns, given the partial program and the glass-box problem, the probabilities over the space of programs. We empirically demonstrate that our informed search procedure leads to significant improvements compared to brute-force program search, both in terms of accuracy and time. For our experiments we use rich context free grammars inspired by number theory, text processing, and algebra. Our results show that (i) performing 4 rounds of our framework typically solves about 70% of the target problems, (ii) our framework can improve itself even in domain agnostic scenarios, and (iii) it can solve problems that would be otherwise too slow to solve with brute-force search.
[ { "created": "Mon, 25 Sep 2017 18:43:56 GMT", "version": "v1" } ]
"2017-09-27T00:00:00"
[ [ "Christakopoulou", "Konstantina", "" ], [ "Kalai", "Adam Tauman", "" ] ]
0no_new_dataset
1907.12205
Shashank Rajput
Shashank Rajput, Hongyi Wang, Zachary Charles and Dimitris Papailiopoulos
DETOX: A Redundancy-based Framework for Faster and More Robust Gradient Aggregation
null
null
null
null
cs.LG cs.DC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To improve the resilience of distributed training to worst-case, or Byzantine node failures, several recent approaches have replaced gradient averaging with robust aggregation methods. Such techniques can have high computational costs, often quadratic in the number of compute nodes, and only have limited robustness guarantees. Other methods have instead used redundancy to guarantee robustness, but can only tolerate limited number of Byzantine failures. In this work, we present DETOX, a Byzantine-resilient distributed training framework that combines algorithmic redundancy with robust aggregation. DETOX operates in two steps, a filtering step that uses limited redundancy to significantly reduce the effect of Byzantine nodes, and a hierarchical aggregation step that can be used in tandem with any state-of-the-art robust aggregation method. We show theoretically that this leads to a substantial increase in robustness, and has a per iteration runtime that can be nearly linear in the number of compute nodes. We provide extensive experiments over real distributed setups across a variety of large-scale machine learning tasks, showing that DETOX leads to orders of magnitude accuracy and speedup improvements over many state-of-the-art Byzantine-resilient approaches.
[ { "created": "Mon, 29 Jul 2019 04:02:35 GMT", "version": "v1" }, { "created": "Sun, 8 Mar 2020 03:02:12 GMT", "version": "v2" } ]
"2020-03-10T00:00:00"
[ [ "Rajput", "Shashank", "" ], [ "Wang", "Hongyi", "" ], [ "Charles", "Zachary", "" ], [ "Papailiopoulos", "Dimitris", "" ] ]
0no_new_dataset
1712.03529
Behrooz Omidvar-Tehrani
Sihem Amer-Yahia, Behrooz Omidvar-Tehrani, Joao Comba, Viviane Moreira, Fabian Colque Zegarra
Exploration of User Groups in VEXUS
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce VEXUS, an interactive visualization framework for exploring user data to fulfill tasks such as finding a set of experts, forming discussion groups and analyzing collective behaviors. User data is characterized by a combination of demographics like age and occupation, and actions such as rating a movie, writing a paper, following a medical treatment or buying groceries. The ubiquity of user data requires tools that help explorers, be they specialists or novice users, acquire new insights. VEXUS lets explorers interact with user data via visual primitives and builds an exploration profile to recommend the next exploration steps. VEXUS combines state-of-the-art visualization techniques with appropriate indexing of user data to provide fast and relevant exploration.
[ { "created": "Sun, 10 Dec 2017 14:01:53 GMT", "version": "v1" } ]
"2017-12-12T00:00:00"
[ [ "Amer-Yahia", "Sihem", "" ], [ "Omidvar-Tehrani", "Behrooz", "" ], [ "Comba", "Joao", "" ], [ "Moreira", "Viviane", "" ], [ "Zegarra", "Fabian Colque", "" ] ]
1new_dataset
1405.0102
Christian A. Naesseth
Christian A. Naesseth, Fredrik Lindsten, Thomas B. Sch\"on
Capacity estimation of two-dimensional channels using Sequential Monte Carlo
null
null
null
null
cs.IT math.IT stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive a new Sequential-Monte-Carlo-based algorithm to estimate the capacity of two-dimensional channel models. The focus is on computing the noiseless capacity of the 2-D one-infinity run-length limited constrained channel, but the underlying idea is generally applicable. The proposed algorithm is profiled against a state-of-the-art method, yielding more than an order of magnitude improvement in estimation accuracy for a given computation time.
[ { "created": "Thu, 1 May 2014 06:06:45 GMT", "version": "v1" }, { "created": "Mon, 11 Aug 2014 10:36:37 GMT", "version": "v2" } ]
"2014-08-12T00:00:00"
[ [ "Naesseth", "Christian A.", "" ], [ "Lindsten", "Fredrik", "" ], [ "Schön", "Thomas B.", "" ] ]
0no_new_dataset
1605.03389
Markus Oberweger
Markus Oberweger, Gernot Riegler, Paul Wohlhart, Vincent Lepetit
Efficiently Creating 3D Training Data for Fine Hand Pose Estimation
added link to source https://github.com/moberweger/semi-auto-anno. Appears in Proc. of CVPR 2016
null
null
null
cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While many recent hand pose estimation methods critically rely on a training set of labelled frames, the creation of such a dataset is a challenging task that has been overlooked so far. As a result, existing datasets are limited to a few sequences and individuals, with limited accuracy, and this prevents these methods from delivering their full potential. We propose a semi-automated method for efficiently and accurately labeling each frame of a hand depth video with the corresponding 3D locations of the joints: The user is asked to provide only an estimate of the 2D reprojections of the visible joints in some reference frames, which are automatically selected to minimize the labeling work by efficiently optimizing a sub-modular loss function. We then exploit spatial, temporal, and appearance constraints to retrieve the full 3D poses of the hand over the complete sequence. We show that this data can be used to train a recent state-of-the-art hand pose estimation method, leading to increased accuracy. The code and dataset can be found on our website https://cvarlab.icg.tugraz.at/projects/hand_detection/
[ { "created": "Wed, 11 May 2016 11:40:27 GMT", "version": "v1" }, { "created": "Fri, 2 Dec 2016 15:45:38 GMT", "version": "v2" } ]
"2016-12-05T00:00:00"
[ [ "Oberweger", "Markus", "" ], [ "Riegler", "Gernot", "" ], [ "Wohlhart", "Paul", "" ], [ "Lepetit", "Vincent", "" ] ]
1new_dataset
1902.09887
Qianyi Wu
Zi-Hang Jiang, Qianyi Wu, Keyu Chen and Juyong Zhang
Disentangled Representation Learning for 3D Face Shape
15 pages, 8 figures. CVPR 2019
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel strategy to design disentangled 3D face shape representation. Specifically, a given 3D face shape is decomposed into identity part and expression part, which are both encoded and decoded in a nonlinear way. To solve this problem, we propose an attribute decomposition framework for 3D face mesh. To better represent face shapes which are usually nonlinear deformed between each other, the face shapes are represented by a vertex based deformation representation rather than Euclidean coordinates. The experimental results demonstrate that our method has better performance than existing methods on decomposing the identity and expression parts. Moreover, more natural expression transfer results can be achieved with our method than existing methods.
[ { "created": "Tue, 26 Feb 2019 12:22:18 GMT", "version": "v1" }, { "created": "Sun, 3 Mar 2019 06:38:24 GMT", "version": "v2" } ]
"2019-03-05T00:00:00"
[ [ "Jiang", "Zi-Hang", "" ], [ "Wu", "Qianyi", "" ], [ "Chen", "Keyu", "" ], [ "Zhang", "Juyong", "" ] ]
0no_new_dataset
1302.1143
Joel Lehman
Joel Lehman, Kenneth O. Stanley
Evolvability Is Inevitable: Increasing Evolvability Without the Pressure to Adapt
null
null
10.1371/journal.pone.0062186
null
cs.NE q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Why evolvability appears to have increased over evolutionary time is an important unresolved biological question. Unlike most candidate explanations, this paper proposes that increasing evolvability can result without any pressure to adapt. The insight is that if evolvability is heritable, then an unbiased drifting process across genotypes can still create a distribution of phenotypes biased towards evolvability, because evolvable organisms diffuse more quickly through the space of possible phenotypes. Furthermore, because phenotypic divergence often correlates with founding niches, niche founders may on average be more evolvable, which through population growth provides a genotypic bias towards evolvability. Interestingly, the combination of these two mechanisms can lead to increasing evolvability without any pressure to out-compete other organisms, as demonstrated through experiments with a series of simulated models. Thus rather than from pressure to adapt, evolvability may inevitably result from any drift through genotypic space combined with evolution's passive tendency to accumulate niches.
[ { "created": "Tue, 5 Feb 2013 18:14:02 GMT", "version": "v1" } ]
"2015-06-12T00:00:00"
[ [ "Lehman", "Joel", "" ], [ "Stanley", "Kenneth O.", "" ] ]
0no_new_dataset
1707.01446
Xerxes D. Arsiwalla
Xerxes D. Arsiwalla, Pedro A.M. Mediano, Paul F.M.J. Verschure
Spectral Modes of Network Dynamics Reveal Increased Informational Complexity Near Criticality
null
null
null
null
cs.NE physics.soc-ph q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What does the informational complexity of dynamical networked systems tell us about intrinsic mechanisms and functions of these complex systems? Recent complexity measures such as integrated information have sought to operationalize this problem taking a whole-versus-parts perspective, wherein one explicitly computes the amount of information generated by a network as a whole over and above that generated by the sum of its parts during state transitions. While several numerical schemes for estimating network integrated information exist, it is instructive to pursue an analytic approach that computes integrated information as a function of network weights. Our formulation of integrated information uses a Kullback-Leibler divergence between the multi-variate distribution on the set of network states versus the corresponding factorized distribution over its parts. Implementing stochastic Gaussian dynamics, we perform computations for several prototypical network topologies. Our findings show increased informational complexity near criticality, which remains consistent across network topologies. Spectral decomposition of the system's dynamics reveals how informational complexity is governed by eigenmodes of both, the network's covariance and adjacency matrices. We find that as the dynamics of the system approach criticality, high integrated information is exclusively driven by the eigenmode corresponding to the leading eigenvalue of the covariance matrix, while sub-leading modes get suppressed. The implication of this result is that it might be favorable for complex dynamical networked systems such as the human brain or communication systems to operate near criticality so that efficient information integration might be achieved.
[ { "created": "Wed, 5 Jul 2017 15:48:48 GMT", "version": "v1" } ]
"2017-07-06T00:00:00"
[ [ "Arsiwalla", "Xerxes D.", "" ], [ "Mediano", "Pedro A. M.", "" ], [ "Verschure", "Paul F. M. J.", "" ] ]
0no_new_dataset
2304.11507
Smrithi Ajit
Smrithi Ajit, Varsha R Mouli, Skylar Knickerbocker, Jonathan S. Wood
Machine learning framework for end-to-end implementation of Incident duration prediction
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
Traffic congestion caused by non-recurring incidents such as vehicle crashes and debris is a key issue for Traffic Management Centers (TMCs). Clearing incidents in a timely manner is essential for improving safety and reducing delays and emissions for the traveling public. However, TMCs and other responders face a challenge in predicting the duration of incidents (until the roadway is clear), making decisions of what resources to deploy difficult. To address this problem, this research developed an analytical framework and end-to-end machine-learning solution for predicting incident duration based on information available as soon as an incident report is received. Quality predictions of incident duration can help TMCs and other responders take a proactive approach in deploying responder services such as tow trucks, maintenance crews or activating alternative routes. The predictions use a combination of classification and regression machine learning modules. The performance of the developed solution has been evaluated based on the Mean Absolute Error (MAE), or deviation from the actual incident duration as well as Area Under the Curve (AUC) and Mean Absolute Percentage Error (MAPE). The results showed that the framework significantly improved incident duration prediction compared to methods from previous research.
[ { "created": "Sun, 23 Apr 2023 00:55:19 GMT", "version": "v1" } ]
"2023-04-25T00:00:00"
[ [ "Ajit", "Smrithi", "" ], [ "Mouli", "Varsha R", "" ], [ "Knickerbocker", "Skylar", "" ], [ "Wood", "Jonathan S.", "" ] ]
0no_new_dataset
2406.05582
Nathaniel Gordon
Nathaniel G. Gordon, Nesrine Benchoubane, Gunes Karabulut Kurt, and Gregory Falco
On the Role of Communications for Space Domain Awareness
12 pages, 3 figures
null
null
null
cs.ET cs.SI
http://creativecommons.org/licenses/by-sa/4.0/
Space Domain Awareness (SDA) has become increasingly vital with the rapid growth of commercial space activities and the expansion of New Space. This paper stresses the necessity of transitioning from centralized to distributed SDA architectures. The current architecture predominantly relies on individual downhaul, which we propose to transition to on-orbit distribution. Our results demonstrate that the individual downhaul architecture does not scale efficiently with the increasing number of nodes, while on-orbit distribution offers significant improvements. By comparing the centralized architecture with the proposed distributed architecture, we highlight the advantages of enhanced coverage and resilience. Our findings show that on-orbit distribution greatly outperforms individual downhaul in terms of latency and scalability. Specifically, the latency results for on-orbit distribution are substantially lower and more consistent, even as the number of satellites increases. In addition, we address the inherent challenges associated with on-orbit distribution architecture, particularly cybersecurity concerns. We focus on link security to ensure the availability and integrity of data transmission in these advanced SDA systems. Future expectations include further refinement of on-orbit distribution strategies and the development of robust cybersecurity measures to support the scalability and resilience of SDA systems.
[ { "created": "Sat, 8 Jun 2024 21:49:52 GMT", "version": "v1" } ]
"2024-06-11T00:00:00"
[ [ "Gordon", "Nathaniel G.", "" ], [ "Benchoubane", "Nesrine", "" ], [ "Kurt", "Gunes Karabulut", "" ], [ "Falco", "Gregory", "" ] ]
0no_new_dataset
2008.11977
Jonghyun Kim
Jonghyun Kim, Gen Li, Inyong Yun, Cheolkon Jung, and Joongkyu Kim
Edge and Identity Preserving Network for Face Super-Resolution
Neurocomputing'2021
null
10.1016/j.neucom.2021.03.048
null
cs.CV eess.IV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Face super-resolution (SR) has become an indispensable function in security solutions such as video surveillance and identification system, but the distortion in facial components is a great challenge in it. Most state-of-the-art methods have utilized facial priors with deep neural networks. These methods require extra labels, longer training time, and larger computation memory. In this paper, we propose a novel Edge and Identity Preserving Network for Face SR Network, named as EIPNet, to minimize the distortion by utilizing a lightweight edge block and identity information. We present an edge block to extract perceptual edge information, and concatenate it to the original feature maps in multiple scales. This structure progressively provides edge information in reconstruction to aggregate local and global structural information. Moreover, we define an identity loss function to preserve identification of SR images. The identity loss function compares feature distributions between SR images and their ground truth to recover identities in SR images. In addition, we provide a luminance-chrominance error (LCE) to separately infer brightness and color information in SR images. The LCE method not only reduces the dependency of color information by dividing brightness and color components but also enables our network to reflect differences between SR images and their ground truth in two color spaces of RGB and YUV. The proposed method facilitates the proposed SR network to elaborately restore facial components and generate high quality 8x scaled SR images with a lightweight network structure. Furthermore, our network is able to reconstruct an 128x128 SR image with 215 fps on a GTX 1080Ti GPU. Extensive experiments demonstrate that our network qualitatively and quantitatively outperforms state-of-the-art methods on two challenging datasets: CelebA and VGGFace2.
[ { "created": "Thu, 27 Aug 2020 08:04:57 GMT", "version": "v1" }, { "created": "Wed, 31 Mar 2021 02:17:03 GMT", "version": "v2" } ]
"2021-04-01T00:00:00"
[ [ "Kim", "Jonghyun", "" ], [ "Li", "Gen", "" ], [ "Yun", "Inyong", "" ], [ "Jung", "Cheolkon", "" ], [ "Kim", "Joongkyu", "" ] ]
1new_dataset
2405.13349
Jialin Li
Guangda Sun, Tianyang Tao, Yanpei Guo, Michael Yiqing Hu, Jialin Li
Building a Verifiable Logical Clock for P2P Networks
null
null
null
null
cs.DC
http://creativecommons.org/licenses/by-sa/4.0/
Logical clocks are a fundamental tool to establish causal ordering of events in a distributed system. They have been applied in weakly consistent storage systems, causally ordered broadcast, distributed snapshots, deadlock detection, and distributed system debugging. However, prior logical clock constructs fail to work in an open network with Byzantine participants. In this work, we present Chrono, a novel logical clock system that targets such challenging environment. We first redefine causality properties among distributed processes under the Byzantine failure model. To enforce these properties, Chrono defines a new validator abstraction for building fault-tolerant logical clocks. Furthermore, our validator abstraction is customizable: Chrono includes multiple backend implementations for the abstraction, each with different security-performance trade-offs. We have applied Chrono to build two decentralized applications, a mutual exclusive service and a weakly consistent key-value store. Chrono adds only marginal overhead compared to systems that tolerate no Byzantine faults. It also out-performs state-of-the-art BFT total order protocols by significant margins.
[ { "created": "Wed, 22 May 2024 05:10:59 GMT", "version": "v1" } ]
"2024-05-24T00:00:00"
[ [ "Sun", "Guangda", "" ], [ "Tao", "Tianyang", "" ], [ "Guo", "Yanpei", "" ], [ "Hu", "Michael Yiqing", "" ], [ "Li", "Jialin", "" ] ]
0no_new_dataset
2401.08991
John O'Connor
Andrew Ajemian and John Knight and Tommy Nguyen and John O'Connor
Knight Watch: Ubiquitous Computing Enhancements To Sleep Quality With Acoustic Analysis
6 Pages, 3 Figures
null
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-nd/4.0/
This project introduces a wearable, non-intrusive device for snoring detection and remediation, designed to be placed under or alongside a pillow. The device uses sensors and machine learning algorithms to detect snoring and employs gentle vibrations to prompt positional changes, thereby reducing snoring episodes. The device is capable of connecting via an API to a cloud-based platform for the analysis of snoring sleep patterns and environmental context. The paper details the development from concept to prototype, emphasizing the technical challenges, solutions, and alignment with ubiquitous computing in sleep quality improvement.
[ { "created": "Wed, 17 Jan 2024 05:58:25 GMT", "version": "v1" } ]
"2024-01-18T00:00:00"
[ [ "Ajemian", "Andrew", "" ], [ "Knight", "John", "" ], [ "Nguyen", "Tommy", "" ], [ "O'Connor", "John", "" ] ]
0no_new_dataset
2304.03917
Zhu Zhimin
Zhimin Zhu, Jianguo Zhao, Tong Mu, Yuliang Yang, Mengyu Zhu
MC-MLP:Multiple Coordinate Frames in all-MLP Architecture for Vision
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In deep learning, Multi-Layer Perceptrons (MLPs) have once again garnered attention from researchers. This paper introduces MC-MLP, a general MLP-like backbone for computer vision that is composed of a series of fully-connected (FC) layers. In MC-MLP, we propose that the same semantic information has varying levels of difficulty in learning, depending on the coordinate frame of features. To address this, we perform an orthogonal transform on the feature information, equivalent to changing the coordinate frame of features. Through this design, MC-MLP is equipped with multi-coordinate frame receptive fields and the ability to learn information across different coordinate frames. Experiments demonstrate that MC-MLP outperforms most MLPs in image classification tasks, achieving better performance at the same parameter level. The code will be available at: https://github.com/ZZM11/MC-MLP.
[ { "created": "Sat, 8 Apr 2023 05:23:25 GMT", "version": "v1" } ]
"2023-04-11T00:00:00"
[ [ "Zhu", "Zhimin", "" ], [ "Zhao", "Jianguo", "" ], [ "Mu", "Tong", "" ], [ "Yang", "Yuliang", "" ], [ "Zhu", "Mengyu", "" ] ]
0no_new_dataset
2405.02196
Chenyang Ai
Chenyang Ai, Lechuan Zhao, Zhijie Huang, Cangyuan Li, Xinan Wang, Ying Wang
GTA: a new General Tensor Accelerator with Better Area Efficiency and Data Reuse
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, tensor algebra have witnessed significant applications across various domains. Each operator in tensor algebra features different computational workload and precision. However, current general accelerators, such as VPU, GPGPU, and CGRA, support tensor operators with low energy and area efficiency. This paper conducts an in-depth exploration of general accelerator for tensor processing. First, we find the similarity between matrix multiplication and precision multiplication, and create a method classifying tensor operators. Then, we implement two discoveries and introduce the systolic architecture into general-purpose accelerator. Therefore, we propose a new General Tensor Accelerator (GTA), which has a better area efficiency and data reuse. Furthermore, we create a large hardware scheduling space consisting of dataflow, precision and array resize. Our evaluation results demonstrate that GTA is able to achieves 7.76X, 5.35X, 8.76X memory efficiency and 6.45X, 3.39X, 25.83X speedup over of VPU, GPGPU and CGRA.
[ { "created": "Fri, 3 May 2024 15:52:44 GMT", "version": "v1" } ]
"2024-05-06T00:00:00"
[ [ "Ai", "Chenyang", "" ], [ "Zhao", "Lechuan", "" ], [ "Huang", "Zhijie", "" ], [ "Li", "Cangyuan", "" ], [ "Wang", "Xinan", "" ], [ "Wang", "Ying", "" ] ]
1new_dataset
2401.14607
Lynnette Hui Xian Ng
Lynnette Hui Xian Ng and Kathleen M. Carley
Assembling a Multi-Platform Ensemble Social Bot Detector with Applications to US 2020 Elections
Accepted at Social Network Analysis and Mining
null
null
null
cs.SI
http://creativecommons.org/licenses/by-nc-nd/4.0/
Bots have been in the spotlight for many social media studies, for they have been observed to be participating in the manipulation of information and opinions on social media. These studies analyzed the activity and influence of bots in a variety of contexts: elections, protests, health communication and so forth. Prior to this analyses is the identification of bot accounts to segregate the class of social media users. In this work, we propose an ensemble method for bot detection, designing a multi-platform bot detection architecture to handle several problems along the bot detection pipeline: incomplete data input, minimal feature engineering, optimized classifiers for each data field, and also eliminate the need for a threshold value for classification determination. With these design decisions, we generalize our bot detection framework across Twitter, Reddit and Instagram. We also perform feature importance analysis, observing that the entropy of names and number of interactions (retweets/shares) are important factors in bot determination. Finally, we apply our multi-platform bot detector to the US 2020 presidential elections to identify and analyze bot activity across multiple social media platforms, showcasing the difference in online discourse of bots from different platforms.
[ { "created": "Fri, 26 Jan 2024 02:39:54 GMT", "version": "v1" }, { "created": "Tue, 2 Apr 2024 00:11:16 GMT", "version": "v2" } ]
"2024-04-03T00:00:00"
[ [ "Ng", "Lynnette Hui Xian", "" ], [ "Carley", "Kathleen M.", "" ] ]
0no_new_dataset
2003.10685
Jia-Qi Zhang
Min Shi, Jia-Qi Zhang, Shu-Yu Chen, Lin Gao, Yu-Kun Lai, Fang-Lue Zhang
Deep Line Art Video Colorization with a Few References
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coloring line art images based on the colors of reference images is an important stage in animation production, which is time-consuming and tedious. In this paper, we propose a deep architecture to automatically color line art videos with the same color style as the given reference images. Our framework consists of a color transform network and a temporal constraint network. The color transform network takes the target line art images as well as the line art and color images of one or more reference images as input, and generates corresponding target color images. To cope with larger differences between the target line art image and reference color images, our architecture utilizes non-local similarity matching to determine the region correspondences between the target image and the reference images, which are used to transform the local color information from the references to the target. To ensure global color style consistency, we further incorporate Adaptive Instance Normalization (AdaIN) with the transformation parameters obtained from a style embedding vector that describes the global color style of the references, extracted by an embedder. The temporal constraint network takes the reference images and the target image together in chronological order, and learns the spatiotemporal features through 3D convolution to ensure the temporal consistency of the target image and the reference image. Our model can achieve even better coloring results by fine-tuning the parameters with only a small amount of samples when dealing with an animation of a new style. To evaluate our method, we build a line art coloring dataset. Experiments show that our method achieves the best performance on line art video coloring compared to the state-of-the-art methods and other baselines.
[ { "created": "Tue, 24 Mar 2020 06:57:40 GMT", "version": "v1" }, { "created": "Mon, 30 Mar 2020 07:34:55 GMT", "version": "v2" } ]
"2020-03-31T00:00:00"
[ [ "Shi", "Min", "" ], [ "Zhang", "Jia-Qi", "" ], [ "Chen", "Shu-Yu", "" ], [ "Gao", "Lin", "" ], [ "Lai", "Yu-Kun", "" ], [ "Zhang", "Fang-Lue", "" ] ]
1new_dataset
2104.14700
Ewan Dunbar
Ewan Dunbar, Mathieu Bernard, Nicolas Hamilakis, Tu Anh Nguyen, Maureen de Seyssel, Patricia Roz\'e, Morgane Rivi\`ere, Eugene Kharitonov, Emmanuel Dupoux
The Zero Resource Speech Challenge 2021: Spoken language modelling
Submitted to Interspeech 2021. arXiv admin note: text overlap with arXiv:2011.11588
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
We present the Zero Resource Speech Challenge 2021, which asks participants to learn a language model directly from audio, without any text or labels. The challenge is based on the Libri-light dataset, which provides up to 60k hours of audio from English audio books without any associated text. We provide a pipeline baseline system consisting on an encoder based on contrastive predictive coding (CPC), a quantizer ($k$-means) and a standard language model (BERT or LSTM). The metrics evaluate the learned representations at the acoustic (ABX discrimination), lexical (spot-the-word), syntactic (acceptability judgment) and semantic levels (similarity judgment). We present an overview of the eight submitted systems from four groups and discuss the main results.
[ { "created": "Thu, 29 Apr 2021 23:53:37 GMT", "version": "v1" }, { "created": "Mon, 9 Aug 2021 19:09:58 GMT", "version": "v2" } ]
"2021-08-11T00:00:00"
[ [ "Dunbar", "Ewan", "" ], [ "Bernard", "Mathieu", "" ], [ "Hamilakis", "Nicolas", "" ], [ "Nguyen", "Tu Anh", "" ], [ "de Seyssel", "Maureen", "" ], [ "Rozé", "Patricia", "" ], [ "Rivière", "Morgane", "" ], [ "Kharitonov", "Eugene", "" ], [ "Dupoux", "Emmanuel", "" ] ]
0no_new_dataset
2210.02516
I. Elizabeth Kumar
I. Elizabeth Kumar, Keegan E. Hines, John P. Dickerson
Equalizing Credit Opportunity in Algorithms: Aligning Algorithmic Fairness Research with U.S. Fair Lending Regulation
null
AIES '22: Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society
10.1145/3514094.3534154
null
cs.LG cs.CY
http://creativecommons.org/licenses/by/4.0/
Credit is an essential component of financial wellbeing in America, and unequal access to it is a large factor in the economic disparities between demographic groups that exist today. Today, machine learning algorithms, sometimes trained on alternative data, are increasingly being used to determine access to credit, yet research has shown that machine learning can encode many different versions of "unfairness," thus raising the concern that banks and other financial institutions could -- potentially unwittingly -- engage in illegal discrimination through the use of this technology. In the US, there are laws in place to make sure discrimination does not happen in lending and agencies charged with enforcing them. However, conversations around fair credit models in computer science and in policy are often misaligned: fair machine learning research often lacks legal and practical considerations specific to existing fair lending policy, and regulators have yet to issue new guidance on how, if at all, credit risk models should be utilizing practices and techniques from the research community. This paper aims to better align these sides of the conversation. We describe the current state of credit discrimination regulation in the United States, contextualize results from fair ML research to identify the specific fairness concerns raised by the use of machine learning in lending, and discuss regulatory opportunities to address these concerns.
[ { "created": "Wed, 5 Oct 2022 19:23:29 GMT", "version": "v1" } ]
"2022-10-07T00:00:00"
[ [ "Kumar", "I. Elizabeth", "" ], [ "Hines", "Keegan E.", "" ], [ "Dickerson", "John P.", "" ] ]
0no_new_dataset
2010.09569
Erwin Quiring
Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck
Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification
null
null
null
null
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine learning-based systems for malware detection operate in a hostile environment. Consequently, adversaries will also target the learning system and use evasion attacks to bypass the detection of malware. In this paper, we outline our learning-based system PEberus that got the first place in the defender challenge of the Microsoft Evasion Competition, resisting a variety of attacks from independent attackers. Our system combines multiple, diverse defenses: we address the semantic gap, use various classification models, and apply a stateful defense. This competition gives us the unique opportunity to examine evasion attacks under a realistic scenario. It also highlights that existing machine learning methods can be hardened against attacks by thoroughly analyzing the attack surface and implementing concepts from adversarial learning. Our defense can serve as an additional baseline in the future to strengthen the research on secure learning.
[ { "created": "Mon, 19 Oct 2020 14:53:06 GMT", "version": "v1" } ]
"2020-10-20T00:00:00"
[ [ "Quiring", "Erwin", "" ], [ "Pirch", "Lukas", "" ], [ "Reimsbach", "Michael", "" ], [ "Arp", "Daniel", "" ], [ "Rieck", "Konrad", "" ] ]
0no_new_dataset
2012.05391
Somaiyeh MahmoudZadeh
Amin Abbasi, Somaiyeh MahmoudZadeh, Amirmehdi Yazdani, Ata Jahangir Moshayedi
Feasibility Assessment of a Cost-Effective Two-Wheel Kian-I Mobile Robot for Autonomous Navigation
null
Robotics and Autonomous System 2020
null
null
cs.RO
http://creativecommons.org/publicdomain/zero/1.0/
A two-wheeled mobile robot, namely Kian-I, is designed and prototyped in this research. The Kian-I is comparable with Khepera-IV in terms of dimensional specifications, mounted sensors, and performance capabilities and can be used for educational purposes and cost-effective experimental tests. A motion control architecture is designed for Kian-I in this study to facilitate accurate navigation for the robot in an immersive environment. The implemented control structure consists of two main components of the path recommender system and trajectory tracking controller. Given partial knowledge about the operation field, the path recommender system adopts B-spline curves and Particle Swarm Optimization (PSO) algorithm to determine a collision-free path curve with translational velocity constraint. The provided optimal reference path feeds into the trajectory tracking controller enabling Kian-I to navigate autonomously in the operating field. The trajectory tracking module eliminate the error between the desired path and the followed trajectory through controlling the wheels' velocity. To assess the feasibility of the proposed control architecture, the performance of Kian-I robot in autonomous navigation from any arbitrary initial pose to a target of interest is evaluated through numerous simulation and experimental studies. The experimental results demonstrate the functional capacities and performance of the prototyped robot to be used as a benchmark for investigation and verification of various mobile robot algorithms in the laboratory environment.
[ { "created": "Thu, 10 Dec 2020 01:09:01 GMT", "version": "v1" } ]
"2020-12-11T00:00:00"
[ [ "Abbasi", "Amin", "" ], [ "MahmoudZadeh", "Somaiyeh", "" ], [ "Yazdani", "Amirmehdi", "" ], [ "Moshayedi", "Ata Jahangir", "" ] ]
0no_new_dataset
1304.2290
Anton Salikhmetov
Anton Salikhmetov
Macro Lambda Calculus
3 pages
null
null
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of our Macro Lambda Calculus project (MLC) is to encode lambda terms into interaction nets. Its software implementation will accept input in the notation similar to lambda calculus allowing macro definitions. Output is similar to interaction calculus and is suitable for our Interaction Nets Compiler program (INC). In this paper, we describe the interaction system for call-by-need evaluation and the mechanism of encoding lambda terms into this system which MLC is based on.
[ { "created": "Mon, 8 Apr 2013 18:17:32 GMT", "version": "v1" }, { "created": "Thu, 11 Apr 2013 15:28:37 GMT", "version": "v2" }, { "created": "Sat, 13 Apr 2013 09:03:54 GMT", "version": "v3" }, { "created": "Tue, 25 Jun 2013 18:22:25 GMT", "version": "v4" }, { "created": "Wed, 30 Apr 2014 15:21:16 GMT", "version": "v5" }, { "created": "Thu, 16 Apr 2015 19:18:29 GMT", "version": "v6" }, { "created": "Fri, 17 Apr 2015 06:30:12 GMT", "version": "v7" }, { "created": "Fri, 7 Aug 2015 08:37:32 GMT", "version": "v8" } ]
"2015-08-10T00:00:00"
[ [ "Salikhmetov", "Anton", "" ] ]
0no_new_dataset
2311.06095
Thomas Mercier
Thomas M. Mercier, Marcin Budka, Martin R. Vasilev, Julie A. Kirkby, Bernhard Angele, Timothy J. Slattery
Dual input stream transformer for vertical drift correction in eye-tracking reading data
This work has been submitted to the IEEE Transactions on pattern analysis and machine intelligence for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel Dual Input Stream Transformer (DIST) for the challenging problem of assigning fixation points from eye-tracking data collected during passage reading to the line of text that the reader was actually focused on. This post-processing step is crucial for analysis of the reading data due to the presence of noise in the form of vertical drift. We evaluate DIST against eleven classical approaches on a comprehensive suite of nine diverse datasets. We demonstrate that combining multiple instances of the DIST model in an ensemble achieves high accuracy across all datasets. Further combining the DIST ensemble with the best classical approach yields an average accuracy of 98.17 %. Our approach presents a significant step towards addressing the bottleneck of manual line assignment in reading research. Through extensive analysis and ablation studies, we identify key factors that contribute to DIST's success, including the incorporation of line overlap features and the use of a second input stream. Via rigorous evaluation, we demonstrate that DIST is robust to various experimental setups, making it a safe first choice for practitioners in the field.
[ { "created": "Fri, 10 Nov 2023 14:53:39 GMT", "version": "v1" }, { "created": "Thu, 15 Feb 2024 17:05:14 GMT", "version": "v2" } ]
"2024-02-16T00:00:00"
[ [ "Mercier", "Thomas M.", "" ], [ "Budka", "Marcin", "" ], [ "Vasilev", "Martin R.", "" ], [ "Kirkby", "Julie A.", "" ], [ "Angele", "Bernhard", "" ], [ "Slattery", "Timothy J.", "" ] ]
1new_dataset
0910.5744
Olivier Spanjaard
Lucie Galand and Olivier Spanjaard
Exact algorithms for OWA-optimization in multiobjective spanning tree problems
17 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the multiobjective version of the optimal spanning tree problem. More precisely, we are interested in determining the optimal spanning tree according to an Ordered Weighted Average (OWA) of its objective values. We first show that the problem is weakly NP-hard. In the case where the weights of the OWA are strictly decreasing, we then propose a mixed integer programming formulation, and provide dedicated optimality conditions yielding an important reduction of the size of the program. Next, we present two bounds that can be used to prune subspaces of solutions either in a shaving phase or in a branch and bound procedure. The validity of these bounds does not depend on specific properties of the weights (apart from non-negativity). All these exact resolution algorithms are compared on the basis of numerical experiments, according to their respective validity scopes.
[ { "created": "Thu, 29 Oct 2009 23:17:24 GMT", "version": "v1" } ]
"2009-11-02T00:00:00"
[ [ "Galand", "Lucie", "" ], [ "Spanjaard", "Olivier", "" ] ]
0no_new_dataset
1311.7194
Dmitry Trifonov
Dmitry Trifonov
Real-time High Resolution Fusion of Depth Maps on GPU
null
null
null
null
cs.GR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A system for live high quality surface reconstruction using a single moving depth camera on a commodity hardware is presented. High accuracy and real-time frame rate is achieved by utilizing graphics hardware computing capabilities via OpenCL and by using sparse data structure for volumetric surface representation. Depth sensor pose is estimated by combining serial texture registration algorithm with iterative closest points algorithm (ICP) aligning obtained depth map to the estimated scene model. Aligned surface is then fused into the scene. Kalman filter is used to improve fusion quality. Truncated signed distance function (TSDF) stored as block-based sparse buffer is used to represent surface. Use of sparse data structure greatly increases accuracy of scanned surfaces and maximum scanning area. Traditional GPU implementation of volumetric rendering and fusion algorithms were modified to exploit sparsity to achieve desired performance. Incorporation of texture registration for sensor pose estimation and Kalman filter for measurement integration improved accuracy and robustness of scanning process.
[ { "created": "Thu, 28 Nov 2013 03:17:03 GMT", "version": "v1" } ]
"2013-12-02T00:00:00"
[ [ "Trifonov", "Dmitry", "" ] ]
0no_new_dataset
1801.06144
Erick Lavoie
Erick Lavoie and Laurie Hendren
A Formalization for Specifying and Implementing Correct Pull-Stream Modules
null
null
null
null
cs.PL
http://creativecommons.org/licenses/by/4.0/
Pull-stream is a JavaScript demand-driven functional design pattern based on callback functions that enables the creation and easy composition of independent modules that are used to create streaming applications. It is used in popular open source projects and the community around it has created over a hundred compatible modules. While the description of the pull-stream design pattern may seem simple, it does exhibit complicated termination cases. Despite the popularity and large uptake of the pull-stream design pattern, there was no existing formal specification that could help programmers reason about the correctness of their implementations. Thus, the main contribution of this paper is to provide a formalization for specifying and implementing correct pull-stream modules based on the following: (1) we show the pull-stream design pattern is a form of declarative concurrent programming; (2) we present an event-based protocol language that supports our formalization, independently of JavaScript; (3) we provide the first precise and explicit definition of the expected sequences of events that happen at the interface of two modules, which we call the pull-stream protocol; (4) we specify reference modules that exhibit the full range of behaviors of the pull-stream protocol; (5) we validate our definitions against the community expectations by testing the existing core pull-stream modules against them and identify unspecified behaviors in existing modules. Our approach helps to better understand the pull-stream protocol, to ensure interoperability of community modules, and to concisely and precisely specify new pull-stream abstractions in papers and documentation.
[ { "created": "Thu, 18 Jan 2018 17:48:52 GMT", "version": "v1" } ]
"2018-01-19T00:00:00"
[ [ "Lavoie", "Erick", "" ], [ "Hendren", "Laurie", "" ] ]
0no_new_dataset
1304.2759
Eric J. Horvitz
Eric J. Horvitz
Reasoning About Beliefs and Actions Under Computational Resource Constraints
Appears in Proceedings of the Third Conference on Uncertainty in Artificial Intelligence (UAI1987)
null
null
UAI-P-1987-PG-429-447
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although many investigators affirm a desire to build reasoning systems that behave consistently with the axiomatic basis defined by probability theory and utility theory, limited resources for engineering and computation can make a complete normative analysis impossible. We attempt to move discussion beyond the debate over the scope of problems that can be handled effectively to cases where it is clear that there are insufficient computational resources to perform an analysis deemed as complete. Under these conditions, we stress the importance of considering the expected costs and benefits of applying alternative approximation procedures and heuristics for computation and knowledge acquisition. We discuss how knowledge about the structure of user utility can be used to control value tradeoffs for tailoring inference to alternative contexts. We address the notion of real-time rationality, focusing on the application of knowledge about the expected timewise-refinement abilities of reasoning strategies to balance the benefits of additional computation with the costs of acting with a partial result. We discuss the benefits of applying decision theory to control the solution of difficult problems given limitations and uncertainty in reasoning resources.
[ { "created": "Wed, 27 Mar 2013 19:50:20 GMT", "version": "v1" } ]
"2013-04-11T00:00:00"
[ [ "Horvitz", "Eric J.", "" ] ]
0no_new_dataset
1401.6876
Preslav Ivanov Nakov
Preslav Ivanov Nakov, Hwee Tou Ng
Improving Statistical Machine Translation for a Resource-Poor Language Using Related Resource-Rich Languages
null
Journal Of Artificial Intelligence Research, Volume 44, pages 179-222, 2012
10.1613/jair.3540
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel language-independent approach for improving machine translation for resource-poor languages by exploiting their similarity to resource-rich ones. More precisely, we improve the translation from a resource-poor source language X_1 into a resource-rich language Y given a bi-text containing a limited number of parallel sentences for X_1-Y and a larger bi-text for X_2-Y for some resource-rich language X_2 that is closely related to X_1. This is achieved by taking advantage of the opportunities that vocabulary overlap and similarities between the languages X_1 and X_2 in spelling, word order, and syntax offer: (1) we improve the word alignments for the resource-poor language, (2) we further augment it with additional translation options, and (3) we take care of potential spelling differences through appropriate transliteration. The evaluation for Indonesian- >English using Malay and for Spanish -> English using Portuguese and pretending Spanish is resource-poor shows an absolute gain of up to 1.35 and 3.37 BLEU points, respectively, which is an improvement over the best rivaling approaches, while using much less additional data. Overall, our method cuts the amount of necessary "real training data by a factor of 2--5.
[ { "created": "Thu, 23 Jan 2014 02:42:12 GMT", "version": "v1" } ]
"2014-01-28T00:00:00"
[ [ "Nakov", "Preslav Ivanov", "" ], [ "Ng", "Hwee Tou", "" ] ]
0no_new_dataset
1910.08031
Boyan Gao
Boyan Gao, Yongxin Yang, Henry Gouk, Timothy M. Hospedales
Deep clustering with concrete k-means
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of simultaneously learning a k-means clustering and deep feature representation from unlabelled data, which is of interest due to the potential of deep k-means to outperform traditional two-step feature extraction and shallow-clustering strategies. We achieve this by developing a gradient-estimator for the non-differentiable k-means objective via the Gumbel-Softmax reparameterisation trick. In contrast to previous attempts at deep clustering, our concrete k-means model can be optimised with respect to the canonical k-means objective and is easily trained end-to-end without resorting to alternating optimisation. We demonstrate the efficacy of our method on standard clustering benchmarks.
[ { "created": "Thu, 17 Oct 2019 16:57:15 GMT", "version": "v1" } ]
"2019-10-18T00:00:00"
[ [ "Gao", "Boyan", "" ], [ "Yang", "Yongxin", "" ], [ "Gouk", "Henry", "" ], [ "Hospedales", "Timothy M.", "" ] ]
0no_new_dataset
1710.00683
Xiao-Yong Yan
Xiaoyong Yan, Petter Minnhagen
The Dependence of Frequency Distributions on Multiple Meanings of Words, Codes and Signs
10 pages, 12 figures
Physica A 490, 554-564 (2018)
10.1016/j.physa.2017.08.133
null
cs.CL eess.AS physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dependence of the frequency distributions due to multiple meanings of words in a text is investigated by deleting letters. By coding the words with fewer letters the number of meanings per coded word increases. This increase is measured and used as an input in a predictive theory. For a text written in English, the word-frequency distribution is broad and fat-tailed, whereas if the words are only represented by their first letter the distribution becomes exponential. Both distribution are well predicted by the theory, as is the whole sequence obtained by consecutively representing the words by the first L=6,5,4,3,2,1 letters. Comparisons of texts written by Chinese characters and the same texts written by letter-codes are made and the similarity of the corresponding frequency-distributions are interpreted as a consequence of the multiple meanings of Chinese characters. This further implies that the difference of the shape for word-frequencies for an English text written by letters and a Chinese text written by Chinese characters is due to the coding and not to the language per se.
[ { "created": "Thu, 28 Sep 2017 00:39:25 GMT", "version": "v1" } ]
"2017-10-04T00:00:00"
[ [ "Yan", "Xiaoyong", "" ], [ "Minnhagen", "Petter", "" ] ]
0no_new_dataset
2107.00157
Zhiming Li
Zhiming Li, Xiaofei Xie, Haoliang Li, Zhengzi Xu, Yi Li, Yang Liu
Cross-Lingual Transfer Learning for Statistical Type Inference
null
null
null
null
cs.AI cs.LG
http://creativecommons.org/publicdomain/zero/1.0/
Hitherto statistical type inference systems rely thoroughly on supervised learning approaches, which require laborious manual effort to collect and label large amounts of data. Most Turing-complete imperative languages share similar control- and data-flow structures, which make it possible to transfer knowledge learned from one language to another. In this paper, we propose a cross-lingual transfer learning framework, PLATO, for statistical type inference, which allows us to leverage prior knowledge learned from the labeled dataset of one language and transfer it to the others, e.g., Python to JavaScript, Java to JavaScript, etc. PLATO is powered by a novel kernelized attention mechanism to constrain the attention scope of the backbone Transformer model such that the model is forced to base its prediction on commonly shared features among languages. In addition, we propose the syntax enhancement that augments the learning on the feature overlap among language domains. Furthermore, PLATO can also be used to improve the performance of the conventional supervised learning-based type inference by introducing cross-lingual augmentation, which enables the model to learn more general features across multiple languages. We evaluated PLATO under two settings: 1) under the cross-domain scenario that the target language data is not labeled or labeled partially, the results show that PLATO outperforms the state-of-the-art domain transfer techniques by a large margin, e.g., it improves the Python to TypeScript baseline by +5.40%@EM, +5.40%@weighted-F1, and 2) under the conventional monolingual supervised learning based scenario, PLATO improves the Python baseline by +4.40%@EM, +3.20%@EM (parametric).
[ { "created": "Thu, 1 Jul 2021 00:20:24 GMT", "version": "v1" }, { "created": "Sun, 26 Jun 2022 14:50:48 GMT", "version": "v2" }, { "created": "Sat, 26 Nov 2022 04:15:02 GMT", "version": "v3" }, { "created": "Sun, 4 Dec 2022 02:10:24 GMT", "version": "v4" }, { "created": "Sat, 24 Dec 2022 03:27:08 GMT", "version": "v5" } ]
"2022-12-27T00:00:00"
[ [ "Li", "Zhiming", "" ], [ "Xie", "Xiaofei", "" ], [ "Li", "Haoliang", "" ], [ "Xu", "Zhengzi", "" ], [ "Li", "Yi", "" ], [ "Liu", "Yang", "" ] ]
1new_dataset
1911.00157
Jennifer Paykin
Jennifer Paykin, Eric Mertens, Mark Tullsen, Luke Maurer, Beno\^it Razet, Alexander Bakst, and Scott Moore
Weird Machines as Insecure Compilation
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Weird machines---the computational models accessible by exploiting security vulnerabilities---arise from the difference between the model a programmer has in her head of how her program should run and the implementation that actually executes. Previous attempts to reason about or identify weird machines have viewed these models through the lens of formal computational structures such as state machines and Turing machines. But because programmers rarely think about programs in this way, it is difficult to effectively apply insights about weird machines to improve security. We present a new view of weird machines based on techniques from programming languages theory and secure compilation. Instead of an underspecified model drawn from a programmers' head, we start with a program written in a high-level source language that enforces security properties by design. Instead of state machines to describe computation, we use the well-defined semantics of this source language and a target language, into which the source program will be compiled. Weird machines are the sets of behaviors that can be achieved by a compiled source program in the target language that cannot be achieved in the source language directly. That is, exploits are witnesses to insecure compilation. This paper develops a framework for characterizing weird machines as insecure compilation, and illustrates the framework with examples of common exploits. We study the classes of security properties that exploits violate, the compositionality of exploits in a compiler stack, and the weird machines and mitigations that arise.
[ { "created": "Fri, 1 Nov 2019 00:17:40 GMT", "version": "v1" } ]
"2019-11-04T00:00:00"
[ [ "Paykin", "Jennifer", "" ], [ "Mertens", "Eric", "" ], [ "Tullsen", "Mark", "" ], [ "Maurer", "Luke", "" ], [ "Razet", "Benoît", "" ], [ "Bakst", "Alexander", "" ], [ "Moore", "Scott", "" ] ]
0no_new_dataset
1602.03681
Tomislav Slijep\v{c}evi\'c
Tomislav Slijep\v{c}evi\'c
Package equivalence in complex software network
null
null
null
null
cs.SI stat.ML
http://creativecommons.org/licenses/by/4.0/
The public package registry npm is one of the biggest software registry. With its 216 911 software packages, it forms a big network of software dependencies. In this paper we evaluate various methods for finding similar packages in the npm network, using only the structure of the graph. Namely, we want to find a way of categorizing similar packages, which would be useful for recommendation systems. This size enables us to compute meaningful results, as it softened the particularities of the graph. Npm is also quite famous as it is the default package repository of Node.js. We believe that it will make our results interesting for more people than a less used package repository. This makes it a good subject of analysis of software networks.
[ { "created": "Thu, 11 Feb 2016 11:26:01 GMT", "version": "v1" } ]
"2016-02-12T00:00:00"
[ [ "Slijepčević", "Tomislav", "" ] ]
0no_new_dataset
1611.05910
Olga Galinina
Olga Galinina, Konstantin Mikhaylov, Kaibin Huang, Sergey Andreev, Yevgeni Koucheryavy
Wirelessly Powered Urban Crowd Sensing over Wearables: Trading Energy for Data
8 pages, 5 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we put forward the mobile crowd sensing paradigm based on ubiquitous wearable devices carried by human users. The key challenge for mass user involvement into prospective urban crowd sending applications, such as monitoring of large-scale phenomena (e.g., traffic congestion and air pollution levels), is the appropriate sources of motivation. We thus advocate for the use of wireless power transfer provided in exchange for sensed data to incentivize the owners of wearables to participate in collaborative data collection. Based on this construction, we develop the novel concept of wirelessly powered crowd sensing and offer the corresponding network architecture considerations together with a systematic review of wireless charging techniques to implement it. Further, we contribute a detailed system-level feasibility study that reports on the achievable performance levels for the envisioned setup. Finally, the underlying energy-data trading mechanisms are discussed, and the work is concluded with outlining open research opportunities.
[ { "created": "Thu, 17 Nov 2016 21:47:58 GMT", "version": "v1" } ]
"2016-11-21T00:00:00"
[ [ "Galinina", "Olga", "" ], [ "Mikhaylov", "Konstantin", "" ], [ "Huang", "Kaibin", "" ], [ "Andreev", "Sergey", "" ], [ "Koucheryavy", "Yevgeni", "" ] ]
0no_new_dataset
2009.14133
David Calhas
David Calhas, Rui Henriques
EEG to fMRI Synthesis: Is Deep Learning a candidate?
null
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by-nc-sa/4.0/
Advances on signal, image and video generation underly major breakthroughs on generative medical imaging tasks, including Brain Image Synthesis. Still, the extent to which functional Magnetic Ressonance Imaging (fMRI) can be mapped from the brain electrophysiology remains largely unexplored. This work provides the first comprehensive view on how to use state-of-the-art principles from Neural Processing to synthesize fMRI data from electroencephalographic (EEG) data. Given the distinct spatiotemporal nature of haemodynamic and electrophysiological signals, this problem is formulated as the task of learning a mapping function between multivariate time series with highly dissimilar structures. A comparison of state-of-the-art synthesis approaches, including Autoencoders, Generative Adversarial Networks and Pairwise Learning, is undertaken. Results highlight the feasibility of EEG to fMRI brain image mappings, pinpointing the role of current advances in Machine Learning and showing the relevance of upcoming contributions to further improve performance. EEG to fMRI synthesis offers a way to enhance and augment brain image data, and guarantee access to more affordable, portable and long-lasting protocols of brain activity monitoring. The code used in this manuscript is available in Github and the datasets are open source.
[ { "created": "Tue, 29 Sep 2020 16:29:20 GMT", "version": "v1" } ]
"2020-09-30T00:00:00"
[ [ "Calhas", "David", "" ], [ "Henriques", "Rui", "" ] ]
0no_new_dataset
1905.05934
Chaoqi Wang
Chaoqi Wang, Roger Grosse, Sanja Fidler, Guodong Zhang
EigenDamage: Structured Pruning in the Kronecker-Factored Eigenbasis
ICML 2019
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reducing the test time resource requirements of a neural network while preserving test accuracy is crucial for running inference on resource-constrained devices. To achieve this goal, we introduce a novel network reparameterization based on the Kronecker-factored eigenbasis (KFE), and then apply Hessian-based structured pruning methods in this basis. As opposed to existing Hessian-based pruning algorithms which do pruning in parameter coordinates, our method works in the KFE where different weights are approximately independent, enabling accurate pruning and fast computation. We demonstrate empirically the effectiveness of the proposed method through extensive experiments. In particular, we highlight that the improvements are especially significant for more challenging datasets and networks. With negligible loss of accuracy, an iterative-pruning version gives a 10$\times$ reduction in model size and a 8$\times$ reduction in FLOPs on wide ResNet32.
[ { "created": "Wed, 15 May 2019 03:53:08 GMT", "version": "v1" } ]
"2019-05-16T00:00:00"
[ [ "Wang", "Chaoqi", "" ], [ "Grosse", "Roger", "" ], [ "Fidler", "Sanja", "" ], [ "Zhang", "Guodong", "" ] ]
0no_new_dataset
2401.14398
Ege Ozguroglu
Ege Ozguroglu, Ruoshi Liu, D\'idac Sur\'is, Dian Chen, Achal Dave, Pavel Tokmakov, Carl Vondrick
pix2gestalt: Amodal Segmentation by Synthesizing Wholes
Website: https://gestalt.cs.columbia.edu/
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce pix2gestalt, a framework for zero-shot amodal segmentation, which learns to estimate the shape and appearance of whole objects that are only partially visible behind occlusions. By capitalizing on large-scale diffusion models and transferring their representations to this task, we learn a conditional diffusion model for reconstructing whole objects in challenging zero-shot cases, including examples that break natural and physical priors, such as art. As training data, we use a synthetically curated dataset containing occluded objects paired with their whole counterparts. Experiments show that our approach outperforms supervised baselines on established benchmarks. Our model can furthermore be used to significantly improve the performance of existing object recognition and 3D reconstruction methods in the presence of occlusions.
[ { "created": "Thu, 25 Jan 2024 18:57:36 GMT", "version": "v1" } ]
"2024-01-26T00:00:00"
[ [ "Ozguroglu", "Ege", "" ], [ "Liu", "Ruoshi", "" ], [ "Surís", "Dídac", "" ], [ "Chen", "Dian", "" ], [ "Dave", "Achal", "" ], [ "Tokmakov", "Pavel", "" ], [ "Vondrick", "Carl", "" ] ]
1new_dataset
2402.03824
Giuseppe Paolo Dr
Giuseppe Paolo, Jonas Gonzalez-Billandon, Bal\'azs K\'egl
A call for embodied AI
Published in ICML 2024 Position paper track
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose Embodied AI as the next fundamental step in the pursuit of Artificial General Intelligence, juxtaposing it against current AI advancements, particularly Large Language Models. We traverse the evolution of the embodiment concept across diverse fields - philosophy, psychology, neuroscience, and robotics - to highlight how EAI distinguishes itself from the classical paradigm of static learning. By broadening the scope of Embodied AI, we introduce a theoretical framework based on cognitive architectures, emphasizing perception, action, memory, and learning as essential components of an embodied agent. This framework is aligned with Friston's active inference principle, offering a comprehensive approach to EAI development. Despite the progress made in the field of AI, substantial challenges, such as the formulation of a novel AI learning theory and the innovation of advanced hardware, persist. Our discussion lays down a foundational guideline for future Embodied AI research. Highlighting the importance of creating Embodied AI agents capable of seamless communication, collaboration, and coexistence with humans and other intelligent entities within real-world environments, we aim to steer the AI community towards addressing the multifaceted challenges and seizing the opportunities that lie ahead in the quest for AGI.
[ { "created": "Tue, 6 Feb 2024 09:11:20 GMT", "version": "v1" }, { "created": "Tue, 28 May 2024 15:07:37 GMT", "version": "v2" } ]
"2024-05-29T00:00:00"
[ [ "Paolo", "Giuseppe", "" ], [ "Gonzalez-Billandon", "Jonas", "" ], [ "Kégl", "Balázs", "" ] ]
0no_new_dataset
2209.14262
Donghua Wang
Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen
A Survey on Physical Adversarial Attack in Computer Vision
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past decade, deep learning has revolutionized conventional tasks that rely on hand-craft feature extraction with its strong feature learning capability, leading to substantial enhancements in traditional tasks. However, deep neural networks (DNNs) have been demonstrated to be vulnerable to adversarial examples crafted by malicious tiny noise, which is imperceptible to human observers but can make DNNs output the wrong result. Existing adversarial attacks can be categorized into digital and physical adversarial attacks. The former is designed to pursue strong attack performance in lab environments while hardly remaining effective when applied to the physical world. In contrast, the latter focus on developing physical deployable attacks, thus exhibiting more robustness in complex physical environmental conditions. Recently, with the increasing deployment of the DNN-based system in the real world, strengthening the robustness of these systems is an emergency, while exploring physical adversarial attacks exhaustively is the precondition. To this end, this paper reviews the evolution of physical adversarial attacks against DNN-based computer vision tasks, expecting to provide beneficial information for developing stronger physical adversarial attacks. Specifically, we first proposed a taxonomy to categorize the current physical adversarial attacks and grouped them. Then, we discuss the existing physical attacks and focus on the technique for improving the robustness of physical attacks under complex physical environmental conditions. Finally, we discuss the issues of the current physical adversarial attacks to be solved and give promising directions.
[ { "created": "Wed, 28 Sep 2022 17:23:52 GMT", "version": "v1" }, { "created": "Wed, 4 Jan 2023 16:17:42 GMT", "version": "v2" }, { "created": "Mon, 18 Sep 2023 05:47:21 GMT", "version": "v3" } ]
"2023-09-19T00:00:00"
[ [ "Wang", "Donghua", "" ], [ "Yao", "Wen", "" ], [ "Jiang", "Tingsong", "" ], [ "Tang", "Guijian", "" ], [ "Chen", "Xiaoqian", "" ] ]
0no_new_dataset
2305.07571
Harshad Khadilkar
Harshad Khadilkar
Supplementing Gradient-Based Reinforcement Learning with Simple Evolutionary Ideas
17 pages
null
null
null
cs.NE cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
We present a simple, sample-efficient algorithm for introducing large but directed learning steps in reinforcement learning (RL), through the use of evolutionary operators. The methodology uses a population of RL agents training with a common experience buffer, with occasional crossovers and mutations of the agents in order to search efficiently through the policy space. Unlike prior literature on combining evolutionary search (ES) with RL, this work does not generate a distribution of agents from a common mean and covariance matrix. Neither does it require the evaluation of the entire population of policies at every time step. Instead, we focus on gradient-based training throughout the life of every policy (individual), with a sparse amount of evolutionary exploration. The resulting algorithm is shown to be robust to hyperparameter variations. As a surprising corollary, we show that simply initialising and training multiple RL agents with a common memory (with no further evolutionary updates) outperforms several standard RL baselines.
[ { "created": "Wed, 10 May 2023 09:46:53 GMT", "version": "v1" } ]
"2023-05-15T00:00:00"
[ [ "Khadilkar", "Harshad", "" ] ]
0no_new_dataset
1812.00877
Glib Kechyn
Glib Kechyn
Automatic lesion boundary detection in dermoscopy
null
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This manuscript addresses the problem of the automatic lesion boundary detection in dermoscopy, using deep neural networks. An approach is based on the adaptation of the U-net convolutional neural network with skip connections for lesion boundary segmentation task. I hope this paper could serve, to some extent, as an experiment of using deep convolutional networks in biomedical segmentation task and as a guideline of the boundary detection benchmark, inspiring further attempts and researches.
[ { "created": "Fri, 23 Nov 2018 22:36:36 GMT", "version": "v1" } ]
"2018-12-04T00:00:00"
[ [ "Kechyn", "Glib", "" ] ]
0no_new_dataset
cs/9712101
null
J. Frank, P. Cheeseman, J. Stutz
When Gravity Fails: Local Search Topology
See http://www.jair.org/ for any accompanying files
Journal of Artificial Intelligence Research, Vol 7, (1997), 249-281
null
null
cs.AI
null
Local search algorithms for combinatorial search problems frequently encounter a sequence of states in which it is impossible to improve the value of the objective function; moves through these regions, called plateau moves, dominate the time spent in local search. We analyze and characterize plateaus for three different classes of randomly generated Boolean Satisfiability problems. We identify several interesting features of plateaus that impact the performance of local search algorithms. We show that local minima tend to be small but occasionally may be very large. We also show that local minima can be escaped without unsatisfying a large number of clauses, but that systematically searching for an escape route may be computationally expensive if the local minimum is large. We show that plateaus with exits, called benches, tend to be much larger than minima, and that some benches have very few exit states which local search can use to escape. We show that the solutions (i.e., global minima) of randomly generated problem instances form clusters, which behave similarly to local minima. We revisit several enhancements of local search algorithms and explain their performance in light of our results. Finally we discuss strategies for creating the next generation of local search algorithms.
[ { "created": "Mon, 1 Dec 1997 00:00:00 GMT", "version": "v1" } ]
"2014-11-17T00:00:00"
[ [ "Frank", "J.", "" ], [ "Cheeseman", "P.", "" ], [ "Stutz", "J.", "" ] ]
0no_new_dataset
1911.06393
Daniel Stoller
Daniel Stoller, Mi Tian, Sebastian Ewert, Simon Dixon
Seq-U-Net: A One-Dimensional Causal U-Net for Efficient Sequence Modelling
Code available at https://github.com/f90/Seq-U-Net
null
null
null
cs.LG cs.SD eess.AS stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional neural networks (CNNs) with dilated filters such as the Wavenet or the Temporal Convolutional Network (TCN) have shown good results in a variety of sequence modelling tasks. However, efficiently modelling long-term dependencies in these sequences is still challenging. Although the receptive field of these models grows exponentially with the number of layers, computing the convolutions over very long sequences of features in each layer is time and memory-intensive, prohibiting the use of longer receptive fields in practice. To increase efficiency, we make use of the "slow feature" hypothesis stating that many features of interest are slowly varying over time. For this, we use a U-Net architecture that computes features at multiple time-scales and adapt it to our auto-regressive scenario by making convolutions causal. We apply our model ("Seq-U-Net") to a variety of tasks including language and audio generation. In comparison to TCN and Wavenet, our network consistently saves memory and computation time, with speed-ups for training and inference of over 4x in the audio generation experiment in particular, while achieving a comparable performance in all tasks.
[ { "created": "Thu, 14 Nov 2019 21:39:20 GMT", "version": "v1" } ]
"2019-11-18T00:00:00"
[ [ "Stoller", "Daniel", "" ], [ "Tian", "Mi", "" ], [ "Ewert", "Sebastian", "" ], [ "Dixon", "Simon", "" ] ]
0no_new_dataset
1712.04274
Rick Fritschek
Rick Fritschek and Gerhard Wunder
On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel with a Helper: Achievable Schemes and Upper Bounds
15 pages, submitted to IEEE Transactions on Information Forensics and Security; Revision: changed the structure of the paper and improved readability
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study deterministic approximations of the Gaussian two-user multiple access wiretap channel (G-MAC-WT) and the Gaussian wiretap channel with a helper (G-WT-H). These approximations enable results beyond the recently shown 2/3 and 1/2 secure degrees of freedom (s.d.o.f.) for the G-MAC-WT and the G-WT-H, respectively. While the s.d.o.f. were obtained by real interference alignment, our approach uses signal-scale alignment. We show achievable schemes which are independent of the rationality of the channel gains. Moreover, our results can differentiate between channel strengths, in particular between both users, and establishes secrecy rates dependent on this difference. We can show that the resulting achievable secrecy rates tend to the s.d.o.f. for vanishing channel gain differences. Moreover, we extend previous and develop new techniques to prove general s.d.o.f. bounds for varying channel strengths and show that our achievable schemes reach the bounds for certain channel gain parameters. We believe that our analysis is the next step towards a constant-gap analysis of the G-MAC-WT and the G-WT-H.
[ { "created": "Tue, 12 Dec 2017 13:04:56 GMT", "version": "v1" }, { "created": "Mon, 23 Apr 2018 10:03:05 GMT", "version": "v2" } ]
"2018-04-24T00:00:00"
[ [ "Fritschek", "Rick", "" ], [ "Wunder", "Gerhard", "" ] ]
0no_new_dataset
2402.15929
Isha Chaudhary
Isha Chaudhary, Vedaant V. Jain, Gagandeep Singh
QuaCer-C: Quantitative Certification of Knowledge Comprehension in LLMs
null
null
null
null
cs.AI cs.CL cs.LG
http://creativecommons.org/licenses/by/4.0/
Large Language Models (LLMs) have demonstrated impressive performance on several benchmarks. However, traditional studies do not provide formal guarantees on the performance of LLMs. In this work, we propose a novel certification framework for LLM, QuaCer-C, wherein we formally certify the knowledge-comprehension capabilities of popular LLMs. Our certificates are quantitative - they consist of high-confidence, tight bounds on the probability that the target LLM gives the correct answer on any relevant knowledge comprehension prompt. Our certificates for the Llama, Vicuna, and Mistral LLMs indicate that the knowledge comprehension capability improves with an increase in the number of parameters and that the Mistral model is less performant than the rest in this evaluation.
[ { "created": "Sat, 24 Feb 2024 23:16:57 GMT", "version": "v1" } ]
"2024-02-27T00:00:00"
[ [ "Chaudhary", "Isha", "" ], [ "Jain", "Vedaant V.", "" ], [ "Singh", "Gagandeep", "" ] ]
0no_new_dataset
2406.07908
Zheng Dai
Zheng Dai, David K Gifford
Ablation Based Counterfactuals
11 pages, 7 figures, appendix included
null
null
null
cs.LG cs.AI stat.ML
http://creativecommons.org/licenses/by/4.0/
Diffusion models are a class of generative models that generate high-quality samples, but at present it is difficult to characterize how they depend upon their training data. This difficulty raises scientific and regulatory questions, and is a consequence of the complexity of diffusion models and their sampling process. To analyze this dependence, we introduce Ablation Based Counterfactuals (ABC), a method of performing counterfactual analysis that relies on model ablation rather than model retraining. In our approach, we train independent components of a model on different but overlapping splits of a training set. These components are then combined into a single model, from which the causal influence of any training sample can be removed by ablating a combination of model components. We demonstrate how we can construct a model like this using an ensemble of diffusion models. We then use this model to study the limits of training data attribution by enumerating full counterfactual landscapes, and show that single source attributability diminishes with increasing training data size. Finally, we demonstrate the existence of unattributable samples.
[ { "created": "Wed, 12 Jun 2024 06:22:51 GMT", "version": "v1" } ]
"2024-06-13T00:00:00"
[ [ "Dai", "Zheng", "" ], [ "Gifford", "David K", "" ] ]
0no_new_dataset
1804.02316
Massimiliano De Leoni
Massimiliano de Leoni, Paolo Felli, and Marco Montali
A Holistic Approach for Soundness Verification of Decision-Aware Process Models (extended version)
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The last decade has witnessed an increasing transformation in the design, engineering, and mining of processes, moving from a pure control-flow perspective to more integrated models where also data and decisions are explicitly considered. This calls for methods and techniques able to ascertain the correctness of such integrated models. Differently from previous approaches, which mainly focused on the local interplay between decisions and their corresponding outgoing branches, we introduce a holistic approach to verify the end-to-end soundness of a Petri net-based process model, enriched with case data and decisions. In particular, we present an effective, implemented technique that verifies soundness by translating the input net into a colored Petri net with bounded color domains, which can then be analyzed using conventional tools. We prove correctness and termination of this technique. In addition, we relate our contribution to recent results on decision-aware soundness, showing that our approach can be readily applied there.
[ { "created": "Fri, 6 Apr 2018 15:09:32 GMT", "version": "v1" } ]
"2018-04-09T00:00:00"
[ [ "de Leoni", "Massimiliano", "" ], [ "Felli", "Paolo", "" ], [ "Montali", "Marco", "" ] ]
0no_new_dataset
1506.08291
Ananthanarayanan Chockalingam
T. Datta, H. S. Eshwaraiah, and A. Chockalingam
Generalized Space and Frequency Index Modulation
IEEE Trans. on Vehicular Technology, accepted
null
10.1109/TVT.2015.2451095
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unlike in conventional modulation where information bits are conveyed only through symbols from modulation alphabets defined in the complex plane (e.g., quadrature amplitude modulation (QAM), phase shift keying (PSK)), in index modulation (IM), additional information bits are conveyed through indices of certain transmit entities that get involved in the transmission. Transmit antennas in multi-antenna systems and subcarriers in multi-carrier systems are examples of such transmit entities that can be used to convey additional information bits through indexing. In this paper, we introduce {\em generalized space and frequency index modulation}, where the indices of active transmit antennas and subcarriers convey information bits. We first introduce index modulation in the spatial domain, referred to as generalized spatial index modulation (GSIM). For GSIM, where bits are indexed only in the spatial domain, we derive the expression for achievable rate as well as easy-to-compute upper and lower bounds on this rate. We show that the achievable rate in GSIM can be more than that in spatial multiplexing, and analytically establish the condition under which this can happen. It is noted that GSIM achieves this higher rate using fewer transmit radio frequency (RF) chains compared to spatial multiplexing. We also propose a Gibbs sampling based detection algorithm for GSIM and show that GSIM can achieve better bit error rate (BER) performance than spatial multiplexing. For generalized space-frequency index modulation (GSFIM), where bits are encoded through indexing in both active antennas as well as subcarriers, we derive the achievable rate expression. Numerical results show that GSFIM can achieve higher rates compared to conventional MIMO-OFDM. Also, BER results show the potential for GSFIM performing better than MIMO-OFDM.
[ { "created": "Sat, 27 Jun 2015 13:31:58 GMT", "version": "v1" } ]
"2016-11-18T00:00:00"
[ [ "Datta", "T.", "" ], [ "Eshwaraiah", "H. S.", "" ], [ "Chockalingam", "A.", "" ] ]
0no_new_dataset
2002.11385
Xingbo Fu
Xingbo Fu, Feng Gao, Jiang Wu
When Do Drivers Concentrate? Attention-based Driver Behavior Modeling With Deep Reinforcement Learning
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Driver distraction a significant risk to driving safety. Apart from spatial domain, research on temporal inattention is also necessary. This paper aims to figure out the pattern of drivers' temporal attention allocation. In this paper, we propose an actor-critic method - Attention-based Twin Delayed Deep Deterministic policy gradient (ATD3) algorithm to approximate a driver' s action according to observations and measure the driver' s attention allocation for consecutive time steps in car-following model. Considering reaction time, we construct the attention mechanism in the actor network to capture temporal dependencies of consecutive observations. In the critic network, we employ Twin Delayed Deep Deterministic policy gradient algorithm (TD3) to address overestimated value estimates persisting in the actor-critic algorithm. We conduct experiments on real-world vehicle trajectory datasets and show that the accuracy of our proposed approach outperforms seven baseline algorithms. Moreover, the results reveal that the attention of the drivers in smooth vehicles is uniformly distributed in previous observations while they keep their attention to recent observations when sudden decreases of relative speeds occur. This study is the first contribution to drivers' temporal attention and provides scientific support for safety measures in transportation systems from the perspective of data mining.
[ { "created": "Wed, 26 Feb 2020 09:56:36 GMT", "version": "v1" }, { "created": "Sun, 7 Jun 2020 06:09:55 GMT", "version": "v2" } ]
"2020-06-09T00:00:00"
[ [ "Fu", "Xingbo", "" ], [ "Gao", "Feng", "" ], [ "Wu", "Jiang", "" ] ]
1new_dataset
2003.12319
Xavier Porte
Louis Andreoli, Xavier Porte, St\'ephane Chr\'etien, Maxime Jacquot, Laurent Larger and Daniel Brunner
Boolean learning under noise-perturbations in hardware neural networks
8 pages, 5 figures
Nanophotonics (published online ahead of print), 20200171 (2020)
10.1515/nanoph-2020-0171
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A high efficiency hardware integration of neural networks benefits from realizing nonlinearity, network connectivity and learning fully in a physical substrate. Multiple systems have recently implemented some or all of these operations, yet the focus was placed on addressing technological challenges. Fundamental questions regarding learning in hardware neural networks remain largely unexplored. Noise in particular is unavoidable in such architectures, and here we investigate its interaction with a learning algorithm using an opto-electronic recurrent neural network. We find that noise strongly modifies the system's path during convergence, and surprisingly fully decorrelates the final readout weight matrices. This highlights the importance of understanding architecture, noise and learning algorithm as interacting players, and therefore identifies the need for mathematical tools for noisy, analogue system optimization.
[ { "created": "Fri, 27 Mar 2020 10:36:03 GMT", "version": "v1" }, { "created": "Fri, 25 Jun 2021 09:41:21 GMT", "version": "v2" } ]
"2021-06-28T00:00:00"
[ [ "Andreoli", "Louis", "" ], [ "Porte", "Xavier", "" ], [ "Chrétien", "Stéphane", "" ], [ "Jacquot", "Maxime", "" ], [ "Larger", "Laurent", "" ], [ "Brunner", "Daniel", "" ] ]
0no_new_dataset
2308.10604
Dongwook Lee Ph.D.
Dongwook Lee, Wonjun Choi, Seohyung Lee, ByungIn Yoo, Eunho Yang, Seongju Hwang
BackTrack: Robust template update via Backward Tracking of candidate template
14 pages, 7 figures
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Variations of target appearance such as deformations, illumination variance, occlusion, etc., are the major challenges of visual object tracking that negatively impact the performance of a tracker. An effective method to tackle these challenges is template update, which updates the template to reflect the change of appearance in the target object during tracking. However, with template updates, inadequate quality of new templates or inappropriate timing of updates may induce a model drift problem, which severely degrades the tracking performance. Here, we propose BackTrack, a robust and reliable method to quantify the confidence of the candidate template by backward tracking it on the past frames. Based on the confidence score of candidates from BackTrack, we can update the template with a reliable candidate at the right time while rejecting unreliable candidates. BackTrack is a generic template update scheme and is applicable to any template-based trackers. Extensive experiments on various tracking benchmarks verify the effectiveness of BackTrack over existing template update algorithms, as it achieves SOTA performance on various tracking benchmarks.
[ { "created": "Mon, 21 Aug 2023 10:00:59 GMT", "version": "v1" } ]
"2023-08-22T00:00:00"
[ [ "Lee", "Dongwook", "" ], [ "Choi", "Wonjun", "" ], [ "Lee", "Seohyung", "" ], [ "Yoo", "ByungIn", "" ], [ "Yang", "Eunho", "" ], [ "Hwang", "Seongju", "" ] ]
0no_new_dataset
2403.03822
Jianing Hao
Zezheng Feng, Fang Zhu, Hongjun Wang, Jianing Hao, ShuangHua Yang, Wei Zeng, Huamin Qu
HoLens: A Visual Analytics Design for Higher-order Movement Modeling and Visualization
20 pages, 18 figures, is accepted by computational visual media journal
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Higher-order patterns reveal sequential multistep state transitions, which are usually superior to origin-destination analysis, which depicts only first-order geospatial movement patterns. Conventional methods for higher-order movement modeling first construct a directed acyclic graph (DAG) of movements, then extract higher-order patterns from the DAG. However, DAG-based methods heavily rely on the identification of movement keypoints that are challenging for sparse movements and fail to consider the temporal variants that are critical for movements in urban environments. To overcome the limitations, we propose HoLens, a novel approach for modeling and visualizing higher-order movement patterns in the context of an urban environment. HoLens mainly makes twofold contributions: first, we design an auto-adaptive movement aggregation algorithm that self-organizes movements hierarchically by considering spatial proximity, contextual information, and temporal variability; second, we develop an interactive visual analytics interface consisting of well-established visualization techniques, including the H-Flow for visualizing the higher-order patterns on the map and the higher-order state sequence chart for representing the higher-order state transitions. Two real-world case studies manifest that the method can adaptively aggregate the data and exhibit the process of how to explore the higher-order patterns by HoLens. We also demonstrate our approach's feasibility, usability, and effectiveness through an expert interview with three domain experts.
[ { "created": "Wed, 6 Mar 2024 16:08:51 GMT", "version": "v1" } ]
"2024-03-07T00:00:00"
[ [ "Feng", "Zezheng", "" ], [ "Zhu", "Fang", "" ], [ "Wang", "Hongjun", "" ], [ "Hao", "Jianing", "" ], [ "Yang", "ShuangHua", "" ], [ "Zeng", "Wei", "" ], [ "Qu", "Huamin", "" ] ]
1new_dataset
1007.0638
Debotosh Bhattacharjee
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, and Mahantapas Kundu
Human Face Recognition using Line Features
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we investigate a novel approach to handle the challenges of face recognition, which includes rotation, scale, occlusion, illumination etc. Here, we have used thermal face images as those are capable to minimize the affect of illumination changes and occlusion due to moustache, beards, adornments etc. The proposed approach registers the training and testing thermal face images in polar coordinate, which is capable to handle complicacies introduced by scaling and rotation. Line features are extracted from thermal polar images and feature vectors are constructed using these line. Feature vectors thus obtained passes through principal component analysis (PCA) for the dimensionality reduction of feature vectors. Finally, the images projected into eigenspace are classified using a multi-layer perceptron. In the experiments we have used Object Tracking and Classification Beyond Visible Spectrum (OTCBVS) database. Experimental results show that the proposed approach significantly improves the verification and identification performance and the success rate is 99.25%.
[ { "created": "Mon, 5 Jul 2010 08:10:30 GMT", "version": "v1" } ]
"2010-07-06T00:00:00"
[ [ "Bhowmik", "Mrinal Kanti", "" ], [ "Bhattacharjee", "Debotosh", "" ], [ "Nasipuri", "Mita", "" ], [ "Basu", "Dipak Kumar", "" ], [ "Kundu", "Mahantapas", "" ] ]
1new_dataset
2201.07821
Zhongyi Lin
Zhongyi Lin and Louis Feng and Ehsan K. Ardestani and Jaewon Lee and John Lundell and Changkyu Kim and Arun Kejariwal and John D. Owens
Building a Performance Model for Deep Learning Recommendation Model Training on GPUs
11 pages, 11 figures. Appears in the 29th IEEE International Conference on High-Performance Computing, Data, and Analytics (HiPC 2022)
null
null
null
cs.LG cs.PF
http://creativecommons.org/licenses/by/4.0/
We devise a performance model for GPU training of Deep Learning Recommendation Models (DLRM), whose GPU utilization is low compared to other well-optimized CV and NLP models. We show that both the device active time (the sum of kernel runtimes) but also the device idle time are important components of the overall device time. We therefore tackle them separately by (1) flexibly adopting heuristic-based and ML-based kernel performance models for operators that dominate the device active time, and (2) categorizing operator overheads into five types to determine quantitatively their contribution to the device active time. Combining these two parts, we propose a critical-path-based algorithm to predict the per-batch training time of DLRM by traversing its execution graph. We achieve less than 10% geometric mean average error (GMAE) in all kernel performance modeling, and 4.61% and 7.96% geomean errors for GPU active time and overall E2E per-batch training time prediction with overheads from individual workloads, respectively. A slight increase of 2.19% incurred in E2E prediction error with shared overheads across workloads suggests the feasibility of using shared overheads in large-scale prediction. We show that our general performance model not only achieves low prediction error on DLRM, which has highly customized configurations and is dominated by multiple factors but also yields comparable accuracy on other compute-bound ML models targeted by most previous methods. Using this performance model and graph-level data and task dependency analysis, we show our system can provide more general model-system co-design than previous methods.
[ { "created": "Wed, 19 Jan 2022 19:05:42 GMT", "version": "v1" }, { "created": "Wed, 16 Nov 2022 23:25:25 GMT", "version": "v2" } ]
"2022-11-18T00:00:00"
[ [ "Lin", "Zhongyi", "" ], [ "Feng", "Louis", "" ], [ "Ardestani", "Ehsan K.", "" ], [ "Lee", "Jaewon", "" ], [ "Lundell", "John", "" ], [ "Kim", "Changkyu", "" ], [ "Kejariwal", "Arun", "" ], [ "Owens", "John D.", "" ] ]
0no_new_dataset
1911.08816
Yuki Ueda
Dong Wang and Yuki Ueda and Raula Gaikovina Kula and Takashi Ishio and Kenichi Matsumoto
Can We Benchmark Code Review Studies? A Systematic Mapping Study of Methodology, Dataset, and Metric
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Code Review (CR) is the cornerstone for software quality assurance and a crucial practice for software development. As CR research matures, it can be difficult to keep track of the best practices and state-of-the-art in methodology, dataset, and metric. This paper investigates the potential of benchmarking by collecting methodology, dataset, and metric of CR studies. A systematic mapping study was conducted. A total of 112 studies from 19,847 papers published in high-impact venues between the years 2011 and 2019 were selected and analyzed. First, we find that empirical evaluation is the most common methodology (65% of papers), with solution and experience being the least common methodology. Second, we highlight 50% of papers that use the quantitative method or mixed-method have the potential for replicability. Third, we identify 457 metrics that are grouped into sixteen core metric sets, applied to nine Software Engineering topics, showing different research topics tend to use specific metric sets. We conclude that at this stage, we cannot benchmark CR studies. Nevertheless, a common benchmark will facilitate new researchers, including experts from other fields, to innovate new techniques and build on top of already established methodologies. A full replication is available at https://naist-se.github.io/code-review/.
[ { "created": "Wed, 20 Nov 2019 10:50:29 GMT", "version": "v1" }, { "created": "Tue, 13 Apr 2021 04:45:47 GMT", "version": "v2" } ]
"2021-04-14T00:00:00"
[ [ "Wang", "Dong", "" ], [ "Ueda", "Yuki", "" ], [ "Kula", "Raula Gaikovina", "" ], [ "Ishio", "Takashi", "" ], [ "Matsumoto", "Kenichi", "" ] ]
1new_dataset
2403.16005
Yucheng Suo
Yucheng Suo, Fan Ma, Linchao Zhu, Yi Yang
Knowledge-Enhanced Dual-stream Zero-shot Composed Image Retrieval
CVPR 2024
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the zero-shot Composed Image Retrieval (ZS-CIR) task, which is to retrieve the target image given a reference image and a description without training on the triplet datasets. Previous works generate pseudo-word tokens by projecting the reference image features to the text embedding space. However, they focus on the global visual representation, ignoring the representation of detailed attributes, e.g., color, object number and layout. To address this challenge, we propose a Knowledge-Enhanced Dual-stream zero-shot composed image retrieval framework (KEDs). KEDs implicitly models the attributes of the reference images by incorporating a database. The database enriches the pseudo-word tokens by providing relevant images and captions, emphasizing shared attribute information in various aspects. In this way, KEDs recognizes the reference image from diverse perspectives. Moreover, KEDs adopts an extra stream that aligns pseudo-word tokens with textual concepts, leveraging pseudo-triplets mined from image-text pairs. The pseudo-word tokens generated in this stream are explicitly aligned with fine-grained semantics in the text embedding space. Extensive experiments on widely used benchmarks, i.e. ImageNet-R, COCO object, Fashion-IQ and CIRR, show that KEDs outperforms previous zero-shot composed image retrieval methods.
[ { "created": "Sun, 24 Mar 2024 04:23:56 GMT", "version": "v1" } ]
"2024-03-26T00:00:00"
[ [ "Suo", "Yucheng", "" ], [ "Ma", "Fan", "" ], [ "Zhu", "Linchao", "" ], [ "Yang", "Yi", "" ] ]
0no_new_dataset
2309.09467
Michael Mislove
Younesse Kaddar and Sam Staton
A model of stochastic memoization and name generation in probabilistic programming: categorical semantics via monads on presheaf categories
To be published in the MFPS 2023 Proceedings as part of the Electronic Notes in Theoretical Informatics and Computer Science (ENTICS) series
Electronic Notes in Theoretical Informatics and Computer Science, Volume 3 - Proceedings of MFPS XXXIX (November 23, 2023) entics:12291
10.46298/entics.12291
null
cs.PL
http://creativecommons.org/licenses/by-sa/4.0/
Stochastic memoization is a higher-order construct of probabilistic programming languages that is key in Bayesian nonparametrics, a modular approach that allows us to extend models beyond their parametric limitations and compose them in an elegant and principled manner. Stochastic memoization is simple and useful in practice, but semantically elusive, particularly regarding dataflow transformations. As the naive implementation resorts to the state monad, which is not commutative, it is not clear if stochastic memoization preserves the dataflow property -- i.e., whether we can reorder the lines of a program without changing its semantics, provided the dataflow graph is preserved. In this paper, we give an operational and categorical semantics to stochastic memoization and name generation in the context of a minimal probabilistic programming language, for a restricted class of functions. Our contribution is a first model of stochastic memoization of constant Bernoulli functions with a non-enumerable type, which validates data flow transformations, bridging the gap between traditional probability theory and higher-order probability models. Our model uses a presheaf category and a novel probability monad on it.
[ { "created": "Mon, 18 Sep 2023 04:02:03 GMT", "version": "v1" }, { "created": "Tue, 21 Nov 2023 14:28:35 GMT", "version": "v2" } ]
"2024-02-14T00:00:00"
[ [ "Kaddar", "Younesse", "" ], [ "Staton", "Sam", "" ] ]
0no_new_dataset
1812.04199
Haruna Isah
Dev Shah, Haruna Isah, Farhana Zulkernine
Predicting the Effects of News Sentiments on the Stock Market
4 pages
null
10.1109/BigData.2018.8621884
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stock market forecasting is very important in the planning of business activities. Stock price prediction has attracted many researchers in multiple disciplines including computer science, statistics, economics, finance, and operations research. Recent studies have shown that the vast amount of online information in the public domain such as Wikipedia usage pattern, news stories from the mainstream media, and social media discussions can have an observable effect on investors opinions towards financial markets. The reliability of the computational models on stock market prediction is important as it is very sensitive to the economy and can directly lead to financial loss. In this paper, we retrieved, extracted, and analyzed the effects of news sentiments on the stock market. Our main contributions include the development of a sentiment analysis dictionary for the financial sector, the development of a dictionary-based sentiment analysis model, and the evaluation of the model for gauging the effects of news sentiments on stocks for the pharmaceutical market. Using only news sentiments, we achieved a directional accuracy of 70.59% in predicting the trends in short-term stock price movement.
[ { "created": "Tue, 11 Dec 2018 03:06:02 GMT", "version": "v1" } ]
"2019-07-23T00:00:00"
[ [ "Shah", "Dev", "" ], [ "Isah", "Haruna", "" ], [ "Zulkernine", "Farhana", "" ] ]
0no_new_dataset
2205.15608
Wei Mao
Wei Mao and Miaomiao Liu and Mathieu Salzmann
Weakly-supervised Action Transition Learning for Stochastic Human Motion Prediction
CVPR2022 (Oral)
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the task of action-driven stochastic human motion prediction, which aims to predict multiple plausible future motions given a sequence of action labels and a short motion history. This differs from existing works, which predict motions that either do not respect any specific action category, or follow a single action label. In particular, addressing this task requires tackling two challenges: The transitions between the different actions must be smooth; the length of the predicted motion depends on the action sequence and varies significantly across samples. As we cannot realistically expect training data to cover sufficiently diverse action transitions and motion lengths, we propose an effective training strategy consisting of combining multiple motions from different actions and introducing a weak form of supervision to encourage smooth transitions. We then design a VAE-based model conditioned on both the observed motion and the action label sequence, allowing us to generate multiple plausible future motions of varying length. We illustrate the generality of our approach by exploring its use with two different temporal encoding models, namely RNNs and Transformers. Our approach outperforms baseline models constructed by adapting state-of-the-art single action-conditioned motion generation methods and stochastic human motion prediction approaches to our new task of action-driven stochastic motion prediction. Our code is available at https://github.com/wei-mao-2019/WAT.
[ { "created": "Tue, 31 May 2022 08:38:07 GMT", "version": "v1" } ]
"2022-06-01T00:00:00"
[ [ "Mao", "Wei", "" ], [ "Liu", "Miaomiao", "" ], [ "Salzmann", "Mathieu", "" ] ]
0no_new_dataset
2002.07784
Julian Portmann
Davin Choo, Christoph Grunau, Julian Portmann, V\'aclav Rozho\v{n}
k-means++: few more steps yield constant approximation
null
null
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The k-means++ algorithm of Arthur and Vassilvitskii (SODA 2007) is a state-of-the-art algorithm for solving the k-means clustering problem and is known to give an O(log k)-approximation in expectation. Recently, Lattanzi and Sohler (ICML 2019) proposed augmenting k-means++ with O(k log log k) local search steps to yield a constant approximation (in expectation) to the k-means clustering problem. In this paper, we improve their analysis to show that, for any arbitrarily small constant $\eps > 0$, with only $\eps k$ additional local search steps, one can achieve a constant approximation guarantee (with high probability in k), resolving an open problem in their paper.
[ { "created": "Tue, 18 Feb 2020 18:28:25 GMT", "version": "v1" } ]
"2020-02-19T00:00:00"
[ [ "Choo", "Davin", "" ], [ "Grunau", "Christoph", "" ], [ "Portmann", "Julian", "" ], [ "Rozhoň", "Václav", "" ] ]
0no_new_dataset
1008.1338
Zeeshan Ahmed Mr.
Zeeshan Ahmed
Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems
In International Conference on Frontiers of Information Technology, ACM - FIT09, Session 5: Computational Science/Artificial Intelligence, 16-18 December, 2009
ACM Special Interest Group on Artificial Intelligence (SIGART), 2009
10.1145/1838002.1838058
null
cs.HC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Designing and implementing an intelligent and user friendly human machine interface for any kind of software or hardware oriented application is always be a challenging task for the designers and developers because it is very difficult to understand the psychology of the user, nature of the work and best suit of the environment. This research paper is basically about to propose an intelligent, flexible and user friendly machine interface for Product Life Cycle Management products or PDM Systems since studies show that usability and human computer interaction issues are a major cause of acceptance problems introducing or using such systems. Going into details of the proposition, we present prototype implementations about theme based on design requirements, designed designs and technologies involved for the development of human machine interface.
[ { "created": "Sat, 7 Aug 2010 12:58:13 GMT", "version": "v1" } ]
"2010-08-26T00:00:00"
[ [ "Ahmed", "Zeeshan", "" ] ]
0no_new_dataset
2209.04075
Sagar Dasgupta
Finley Walden, Sagar Dasgupta, Mizanur Rahman, Mhafuzul Islam
Improving the Environmental Perception of Autonomous Vehicles using Deep Learning-based Audio Classification
null
null
null
null
cs.SD cs.AI eess.AS
http://creativecommons.org/licenses/by-nc-nd/4.0/
Sense of hearing is crucial for autonomous vehicles (AVs) to better perceive its surrounding environment. Although visual sensors of an AV, such as camera, lidar, and radar, help to see its surrounding environment, an AV cannot see beyond those sensors line of sight. On the other hand, an AV s sense of hearing cannot be obstructed by line of sight. For example, an AV can identify an emergency vehicle s siren through audio classification even though the emergency vehicle is not within the line of sight of the AV. Thus, auditory perception is complementary to the camera, lidar, and radar-based perception systems. This paper presents a deep learning-based robust audio classification framework aiming to achieve improved environmental perception for AVs. The presented framework leverages a deep Convolution Neural Network (CNN) to classify different audio classes. UrbanSound8k, an urban environment dataset, is used to train and test the developed framework. Seven audio classes i.e., air conditioner, car horn, children playing, dog bark, engine idling, gunshot, and siren, are identified from the UrbanSound8k dataset because of their relevancy related to AVs. Our framework can classify different audio classes with 97.82% accuracy. Moreover, the audio classification accuracies with all ten classes are presented, which proves that our framework performed better in the case of AV-related sounds compared to the existing audio classification frameworks.
[ { "created": "Fri, 9 Sep 2022 01:23:13 GMT", "version": "v1" } ]
"2022-09-12T00:00:00"
[ [ "Walden", "Finley", "" ], [ "Dasgupta", "Sagar", "" ], [ "Rahman", "Mizanur", "" ], [ "Islam", "Mhafuzul", "" ] ]
1new_dataset
2402.15043
Zhuohao Yu
Zhuohao Yu, Chang Gao, Wenjin Yao, Yidong Wang, Wei Ye, Jindong Wang, Xing Xie, Yue Zhang, Shikun Zhang
KIEval: A Knowledge-grounded Interactive Evaluation Framework for Large Language Models
Accepted to ACL 2024 (main conference); 19 pages, 5 figures, 19 tables, code is available at: https://github.com/zhuohaoyu/KIEval
null
null
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Automatic evaluation methods for large language models (LLMs) are hindered by data contamination, leading to inflated assessments of their effectiveness. Existing strategies, which aim to detect contaminated texts, focus on quantifying contamination status instead of accurately gauging model performance. In this paper, we introduce KIEval, a Knowledge-grounded Interactive Evaluation framework, which incorporates an LLM-powered "interactor" role for the first time to accomplish a dynamic contamination-resilient evaluation. Starting with a question in a conventional LLM benchmark involving domain-specific knowledge, KIEval utilizes dynamically generated, multi-round, and knowledge-focused dialogues to determine whether a model's response is merely a recall of benchmark answers or demonstrates a deep comprehension to apply knowledge in more complex conversations. Extensive experiments on seven leading LLMs across five datasets validate KIEval's effectiveness and generalization. We also reveal that data contamination brings no contribution or even negative effect to models' real-world applicability and understanding, and existing contamination detection methods for LLMs can only identify contamination in pre-training but not during supervised fine-tuning.
[ { "created": "Fri, 23 Feb 2024 01:30:39 GMT", "version": "v1" }, { "created": "Mon, 3 Jun 2024 06:02:39 GMT", "version": "v2" } ]
"2024-06-04T00:00:00"
[ [ "Yu", "Zhuohao", "" ], [ "Gao", "Chang", "" ], [ "Yao", "Wenjin", "" ], [ "Wang", "Yidong", "" ], [ "Ye", "Wei", "" ], [ "Wang", "Jindong", "" ], [ "Xie", "Xing", "" ], [ "Zhang", "Yue", "" ], [ "Zhang", "Shikun", "" ] ]
0no_new_dataset
2110.07872
Qi Bao
Qi Bao, Zhongzhi Zhang, Haibin Kan
Role Similarity Metric Based on Spanning Rooted Forest
10 pages, 5 figures
null
null
null
cs.SI cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a fundamental issue in network analysis, structural node similarity has received much attention in academia and is adopted in a wide range of applications. Among these proposed structural node similarity measures, role similarity stands out because of satisfying several axiomatic properties including automorphism conformation. Existing role similarity metrics cannot handle top-k queries on large real-world networks due to the high time and space cost. In this paper, we propose a new role similarity metric, namely \textsf{ForestSim}. We prove that \textsf{ForestSim} is an admissible role similarity metric and devise the corresponding top-k similarity search algorithm, namely \textsf{ForestSimSearch}, which is able to process a top-k query in $O(k)$ time once the precomputation is finished. Moreover, we speed up the precomputation by using a fast approximate algorithm to compute the diagonal entries of the forest matrix, which reduces the time and space complexity of the precomputation to $O(\epsilon^{-2}m\log^5{n}\log{\frac{1}{\epsilon}})$ and $O(m\log^3{n})$, respectively. Finally, we conduct extensive experiments on 26 real-world networks. The results show that \textsf{ForestSim} works efficiently on million-scale networks and achieves comparable performance to the state-of-art methods.
[ { "created": "Fri, 15 Oct 2021 05:50:10 GMT", "version": "v1" }, { "created": "Mon, 1 Apr 2024 04:51:37 GMT", "version": "v2" } ]
"2024-04-02T00:00:00"
[ [ "Bao", "Qi", "" ], [ "Zhang", "Zhongzhi", "" ], [ "Kan", "Haibin", "" ] ]
0no_new_dataset
2212.14530
Khimya Khetarpal
Khimya Khetarpal, Claire Vernade, Brendan O'Donoghue, Satinder Singh, Tom Zahavy
POMRL: No-Regret Learning-to-Plan with Increasing Horizons
24 pages, 6 figures
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of planning under model uncertainty in an online meta-reinforcement learning (RL) setting where an agent is presented with a sequence of related tasks with limited interactions per task. The agent can use its experience in each task and across tasks to estimate both the transition model and the distribution over tasks. We propose an algorithm to meta-learn the underlying structure across tasks, utilize it to plan in each task, and upper-bound the regret of the planning loss. Our bound suggests that the average regret over tasks decreases as the number of tasks increases and as the tasks are more similar. In the classical single-task setting, it is known that the planning horizon should depend on the estimated model's accuracy, that is, on the number of samples within task. We generalize this finding to meta-RL and study this dependence of planning horizons on the number of tasks. Based on our theoretical findings, we derive heuristics for selecting slowly increasing discount factors, and we validate its significance empirically.
[ { "created": "Fri, 30 Dec 2022 03:09:45 GMT", "version": "v1" } ]
"2023-01-02T00:00:00"
[ [ "Khetarpal", "Khimya", "" ], [ "Vernade", "Claire", "" ], [ "O'Donoghue", "Brendan", "" ], [ "Singh", "Satinder", "" ], [ "Zahavy", "Tom", "" ] ]
0no_new_dataset
0904.1752
Fran\c{c}ois Nicolas
Julien Cassaigne and Francois Nicolas
On polynomial growth functions of D0L-systems
Not intended to be published
null
null
null
cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to prove that every polynomial function that maps the natural integers to the positive integers is the growth function of some D0L-system.
[ { "created": "Sat, 11 Apr 2009 11:52:41 GMT", "version": "v1" }, { "created": "Wed, 12 Aug 2009 14:34:22 GMT", "version": "v2" }, { "created": "Tue, 3 Jan 2012 21:52:10 GMT", "version": "v3" } ]
"2012-01-05T00:00:00"
[ [ "Cassaigne", "Julien", "" ], [ "Nicolas", "Francois", "" ] ]
0no_new_dataset
2008.12197
Ke Mei
Ke Mei, Chuang Zhu, Jiaqi Zou, Shanghang Zhang
Instance Adaptive Self-Training for Unsupervised Domain Adaptation
ECCV 2020
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The divergence between labeled training data and unlabeled testing data is a significant challenge for recent deep learning models. Unsupervised domain adaptation (UDA) attempts to solve such a problem. Recent works show that self-training is a powerful approach to UDA. However, existing methods have difficulty in balancing scalability and performance. In this paper, we propose an instance adaptive self-training framework for UDA on the task of semantic segmentation. To effectively improve the quality of pseudo-labels, we develop a novel pseudo-label generation strategy with an instance adaptive selector. Besides, we propose the region-guided regularization to smooth the pseudo-label region and sharpen the non-pseudo-label region. Our method is so concise and efficient that it is easy to be generalized to other unsupervised domain adaptation methods. Experiments on 'GTA5 to Cityscapes' and 'SYNTHIA to Cityscapes' demonstrate the superior performance of our approach compared with the state-of-the-art methods.
[ { "created": "Thu, 27 Aug 2020 15:50:27 GMT", "version": "v1" } ]
"2020-08-28T00:00:00"
[ [ "Mei", "Ke", "" ], [ "Zhu", "Chuang", "" ], [ "Zou", "Jiaqi", "" ], [ "Zhang", "Shanghang", "" ] ]
0no_new_dataset
2307.07683
Hany Farid
Sarah Barrington, Romit Barua, Gautham Koorma, Hany Farid
Single and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features
S. Barrington, R. Barua, G. Koorma, and Hany Farid. Single and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features. Workshop on Image Forensics and Security, Nuremberg, Germany, 2023
null
null
null
cs.SD cs.CL eess.AS
http://creativecommons.org/licenses/by/4.0/
Synthetic-voice cloning technologies have seen significant advances in recent years, giving rise to a range of potential harms. From small- and large-scale financial fraud to disinformation campaigns, the need for reliable methods to differentiate real and synthesized voices is imperative. We describe three techniques for differentiating a real from a cloned voice designed to impersonate a specific person. These three approaches differ in their feature extraction stage with low-dimensional perceptual features offering high interpretability but lower accuracy, to generic spectral features, and end-to-end learned features offering less interpretability but higher accuracy. We show the efficacy of these approaches when trained on a single speaker's voice and when trained on multiple voices. The learned features consistently yield an equal error rate between 0% and 4%, and are reasonably robust to adversarial laundering.
[ { "created": "Sat, 15 Jul 2023 02:20:26 GMT", "version": "v1" }, { "created": "Wed, 27 Sep 2023 16:50:15 GMT", "version": "v2" } ]
"2023-09-28T00:00:00"
[ [ "Barrington", "Sarah", "" ], [ "Barua", "Romit", "" ], [ "Koorma", "Gautham", "" ], [ "Farid", "Hany", "" ] ]
0no_new_dataset
2110.15460
Scott Davidoff
Thomas Chan, Jeremy Argueta, Jazlyn Armendariz, Allison Graham, Sarah Hwang, Basak Ramaswamy, So Young Kim, Scott Davidoff
Human-Computer Interaction Glow Up: Examining Operational Trust and Intention Towards Mars Autonomous Systems
9 pages, 1 figure, to appear in Proceedings of the 2021 American Institute of Aeronautics and Astronautics ASCEND Conference (AIAA ASCEND 2021)
null
10.2514/6.2021-4117
null
cs.RO cs.HC
http://creativecommons.org/licenses/by/4.0/
Tactful coordination on earth between hundreds of operators from diverse disciplines and backgrounds is needed to ensure that Martian rovers have a high likelihood of achieving their science goals while enduring the harsh environment of the red planet. The operations team includes many individuals, each with independent and overlapping objectives, working to decide what to execute on the Mars surface during the next planning period. The team must work together to understand each other's objectives and constraints within a fixed time period, often requiring frequent revision. This study examines the challenges faced during Mars surface operations, from high-level science objectives to formulating a valid, safe, and optimal activity plan that is ready to be radiated to the rover. Through this examination, we aim to illuminate how planning intent can be formulated and effectively communicated to future spacecrafts that will become more and more autonomous. Our findings reveal the intricate nature of human-to-human interactions that require a large array of soft skills and core competencies to communicate concurrently with science and engineering teams during plan formulation. Additionally, our findings exposed significant challenges in eliciting planning intent from operators, which will intensify in the future, as operators on the ground asynchronously co-operate the rover with the on board autonomy. Building a marvellous robot and landing it onto the Mars surface are remarkable feats -however, ensuring that scientists can get the best out of the mission is an ongoing challenge and will not cease to be a difficult task with increased autonomy.
[ { "created": "Thu, 28 Oct 2021 22:55:23 GMT", "version": "v1" } ]
"2021-11-05T00:00:00"
[ [ "Chan", "Thomas", "" ], [ "Argueta", "Jeremy", "" ], [ "Armendariz", "Jazlyn", "" ], [ "Graham", "Allison", "" ], [ "Hwang", "Sarah", "" ], [ "Ramaswamy", "Basak", "" ], [ "Kim", "So Young", "" ], [ "Davidoff", "Scott", "" ] ]
0no_new_dataset
2310.04955
Jiazhi Li
Jiazhi Li, Mahyar Khayatkhoei, Jiageng Zhu, Hanchen Xie, Mohamed E. Hussein, Wael AbdAlmageed
Information-Theoretic Bounds on The Removal of Attribute-Specific Bias From Neural Networks
15 pages, 4 figures, 3 tables. To appear in Algorithmic Fairness through the Lens of Time Workshop at NeurIPS 2023
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Ensuring a neural network is not relying on protected attributes (e.g., race, sex, age) for predictions is crucial in advancing fair and trustworthy AI. While several promising methods for removing attribute bias in neural networks have been proposed, their limitations remain under-explored. In this work, we mathematically and empirically reveal an important limitation of attribute bias removal methods in presence of strong bias. Specifically, we derive a general non-vacuous information-theoretical upper bound on the performance of any attribute bias removal method in terms of the bias strength. We provide extensive experiments on synthetic, image, and census datasets to verify the theoretical bound and its consequences in practice. Our findings show that existing attribute bias removal methods are effective only when the inherent bias in the dataset is relatively weak, thus cautioning against the use of these methods in smaller datasets where strong attribute bias can occur, and advocating the need for methods that can overcome this limitation.
[ { "created": "Sun, 8 Oct 2023 00:39:11 GMT", "version": "v1" }, { "created": "Thu, 16 Nov 2023 17:57:45 GMT", "version": "v2" } ]
"2023-11-17T00:00:00"
[ [ "Li", "Jiazhi", "" ], [ "Khayatkhoei", "Mahyar", "" ], [ "Zhu", "Jiageng", "" ], [ "Xie", "Hanchen", "" ], [ "Hussein", "Mohamed E.", "" ], [ "AbdAlmageed", "Wael", "" ] ]
1new_dataset
1902.04779
Lin Yang
Lin F. Yang, Mengdi Wang
Sample-Optimal Parametric Q-Learning Using Linearly Additive Features
Accepted to ICML, 2019
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a Markov decision process (MDP) that admits a set of state-action features, which can linearly express the process's probabilistic transition model. We propose a parametric Q-learning algorithm that finds an approximate-optimal policy using a sample size proportional to the feature dimension $K$ and invariant with respect to the size of the state space. To further improve its sample efficiency, we exploit the monotonicity property and intrinsic noise structure of the Bellman operator, provided the existence of anchor state-actions that imply implicit non-negativity in the feature space. We augment the algorithm using techniques of variance reduction, monotonicity preservation, and confidence bounds. It is proved to find a policy which is $\epsilon$-optimal from any initial state with high probability using $\widetilde{O}(K/\epsilon^2(1-\gamma)^3)$ sample transitions for arbitrarily large-scale MDP with a discount factor $\gamma\in(0,1)$. A matching information-theoretical lower bound is proved, confirming the sample optimality of the proposed method with respect to all parameters (up to polylog factors).
[ { "created": "Wed, 13 Feb 2019 08:26:47 GMT", "version": "v1" }, { "created": "Wed, 5 Jun 2019 20:20:23 GMT", "version": "v2" } ]
"2019-06-07T00:00:00"
[ [ "Yang", "Lin F.", "" ], [ "Wang", "Mengdi", "" ] ]
0no_new_dataset
2005.09436
Siamak Parhizkari
Siamak Parhizkari, Mohammad Bagher Menhaj, Atena Sajedin
A cognitive based Intrusion detection system
17 pages, 6 figures
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intrusion detection is one of the important mechanisms that provide computer networks security. Due to an increase in attacks and growing dependence upon other fields such as medicine, commerce, and engineering, offering services over a network and maintaining network security have become a significant issue. The purpose of Intrusion Detection Systems (IDS) is to develop models which are able to distinguish regular communications from abnormal ones, and take the necessary actions. Among different methods in this field, Artificial Neural Networks (ANNs) have been widely used. However, ANN-based IDS encountered two main problems: low detection precision and weak detection stability. To overcome these problems, this paper proposes a new approach based on Deep Neural Network ans Support vector machine classifier, which inspired by "divide and conquer" philosophy. The proposed model predicts the attacks with better accuracy for intrusion detection rather similar methods. For our empirical study, we were taking advantage of the KDD99 dataset. Our experimental results suggest that the new approach enhance to 95.4 percent classification accuracy.
[ { "created": "Tue, 19 May 2020 13:30:30 GMT", "version": "v1" }, { "created": "Sun, 12 Jun 2022 07:14:11 GMT", "version": "v2" } ]
"2022-06-14T00:00:00"
[ [ "Parhizkari", "Siamak", "" ], [ "Menhaj", "Mohammad Bagher", "" ], [ "Sajedin", "Atena", "" ] ]
1new_dataset
2104.01290
Jonathan Dunn
Jonathan Dunn and Tom Coupe and Benjamin Adams
Measuring Linguistic Diversity During COVID-19
null
Proceedings of the 4th Workshop on NLP and Computational Social Science (2020)
10.18653/v1/P17
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Computational measures of linguistic diversity help us understand the linguistic landscape using digital language data. The contribution of this paper is to calibrate measures of linguistic diversity using restrictions on international travel resulting from the COVID-19 pandemic. Previous work has mapped the distribution of languages using geo-referenced social media and web data. The goal, however, has been to describe these corpora themselves rather than to make inferences about underlying populations. This paper shows that a difference-in-differences method based on the Herfindahl-Hirschman Index can identify the bias in digital corpora that is introduced by non-local populations. These methods tell us where significant changes have taken place and whether this leads to increased or decreased diversity. This is an important step in aligning digital corpora like social media with the real-world populations that have produced them.
[ { "created": "Sat, 3 Apr 2021 02:09:37 GMT", "version": "v1" } ]
"2021-04-06T00:00:00"
[ [ "Dunn", "Jonathan", "" ], [ "Coupe", "Tom", "" ], [ "Adams", "Benjamin", "" ] ]
0no_new_dataset
2105.13695
Ming Sun
Ming Sun, Haoxuan Dou, Baopu Li, Lei Cui, Junjie Yan, Wanli Ouyang
AutoSampling: Search for Effective Data Sampling Schedules
Automl for sampling firstly without any assumpation
ICML 2021
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data sampling acts as a pivotal role in training deep learning models. However, an effective sampling schedule is difficult to learn due to the inherently high dimension of parameters in learning the sampling schedule. In this paper, we propose an AutoSampling method to automatically learn sampling schedules for model training, which consists of the multi-exploitation step aiming for optimal local sampling schedules and the exploration step for the ideal sampling distribution. More specifically, we achieve sampling schedule search with shortened exploitation cycle to provide enough supervision. In addition, we periodically estimate the sampling distribution from the learned sampling schedules and perturb it to search in the distribution space. The combination of two searches allows us to learn a robust sampling schedule. We apply our AutoSampling method to a variety of image classification tasks illustrating the effectiveness of the proposed method.
[ { "created": "Fri, 28 May 2021 09:39:41 GMT", "version": "v1" } ]
"2021-05-31T00:00:00"
[ [ "Sun", "Ming", "" ], [ "Dou", "Haoxuan", "" ], [ "Li", "Baopu", "" ], [ "Cui", "Lei", "" ], [ "Yan", "Junjie", "" ], [ "Ouyang", "Wanli", "" ] ]
0no_new_dataset
2106.04221
Florian Buettner
Yinchong Yang, Florian Buettner
Multi-output Gaussian Processes for Uncertainty-aware Recommender Systems
Published at UAI 2021
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by-nc-sa/4.0/
Recommender systems are often designed based on a collaborative filtering approach, where user preferences are predicted by modelling interactions between users and items. Many common approaches to solve the collaborative filtering task are based on learning representations of users and items, including simple matrix factorization, Gaussian process latent variable models, and neural-network based embeddings. While matrix factorization approaches fail to model nonlinear relations, neural networks can potentially capture such complex relations with unprecedented predictive power and are highly scalable. However, neither of them is able to model predictive uncertainties. In contrast, Gaussian Process based models can generate a predictive distribution, but cannot scale to large amounts of data. In this manuscript, we propose a novel approach combining the representation learning paradigm of collaborative filtering with multi-output Gaussian processes in a joint framework to generate uncertainty-aware recommendations. We introduce an efficient strategy for model training and inference, resulting in a model that scales to very large and sparse datasets and achieves competitive performance in terms of classical metrics quantifying the reconstruction error. In addition to accurately predicting user preferences, our model also provides meaningful uncertainty estimates about that prediction.
[ { "created": "Tue, 8 Jun 2021 10:01:14 GMT", "version": "v1" }, { "created": "Fri, 8 Oct 2021 15:53:08 GMT", "version": "v2" } ]
"2021-10-11T00:00:00"
[ [ "Yang", "Yinchong", "" ], [ "Buettner", "Florian", "" ] ]
0no_new_dataset
2402.07529
Haoyu Li
Haoyu Li, Yuchen Xu, Jiayi Chen, Rohit Dwivedula, Wenfei Wu, Keqiang He, Aditya Akella, Daehyeok Kim
Accelerating Distributed Deep Learning using Lossless Homomorphic Compression
null
null
null
null
cs.DC cs.DS cs.LG cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As deep neural networks (DNNs) grow in complexity and size, the resultant increase in communication overhead during distributed training has become a significant bottleneck, challenging the scalability of distributed training systems. Existing solutions, while aiming to mitigate this bottleneck through worker-level compression and in-network aggregation, fall short due to their inability to efficiently reconcile the trade-offs between compression effectiveness and computational overhead, hindering overall performance and scalability. In this paper, we introduce a novel compression algorithm that effectively merges worker-level compression with in-network aggregation. Our solution is both homomorphic, allowing for efficient in-network aggregation without CPU/GPU processing, and lossless, ensuring no compromise on training accuracy. Theoretically optimal in compression and computational efficiency, our approach is empirically validated across diverse DNN models such as NCF, LSTM, VGG19, and BERT-base, showing up to a 6.33$\times$ improvement in aggregation throughput and a 3.74$\times$ increase in per-iteration training speed.
[ { "created": "Mon, 12 Feb 2024 09:57:47 GMT", "version": "v1" } ]
"2024-02-13T00:00:00"
[ [ "Li", "Haoyu", "" ], [ "Xu", "Yuchen", "" ], [ "Chen", "Jiayi", "" ], [ "Dwivedula", "Rohit", "" ], [ "Wu", "Wenfei", "" ], [ "He", "Keqiang", "" ], [ "Akella", "Aditya", "" ], [ "Kim", "Daehyeok", "" ] ]
0no_new_dataset
1603.03610
Mark-Jan Nederhof
Mark-Jan Nederhof
A short proof that $O_2$ is an MCFL
9 pages
null
null
null
cs.FL cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new proof that $O_2$ is a multiple context-free language. It contrasts with a recent proof by Salvati (2015) in its avoidance of concepts that seem specific to two-dimensional geometry, such as the complex exponential function. Our simple proof creates realistic prospects of widening the results to higher dimensions. This finding is of central importance to the relation between extreme free word order and classes of grammars used to describe the syntax of natural language.
[ { "created": "Fri, 11 Mar 2016 12:32:29 GMT", "version": "v1" } ]
"2016-03-14T00:00:00"
[ [ "Nederhof", "Mark-Jan", "" ] ]
0no_new_dataset
2311.06697
Vasilisa Bashlovkina
Vasilisa Bashlovkina, Zhaobin Kuang, Riley Matthews, Edward Clifford, Yennie Jun, William W. Cohen, Simon Baumgartner
Trusted Source Alignment in Large Language Models
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Large language models (LLMs) are trained on web-scale corpora that inevitably include contradictory factual information from sources of varying reliability. In this paper, we propose measuring an LLM property called trusted source alignment (TSA): the model's propensity to align with content produced by trusted publishers in the face of uncertainty or controversy. We present FactCheckQA, a TSA evaluation dataset based on a corpus of fact checking articles. We describe a simple protocol for evaluating TSA and offer a detailed analysis of design considerations including response extraction, claim contextualization, and bias in prompt formulation. Applying the protocol to PaLM-2, we find that as we scale up the model size, the model performance on FactCheckQA improves from near-random to up to 80% balanced accuracy in aligning with trusted sources.
[ { "created": "Sun, 12 Nov 2023 00:25:25 GMT", "version": "v1" } ]
"2023-11-14T00:00:00"
[ [ "Bashlovkina", "Vasilisa", "" ], [ "Kuang", "Zhaobin", "" ], [ "Matthews", "Riley", "" ], [ "Clifford", "Edward", "" ], [ "Jun", "Yennie", "" ], [ "Cohen", "William W.", "" ], [ "Baumgartner", "Simon", "" ] ]
0no_new_dataset