id
stringlengths
9
10
submitter
stringlengths
5
46
authors
stringlengths
5
1.31k
title
stringlengths
8
223
comments
stringlengths
2
574
journal-ref
stringclasses
587 values
doi
stringclasses
784 values
report-no
stringclasses
75 values
categories
stringlengths
5
72
license
stringclasses
9 values
abstract
stringlengths
82
3.31k
versions
listlengths
1
15
update_date
unknown
authors_parsed
sequencelengths
1
76
label
class label
2 classes
2101.05127
Michail Palaiologos
Michail Palaiologos, Jian Luo, Richard A. Stirling-Gallacher and Giuseppe Caire
Low Latency Scheduling Algorithms for Full-Duplex V2X Networks
Submitted to "VTC2021-Spring, Recent Results and Workshops"
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular communication systems have been an active subject of research for many years and are important technologies in the 5G and the post-5G era. One important use case is platooning which is seemingly the first step towards fully autonomous driving systems. Furthermore, a key performance parameter in all vehicular communication systems is the end-to-end packet latency. Towards this goal, full-duplex (FD) transceivers can potentially be an efficient and practical solution towards reducing the delay in platooning networks. In this paper, we study the delay performance of dynamic and TDMAbased scheduling algorithms and assess the effect of FD-enabled vehicles with imperfect self-interference cancellation (SIC). By simulations, we demonstrate the performance-complexity tradeoff of these algorithms and show that a TDMA centralized scheme with low-complexity and overhead can achieve comparable performance with a fully-dynamic, centralized algorithm.
[ { "created": "Wed, 13 Jan 2021 15:22:06 GMT", "version": "v1" } ]
"2021-01-14T00:00:00"
[ [ "Palaiologos", "Michail", "" ], [ "Luo", "Jian", "" ], [ "Stirling-Gallacher", "Richard A.", "" ], [ "Caire", "Giuseppe", "" ] ]
0no_new_dataset
1711.03398
Mohsen Mahoor
Mohsen Mahoor and Amin Khodaei
Data Fusion and Machine Learning Integration for Transformer Loss of Life Estimation
null
null
null
null
cs.SY cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rapid growth of machine learning methodologies and their applications offer new opportunity for improved transformer asset management. Accordingly, power system operators are currently looking for data-driven methods to make better-informed decisions in terms of network management. In this paper, machine learning and data fusion techniques are integrated to estimate transformer loss of life. Using IEEE Std. C57.91-2011, a data synthesis process is proposed based on hourly transformer loading and ambient temperature values. This synthesized data is employed to estimate transformer loss of life by using Adaptive Network-Based Fuzzy Inference System (ANFIS) and Radial Basis Function (RBF) network, which are further fused together with the objective of improving the estimation accuracy. Among various data fusion techniques, Ordered Weighted Averaging (OWA) and sequential Kalman filter are selected to fuse the output results of the estimated ANFIS and RBF. Simulation results demonstrate the merit and the effectiveness of the proposed method.
[ { "created": "Wed, 8 Nov 2017 17:16:24 GMT", "version": "v1" } ]
"2017-11-10T00:00:00"
[ [ "Mahoor", "Mohsen", "" ], [ "Khodaei", "Amin", "" ] ]
0no_new_dataset
1710.02796
Berk Akgun
Berk Akgun, Marwan Krunz, O. Ozan Koyluoglu
Vulnerabilities of Massive MIMO Systems Against Pilot Contamination Attacks
null
null
10.1109/TIFS.2018.2876750
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a single-cell massive MIMO system in which a base station (BS) with a large number of antennas transmits simultaneously to several single-antenna users in the presence of an attacker.The BS acquires the channel state information (CSI) based on uplink pilot transmissions. In this work, we demonstrate the vulnerability of CSI estimation phase to malicious attacks. For that purpose, we study two attack models. In the first model, the attacker aims at minimizing the sum-rate of downlink transmissions by contaminating the uplink pilots. In the second model, the attacker exploits its in-band full-duplex capabilities to generate jamming signals in both the CSI estimation and data transmission phases. We study these attacks under two downlink power allocation strategies when the attacker knows and does not know the locations of the BS and users. The formulated problems are solved using stochastic optimization, Lagrangian minimization, and game-theoretic methods. A closed-form solution for a special case of the problem is obtained. Furthermore, we analyze the achievable individual secrecy rates under a pilot contamination attack, and provide an upper bound on these rates. Our results indicate that the proposed attacks degrade the throughput of a massive MIMO system by more than half.
[ { "created": "Sun, 8 Oct 2017 07:31:01 GMT", "version": "v1" } ]
"2019-01-25T00:00:00"
[ [ "Akgun", "Berk", "" ], [ "Krunz", "Marwan", "" ], [ "Koyluoglu", "O. Ozan", "" ] ]
0no_new_dataset
2109.11693
Bruce Spang
Bruce Spang, Serhat Arslan, Nick McKeown
Updating the Theory of Buffer Sizing
21 pages, to be published in IFIP Performance '21. Code available at https://github.com/brucespang/ifip21-buffer-sizing
null
null
null
cs.NI cs.PF
http://creativecommons.org/licenses/by/4.0/
Routers have packet buffers to reduce packet drops during times of congestion. It is important to correctly size the buffer: make it too small, and packets are dropped unnecessarily and the link may be underutilized; make it too big, and packets may wait for a long time, and the router itself may be more expensive to build. Despite its importance, there are few guidelines for picking the buffer size. The two most well-known rules only apply to long-lived TCP Reno flows; either for a network carrying a single TCP Reno flow (the buffer size should equal the bandwidth-delay product, or $BDP$) or for a network carrying $n$ TCP Reno flows (the buffer size should equal $BDP/\sqrt{n}$). Since these rules were introduced, TCP Reno has been replaced by newer algorithms as the default congestion control algorithm in all major operating systems, yet little has been written about how the rules need to change. This paper revisits both rules. For the single flow case, we generalize the $BDP$ rule to account for changes to TCP, such as Proportional Rate Reduction (PRR), and the introduction of new algorithms including Cubic and BBR. We find that buffers can be made 60-75% smaller for newer algorithms. For the multiple flow case, we show that the square root of $n$ rule holds under a broader set of assumptions than previously known, including for these new congestion control algorithms. We also demonstrate situations where the square root of $n$ rule does not hold, including for unfair flows and certain settings with ECN. We validate our results by precisely measuring the time series of buffer occupancy in a real network, and comparing it to the per-packet window size.
[ { "created": "Thu, 23 Sep 2021 23:42:24 GMT", "version": "v1" } ]
"2021-09-27T00:00:00"
[ [ "Spang", "Bruce", "" ], [ "Arslan", "Serhat", "" ], [ "McKeown", "Nick", "" ] ]
0no_new_dataset
2101.03850
Antoine Garcon AntoineGarcon
Antoine Garcon, Julian Vexler, Dmitry Budker, Stefan Kramer
Deep Neural Networks to Recover Unknown Physical Parameters from Oscillating Time Series
null
null
10.1371/journal.pone.0268439
null
cs.LG cs.NA math.NA physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep neural networks (DNNs) are widely used in pattern-recognition tasks for which a human comprehensible, quantitative description of the data-generating process, e.g., in the form of equations, cannot be achieved. While doing so, DNNs often produce an abstract (entangled and non-interpretable) representation of the data-generating process. This is one of the reasons why DNNs are not extensively used in physics-signal processing: physicists generally require their analyses to yield quantitative information about the studied systems. In this article we use DNNs to disentangle components of oscillating time series, and recover meaningful information. We show that, because DNNs can find useful abstract feature representations, they can be used when prior knowledge about the signal-generating process exists, but is not complete, as it is particularly the case in "new-physics" searches. To this aim, we train our DNN on synthetic oscillating time series to perform two tasks: a regression of the signal latent parameters and signal denoising by an Autoencoder-like architecture. We show that the regression and denoising performance is similar to those of least-square curve fittings (LS-fit) with true latent parameters' initial guesses, in spite of the DNN needing no initial guesses at all. We then explore applications in which we believe our architecture could prove useful for time-series processing in physics, when prior knowledge is incomplete. As an example, we employ DNNs as a tool to inform LS-fits when initial guesses are unknown. We show that the regression can be performed on some latent parameters, while ignoring the existence of others. Because the Autoencoder needs no prior information about the physical model, the remaining unknown latent parameters can still be captured, thus making use of partial prior knowledge, while leaving space for data exploration and discoveries.
[ { "created": "Mon, 11 Jan 2021 12:39:50 GMT", "version": "v1" } ]
"2022-10-12T00:00:00"
[ [ "Garcon", "Antoine", "" ], [ "Vexler", "Julian", "" ], [ "Budker", "Dmitry", "" ], [ "Kramer", "Stefan", "" ] ]
0no_new_dataset
2003.03492
Wensheng Cheng
Wensheng Cheng, Yan Zhang, Xu Lei, Wen Yang, Guisong Xia
Semantic Change Pattern Analysis
17 pages, 7 figures
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Change detection is an important problem in vision field, especially for aerial images. However, most works focus on traditional change detection, i.e., where changes happen, without considering the change type information, i.e., what changes happen. Although a few works have tried to apply semantic information to traditional change detection, they either only give the label of emerging objects without taking the change type into consideration, or set some kinds of change subjectively without specifying semantic information. To make use of semantic information and analyze change types comprehensively, we propose a new task called semantic change pattern analysis for aerial images. Given a pair of co-registered aerial images, the task requires a result including both where and what changes happen. We then describe the metric adopted for the task, which is clean and interpretable. We further provide the first well-annotated aerial image dataset for this task. Extensive baseline experiments are conducted as reference for following works. The aim of this work is to explore high-level information based on change detection and facilitate the development of this field with the publicly available dataset.
[ { "created": "Sat, 7 Mar 2020 02:22:19 GMT", "version": "v1" } ]
"2020-03-10T00:00:00"
[ [ "Cheng", "Wensheng", "" ], [ "Zhang", "Yan", "" ], [ "Lei", "Xu", "" ], [ "Yang", "Wen", "" ], [ "Xia", "Guisong", "" ] ]
1new_dataset
2403.12764
Max Zimmer
Konrad Mundinger, Max Zimmer, Sebastian Pokutta
Neural Parameter Regression for Explicit Representations of PDE Solution Operators
ICLR24 Workshop AI4Differential Equations In Science, 15 pages, 4 figures, 2 tables, 1 algorithm
null
null
null
cs.LG cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce Neural Parameter Regression (NPR), a novel framework specifically developed for learning solution operators in Partial Differential Equations (PDEs). Tailored for operator learning, this approach surpasses traditional DeepONets (Lu et al., 2021) by employing Physics-Informed Neural Network (PINN, Raissi et al., 2019) techniques to regress Neural Network (NN) parameters. By parametrizing each solution based on specific initial conditions, it effectively approximates a mapping between function spaces. Our method enhances parameter efficiency by incorporating low-rank matrices, thereby boosting computational efficiency and scalability. The framework shows remarkable adaptability to new initial and boundary conditions, allowing for rapid fine-tuning and inference, even in cases of out-of-distribution examples.
[ { "created": "Tue, 19 Mar 2024 14:30:56 GMT", "version": "v1" } ]
"2024-03-20T00:00:00"
[ [ "Mundinger", "Konrad", "" ], [ "Zimmer", "Max", "" ], [ "Pokutta", "Sebastian", "" ] ]
0no_new_dataset
1705.09412
Haoran Sun
Haoran Sun, Xiangyi Chen, Qingjiang Shi, Mingyi Hong, Xiao Fu, Nicholas D. Sidiropoulos
Learning to Optimize: Training Deep Neural Networks for Wireless Resource Management
Submitted to TSP
IEEE Transactions on Signal Processing, vol. 66, no. 20, pp. 5438-5453, 15 Oct.15, 2018
10.1109/TSP.2018.2866382
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the past couple of decades, numerical optimization has played a central role in addressing wireless resource management problems such as power control and beamformer design. However, optimization algorithms often entail considerable complexity, which creates a serious gap between theoretical design/analysis and real-time processing. To address this challenge, we propose a new learning-based approach. The key idea is to treat the input and output of a resource allocation algorithm as an unknown non-linear mapping and use a deep neural network (DNN) to approximate it. If the non-linear mapping can be learned accurately by a DNN of moderate size, then resource allocation can be done in almost real time -- since passing the input through a DNN only requires a small number of simple operations. In this work, we address both the thereotical and practical aspects of DNN-based algorithm approximation with applications to wireless resource management. We first pin down a class of optimization algorithms that are `learnable' in theory by a fully connected DNN. Then, we focus on DNN-based approximation to a popular power allocation algorithm named WMMSE (Shi {\it et al} 2011). We show that using a DNN to approximate WMMSE can be fairly accurate -- the approximation error $\epsilon$ depends mildly [in the order of $\log(1/\epsilon)$] on the numbers of neurons and layers of the DNN. On the implementation side, we use extensive numerical simulations to demonstrate that DNNs can achieve orders of magnitude speedup in computational time compared to state-of-the-art power allocation algorithms based on optimization.
[ { "created": "Fri, 26 May 2017 02:21:52 GMT", "version": "v1" }, { "created": "Wed, 25 Oct 2017 19:22:38 GMT", "version": "v2" } ]
"2018-09-18T00:00:00"
[ [ "Sun", "Haoran", "" ], [ "Chen", "Xiangyi", "" ], [ "Shi", "Qingjiang", "" ], [ "Hong", "Mingyi", "" ], [ "Fu", "Xiao", "" ], [ "Sidiropoulos", "Nicholas D.", "" ] ]
0no_new_dataset
2208.08566
Alexander Lavin
Erik Peterson, Alexander Lavin
Physical Computing for Materials Acceleration Platforms
null
MATTER, VOLUME 5, ISSUE 11, P3586-3596, NOVEMBER 02, 2022
10.1016/j.matt.2022.09.022
null
cs.AI cs.AR cs.SY eess.SY
http://creativecommons.org/licenses/by/4.0/
A ''technology lottery'' describes a research idea or technology succeeding over others because it is suited to the available software and hardware, not necessarily because it is superior to alternative directions--examples abound, from the synergies of deep learning and GPUs to the disconnect of urban design and autonomous vehicles. The nascent field of Self-Driving Laboratories (SDL), particularly those implemented as Materials Acceleration Platforms (MAPs), is at risk of an analogous pitfall: the next logical step for building MAPs is to take existing lab equipment and workflows and mix in some AI and automation. In this whitepaper, we argue that the same simulation and AI tools that will accelerate the search for new materials, as part of the MAPs research program, also make possible the design of fundamentally new computing mediums. We need not be constrained by existing biases in science, mechatronics, and general-purpose computing, but rather we can pursue new vectors of engineering physics with advances in cyber-physical learning and closed-loop, self-optimizing systems. Here we outline a simulation-based MAP program to design computers that use physics itself to solve optimization problems. Such systems mitigate the hardware-software-substrate-user information losses present in every other class of MAPs and they perfect alignment between computing problems and computing mediums eliminating any technology lottery. We offer concrete steps toward early ''Physical Computing (PC) -MAP'' advances and the longer term cyber-physical R&D which we expect to introduce a new era of innovative collaboration between materials researchers and computer scientists.
[ { "created": "Wed, 17 Aug 2022 23:03:54 GMT", "version": "v1" } ]
"2022-11-10T00:00:00"
[ [ "Peterson", "Erik", "" ], [ "Lavin", "Alexander", "" ] ]
0no_new_dataset
1302.6830
Paul E. Lehner
Paul E. Lehner, Christopher Elsaesser, Scott A. Musman
Constructing Belief Networks to Evaluate Plans
Appears in Proceedings of the Tenth Conference on Uncertainty in Artificial Intelligence (UAI1994)
null
null
UAI-P-1994-PG-416-422
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines the problem of constructing belief networks to evaluate plans produced by an knowledge-based planner. Techniques are presented for handling various types of complicating plan features. These include plans with context-dependent consequences, indirect consequences, actions with preconditions that must be true during the execution of an action, contingencies, multiple levels of abstraction multiple execution agents with partially-ordered and temporally overlapping actions, and plans which reference specific times and time durations.
[ { "created": "Wed, 27 Feb 2013 14:18:18 GMT", "version": "v1" } ]
"2013-02-28T00:00:00"
[ [ "Lehner", "Paul E.", "" ], [ "Elsaesser", "Christopher", "" ], [ "Musman", "Scott A.", "" ] ]
0no_new_dataset
2312.16083
Sikun Yang
Sikun Yang, Hongyuan Zha
A Variational Autoencoder for Neural Temporal Point Processes with Dynamic Latent Graphs
Accepted by AAAI-2024
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by/4.0/
Continuously-observed event occurrences, often exhibit self- and mutually-exciting effects, which can be well modeled using temporal point processes. Beyond that, these event dynamics may also change over time, with certain periodic trends. We propose a novel variational auto-encoder to capture such a mixture of temporal dynamics. More specifically, the whole time interval of the input sequence is partitioned into a set of sub-intervals. The event dynamics are assumed to be stationary within each sub-interval, but could be changing across those sub-intervals. In particular, we use a sequential latent variable model to learn a dependency graph between the observed dimensions, for each sub-interval. The model predicts the future event times, by using the learned dependency graph to remove the noncontributing influences of past events. By doing so, the proposed model demonstrates its higher accuracy in predicting inter-event times and event types for several real-world event sequences, compared with existing state of the art neural point processes.
[ { "created": "Tue, 26 Dec 2023 15:11:55 GMT", "version": "v1" }, { "created": "Fri, 8 Mar 2024 02:41:37 GMT", "version": "v2" } ]
"2024-03-11T00:00:00"
[ [ "Yang", "Sikun", "" ], [ "Zha", "Hongyuan", "" ] ]
0no_new_dataset
1805.06924
Sergio Romano
Pablo Tano, Sergio Romano, Mariano Sigman, Alejo Salles and Santiago Figueira
Towards a more flexible Language of Thought: Bayesian grammar updates after each concept exposure
null
Phys. Rev. E 101, 042128 (2020)
10.1103/PhysRevE.101.042128
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Recent approaches to human concept learning have successfully combined the power of symbolic, infinitely productive rule systems and statistical learning to explain our ability to learn new concepts from just a few examples. The aim of most of these studies is to reveal the underlying language structuring these representations and providing a general substrate for thought. However, describing a model of thought that is fixed once trained is against the extensive literature that shows how experience shapes concept learning. Here, we ask about the plasticity of these symbolic descriptive languages. We perform a concept learning experiment that demonstrates that humans can change very rapidly the repertoire of symbols they use to identify concepts, by compiling expressions which are frequently used into new symbols of the language. The pattern of concept learning times is accurately described by a Bayesian agent that rationally updates the probability of compiling a new expression according to how useful it has been to compress concepts so far. By portraying the Language of Thought as a flexible system of rules, we also highlight the difficulties to pin it down empirically.
[ { "created": "Thu, 17 May 2018 18:56:09 GMT", "version": "v1" }, { "created": "Thu, 26 Sep 2019 20:15:54 GMT", "version": "v2" } ]
"2020-04-29T00:00:00"
[ [ "Tano", "Pablo", "" ], [ "Romano", "Sergio", "" ], [ "Sigman", "Mariano", "" ], [ "Salles", "Alejo", "" ], [ "Figueira", "Santiago", "" ] ]
0no_new_dataset
2307.16852
Daniel Menasche
Breno Tostes, Leonardo Ventura, Enrico Lovat, Matheus Martins, Daniel Sadoc Menasch\'e
Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?
2023 IEEE International Conference on Cyber Security and Resilience (IEEE CSR)
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Indicators of Compromise (IOCs), such as IP addresses, file hashes, and domain names associated with known malware or attacks, are cornerstones of cybersecurity, serving to identify malicious activity on a network. In this work, we leverage real data to compare different parameterizations of IOC aging models. Our dataset comprises traffic at a real environment for more than 1 year. Among our trace-driven findings, we determine thresholds for the ratio between miss over monitoring costs such that the system benefits from storing IOCs for a finite time-to-live (TTL) before eviction. To the best of our knowledge, this is the first real world evaluation of thresholds related to IOC aging, paving the way towards realistic IOC decaying models.
[ { "created": "Mon, 31 Jul 2023 17:11:48 GMT", "version": "v1" } ]
"2023-08-01T00:00:00"
[ [ "Tostes", "Breno", "" ], [ "Ventura", "Leonardo", "" ], [ "Lovat", "Enrico", "" ], [ "Martins", "Matheus", "" ], [ "Menasché", "Daniel Sadoc", "" ] ]
1new_dataset
1512.01871
Andrew Adamatzky
Andrew Adamatzky and Georgios Ch. Sirakoulis
Building exploration with leeches Hirudo verbana
null
Biosystems Volume 134, August 2015, Pages 48--55
10.1016/j.biosystems.2015.06.004
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Safe evacuation of people from building and outdoor environments, and search and rescue operations, always will remain actual in course of all socio-technological developments. Modern facilities offer a range of automated systems to guide residents towards emergency exists. The systems are assumed to be infallible. But what if they fail? How occupants not familiar with a building layout will be looking for exits in case of very limited visibility where tactile sensing is the only way to assess the environment? Analogous models of human behaviour, and socio-dynamics in general, are provided to be fruitful ways to explore alternative, or would-be scenarios. Crowd, or a single person, dynamics could be imitated using particle systems, reaction-diffusion chemical medium, electro-magnetic fields, or social insects. Each type of analogous model offer unique insights on behavioural patterns of natural systems in constrained geometries. In this particular paper we have chosen leeches to analyse patterns of exploration. Reasons are two-fold. First, when deprived from other stimuli leeches change their behavioural modes in an automated regime in response to mechanical stimulation. Therefore leeches can give us invaluable information on how human beings might behave under stress and limited visibility. Second, leeches are ideal blueprints of future soft-bodied rescue robots. Leeches have modular nervous circuitry with a rich behavioral spectrum. Leeches are multi-functional, fault-tolerant with autonomous inter-segment coordination and adaptive decision-making. We aim to answer the question: how efficiently a real building can be explored and whether there any dependencies on the pathways of exploration and geometrical complexity of the building. In our case studies we use templates made on the floor plan of real building.
[ { "created": "Mon, 7 Dec 2015 01:32:09 GMT", "version": "v1" } ]
"2015-12-08T00:00:00"
[ [ "Adamatzky", "Andrew", "" ], [ "Sirakoulis", "Georgios Ch.", "" ] ]
0no_new_dataset
2306.11646
Chen Xu
Chen Xu, Rong Ye, Qianqian Dong, Chengqi Zhao, Tom Ko, Mingxuan Wang, Tong Xiao, Jingbo Zhu
Recent Advances in Direct Speech-to-text Translation
An expanded version of the paper accepted by IJCAI2023 survey track
null
null
null
cs.CL eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, speech-to-text translation has attracted more and more attention and many studies have emerged rapidly. In this paper, we present a comprehensive survey on direct speech translation aiming to summarize the current state-of-the-art techniques. First, we categorize the existing research work into three directions based on the main challenges -- modeling burden, data scarcity, and application issues. To tackle the problem of modeling burden, two main structures have been proposed, encoder-decoder framework (Transformer and the variants) and multitask frameworks. For the challenge of data scarcity, recent work resorts to many sophisticated techniques, such as data augmentation, pre-training, knowledge distillation, and multilingual modeling. We analyze and summarize the application issues, which include real-time, segmentation, named entity, gender bias, and code-switching. Finally, we discuss some promising directions for future work.
[ { "created": "Tue, 20 Jun 2023 16:14:27 GMT", "version": "v1" } ]
"2023-06-21T00:00:00"
[ [ "Xu", "Chen", "" ], [ "Ye", "Rong", "" ], [ "Dong", "Qianqian", "" ], [ "Zhao", "Chengqi", "" ], [ "Ko", "Tom", "" ], [ "Wang", "Mingxuan", "" ], [ "Xiao", "Tong", "" ], [ "Zhu", "Jingbo", "" ] ]
0no_new_dataset
2006.10333
Ilia Iuskevich
Ilya Yuskevich (IRT SystemX, LGI), A. Hein (LGI), Kahina Amokrane-Ferka (IRT SystemX), Abdelkrim Doufene (IRT SystemX), Marija Jankovic (LGI)
A discrete-event simulation model for driver performance assessment: application to autonomous vehicle cockpit design optimization
null
Proceedings of the Design Society: DESIGN Conference, Oct 2020, Dubrovnik, Croatia. pp.2521-2530
10.1017/dsd.2020.157
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The latest advances in the design of vehicles with the adaptive level of automation pose new challenges in the vehicle-driver interaction. Safety requirements underline the need to explore optimal cockpit architectures with regard to driver cognitive and perceptual workload, eyes-off-the-road time and situation awareness. We propose to integrate existing task analysis approaches into system architecture evaluation for the early-stage design optimization. We built the discrete-event simulation tool and applied it within the multi-sensory (sight, sound, touch) cockpit design industrial project.
[ { "created": "Thu, 18 Jun 2020 07:40:53 GMT", "version": "v1" } ]
"2020-06-19T00:00:00"
[ [ "Yuskevich", "Ilya", "", "IRT SystemX, LGI" ], [ "Hein", "A.", "", "LGI" ], [ "Amokrane-Ferka", "Kahina", "", "IRT SystemX" ], [ "Doufene", "Abdelkrim", "", "IRT SystemX" ], [ "Jankovic", "Marija", "", "LGI" ] ]
0no_new_dataset
2407.05941
Nick John Eliopoulos
Nick John Eliopoulos, Purvish Jajal, James Davis, Gaowen Liu, George K. Thiravathukal, Yung-Hsiang Lu
Reducing Vision Transformer Latency on Edge Devices via GPU Tail Effect and Training-free Token Pruning
null
null
null
null
cs.LG cs.CV
http://creativecommons.org/licenses/by-sa/4.0/
This paper investigates how to efficiently deploy transformer-based neural networks on edge devices. Recent methods reduce the latency of transformer neural networks by removing or merging tokens, with small accuracy degradation. However, these methods are not designed with edge device deployment in mind, and do not leverage information about the hardware characteristics to improve efficiency. First, we show that the relationship between latency and workload size is governed by the GPU tail-effect. This relationship is used to create a token pruning schedule tailored for a pre-trained model and device pair. Second, we demonstrate a training-free token pruning method utilizing this relationship. This method achieves accuracy-latency trade-offs in a hardware aware manner. We show that for single batch inference, other methods may actually increase latency by 18.6-30.3% with respect to baseline, while we can reduce it by 9%. For similar latency (within 5.2%) across devices we achieve 78.6%-84.5% ImageNet1K accuracy, while the state-of-the-art, Token Merging, achieves 45.8%-85.4%.
[ { "created": "Mon, 1 Jul 2024 17:42:40 GMT", "version": "v1" } ]
"2024-07-09T00:00:00"
[ [ "Eliopoulos", "Nick John", "" ], [ "Jajal", "Purvish", "" ], [ "Davis", "James", "" ], [ "Liu", "Gaowen", "" ], [ "Thiravathukal", "George K.", "" ], [ "Lu", "Yung-Hsiang", "" ] ]
0no_new_dataset
2211.15287
Yagmur Yigit
Yagmur Yigit (1), Khayal Huseynov (1)(2), Hamed Ahmadi (3) and Berk Canberk (4)(5) ((1) Department of Computer Engineering, Istanbul Technical University, Turkey, (2) BTS Group, Istanbul, Turkey, (3) Department of Electronic Engineering, University of York, United Kingdom, (4) School of Computing, Engineering and The Build Environment, Edinburgh Napier University, United Kingdom, (5) Department of Artificial Intelligence and Data Engineering, Istanbul Technical University, Turkey)
YA-DA: YAng-Based DAta Model for Fine-Grained IIoT Air Quality Monitoring
This paper has been accepted at the 4th Workshop on Future of Wireless Access and Sensing for Industrial IoT (FUTUREIIOT) in IEEE Global Communications Conference (IEEE GLOBECOM) 2022
2022 IEEE Globecom Workshops (GC Wkshps), Rio de Janeiro, Brazil, 2022, pp. 438-443
10.1109/GCWkshps56602.2022.10008637
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the development of industrialization, air pollution is also steadily on the rise since both industrial and daily activities generate a massive amount of air pollution. Since decreasing air pollution is critical for citizens' health and well-being, air pollution monitoring is becoming an essential topic. Industrial Internet of Things (IIoT) research focuses on this crucial area. Several attempts already exist for air pollution monitoring. However, none of them are improving the performance of IoT data collection at the desired level. Inspired by the genuine Yet Another Next Generation (YANG) data model, we propose a YAng-based DAta model (YA-DA) to improve the performance of IIoT data collection. Moreover, by taking advantage of digital twin (DT) technology, we propose a DT-enabled fine-grained IIoT air quality monitoring system using YA-DA. As a result, DT synchronization becomes fine-grained. In turn, we improve the performance of IIoT data collection resulting in lower round-trip time (RTT), higher DT synchronization, and lower DT latency.
[ { "created": "Mon, 28 Nov 2022 13:18:07 GMT", "version": "v1" }, { "created": "Wed, 25 Oct 2023 23:34:00 GMT", "version": "v2" } ]
"2023-10-27T00:00:00"
[ [ "Yigit", "Yagmur", "" ], [ "Huseynov", "Khayal", "" ], [ "Ahmadi", "Hamed", "" ], [ "Canberk", "Berk", "" ] ]
0no_new_dataset
2312.05669
Ziyi Ye
Ziyi Ye, Xiaohui Xie, Qingyao Ai, Yiqun Liu, Zhihong Wang, Weihang Su, Min Zhang
Relevance Feedback with Brain Signals
null
null
null
null
cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Relevance Feedback (RF) process relies on accurate and real-time relevance estimation of feedback documents to improve retrieval performance. Since collecting explicit relevance annotations imposes an extra burden on the user, extensive studies have explored using pseudo-relevance signals and implicit feedback signals as substitutes. However, such signals are indirect indicators of relevance and suffer from complex search scenarios where user interactions are absent or biased. Recently, the advances in portable and high-precision brain-computer interface (BCI) devices have shown the possibility to monitor user's brain activities during search process. Brain signals can directly reflect user's psychological responses to search results and thus it can act as additional and unbiased RF signals. To explore the effectiveness of brain signals in the context of RF, we propose a novel RF framework that combines BCI-based relevance feedback with pseudo-relevance signals and implicit signals to improve the performance of document re-ranking. The experimental results on the user study dataset show that incorporating brain signals leads to significant performance improvement in our RF framework. Besides, we observe that brain signals perform particularly well in several hard search scenarios, especially when implicit signals as feedback are missing or noisy. This reveals when and how to exploit brain signals in the context of RF.
[ { "created": "Sat, 9 Dec 2023 20:19:16 GMT", "version": "v1" } ]
"2023-12-12T00:00:00"
[ [ "Ye", "Ziyi", "" ], [ "Xie", "Xiaohui", "" ], [ "Ai", "Qingyao", "" ], [ "Liu", "Yiqun", "" ], [ "Wang", "Zhihong", "" ], [ "Su", "Weihang", "" ], [ "Zhang", "Min", "" ] ]
0no_new_dataset
2005.09382
Felix Hill Mr
Felix Hill, Sona Mokra, Nathaniel Wong, Tim Harley
Human Instruction-Following with Deep Reinforcement Learning via Transfer-Learning from Text
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work has described neural-network-based agents that are trained with reinforcement learning (RL) to execute language-like commands in simulated worlds, as a step towards an intelligent agent or robot that can be instructed by human users. However, the optimisation of multi-goal motor policies via deep RL from scratch requires many episodes of experience. Consequently, instruction-following with deep RL typically involves language generated from templates (by an environment simulator), which does not reflect the varied or ambiguous expressions of real users. Here, we propose a conceptually simple method for training instruction-following agents with deep RL that are robust to natural human instructions. By applying our method with a state-of-the-art pre-trained text-based language model (BERT), on tasks requiring agents to identify and position everyday objects relative to other objects in a naturalistic 3D simulated room, we demonstrate substantially-above-chance zero-shot transfer from synthetic template commands to natural instructions given by humans. Our approach is a general recipe for training any deep RL-based system to interface with human users, and bridges the gap between two research directions of notable recent success: agent-centric motor behavior and text-based representation learning.
[ { "created": "Tue, 19 May 2020 12:16:58 GMT", "version": "v1" } ]
"2020-05-20T00:00:00"
[ [ "Hill", "Felix", "" ], [ "Mokra", "Sona", "" ], [ "Wong", "Nathaniel", "" ], [ "Harley", "Tim", "" ] ]
0no_new_dataset
2006.07752
Anh Thai
Anh Thai, Stefan Stojanov, Vijay Upadhya, James M. Rehg
3D Reconstruction of Novel Object Shapes from Single Images
First two authors contributed equally
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accurately predicting the 3D shape of any arbitrary object in any pose from a single image is a key goal of computer vision research. This is challenging as it requires a model to learn a representation that can infer both the visible and occluded portions of any object using a limited training set. A training set that covers all possible object shapes is inherently infeasible. Such learning-based approaches are inherently vulnerable to overfitting, and successfully implementing them is a function of both the architecture design and the training approach. We present an extensive investigation of factors specific to architecture design, training, experiment design, and evaluation that influence reconstruction performance and measurement. We show that our proposed SDFNet achieves state-of-the-art performance on seen and unseen shapes relative to existing methods GenRe and OccNet. We provide the first large-scale evaluation of single image shape reconstruction to unseen objects. The source code, data and trained models can be found on https://github.com/rehg-lab/3DShapeGen.
[ { "created": "Sun, 14 Jun 2020 00:34:26 GMT", "version": "v1" }, { "created": "Thu, 24 Sep 2020 02:12:45 GMT", "version": "v2" }, { "created": "Mon, 18 Jan 2021 19:41:48 GMT", "version": "v3" }, { "created": "Wed, 1 Sep 2021 21:11:12 GMT", "version": "v4" } ]
"2021-09-03T00:00:00"
[ [ "Thai", "Anh", "" ], [ "Stojanov", "Stefan", "" ], [ "Upadhya", "Vijay", "" ], [ "Rehg", "James M.", "" ] ]
1new_dataset
2207.03330
Isac Mendes Lacerda
Isac M. Lacerda, Eber A. Schmitz, Jayme L. Szwarcfiter, Rosiane de Freitas
Empirical Evaluation of Project Scheduling Algorithms for Maximization of the Net Present Value
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an empirical performance analysis of three project scheduling algorithms dealing with maximizing projects' net present value with unrestricted resources. The selected algorithms, being the most recently cited in the literature, are: Recursive Search (RS), Steepest Ascent Approach (SAA) and Hybrid Search (HS). The main motivation for this research is the lack of knowledge about the computational complexities of the RS, SAA, and HS algorithms, since all studies to date show some gaps in the analysis. Furthermore, the empirical analysis performed to date does not consider the fact that one algorithm (HS) uses a dual search strategy, which markedly improved the algorithm's performance, while the others don't. In order to obtain a fair performance comparison, we implemented the dual search strategy into the other two algorithms (RS and SAA), and the new algorithms were called Recursive Search Forward-Backward (RSFB) and Steepest Ascent Approach Forward-Backward (SAAFB). The algorithms RSFB, SAAFB, and HS were submitted to a factorial experiment with three different project network sampling characteristics. The results were analyzed using the Generalized Linear Models (GLM) statistical modeling technique that showed: a) the general computational costs of RSFB, SAAFB, and HS; b) the costs of restarting the search in the spanning tree as part of the total cost of the algorithms; c) and statistically significant differences between the distributions of the algorithms' results.
[ { "created": "Tue, 5 Jul 2022 03:01:33 GMT", "version": "v1" } ]
"2022-07-08T00:00:00"
[ [ "Lacerda", "Isac M.", "" ], [ "Schmitz", "Eber A.", "" ], [ "Szwarcfiter", "Jayme L.", "" ], [ "de Freitas", "Rosiane", "" ] ]
0no_new_dataset
1907.12437
Jerin Philip
Jerin Philip, Vinay P. Namboodiri, C.V. Jawahar
A Baseline Neural Machine Translation System for Indian Languages
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple, yet effective, Neural Machine Translation system for Indian languages. We demonstrate the feasibility for multiple language pairs, and establish a strong baseline for further research.
[ { "created": "Mon, 29 Jul 2019 13:59:02 GMT", "version": "v1" } ]
"2019-07-30T00:00:00"
[ [ "Philip", "Jerin", "" ], [ "Namboodiri", "Vinay P.", "" ], [ "Jawahar", "C. V.", "" ] ]
0no_new_dataset
2206.06573
Toshio Irino
Toshio Irino and Honoka Tamaru and Ayako Yamamoto
Speech intelligibility of simulated hearing loss sounds and its prediction using the Gammachirp Envelope Similarity Index (GESI)
This preprint is a copy of the final version accepted for Interspeech 2022. See https://doi.org/10.21437/Interspeech.2022-211
Proc. Interspeech 2022
10.21437/Interspeech.2022-211
null
cs.SD eess.AS
http://creativecommons.org/licenses/by-nc-nd/4.0/
In the present study, speech intelligibility (SI) experiments were performed using simulated hearing loss (HL) sounds in laboratory and remote environments to clarify the effects of peripheral dysfunction. Noisy speech sounds were processed to simulate the average HL of 70- and 80-year-olds using Wadai Hearing Impairment Simulator (WHIS). These sounds were presented to normal hearing (NH) listeners whose cognitive function could be assumed to be normal. The results showed that the divergence was larger in the remote experiments than in the laboratory ones. However, the remote results could be equalized to the laboratory ones, mostly through data screening using the results of tone pip tests prepared on the experimental web page. In addition, a newly proposed objective intelligibility measure (OIM) called the Gammachirp Envelope Similarity Index (GESI) explained the psychometric functions in the laboratory and remote experiments fairly well. GESI has the potential to explain the SI of HI listeners by properly setting HL parameters.
[ { "created": "Tue, 14 Jun 2022 03:22:30 GMT", "version": "v1" }, { "created": "Tue, 28 Nov 2023 05:52:14 GMT", "version": "v2" } ]
"2023-11-29T00:00:00"
[ [ "Irino", "Toshio", "" ], [ "Tamaru", "Honoka", "" ], [ "Yamamoto", "Ayako", "" ] ]
1new_dataset
2010.05683
Shouhuai Xu
Shouhuai Xu
Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity
31 pages. Chapter in Springer 2019 book entitled "Proactive and Dynamic Network Defense"
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cybersecurity Dynamics is new concept that aims to achieve the modeling, analysis, quantification, and management of cybersecurity from a holistic perspective, rather than from a building-blocks perspective. It is centered at modeling and analyzing the attack-defense interactions in cyberspace, which cause a ``natural'' phenomenon -- the evolution of the global cybersecurity state. In this Chapter, we systematically introduce and review the Cybersecurity Dynamics foundation for the Science of Cybersecurity. We review the core concepts, technical approaches, research axes, and results that have been obtained in this endeavor. We outline a research roadmap towards the ultimate research goal, including a systematic set of technical barriers.
[ { "created": "Fri, 9 Oct 2020 04:09:43 GMT", "version": "v1" } ]
"2020-10-13T00:00:00"
[ [ "Xu", "Shouhuai", "" ] ]
0no_new_dataset
2211.11216
Shangda Wu
Shangda Wu, Maosong Sun
Exploring the Efficacy of Pre-trained Checkpoints in Text-to-Music Generation Task
Accepted by the Creative AI Across Modalities workshop at AAAI 2023
null
null
null
cs.SD cs.CL eess.AS
http://creativecommons.org/licenses/by/4.0/
Benefiting from large-scale datasets and pre-trained models, the field of generative models has recently gained significant momentum. However, most datasets for symbolic music are very small, which potentially limits the performance of data-driven multimodal models. An intuitive solution to this problem is to leverage pre-trained models from other modalities (e.g., natural language) to improve the performance of symbolic music-related multimodal tasks. In this paper, we carry out the first study of generating complete and semantically consistent symbolic music scores from text descriptions, and explore the efficacy of using publicly available checkpoints (i.e., BERT, GPT-2, and BART) for natural language processing in the task of text-to-music generation. Our experimental results show that the improvement from using pre-trained checkpoints is statistically significant in terms of BLEU score and edit distance similarity. We analyse the capabilities and limitations of our model to better understand the potential of language-music models.
[ { "created": "Mon, 21 Nov 2022 07:19:17 GMT", "version": "v1" }, { "created": "Wed, 4 Jan 2023 01:06:19 GMT", "version": "v2" } ]
"2023-01-05T00:00:00"
[ [ "Wu", "Shangda", "" ], [ "Sun", "Maosong", "" ] ]
0no_new_dataset
2211.06598
Keyi Shi
Keyi Shi, Jingchao Wang, Hongyan Li and Kan Wang
Enhancing Resource Utilization of Non-terrestrial Networks Using Temporal Graph-based Deterministic Routing
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deterministic routing has emerged as a promising technology for future non-terrestrial networks (NTNs), offering the potential to enhance service performance and optimize resource utilization. However, the dynamic nature of network topology and resources poses challenges in establishing deterministic routing. These challenges encompass the intricacy of jointly scheduling transmission links and cycles, as well as the difficulty of maintaining stable end-to-end (E2E) routing paths. To tackle these challenges, our work introduces an efficient temporal graph-based deterministic routing strategy. Initially, we utilize a time-expanded graph (TEG) to represent the heterogeneous resources of an NTN in a time-slotted manner. With TEG, we meticulously define each necessary constraint and formulate the deterministic routing problem. Subsequently, we transform this nonlinear problem equivalently into solvable integer linear programming (ILP), providing a robust yet time-consuming performance upper bound. To address the considered problem with reduced complexity, we extend TEG by introducing virtual nodes and edges. This extension facilitates a uniform representation of heterogeneous network resources and traffic transmission requirements. Consequently, we propose a polynomial-time complexity algorithm, enabling the dynamic selection of optimal transmission links and cycles on a hop-by-hop basis. Simulation results validate that the proposed algorithm yields significant performance gains in traffic acceptance, justifying its additional complexity compared to existing routing strategies.
[ { "created": "Sat, 12 Nov 2022 07:28:29 GMT", "version": "v1" }, { "created": "Sat, 13 Jan 2024 04:54:32 GMT", "version": "v2" }, { "created": "Tue, 23 Jan 2024 02:34:49 GMT", "version": "v3" } ]
"2024-01-24T00:00:00"
[ [ "Shi", "Keyi", "" ], [ "Wang", "Jingchao", "" ], [ "Li", "Hongyan", "" ], [ "Wang", "Kan", "" ] ]
0no_new_dataset
2404.00694
Haolin Qin
Haolin Qin, Tingfa Xu, Peifu Liu, Jingxuan Xu, Jianan Li
DMSSN: Distilled Mixed Spectral-Spatial Network for Hyperspectral Salient Object Detection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hyperspectral salient object detection (HSOD) has exhibited remarkable promise across various applications, particularly in intricate scenarios where conventional RGB-based approaches fall short. Despite the considerable progress in HSOD method advancements, two critical challenges require immediate attention. Firstly, existing hyperspectral data dimension reduction techniques incur a loss of spectral information, which adversely affects detection accuracy. Secondly, previous methods insufficiently harness the inherent distinctive attributes of hyperspectral images (HSIs) during the feature extraction process. To address these challenges, we propose a novel approach termed the Distilled Mixed Spectral-Spatial Network (DMSSN), comprising a Distilled Spectral Encoding process and a Mixed Spectral-Spatial Transformer (MSST) feature extraction network. The encoding process utilizes knowledge distillation to construct a lightweight autoencoder for dimension reduction, striking a balance between robust encoding capabilities and low computational costs. The MSST extracts spectral-spatial features through multiple attention head groups, collaboratively enhancing its resistance to intricate scenarios. Moreover, we have created a large-scale HSOD dataset, HSOD-BIT, to tackle the issue of data scarcity in this field and meet the fundamental data requirements of deep network training. Extensive experiments demonstrate that our proposed DMSSN achieves state-of-the-art performance on multiple datasets. We will soon make the code and dataset publicly available on https://github.com/anonymous0519/HSOD-BIT.
[ { "created": "Sun, 31 Mar 2024 14:04:57 GMT", "version": "v1" } ]
"2024-04-02T00:00:00"
[ [ "Qin", "Haolin", "" ], [ "Xu", "Tingfa", "" ], [ "Liu", "Peifu", "" ], [ "Xu", "Jingxuan", "" ], [ "Li", "Jianan", "" ] ]
1new_dataset
2207.08965
Jonathan Schneider
Rad Niazadeh, Renato Paes Leme, Jon Schneider
Bernoulli Factories for Flow-Based Polytopes
null
null
null
null
cs.DS cs.DM math.CO math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct explicit combinatorial Bernoulli factories for the class of \emph{flow-based polytopes}; integral 0/1-polytopes defined by a set of network flow constraints. This generalizes the results of Niazadeh et al. (who constructed an explicit factory for the specific case of bipartite perfect matchings) and provides novel exact sampling procedures for sampling paths, circulations, and $k$-flows. In the process, we uncover new connections to algebraic combinatorics.
[ { "created": "Mon, 18 Jul 2022 22:34:36 GMT", "version": "v1" } ]
"2022-07-20T00:00:00"
[ [ "Niazadeh", "Rad", "" ], [ "Leme", "Renato Paes", "" ], [ "Schneider", "Jon", "" ] ]
0no_new_dataset
2208.05174
YuanYuan Chen Mr
Yuanyuan Chen, Zichen Chen, Pengcheng Wu, Han Yu
FedOBD: Opportunistic Block Dropout for Efficiently Training Large-scale Neural Networks through Federated Learning
null
null
null
null
cs.LG cs.DC
http://creativecommons.org/licenses/by/4.0/
Large-scale neural networks possess considerable expressive power. They are well-suited for complex learning tasks in industrial applications. However, large-scale models pose significant challenges for training under the current Federated Learning (FL) paradigm. Existing approaches for efficient FL training often leverage model parameter dropout. However, manipulating individual model parameters is not only inefficient in meaningfully reducing the communication overhead when training large-scale FL models, but may also be detrimental to the scaling efforts and model performance as shown by recent research. To address these issues, we propose the Federated Opportunistic Block Dropout (FedOBD) approach. The key novelty is that it decomposes large-scale models into semantic blocks so that FL participants can opportunistically upload quantized blocks, which are deemed to be significant towards training the model, to the FL server for aggregation. Extensive experiments evaluating FedOBD against four state-of-the-art approaches based on multiple real-world datasets show that it reduces the overall communication overhead by more than 88% compared to the best performing baseline approach, while achieving the highest test accuracy. To the best of our knowledge, FedOBD is the first approach to perform dropout on FL models at the block level rather than at the individual parameter level.
[ { "created": "Wed, 10 Aug 2022 06:36:49 GMT", "version": "v1" }, { "created": "Mon, 26 Sep 2022 03:43:21 GMT", "version": "v2" }, { "created": "Tue, 27 Sep 2022 02:46:37 GMT", "version": "v3" }, { "created": "Thu, 11 May 2023 07:16:33 GMT", "version": "v4" }, { "created": "Mon, 7 Aug 2023 14:37:00 GMT", "version": "v5" } ]
"2023-08-08T00:00:00"
[ [ "Chen", "Yuanyuan", "" ], [ "Chen", "Zichen", "" ], [ "Wu", "Pengcheng", "" ], [ "Yu", "Han", "" ] ]
0no_new_dataset
1012.4691
Thomas Sejr Jensen
Steffen Godskesen, Thomas Sejr Jensen, Niels Kjeldsen, Rune Larsen
Solving a real-life large-scale energy management problem
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a three-phase heuristic approach for a large-scale energy management and maintenance scheduling problem. The problem is concerned with scheduling maintenance and refueling for nuclear power plants up to five years into the future, while handling a number of scenarios for future demand and prices. The goal is to minimize the expected total production costs. The first phase of the heuristic solves a simplified constraint programming model of the problem, the second performs a local search, and the third handles overproduction in a greedy fashion. This work was initiated in the context of the ROADEF/EURO Challenge 2010, a competition organized jointly by the French Operational Research and Decision Support Society, the European Operational Research Society, and the European utility company Electricite de France. In the concluding phase of the competition our team ranked second in the junior category and sixth overall. After correcting an implementation bug in the program that was submitted for evaluation, our heuristic solves all ten real-life instances, and the solutions obtained are all within 2.45% of the currently best known solutions. The results given here would have ranked first in the original competition.
[ { "created": "Tue, 21 Dec 2010 15:21:26 GMT", "version": "v1" } ]
"2010-12-22T00:00:00"
[ [ "Godskesen", "Steffen", "" ], [ "Jensen", "Thomas Sejr", "" ], [ "Kjeldsen", "Niels", "" ], [ "Larsen", "Rune", "" ] ]
0no_new_dataset
1703.05351
Phil Scott
Phil Scott, Steven Obua, Jacques Fleuriot
Bootstrapping LCF Declarative Proofs
15 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suppose we have been sold on the idea that formalised proofs in an LCF system should resemble their written counterparts, and so consist of formulas that only provide signposts for a fully verified proof. To be practical, most of the fully elaborated verification must then be done by way of general purpose proof procedures. Now if these are the only procedures we implement outside the kernel of logical rules, what does the theorem prover look like? We give our account, working from scratch in the ProofPeer theorem prover, making observations about this new setting along the way.
[ { "created": "Wed, 15 Mar 2017 18:56:42 GMT", "version": "v1" } ]
"2017-03-17T00:00:00"
[ [ "Scott", "Phil", "" ], [ "Obua", "Steven", "" ], [ "Fleuriot", "Jacques", "" ] ]
0no_new_dataset
2005.13118
Zhanzhan Cheng
Peng Zhang, Yunlu Xu, Zhanzhan Cheng, Shiliang Pu, Jing Lu, Liang Qiao, Yi Niu, and Fei Wu
TRIE: End-to-End Text Reading and Information Extraction for Document Understanding
Accepted to ACM MM2020. Code is available at https://davar-lab.github.io/publication.html or https://github.com/hikopensource/DAVAR-Lab-OCR
null
null
null
cs.CV
http://creativecommons.org/licenses/by-sa/4.0/
Since real-world ubiquitous documents (e.g., invoices, tickets, resumes and leaflets) contain rich information, automatic document image understanding has become a hot topic. Most existing works decouple the problem into two separate tasks, (1) text reading for detecting and recognizing texts in images and (2) information extraction for analyzing and extracting key elements from previously extracted plain text. However, they mainly focus on improving information extraction task, while neglecting the fact that text reading and information extraction are mutually correlated. In this paper, we propose a unified end-to-end text reading and information extraction network, where the two tasks can reinforce each other. Specifically, the multimodal visual and textual features of text reading are fused for information extraction and in turn, the semantics in information extraction contribute to the optimization of text reading. On three real-world datasets with diverse document images (from fixed layout to variable layout, from structured text to semi-structured text), our proposed method significantly outperforms the state-of-the-art methods in both efficiency and accuracy.
[ { "created": "Wed, 27 May 2020 01:47:26 GMT", "version": "v1" }, { "created": "Wed, 5 Aug 2020 11:16:55 GMT", "version": "v2" }, { "created": "Mon, 25 Oct 2021 09:33:53 GMT", "version": "v3" } ]
"2021-10-26T00:00:00"
[ [ "Zhang", "Peng", "" ], [ "Xu", "Yunlu", "" ], [ "Cheng", "Zhanzhan", "" ], [ "Pu", "Shiliang", "" ], [ "Lu", "Jing", "" ], [ "Qiao", "Liang", "" ], [ "Niu", "Yi", "" ], [ "Wu", "Fei", "" ] ]
0no_new_dataset
2302.05206
Fangchen Liu
Tianjun Zhang, Fangchen Liu, Justin Wong, Pieter Abbeel, Joseph E. Gonzalez
The Wisdom of Hindsight Makes Language Models Better Instruction Followers
null
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reinforcement learning has seen wide success in finetuning large language models to better align with instructions via human feedback. The so-called algorithm, Reinforcement Learning with Human Feedback (RLHF) demonstrates impressive performance on the GPT series models. However, the underlying Reinforcement Learning (RL) algorithm is complex and requires an additional training pipeline for reward and value networks. In this paper, we consider an alternative approach: converting feedback to instruction by relabeling the original one and training the model for better alignment in a supervised manner. Such an algorithm doesn't require any additional parameters except for the original language model and maximally reuses the pretraining pipeline. To achieve this, we formulate instruction alignment problem for language models as a goal-reaching problem in decision making. We propose Hindsight Instruction Relabeling (HIR), a novel algorithm for aligning language models with instructions. The resulting two-stage algorithm shed light to a family of reward-free approaches that utilize the hindsightly relabeled instructions based on feedback. We evaluate the performance of HIR extensively on 12 challenging BigBench reasoning tasks and show that HIR outperforms the baseline algorithms and is comparable to or even surpasses supervised finetuning.
[ { "created": "Fri, 10 Feb 2023 12:16:38 GMT", "version": "v1" } ]
"2023-02-13T00:00:00"
[ [ "Zhang", "Tianjun", "" ], [ "Liu", "Fangchen", "" ], [ "Wong", "Justin", "" ], [ "Abbeel", "Pieter", "" ], [ "Gonzalez", "Joseph E.", "" ] ]
0no_new_dataset
2205.14912
Qihuang Zhong
Qihuang Zhong, Liang Ding, Juhua Liu, Bo Du and Dacheng Tao
E2S2: Encoding-Enhanced Sequence-to-Sequence Pretraining for Language Understanding and Generation
Accepted by IEEE TKDE 2023
null
10.1109/TKDE.2023.3341917
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sequence-to-sequence (seq2seq) learning is a popular fashion for large-scale pretraining language models. However, the prior seq2seq pretraining models generally focus on reconstructive objectives on the decoder side and neglect the effect of encoder-side supervision, which we argue may lead to sub-optimal performance. To verify our hypothesis, we first empirically study the functionalities of the encoder and decoder in seq2seq pretrained language models, and find that the encoder takes an important but under-exploitation role than the decoder regarding the downstream performance and neuron activation. Therefore, we propose an encoding-enhanced seq2seq pretraining strategy, namely E2S2, which improves the seq2seq models via integrating more efficient self-supervised information into the encoders. Specifically, E2S2 adopts two self-supervised objectives on the encoder side from two aspects: 1) locally denoising the corrupted sentence (denoising objective); and 2) globally learning better sentence representations (contrastive objective). With the help of both objectives, the encoder can effectively distinguish the noise tokens and capture high-level (i.e., syntactic and semantic) knowledge, thus strengthening the ability of seq2seq model to accurately achieve the conditional generation. On a large diversity of downstream natural language understanding and generation tasks, E2S2 dominantly improves the performance of its powerful backbone models, e.g., BART and T5. For example, upon BART backbone, we achieve +1.1% averaged gain on the general language understanding evaluation (GLUE) benchmark and +1.75% F_0.5 score improvement on CoNLL2014 dataset. We also provide in-depth analyses to show the improvement stems from better linguistic representation. We hope that our work will foster future self-supervision research on seq2seq language model pretraining.
[ { "created": "Mon, 30 May 2022 08:25:36 GMT", "version": "v1" }, { "created": "Mon, 5 Dec 2022 12:56:43 GMT", "version": "v2" }, { "created": "Tue, 9 Jan 2024 09:44:10 GMT", "version": "v3" } ]
"2024-01-10T00:00:00"
[ [ "Zhong", "Qihuang", "" ], [ "Ding", "Liang", "" ], [ "Liu", "Juhua", "" ], [ "Du", "Bo", "" ], [ "Tao", "Dacheng", "" ] ]
0no_new_dataset
1710.02124
Robert Maier
Vladislav Golyanik, Kihwan Kim, Robert Maier, Matthias Nie{\ss}ner, Didier Stricker, Jan Kautz
Multiframe Scene Flow with Piecewise Rigid Motion
International Conference on 3D Vision (3DV), Qingdao, China, October 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel multiframe scene flow approach that jointly optimizes the consistency of the patch appearances and their local rigid motions from RGB-D image sequences. In contrast to the competing methods, we take advantage of an oversegmentation of the reference frame and robust optimization techniques. We formulate scene flow recovery as a global non-linear least squares problem which is iteratively solved by a damped Gauss-Newton approach. As a result, we obtain a qualitatively new level of accuracy in RGB-D based scene flow estimation which can potentially run in real-time. Our method can handle challenging cases with rigid, piecewise rigid, articulated and moderate non-rigid motion, and does not rely on prior knowledge about the types of motions and deformations. Extensive experiments on synthetic and real data show that our method outperforms state-of-the-art.
[ { "created": "Thu, 5 Oct 2017 17:28:44 GMT", "version": "v1" } ]
"2017-10-06T00:00:00"
[ [ "Golyanik", "Vladislav", "" ], [ "Kim", "Kihwan", "" ], [ "Maier", "Robert", "" ], [ "Nießner", "Matthias", "" ], [ "Stricker", "Didier", "" ], [ "Kautz", "Jan", "" ] ]
0no_new_dataset
2308.13495
Sushmanth Reddy Mereddy
Sushmanth reddy, Jyothi Swaroop Reddy
Open Gaze: Open Source eye tracker for smartphone devices using Deep Learning
26 pages , 15 figures
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
Eye tracking has been a pivotal tool in diverse fields such as vision research, language analysis, and usability assessment. The majority of prior investigations, however, have concentrated on expansive desktop displays employing specialized, costly eye tracking hardware that lacks scalability. Remarkably little insight exists into ocular movement patterns on smartphones, despite their widespread adoption and significant usage. In this manuscript, we present an open-source implementation of a smartphone-based gaze tracker that emulates the methodology proposed by a GooglePaper (whose source code remains proprietary). Our focus is on attaining accuracy comparable to that attained through the GooglePaper's methodology, without the necessity for supplementary hardware. Through the integration of machine learning techniques, we unveil an accurate eye tracking solution that is native to smartphones. Our approach demonstrates precision akin to the state-of-the-art mobile eye trackers, which are characterized by a cost that is two orders of magnitude higher. Leveraging the vast MIT GazeCapture dataset, which is available through registration on the dataset's website, we successfully replicate crucial findings from previous studies concerning ocular motion behavior in oculomotor tasks and saliency analyses during natural image observation. Furthermore, we emphasize the applicability of smartphone-based gaze tracking in discerning reading comprehension challenges. Our findings exhibit the inherent potential to amplify eye movement research by significant proportions, accommodating participation from thousands of subjects with explicit consent. This scalability not only fosters advancements in vision research, but also extends its benefits to domains such as accessibility enhancement and healthcare applications.
[ { "created": "Fri, 25 Aug 2023 17:10:22 GMT", "version": "v1" }, { "created": "Tue, 29 Aug 2023 09:01:13 GMT", "version": "v2" } ]
"2023-08-30T00:00:00"
[ [ "reddy", "Sushmanth", "" ], [ "Reddy", "Jyothi Swaroop", "" ] ]
1new_dataset
2002.00611
Aysun Gurur \"Onalan
Aysun Gurur Onalan, Elif Dilek Salik, Sinem Coleri
Relay Selection, Scheduling and Power Control in Wireless Powered Cooperative Communication Networks
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relay nodes are used to improve the throughput, delay and reliability performance of energy harvesting networks by assisting both energy and information transfer between information nodes and access point. Previous studies on radio frequency energy harvesting networks are limited to single source single/multiple relay networks. In this paper, a novel joint relay selection, scheduling and power control problem for multiple source multiple relay network is formulated with the objective of minimizing the total duration of wireless power and information transfer. The formulated problem is non-convex mixed-integer non-linear programming problem, and proven to be NP-hard. We first formulate a sub-problem on scheduling and power control for a given relay selection. We propose an efficient optimal algorithm based on a bi-level optimization over power transfer time allocation. Then, for optimal relay selection, we present optimal exponential-time Branch-and-Bound (BB) based algorithm where the nodes are pruned with problem specific lower and upper bounds. We also provide two BB-based heuristic approaches limiting the number of branches generated from a BB-node, and a relay criterion based lower complexity heuristic algorithm. The performance of the proposed algorithms are demonstrated to outperform conventional harvest-then-cooperate approaches with up to $88\%$ lower schedule length for various network settings.
[ { "created": "Mon, 3 Feb 2020 09:08:43 GMT", "version": "v1" } ]
"2020-02-04T00:00:00"
[ [ "Onalan", "Aysun Gurur", "" ], [ "Salik", "Elif Dilek", "" ], [ "Coleri", "Sinem", "" ] ]
0no_new_dataset
2310.01423
Arslan Akram Doula
Arslan Akram
An Empirical Study of AI Generated Text Detection Tools
15 Pages, 4 Figures, 2 Tables, 42 References
2023
10.33140/AMLAI
42
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by-nc-sa/4.0/
Since ChatGPT has emerged as a major AIGC model, providing high-quality responses across a wide range of applications (including software development and maintenance), it has attracted much interest from many individuals. ChatGPT has great promise, but there are serious problems that might arise from its misuse, especially in the realms of education and public safety. Several AIGC detectors are available, and they have all been tested on genuine text. However, more study is needed to see how effective they are for multi-domain ChatGPT material. This study aims to fill this need by creating a multi-domain dataset for testing the state-of-the-art APIs and tools for detecting artificially generated information used by universities and other research institutions. A large dataset consisting of articles, abstracts, stories, news, and product reviews was created for this study. The second step is to use the newly created dataset to put six tools through their paces. Six different artificial intelligence (AI) text identification systems, including "GPTkit," "GPTZero," "Originality," "Sapling," "Writer," and "Zylalab," have accuracy rates between 55.29 and 97.0%. Although all the tools fared well in the evaluations, originality was particularly effective across the board.
[ { "created": "Wed, 27 Sep 2023 12:44:12 GMT", "version": "v1" } ]
"2023-10-24T00:00:00"
[ [ "Akram", "Arslan", "" ] ]
1new_dataset
2405.15443
Drago Plecko
Drago Plecko, Elias Bareinboim
Fairness-Accuracy Trade-Offs: A Causal Perspective
null
null
null
null
cs.LG cs.AI stat.ML
http://creativecommons.org/licenses/by/4.0/
Systems based on machine learning may exhibit discriminatory behavior based on sensitive characteristics such as gender, sex, religion, or race. In light of this, various notions of fairness and methods to quantify discrimination were proposed, leading to the development of numerous approaches for constructing fair predictors. At the same time, imposing fairness constraints may decrease the utility of the decision-maker, highlighting a tension between fairness and utility. This tension is also recognized in legal frameworks, for instance in the disparate impact doctrine of Title VII of the Civil Rights Act of 1964 -- in which specific attention is given to considerations of business necessity -- possibly allowing the usage of proxy variables associated with the sensitive attribute in case a high-enough utility cannot be achieved without them. In this work, we analyze the tension between fairness and accuracy from a causal lens for the first time. We introduce the notion of a path-specific excess loss (PSEL) that captures how much the predictor's loss increases when a causal fairness constraint is enforced. We then show that the total excess loss (TEL), defined as the difference between the loss of predictor fair along all causal pathways vs. an unconstrained predictor, can be decomposed into a sum of more local PSELs. At the same time, enforcing a causal constraint often reduces the disparity between demographic groups. Thus, we introduce a quantity that summarizes the fairness-utility trade-off, called the causal fairness/utility ratio, defined as the ratio of the reduction in discrimination vs. the excess loss from constraining a causal pathway. This quantity is suitable for comparing the fairness-utility trade-off across causal pathways. Finally, as our approach requires causally-constrained fair predictors, we introduce a new neural approach for causally-constrained fair learning.
[ { "created": "Fri, 24 May 2024 11:19:52 GMT", "version": "v1" } ]
"2024-05-27T00:00:00"
[ [ "Plecko", "Drago", "" ], [ "Bareinboim", "Elias", "" ] ]
0no_new_dataset
1703.05380
Kitty Meeks
Marthe Bonamy and Kitty Meeks
The Interactive Sum Choice Number of Graphs
Author final version, to appear in Discrete Applied Mathematics
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a variant of the well-studied sum choice number of graphs, which we call the interactive sum choice number. In this variant, we request colours to be added to the vertices' colour-lists one at a time, and so we are able to make use of information about the colours assigned so far to determine our future choices. The interactive sum choice number cannot exceed the sum choice number and we conjecture that, except in the case of complete graphs, the interactive sum choice number is always strictly smaller than the sum choice number. In this paper we provide evidence in support of this conjecture, demonstrating that it holds for a number of graph classes, and indeed that in many cases the difference between the two quantities grows as a linear function of the number of vertices.
[ { "created": "Wed, 15 Mar 2017 20:47:34 GMT", "version": "v1" }, { "created": "Sun, 9 Jul 2017 13:45:05 GMT", "version": "v2" }, { "created": "Wed, 6 Jan 2021 16:01:31 GMT", "version": "v3" } ]
"2021-01-07T00:00:00"
[ [ "Bonamy", "Marthe", "" ], [ "Meeks", "Kitty", "" ] ]
0no_new_dataset
2003.00294
Suat Mercan
Suat Mercan, Enes Erdin, and Kemal Akkaya
Improving Sustainability of Cryptocurrency Payment Networks for IoT Applications
null
null
10.1109/ICCWorkshops49005.2020.9145389
null
cs.CR cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blockchain-based cryptocurrencies received a lot of attention recently for their applications in many domains. IoT domain is one of such applications, which can utilize cryptocur-rencies for micro payments without compromising their payment privacy. However, long confirmation times of transactions and relatively high fees hinder the adoption of cryptoccurency based micro-payments. The payment channel networks is one of the proposed solutions to address these issue where nodes establish payment channels among themselves without writing on blockchain. IoT devices can benefit from such payment networks as long as they are capable of sustaining their overhead. Payment channel networks pose unique characteristics as far as the routing problem is concerned. Specifically, they should stay balanced to have a sustainable network for maintaining payments for longer times, which is crucial for IoT devices once they are deployed.In this paper, we present a payment channel network design that aims to keep the channels balanced by using a common weight policy across the network. We additionally propose using multi-point connections to nodes for each IoT device for unbalanced payment scenarios. The experiment results show that we can keep the channels in the network more equally balanced compared to the minimal fee approach. In addition, multiple connections from IoT devices to nodes increase the success ratio significantly.
[ { "created": "Sat, 29 Feb 2020 16:33:25 GMT", "version": "v1" } ]
"2020-12-15T00:00:00"
[ [ "Mercan", "Suat", "" ], [ "Erdin", "Enes", "" ], [ "Akkaya", "Kemal", "" ] ]
0no_new_dataset
2303.14592
Bradford Windsor
Brad Windsor, Brandon O'Shea, Mengxi Wu
Exploring Novel Quality Diversity Methods For Generalization in Reinforcement Learning
null
null
null
null
cs.NE
http://creativecommons.org/licenses/by/4.0/
The Reinforcement Learning field is strong on achievements and weak on reapplication; a computer playing GO at a super-human level is still terrible at Tic-Tac-Toe. This paper asks whether the method of training networks improves their generalization. Specifically we explore core quality diversity algorithms, compare against two recent algorithms, and propose a new algorithm to deal with shortcomings in existing methods. Although results of these methods are well below the performance hoped for, our work raises important points about the choice of behavior criterion in quality diversity, the interaction of differential and evolutionary training methods, and the role of offline reinforcement learning and randomized learning in evolutionary search.
[ { "created": "Sun, 26 Mar 2023 00:23:29 GMT", "version": "v1" } ]
"2023-03-28T00:00:00"
[ [ "Windsor", "Brad", "" ], [ "O'Shea", "Brandon", "" ], [ "Wu", "Mengxi", "" ] ]
0no_new_dataset
2204.09388
Fran\c{c}ois Gauthier
Francois Gauthier and Sora Bae
Runtime Prevention of Deserialization Attacks
null
null
10.1145/3510455.3512786
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Untrusted deserialization exploits, where a serialised object graph is used to achieve denial-of-service or arbitrary code execution, have become so prominent that they were introduced in the 2017 OWASP Top 10. In this paper, we present a novel and lightweight approach for runtime prevention of deserialization attacks using Markov chains. The intuition behind our work is that the features and ordering of classes in malicious object graphs make them distinguishable from benign ones. Preliminary results indeed show that our approach achieves an F1-score of 0.94 on a dataset of 264 serialised payloads, collected from an industrial Java EE application server and a repository of deserialization exploits.
[ { "created": "Wed, 20 Apr 2022 11:01:46 GMT", "version": "v1" } ]
"2022-04-21T00:00:00"
[ [ "Gauthier", "Francois", "" ], [ "Bae", "Sora", "" ] ]
1new_dataset
1504.06961
Daniel Hienert
Daniel Hienert, Wilko van Hoek, Alina Weber and Dagmar Kern
WHOSE - A Tool for Whole-Session Analysis in IIR
In Advances in Information Retrieval: 37th European Conference on IR Research, ECIR 2015, Vienna, Austria, March 29 - April 2, 2015. Proceedings, Lecture Notes in Computer Science 9022, 172-183
null
10.1007/978-3-319-16354-3_18
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the main challenges in Interactive Information Retrieval (IIR) evaluation is the development and application of re-usable tools that allow researchers to analyze search behavior of real users in different environments and different domains, but with comparable results. Furthermore, IIR recently focuses more on the analysis of whole sessions, which includes all user interactions that are carried out within a session but also across several sessions by the same user. Some frameworks have already been proposed for the evaluation of controlled experiments in IIR, but yet no framework is available for interactive evaluation of search behavior from real-world information retrieval (IR) systems with real users. In this paper we present a framework for whole-session evaluation that can also utilize these uncontrolled data sets. The logging component can easily be integrated into real-world IR systems for generating and analyzing new log data. Furthermore, due to a supplementary mapping it is also possible to analyze existing log data. For every IR system different actions and filters can be defined. This allows system operators and researchers to use the framework for the analysis of user search behavior in their IR systems and to compare it with others. Using a graphical user interface they have the possibility to interactively explore the data set from a broad overview down to individual sessions.
[ { "created": "Mon, 27 Apr 2015 08:06:21 GMT", "version": "v1" } ]
"2015-04-28T00:00:00"
[ [ "Hienert", "Daniel", "" ], [ "van Hoek", "Wilko", "" ], [ "Weber", "Alina", "" ], [ "Kern", "Dagmar", "" ] ]
0no_new_dataset
2012.06009
Liang Han
Liang Han, Zhaozheng Yin, Zhurong Xia, Li Guo, Mingqian Tang, Rong Jin
Vision-based Price Suggestion for Online Second-hand Items
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different from shopping in physical stores, where people have the opportunity to closely check a product (e.g., touching the surface of a T-shirt or smelling the scent of perfume) before making a purchase decision, online shoppers rely greatly on the uploaded product images to make any purchase decision. The decision-making is challenging when selling or purchasing second-hand items online since estimating the items' prices is not trivial. In this work, we present a vision-based price suggestion system for the online second-hand item shopping platform. The goal of vision-based price suggestion is to help sellers set effective prices for their second-hand listings with the images uploaded to the online platforms. First, we propose to better extract representative visual features from the images with the aid of some other image-based item information (e.g., category, brand). Then, we design a vision-based price suggestion module which takes the extracted visual features along with some statistical item features from the shopping platform as the inputs to determine whether an uploaded item image is qualified for price suggestion by a binary classification model, and provide price suggestions for items with qualified images by a regression model. According to two demands from the platform, two different objective functions are proposed to jointly optimize the classification model and the regression model. For better model training, we also propose a warm-up training strategy for the joint optimization. Extensive experiments on a large real-world dataset demonstrate the effectiveness of our vision-based price prediction system.
[ { "created": "Thu, 10 Dec 2020 22:56:29 GMT", "version": "v1" } ]
"2020-12-14T00:00:00"
[ [ "Han", "Liang", "" ], [ "Yin", "Zhaozheng", "" ], [ "Xia", "Zhurong", "" ], [ "Guo", "Li", "" ], [ "Tang", "Mingqian", "" ], [ "Jin", "Rong", "" ] ]
1new_dataset
1808.02191
Ghazaleh Beigi
Ghazaleh Beigi, Huan Liu
Privacy in Social Media: Identification, Mitigation and Applications
This survey is currently under review
null
null
null
cs.CR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing popularity of social media has attracted a huge number of people to participate in numerous activities on a daily basis. This results in tremendous amounts of rich user-generated data. This data provides opportunities for researchers and service providers to study and better understand users' behaviors and further improve the quality of the personalized services. Publishing user-generated data risks exposing individuals' privacy. Users privacy in social media is an emerging task and has attracted increasing attention in recent years. These works study privacy issues in social media from the two different points of views: identification of vulnerabilities, and mitigation of privacy risks. Recent research has shown the vulnerability of user-generated data against the two general types of attacks, identity disclosure and attribute disclosure. These privacy issues mandate social media data publishers to protect users' privacy by sanitizing user-generated data before publishing it. Consequently, various protection techniques have been proposed to anonymize user-generated social media data. There is a vast literature on privacy of users in social media from many perspectives. In this survey, we review the key achievements of user privacy in social media. In particular, we review and compare the state-of-the-art algorithms in terms of the privacy leakage attacks and anonymization algorithms. We overview the privacy risks from different aspects of social media and categorize the relevant works into five groups 1) graph data anonymization and de-anonymization, 2) author identification, 3) profile attribute disclosure, 4) user location and privacy, and 5) recommender systems and privacy issues. We also discuss open problems and future research directions for user privacy issues in social media.
[ { "created": "Tue, 7 Aug 2018 03:09:54 GMT", "version": "v1" } ]
"2018-08-08T00:00:00"
[ [ "Beigi", "Ghazaleh", "" ], [ "Liu", "Huan", "" ] ]
0no_new_dataset
2004.03436
Shaoxu Song
Aoqian Zhang, Shaoxu Song, Yu Sun, Jianmin Wang
Learning Individual Models for Imputation (Technical Report)
null
null
null
null
cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Missing numerical values are prevalent, e.g., owing to unreliable sensor reading, collection and transmission among heterogeneous sources. Unlike categorized data imputation over a limited domain, the numerical values suffer from two issues: (1) sparsity problem, the incomplete tuple may not have sufficient complete neighbors sharing the same/similar values for imputation, owing to the (almost) infinite domain; (2) heterogeneity problem, different tuples may not fit the same (regression) model. In this study, enlightened by the conditional dependencies that hold conditionally over certain tuples rather than the whole relation, we propose to learn a regression model individually for each complete tuple together with its neighbors. Our IIM, Imputation via Individual Models, thus no longer relies on sharing similar values among the k complete neighbors for imputation, but utilizes their regression results by the aforesaid learned individual (not necessary the same) models. Remarkably, we show that some existing methods are indeed special cases of our IIM, under the extreme settings of the number l of learning neighbors considered in individual learning. In this sense, a proper number l of neighbors is essential to learn the individual models (avoid over-fitting or under-fitting). We propose to adaptively learn individual models over various number l of neighbors for different complete tuples. By devising efficient incremental computation, the time complexity of learning a model reduces from linear to constant. Experiments on real data demonstrate that our IIM with adaptive learning achieves higher imputation accuracy than the existing approaches.
[ { "created": "Tue, 7 Apr 2020 14:36:54 GMT", "version": "v1" } ]
"2020-04-08T00:00:00"
[ [ "Zhang", "Aoqian", "" ], [ "Song", "Shaoxu", "" ], [ "Sun", "Yu", "" ], [ "Wang", "Jianmin", "" ] ]
0no_new_dataset
2303.13560
Yue Hu
Yue Hu, Yifan Lu, Runsheng Xu, Weidi Xie, Siheng Chen, Yanfeng Wang
Collaboration Helps Camera Overtake LiDAR in 3D Detection
Accepted by CVPR23
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Camera-only 3D detection provides an economical solution with a simple configuration for localizing objects in 3D space compared to LiDAR-based detection systems. However, a major challenge lies in precise depth estimation due to the lack of direct 3D measurements in the input. Many previous methods attempt to improve depth estimation through network designs, e.g., deformable layers and larger receptive fields. This work proposes an orthogonal direction, improving the camera-only 3D detection by introducing multi-agent collaborations. Our proposed collaborative camera-only 3D detection (CoCa3D) enables agents to share complementary information with each other through communication. Meanwhile, we optimize communication efficiency by selecting the most informative cues. The shared messages from multiple viewpoints disambiguate the single-agent estimated depth and complement the occluded and long-range regions in the single-agent view. We evaluate CoCa3D in one real-world dataset and two new simulation datasets. Results show that CoCa3D improves previous SOTA performances by 44.21% on DAIR-V2X, 30.60% on OPV2V+, 12.59% on CoPerception-UAVs+ for AP@70. Our preliminary results show a potential that with sufficient collaboration, the camera might overtake LiDAR in some practical scenarios. We released the dataset and code at https://siheng-chen.github.io/dataset/CoPerception+ and https://github.com/MediaBrain-SJTU/CoCa3D.
[ { "created": "Thu, 23 Mar 2023 03:50:41 GMT", "version": "v1" } ]
"2023-03-27T00:00:00"
[ [ "Hu", "Yue", "" ], [ "Lu", "Yifan", "" ], [ "Xu", "Runsheng", "" ], [ "Xie", "Weidi", "" ], [ "Chen", "Siheng", "" ], [ "Wang", "Yanfeng", "" ] ]
1new_dataset
1706.07144
Sourav Garg
Sourav Garg, Adam Jacobson, Swagat Kumar and Michael Milford
Improving Condition- and Environment-Invariant Place Recognition with Semantic Place Categorization
9 pages, 7 figures, to be published in IROS 2017
null
10.1109/IROS.2017.8206608
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The place recognition problem comprises two distinct subproblems; recognizing a specific location in the world ("specific" or "ordinary" place recognition) and recognizing the type of place (place categorization). Both are important competencies for mobile robots and have each received significant attention in the robotics and computer vision community, but usually as separate areas of investigation. In this paper, we leverage the powerful complementary nature of place recognition and place categorization processes to create a new hybrid place recognition system that uses place context to inform place recognition. We show that semantic place categorization creates an informative natural segmenting of physical space that in turn enables significantly better place recognition performance in comparison to existing techniques. In particular, this new semantically informed approach adds robustness to significant local changes within the environment, such as transitioning between indoor and outdoor environments or between dark and light rooms in a house, complementing the capabilities of current condition-invariant techniques that are robust to globally consistent change (such as day to night cycles). We perform experiments using 4 benchmark and new datasets and show that semantically-informed place recognition outperforms the previous state-of-the-art systems. Like it does for object recognition [1], we believe that semantics can play a key role in boosting conventional place recognition and navigation performance for robotic systems.
[ { "created": "Thu, 22 Jun 2017 00:54:47 GMT", "version": "v1" } ]
"2018-04-17T00:00:00"
[ [ "Garg", "Sourav", "" ], [ "Jacobson", "Adam", "" ], [ "Kumar", "Swagat", "" ], [ "Milford", "Michael", "" ] ]
1new_dataset
2207.10582
Zuo-Liang Zhu
Zuo-Liang Zhu, Zhen Li, Rui-Xun Zhang, Chun-Le Guo, Ming-Ming Cheng
Designing An Illumination-Aware Network for Deep Image Relighting
Accepted for publication as a Regular paper in the IEEE Transactions on Image Processing (T-IP)
null
10.1109/TIP.2022.3195366
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
Lighting is a determining factor in photography that affects the style, expression of emotion, and even quality of images. Creating or finding satisfying lighting conditions, in reality, is laborious and time-consuming, so it is of great value to develop a technology to manipulate illumination in an image as post-processing. Although previous works have explored techniques based on the physical viewpoint for relighting images, extensive supervisions and prior knowledge are necessary to generate reasonable images, restricting the generalization ability of these works. In contrast, we take the viewpoint of image-to-image translation and implicitly merge ideas of the conventional physical viewpoint. In this paper, we present an Illumination-Aware Network (IAN) which follows the guidance from hierarchical sampling to progressively relight a scene from a single image with high efficiency. In addition, an Illumination-Aware Residual Block (IARB) is designed to approximate the physical rendering process and to extract precise descriptors of light sources for further manipulations. We also introduce a depth-guided geometry encoder for acquiring valuable geometry- and structure-related representations once the depth information is available. Experimental results show that our proposed method produces better quantitative and qualitative relighting results than previous state-of-the-art methods. The code and models are publicly available on https://github.com/NK-CS-ZZL/IAN.
[ { "created": "Thu, 21 Jul 2022 16:21:24 GMT", "version": "v1" } ]
"2022-08-31T00:00:00"
[ [ "Zhu", "Zuo-Liang", "" ], [ "Li", "Zhen", "" ], [ "Zhang", "Rui-Xun", "" ], [ "Guo", "Chun-Le", "" ], [ "Cheng", "Ming-Ming", "" ] ]
0no_new_dataset
1611.09392
Ang Li
Ang Li, Jin Sun, Joe Yue-Hei Ng, Ruichi Yu, Vlad I. Morariu, Larry S. Davis
Generating Holistic 3D Scene Abstractions for Text-based Image Retrieval
CVPR 2017
null
null
null
cs.CV cs.CG cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spatial relationships between objects provide important information for text-based image retrieval. As users are more likely to describe a scene from a real world perspective, using 3D spatial relationships rather than 2D relationships that assume a particular viewing direction, one of the main challenges is to infer the 3D structure that bridges images with users' text descriptions. However, direct inference of 3D structure from images requires learning from large scale annotated data. Since interactions between objects can be reduced to a limited set of atomic spatial relations in 3D, we study the possibility of inferring 3D structure from a text description rather than an image, applying physical relation models to synthesize holistic 3D abstract object layouts satisfying the spatial constraints present in a textual description. We present a generic framework for retrieving images from a textual description of a scene by matching images with these generated abstract object layouts. Images are ranked by matching object detection outputs (bounding boxes) to 2D layout candidates (also represented by bounding boxes) which are obtained by projecting the 3D scenes with sampled camera directions. We validate our approach using public indoor scene datasets and show that our method outperforms baselines built upon object occurrence histograms and learned 2D pairwise relations.
[ { "created": "Mon, 28 Nov 2016 21:29:07 GMT", "version": "v1" }, { "created": "Tue, 11 Apr 2017 20:37:18 GMT", "version": "v2" } ]
"2017-04-13T00:00:00"
[ [ "Li", "Ang", "" ], [ "Sun", "Jin", "" ], [ "Ng", "Joe Yue-Hei", "" ], [ "Yu", "Ruichi", "" ], [ "Morariu", "Vlad I.", "" ], [ "Davis", "Larry S.", "" ] ]
0no_new_dataset
2207.07568
Shailaja Keyur Sampat
Shailaja Keyur Sampat, Maitreya Patel, Subhasish Das, Yezhou Yang and Chitta Baral
Reasoning about Actions over Visual and Linguistic Modalities: A Survey
7 pages, 3 figures; This survey will be periodically updated with the latest works in this area
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
'Actions' play a vital role in how humans interact with the world and enable them to achieve desired goals. As a result, most common sense (CS) knowledge for humans revolves around actions. While 'Reasoning about Actions & Change' (RAC) has been widely studied in the Knowledge Representation community, it has recently piqued the interest of NLP and computer vision researchers. This paper surveys existing tasks, benchmark datasets, various techniques and models, and their respective performance concerning advancements in RAC in the vision and language domain. Towards the end, we summarize our key takeaways, discuss the present challenges facing this research area, and outline potential directions for future research.
[ { "created": "Fri, 15 Jul 2022 16:15:46 GMT", "version": "v1" } ]
"2022-07-18T00:00:00"
[ [ "Sampat", "Shailaja Keyur", "" ], [ "Patel", "Maitreya", "" ], [ "Das", "Subhasish", "" ], [ "Yang", "Yezhou", "" ], [ "Baral", "Chitta", "" ] ]
0no_new_dataset
2103.13041
Haoyu Ma
Haoyu Ma, Xiangru Lin, Zifeng Wu, Yizhou Yu
Coarse-to-Fine Domain Adaptive Semantic Segmentation with Photometric Alignment and Category-Center Regularization
Accepted to appear in CVPR2021
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unsupervised domain adaptation (UDA) in semantic segmentation is a fundamental yet promising task relieving the need for laborious annotation works. However, the domain shifts/discrepancies problem in this task compromise the final segmentation performance. Based on our observation, the main causes of the domain shifts are differences in imaging conditions, called image-level domain shifts, and differences in object category configurations called category-level domain shifts. In this paper, we propose a novel UDA pipeline that unifies image-level alignment and category-level feature distribution regularization in a coarse-to-fine manner. Specifically, on the coarse side, we propose a photometric alignment module that aligns an image in the source domain with a reference image from the target domain using a set of image-level operators; on the fine side, we propose a category-oriented triplet loss that imposes a soft constraint to regularize category centers in the source domain and a self-supervised consistency regularization method in the target domain. Experimental results show that our proposed pipeline improves the generalization capability of the final segmentation model and significantly outperforms all previous state-of-the-arts.
[ { "created": "Wed, 24 Mar 2021 08:04:08 GMT", "version": "v1" } ]
"2021-03-25T00:00:00"
[ [ "Ma", "Haoyu", "" ], [ "Lin", "Xiangru", "" ], [ "Wu", "Zifeng", "" ], [ "Yu", "Yizhou", "" ] ]
0no_new_dataset
2010.12652
Orhan Firat
Mahdis Mahdieh, Mia Xu Chen, Yuan Cao, Orhan Firat
Rapid Domain Adaptation for Machine Translation with Monolingual Data
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One challenge of machine translation is how to quickly adapt to unseen domains in face of surging events like COVID-19, in which case timely and accurate translation of in-domain information into multiple languages is critical but little parallel data is available yet. In this paper, we propose an approach that enables rapid domain adaptation from the perspective of unsupervised translation. Our proposed approach only requires in-domain monolingual data and can be quickly applied to a preexisting translation system trained on general domain, reaching significant gains on in-domain translation quality with little or no drop on general-domain. We also propose an effective procedure of simultaneous adaptation for multiple domains and languages. To the best of our knowledge, this is the first attempt that aims to address unsupervised multilingual domain adaptation.
[ { "created": "Fri, 23 Oct 2020 20:31:37 GMT", "version": "v1" } ]
"2020-10-27T00:00:00"
[ [ "Mahdieh", "Mahdis", "" ], [ "Chen", "Mia Xu", "" ], [ "Cao", "Yuan", "" ], [ "Firat", "Orhan", "" ] ]
0no_new_dataset
1709.08115
Ali Yekkehkhany
Ali Yekkehkhany, Avesta Hojjati, Mohammad H Hajiesmaili
GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling
IFIP WG 7.3 Performance 2017 - The 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation 2017
null
10.1145/3199524.3199528
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic affinity scheduling has been an open problem for nearly three decades. The problem is to dynamically schedule multi-type tasks to multi-skilled servers such that the resulting queueing system is both stable in the capacity region (throughput optimality) and the mean delay of tasks is minimized at high loads near the boundary of the capacity region (heavy-traffic optimality). As for applications, data-intensive analytics like MapReduce, Hadoop, and Dryad fit into this setting, where the set of servers is heterogeneous for different task types, so the pair of task type and server determines the processing rate of the task. The load balancing algorithm used in such frameworks is an example of affinity scheduling which is desired to be both robust and delay optimal at high loads when hot-spots occur. Fluid model planning, the MaxWeight algorithm, and the generalized $c\mu$-rule are among the first algorithms proposed for affinity scheduling that have theoretical guarantees on being optimal in different senses, which will be discussed in the related work section. All these algorithms are not practical for use in data center applications because of their non-realistic assumptions. The join-the-shortest-queue-MaxWeight (JSQ-MaxWeight), JSQ-Priority, and weighted-workload algorithms are examples of load balancing policies for systems with two and three levels of data locality with a rack structure. In this work, we propose the Generalized-Balanced-Pandas algorithm (GB-PANDAS) for a system with multiple levels of data locality and prove its throughput optimality. We prove this result under an arbitrary distribution for service times, whereas most previous theoretical work assumes geometric distribution for service times. The extensive simulation results show that the GB-PANDAS algorithm alleviates the mean delay and has a better performance than the JSQ-MaxWeight algorithm by twofold
[ { "created": "Sat, 23 Sep 2017 20:38:25 GMT", "version": "v1" } ]
"2019-01-15T00:00:00"
[ [ "Yekkehkhany", "Ali", "" ], [ "Hojjati", "Avesta", "" ], [ "Hajiesmaili", "Mohammad H", "" ] ]
0no_new_dataset
cs/9811014
James K. Huggins
Egon Boerger and James K. Huggins
Abstract State Machines 1988-1998: Commented ASM Bibliography
Also maintained as a BibTeX file at http://www.eecs.umich.edu/gasm/
Formal Specification Column (H. Ehrig, ed.), EATCS Bulletin 64, February 1998, 105--127
null
null
cs.SE
null
An annotated bibliography of papers which deal with or use Abstract State Machines (ASMs), as of January 1998.
[ { "created": "Mon, 9 Nov 1998 19:32:38 GMT", "version": "v1" } ]
"2007-05-23T00:00:00"
[ [ "Boerger", "Egon", "" ], [ "Huggins", "James K.", "" ] ]
0no_new_dataset
1908.11049
Nedjma Ousidhoum
Nedjma Ousidhoum, Zizheng Lin, Hongming Zhang, Yangqiu Song, Dit-Yan Yeung
Multilingual and Multi-Aspect Hate Speech Analysis
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current research on hate speech analysis is typically oriented towards monolingual and single classification tasks. In this paper, we present a new multilingual multi-aspect hate speech analysis dataset and use it to test the current state-of-the-art multilingual multitask learning approaches. We evaluate our dataset in various classification settings, then we discuss how to leverage our annotations in order to improve hate speech detection and classification in general.
[ { "created": "Thu, 29 Aug 2019 04:53:29 GMT", "version": "v1" } ]
"2019-08-30T00:00:00"
[ [ "Ousidhoum", "Nedjma", "" ], [ "Lin", "Zizheng", "" ], [ "Zhang", "Hongming", "" ], [ "Song", "Yangqiu", "" ], [ "Yeung", "Dit-Yan", "" ] ]
1new_dataset
2405.16473
Qiguang Chen
Qiguang Chen, Libo Qin, Jin Zhang, Zhi Chen, Xiao Xu, Wanxiang Che
M$^3$CoT: A Novel Benchmark for Multi-Domain Multi-step Multi-modal Chain-of-Thought
Accepted at ACL2024 Main Conference
null
null
null
cs.CV cs.AI cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
Multi-modal Chain-of-Thought (MCoT) requires models to leverage knowledge from both textual and visual modalities for step-by-step reasoning, which gains increasing attention. Nevertheless, the current MCoT benchmark still faces some challenges: (1) absence of visual modal reasoning, (2) single-step visual modal reasoning, and (3) Domain missing, thereby hindering the development of MCoT. Motivated by this, we introduce a novel benchmark (M$^3$CoT) to address the above challenges, advancing the multi-domain, multi-step, and multi-modal CoT. Additionally, we conduct a thorough evaluation involving abundant MCoT approaches on Vision Large Language Models (VLLMs). In addition, we highlight that the current VLLMs still struggle to correctly reason in M$^3$CoT and there remains a large gap between existing VLLMs and human performance in M$^3$CoT, despite their superior results on previous MCoT benchmarks. To our knowledge, we take the first meaningful step toward the multi-domain, multi-step, and multi-modal scenario in MCoT. We hope that M$^3$CoT can serve as a valuable resource, providing a pioneering foundation in multi-domain, multi-step, multi-modal chain-of-thought research.
[ { "created": "Sun, 26 May 2024 07:56:30 GMT", "version": "v1" } ]
"2024-05-28T00:00:00"
[ [ "Chen", "Qiguang", "" ], [ "Qin", "Libo", "" ], [ "Zhang", "Jin", "" ], [ "Chen", "Zhi", "" ], [ "Xu", "Xiao", "" ], [ "Che", "Wanxiang", "" ] ]
1new_dataset
2402.08381
Hang Yu
Hang Yu, Christophe De Wagter and Guido C. H. E de Croon
MAVRL: Learn to Fly in Cluttered Environments with Varying Speed
8 pages
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
Many existing obstacle avoidance algorithms overlook the crucial balance between safety and agility, especially in environments of varying complexity. In our study, we introduce an obstacle avoidance pipeline based on reinforcement learning. This pipeline enables drones to adapt their flying speed according to the environmental complexity. Moreover, to improve the obstacle avoidance performance in cluttered environments, we propose a novel latent space. The latent space in this representation is explicitly trained to retain memory of previous depth map observations. Our findings confirm that varying speed leads to a superior balance of success rate and agility in cluttered environments. Additionally, our memory-augmented latent representation outperforms the latent representation commonly used in reinforcement learning. Finally, after minimal fine-tuning, we successfully deployed our network on a real drone for enhanced obstacle avoidance.
[ { "created": "Tue, 13 Feb 2024 11:22:23 GMT", "version": "v1" } ]
"2024-02-14T00:00:00"
[ [ "Yu", "Hang", "" ], [ "De Wagter", "Christophe", "" ], [ "de Croon", "Guido C. H. E", "" ] ]
0no_new_dataset
2207.00420
Wael Alghamdi
Wael Alghamdi, Shahab Asoodeh, Flavio P. Calmon, Oliver Kosut, Lalitha Sankar, Fei Wei
Cactus Mechanisms: Optimal Differential Privacy Mechanisms in the Large-Composition Regime
41 pages, 5 figures
null
null
null
cs.CR cs.IT cs.LG math.IT
http://creativecommons.org/licenses/by/4.0/
Most differential privacy mechanisms are applied (i.e., composed) numerous times on sensitive data. We study the design of optimal differential privacy mechanisms in the limit of a large number of compositions. As a consequence of the law of large numbers, in this regime the best privacy mechanism is the one that minimizes the Kullback-Leibler divergence between the conditional output distributions of the mechanism given two different inputs. We formulate an optimization problem to minimize this divergence subject to a cost constraint on the noise. We first prove that additive mechanisms are optimal. Since the optimization problem is infinite dimensional, it cannot be solved directly; nevertheless, we quantize the problem to derive near-optimal additive mechanisms that we call "cactus mechanisms" due to their shape. We show that our quantization approach can be arbitrarily close to an optimal mechanism. Surprisingly, for quadratic cost, the Gaussian mechanism is strictly sub-optimal compared to this cactus mechanism. Finally, we provide numerical results which indicate that cactus mechanism outperforms the Gaussian mechanism for a finite number of compositions.
[ { "created": "Sat, 25 Jun 2022 20:05:50 GMT", "version": "v1" } ]
"2022-07-04T00:00:00"
[ [ "Alghamdi", "Wael", "" ], [ "Asoodeh", "Shahab", "" ], [ "Calmon", "Flavio P.", "" ], [ "Kosut", "Oliver", "" ], [ "Sankar", "Lalitha", "" ], [ "Wei", "Fei", "" ] ]
0no_new_dataset
2211.10831
Vlad Sobal
Vlad Sobal, Jyothir S V, Siddhartha Jalagam, Nicolas Carion, Kyunghyun Cho, Yann LeCun
Joint Embedding Predictive Architectures Focus on Slow Features
4 pages (3 figures) short paper for SSL Theory and Practice workshop at NeurIPS 2022. Code is available at https://github.com/vladisai/JEPA_SSL_NeurIPS_2022
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Many common methods for learning a world model for pixel-based environments use generative architectures trained with pixel-level reconstruction objectives. Recently proposed Joint Embedding Predictive Architectures (JEPA) offer a reconstruction-free alternative. In this work, we analyze performance of JEPA trained with VICReg and SimCLR objectives in the fully offline setting without access to rewards, and compare the results to the performance of the generative architecture. We test the methods in a simple environment with a moving dot with various background distractors, and probe learned representations for the dot's location. We find that JEPA methods perform on par or better than reconstruction when distractor noise changes every time step, but fail when the noise is fixed. Furthermore, we provide a theoretical explanation for the poor performance of JEPA-based methods with fixed noise, highlighting an important limitation.
[ { "created": "Sun, 20 Nov 2022 00:50:11 GMT", "version": "v1" } ]
"2022-11-22T00:00:00"
[ [ "Sobal", "Vlad", "" ], [ "S", "Jyothir", "V" ], [ "Jalagam", "Siddhartha", "" ], [ "Carion", "Nicolas", "" ], [ "Cho", "Kyunghyun", "" ], [ "LeCun", "Yann", "" ] ]
0no_new_dataset
2406.12244
Son Do Hai
Do Hai Son and Nguyen Danh Hao and Tran Thi Thuy Quynh and Le Quang Minh
W2E (Workout to Earn): A Low Cost DApp based on ERC-20 and ERC-721 standards
null
null
null
null
cs.SE
http://creativecommons.org/licenses/by/4.0/
Decentralized applications (DApps) have gained prominence with the advent of blockchain technology, particularly Ethereum, providing trust, transparency, and traceability. However, challenges such as rising transaction costs and block confirmation delays hinder their widespread adoption. In this paper, we present our DApp named W2E - Workout to Earn, a mobile DApp incentivizing exercise through tokens and NFT awards. This application leverages the well-known ERC-20 and ERC-721 token standards of Ethereum. Additionally, we deploy W2E into various Ethereum-based networks, including Ethereum testnets, Layer 2 networks, and private networks, to survey gas efficiency and execution time. Our findings highlight the importance of network selection for DApp deployment, offering insights for developers and businesses seeking efficient blockchain solutions. This is because our experimental results are not only specific for W2E but also for other ERC-20 and ERC-721-based DApps.
[ { "created": "Tue, 18 Jun 2024 03:40:11 GMT", "version": "v1" } ]
"2024-06-19T00:00:00"
[ [ "Son", "Do Hai", "" ], [ "Hao", "Nguyen Danh", "" ], [ "Quynh", "Tran Thi Thuy", "" ], [ "Minh", "Le Quang", "" ] ]
0no_new_dataset
2405.20881
HaoLong Ma
Haolong Ma, Hui Li, Chunyang Cheng, Gaoang Wang, Xiaoning Song, Xiaojun Wu
S4Fusion: Saliency-aware Selective State Space Model for Infrared Visible Image Fusion
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
As one of the tasks in Image Fusion, Infrared and Visible Image Fusion aims to integrate complementary information captured by sensors of different modalities into a single image. The Selective State Space Model (SSSM), known for its ability to capture long-range dependencies, has demonstrated its potential in the field of computer vision. However, in image fusion, current methods underestimate the potential of SSSM in capturing the global spatial information of both modalities. This limitation prevents the simultaneous consideration of the global spatial information from both modalities during interaction, leading to a lack of comprehensive perception of salient targets. Consequently, the fusion results tend to bias towards one modality instead of adaptively preserving salient targets. To address this issue, we propose the Saliency-aware Selective State Space Fusion Model (S4Fusion). In our S4Fusion, the designed Cross-Modal Spatial Awareness Module (CMSA) can simultaneously focus on global spatial information from both modalities while facilitating their interaction, thereby comprehensively capturing complementary information. Additionally, S4Fusion leverages a pre-trained network to perceive uncertainty in the fused images. By minimizing this uncertainty, S4Fusion adaptively highlights salient targets from both images. Extensive experiments demonstrate that our approach produces high-quality images and enhances performance in downstream tasks.
[ { "created": "Fri, 31 May 2024 14:55:31 GMT", "version": "v1" }, { "created": "Mon, 3 Jun 2024 04:38:42 GMT", "version": "v2" } ]
"2024-06-04T00:00:00"
[ [ "Ma", "Haolong", "" ], [ "Li", "Hui", "" ], [ "Cheng", "Chunyang", "" ], [ "Wang", "Gaoang", "" ], [ "Song", "Xiaoning", "" ], [ "Wu", "Xiaojun", "" ] ]
0no_new_dataset
2003.14247
Liangliang Li
Ling Yang, Liangliang Li, Zilun Zhang, Xinyu Zhou, Erjin Zhou, and Yu Liu
DPGN: Distribution Propagation Graph Network for Few-shot Learning
Accepted by CVPR 2020
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most graph-network-based meta-learning approaches model instance-level relation of examples. We extend this idea further to explicitly model the distribution-level relation of one example to all other examples in a 1-vs-N manner. We propose a novel approach named distribution propagation graph network (DPGN) for few-shot learning. It conveys both the distribution-level relations and instance-level relations in each few-shot learning task. To combine the distribution-level relations and instance-level relations for all examples, we construct a dual complete graph network which consists of a point graph and a distribution graph with each node standing for an example. Equipped with dual graph architecture, DPGN propagates label information from labeled examples to unlabeled examples within several update generations. In extensive experiments on few-shot learning benchmarks, DPGN outperforms state-of-the-art results by a large margin in 5% $\sim$ 12% under supervised setting and 7% $\sim$ 13% under semi-supervised setting. Code will be released.
[ { "created": "Tue, 31 Mar 2020 14:32:05 GMT", "version": "v1" }, { "created": "Wed, 1 Apr 2020 16:57:03 GMT", "version": "v2" } ]
"2020-04-02T00:00:00"
[ [ "Yang", "Ling", "" ], [ "Li", "Liangliang", "" ], [ "Zhang", "Zilun", "" ], [ "Zhou", "Xinyu", "" ], [ "Zhou", "Erjin", "" ], [ "Liu", "Yu", "" ] ]
0no_new_dataset
1511.04813
Jing Lu
Jing Lu, Steven C.H. Hoi, Doyen Sahoo, Peilin Zhao
Budget Online Multiple Kernel Learning
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online learning with multiple kernels has gained increasing interests in recent years and found many applications. For classification tasks, Online Multiple Kernel Classification (OMKC), which learns a kernel based classifier by seeking the optimal linear combination of a pool of single kernel classifiers in an online fashion, achieves superior accuracy and enjoys great flexibility compared with traditional single-kernel classifiers. Despite being studied extensively, existing OMKC algorithms suffer from high computational cost due to their unbounded numbers of support vectors. To overcome this drawback, we present a novel framework of Budget Online Multiple Kernel Learning (BOMKL) and propose a new Sparse Passive Aggressive learning to perform effective budget online learning. Specifically, we adopt a simple yet effective Bernoulli sampling to decide if an incoming instance should be added to the current set of support vectors. By limiting the number of support vectors, our method can significantly accelerate OMKC while maintaining satisfactory accuracy that is comparable to that of the existing OMKC algorithms. We theoretically prove that our new method achieves an optimal regret bound in expectation, and empirically found that the proposed algorithm outperforms various OMKC algorithms and can easily scale up to large-scale datasets.
[ { "created": "Mon, 16 Nov 2015 03:40:50 GMT", "version": "v1" }, { "created": "Wed, 18 Nov 2015 08:08:43 GMT", "version": "v2" } ]
"2015-11-19T00:00:00"
[ [ "Lu", "Jing", "" ], [ "Hoi", "Steven C. H.", "" ], [ "Sahoo", "Doyen", "" ], [ "Zhao", "Peilin", "" ] ]
0no_new_dataset
2212.11654
Muhammad Farhan Ahmed
Muhammad Farhan Ahmed, Khayyam Masood, Vincent Fremont, Isabelle Fantoni
Active SLAM: A Review On Last Decade
34 pages, 8 figures, 6 tables
Sensors 2023, 23, 8097
10.3390/s23198097
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
This article presents a comprehensive review of the Active Simultaneous Localization and Mapping (A-SLAM) research conducted over the past decade. It explores the formulation, applications, and methodologies employed in A-SLAM, particularly in trajectory generation and control-action selection, drawing on concepts from Information Theory (IT) and the Theory of Optimal Experimental Design (TOED). This review includes both qualitative and quantitative analyses of various approaches, deployment scenarios, configurations, path-planning methods, and utility functions within A-SLAM research. Furthermore, this article introduces a novel analysis of Active Collaborative SLAM (AC-SLAM), focusing on collaborative aspects within SLAM systems. It includes a thorough examination of collaborative parameters and approaches, supported by both qualitative and statistical assessments. This study also identifies limitations in the existing literature and suggests potential avenues for future research. This survey serves as a valuable resource for researchers seeking insights into A-SLAM methods and techniques, offering a current overview of A-SLAM formulation.
[ { "created": "Thu, 22 Dec 2022 12:56:34 GMT", "version": "v1" }, { "created": "Wed, 31 May 2023 08:19:45 GMT", "version": "v2" }, { "created": "Thu, 21 Sep 2023 14:22:12 GMT", "version": "v3" }, { "created": "Thu, 28 Sep 2023 10:15:35 GMT", "version": "v4" } ]
"2023-09-29T00:00:00"
[ [ "Ahmed", "Muhammad Farhan", "" ], [ "Masood", "Khayyam", "" ], [ "Fremont", "Vincent", "" ], [ "Fantoni", "Isabelle", "" ] ]
0no_new_dataset
1801.08720
Lutz Bornmann Dr.
Andreas Thor, Lutz Bornmann, Werner Marx, R\"udiger Mutz
Identifying single influential publications in a research field: New analysis opportunities of the CRExplorer
null
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reference Publication Year Spectroscopy (RPYS) has been developed for identifying the cited references (CRs) with the greatest influence in a given paper set (mostly sets of papers on certain topics or fields). The program CRExplorer (see www.crexplorer.net) was specifically developed by Thor, Marx, Leydesdorff, and Bornmann (2016a, 2016b) for applying RPYS to publication sets downloaded from Scopus or Web of Science. In this study, we present some advanced methods which have been newly developed for CRExplorer. These methods are able to identify and characterize the CRs which have been influential across a longer period (many citing years). The new methods are demonstrated in this study using all the papers published in Scientometrics between 1978 and 2016. The indicators N_TOP50, N_TOP25, and N_TOP10 can be used to identify those CRs which belong to the 50%, 25%, or 10% most frequently cited publications (CRs) over many citing publication years. In the Scientometrics dataset, for example, Lotka's (1926) paper on the distribution of scientific productivity belongs to the top 10% publications (CRs) in 36 citing years. Furthermore, the new version of CRExplorer analyzes the impact sequence of CRs across citing years. CRs can have below average (-), average (0), or above average (+) impact in citing years (whereby average is meant in the sense of expected values). The sequence (e.g. 00++---0--00) is used by the program to identify papers with typical impact distributions. For example, CRs can have early, but not late impact ("hot papers", e.g. +++---) or vice versa ("sleeping beauties", e.g. ---0000---++).
[ { "created": "Fri, 26 Jan 2018 09:14:21 GMT", "version": "v1" }, { "created": "Wed, 21 Mar 2018 09:38:03 GMT", "version": "v2" } ]
"2018-03-22T00:00:00"
[ [ "Thor", "Andreas", "" ], [ "Bornmann", "Lutz", "" ], [ "Marx", "Werner", "" ], [ "Mutz", "Rüdiger", "" ] ]
1new_dataset
2002.11619
Subhankar Mishra
Subhankar Mishra
Election in India: Polling in National Financial Switch
8 pages, 4 figures, to be published CSI 2020 Conference Proceeding
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indian voters from Kashmir to Kanyakumari select their representatives to form their parliament by going to polls. India's election is one of the largest democratic exercise in the world history. About 850 million eligible voters determine which political party or alliance will form the government and in turn, will serve as prime minister. Given the electoral rules of placing a polling place within 2 kilometers of every habitation, it comes as no surprise that is indeed a humongous task for the Election Commission of India (ECI). It sends around 11 million election workers through tough terrains to reach the last mile. This exercise also comes as ever growing expenditure for the ECI. This paper proposes the use of Automated Teller Machines (ATM) and Point Of Sale (POS) machines to be used to cover as much as urban, rural and semi-urban places possible given the wide network of National Financial Switch (NFS) and increase in connectivity through Digital India initiative. This would add to the use of the existing infrastructure to accommodate a free, fair and transparent election.
[ { "created": "Sat, 15 Feb 2020 15:39:50 GMT", "version": "v1" } ]
"2020-02-27T00:00:00"
[ [ "Mishra", "Subhankar", "" ] ]
1new_dataset
1811.10681
Titus Cieslewski
Titus Cieslewski and Michael Bloesch and Davide Scaramuzza
Matching Features without Descriptors: Implicitly Matched Interest Points
10 pages without references, accepted for publication at the British Machine Vision Conference (BMVC), Cardiff, 2019. v2 contains additional results, and a bug in the evaluation of LF-NET has been fixed
British Machine Vision Conference (BMVC), Cardiff, 2019
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The extraction and matching of interest points is a prerequisite for many geometric computer vision problems. Traditionally, matching has been achieved by assigning descriptors to interest points and matching points that have similar descriptors. In this paper, we propose a method by which interest points are instead already implicitly matched at detection time. With this, descriptors do not need to be calculated, stored, communicated, or matched any more. This is achieved by a convolutional neural network with multiple output channels and can be thought of as a collection of a variety of detectors, each specialized to specific visual features. This paper describes how to design and train such a network in a way that results in successful relative pose estimation performance despite the limitation on interest point count. While the overall matching score is slightly lower than with traditional methods, the approach is descriptor free and thus enables localization systems with a significantly smaller memory footprint and multi-agent localization systems with lower bandwidth requirements. The network also outputs the confidence for a specific interest point resulting in a valid match. We evaluate performance relative to state-of-the-art alternatives.
[ { "created": "Mon, 26 Nov 2018 20:45:58 GMT", "version": "v1" }, { "created": "Mon, 5 Aug 2019 13:17:11 GMT", "version": "v2" } ]
"2019-08-20T00:00:00"
[ [ "Cieslewski", "Titus", "" ], [ "Bloesch", "Michael", "" ], [ "Scaramuzza", "Davide", "" ] ]
0no_new_dataset
1711.07319
Zhicheng Wang
Yilun Chen, Zhicheng Wang, Yuxiang Peng, Zhiqiang Zhang, Gang Yu, Jian Sun
Cascaded Pyramid Network for Multi-Person Pose Estimation
10 pages, accepted to CVPR 2018
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The topic of multi-person pose estimation has been largely improved recently, especially with the development of convolutional neural network. However, there still exist a lot of challenging cases, such as occluded keypoints, invisible keypoints and complex background, which cannot be well addressed. In this paper, we present a novel network structure called Cascaded Pyramid Network (CPN) which targets to relieve the problem from these "hard" keypoints. More specifically, our algorithm includes two stages: GlobalNet and RefineNet. GlobalNet is a feature pyramid network which can successfully localize the "simple" keypoints like eyes and hands but may fail to precisely recognize the occluded or invisible keypoints. Our RefineNet tries explicitly handling the "hard" keypoints by integrating all levels of feature representations from the GlobalNet together with an online hard keypoint mining loss. In general, to address the multi-person pose estimation problem, a top-down pipeline is adopted to first generate a set of human bounding boxes based on a detector, followed by our CPN for keypoint localization in each human bounding box. Based on the proposed algorithm, we achieve state-of-art results on the COCO keypoint benchmark, with average precision at 73.0 on the COCO test-dev dataset and 72.1 on the COCO test-challenge dataset, which is a 19% relative improvement compared with 60.5 from the COCO 2016 keypoint challenge.Code (https://github.com/chenyilun95/tf-cpn.git) and the detection results are publicly available for further research.
[ { "created": "Mon, 20 Nov 2017 14:36:31 GMT", "version": "v1" }, { "created": "Sun, 8 Apr 2018 12:00:58 GMT", "version": "v2" } ]
"2018-04-10T00:00:00"
[ [ "Chen", "Yilun", "" ], [ "Wang", "Zhicheng", "" ], [ "Peng", "Yuxiang", "" ], [ "Zhang", "Zhiqiang", "" ], [ "Yu", "Gang", "" ], [ "Sun", "Jian", "" ] ]
0no_new_dataset
cs/0311009
Alexander Kryukov
A. Demichev (1), D. Foster (2), V. Kalyaev (1), A.Kryukov (1), M. Lamanna (2), V. Pose (3), R. B. Da Rocha (2) and C. Wang (4) ((1) Skobeltsyn Institute of Nuclear Physics, Moscow State University, Moscow, Russia, (2) CERN-IT, Geneva, Switzerland, (3) JINR LIT, Dubna, Russia, (4) Academica Sinica, Taipei, Taiwan)
OGSA/Globus Evaluation for Data Intensive Applications
To be published in the proceedings of the XIX International Symposium on Nuclear Electronics and Computing (NEC'2003), Bulgaria, Varna, 15-20 September, 2003
null
null
null
cs.DC
null
We present an architecture of Globus Toolkit 3 based testbed intended for evaluation of applicability of the Open Grid Service Architecture (OGSA) for Data Intensive Applications.
[ { "created": "Mon, 10 Nov 2003 11:12:26 GMT", "version": "v1" } ]
"2007-05-23T00:00:00"
[ [ "Demichev", "A.", "" ], [ "Foster", "D.", "" ], [ "Kalyaev", "V.", "" ], [ "Kryukov", "A.", "" ], [ "Lamanna", "M.", "" ], [ "Pose", "V.", "" ], [ "Da Rocha", "R. B.", "" ], [ "Wang", "C.", "" ] ]
0no_new_dataset
2207.01687
Alina Matei
Alina-Daniela Matei, Estefania Talavera, Maya Aghaei
Crime scene classification from skeletal trajectory analysis in surveillance settings
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Video anomaly analysis is a core task actively pursued in the field of computer vision, with applications extending to real-world crime detection in surveillance footage. In this work, we address the task of human-related crime classification. In our proposed approach, the human body in video frames, represented as skeletal joints trajectories, is used as the main source of exploration. First, we introduce the significance of extending the ground truth labels for HR-Crime dataset and hence, propose a supervised and unsupervised methodology to generate trajectory-level ground truth labels. Next, given the availability of the trajectory-level ground truth, we introduce a trajectory-based crime classification framework. Ablation studies are conducted with various architectures and feature fusion strategies for the representation of the human trajectories. The conducted experiments demonstrate the feasibility of the task and pave the path for further research in the field.
[ { "created": "Mon, 4 Jul 2022 19:37:06 GMT", "version": "v1" } ]
"2022-07-06T00:00:00"
[ [ "Matei", "Alina-Daniela", "" ], [ "Talavera", "Estefania", "" ], [ "Aghaei", "Maya", "" ] ]
1new_dataset
1509.03705
Yuting Wang
Yuting Wang and Gopalan Nadathur
A Higher-Order Abstract Syntax Approach to Verified Transformations on Functional Programs
null
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an approach to the verified implementation of transformations on functional programs that exploits the higher-order representation of syntax. In this approach, transformations are specified using the logic of hereditary Harrop formulas. On the one hand, these specifications serve directly as implementations, being programs in the language Lambda Prolog. On the other hand, they can be used as input to the Abella system which allows us to prove properties about them and thereby about the implementations. We argue that this approach is especially effective in realizing transformations that analyze binding structure. We do this by describing concise encodings in Lambda Prolog for transformations like typed closure conversion and code hoisting that are sensitive to such structure and by showing how to prove their correctness using Abella.
[ { "created": "Sat, 12 Sep 2015 05:22:52 GMT", "version": "v1" }, { "created": "Mon, 21 Sep 2015 21:48:25 GMT", "version": "v2" }, { "created": "Sat, 23 Jan 2016 21:12:03 GMT", "version": "v3" } ]
"2016-01-26T00:00:00"
[ [ "Wang", "Yuting", "" ], [ "Nadathur", "Gopalan", "" ] ]
0no_new_dataset
2402.09621
Rui Liu
Rui Liu, Jianping Pan
Schnorr Approval-Based Secure and Privacy-Preserving IoV Data Aggregation
null
null
null
null
cs.CR cs.NI
http://creativecommons.org/licenses/by-nc-nd/4.0/
Secure and privacy-preserving data aggregation in the Internet of Vehicles (IoV) continues to be a focal point of interest in both the industry and academia. Aiming at tackling the challenges and solving the remaining limitations of existing works, this paper introduces a novel Schnorr approval-based IoV data aggregation framework based on a two-layered architecture. In this framework, a server can aggregate the IoV data from clusters without inferring the raw data, real identity and trajectories of vehicles. Notably, we avoid incorporating the widely-accepted techniques such as homomorphic encryption and digital pseudonym to avoid introducing high computation cost to vehicles. We propose a novel concept, data approval, based on the Schnorr signature scheme. With the approval, the fake data injection attack carried out by a cluster head can be defended against. The separation of liability is achieved as well. The evaluation shows that the framework is secure and lightweight for vehicles in terms of the computation and communication costs.
[ { "created": "Wed, 14 Feb 2024 23:40:36 GMT", "version": "v1" } ]
"2024-02-16T00:00:00"
[ [ "Liu", "Rui", "" ], [ "Pan", "Jianping", "" ] ]
1new_dataset
2006.07302
Tuukka Korhonen
Tuukka Korhonen
SMS in PACE 2020
3 pages, 3 appendix pages, 0 figures. Submitted as a solver description of a solver in Parameterized Algorithms and Computational Experiments Challenge 2020
null
10.4230/LIPIcs.IPEC.2020.30
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe SMS, our submission to the exact treedepth track of PACE 2020. SMS computes the treedepth of a graph by branching on the small minimal separators of the graph.
[ { "created": "Fri, 12 Jun 2020 16:34:24 GMT", "version": "v1" } ]
"2022-02-08T00:00:00"
[ [ "Korhonen", "Tuukka", "" ] ]
0no_new_dataset
2305.05132
Yuwei Duan
Yuwei Duan
Dual flow fusion model for concrete surface crack segmentation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The existence of cracks and other damages pose a significant threat to the safe operation of transportation infrastructure. Traditional manual detection and ultrasound equipment testing consume a lot of time and resources. With the development of deep learning technology, many deep learning models have been widely applied to practical visual segmentation tasks. The detection method based on deep learning models has the advantages of high detection accuracy, fast detection speed, and simple operation. However, deep learning-based crack segmentation models are sensitive to background noise, have rough edges, and lack robustness. Therefore, this paper proposes a crack segmentation model based on the fusion of dual streams. The image is inputted simultaneously into two designed processing streams to independently extract long-distance dependence and local detail features. The adaptive prediction is achieved through the dual-headed mechanism. Meanwhile, a novel interaction fusion mechanism is proposed to guide the complementary of different feature layers to achieve crack location and recognition in complex backgrounds. Finally, an edge optimization method is proposed to improve the accuracy of segmentation. Experiments show that the F1 value of segmentation results on the DeepCrack[1] public dataset is 93.7% and the IOU value is 86.6%. The F1 value of segmentation results on the CRACK500[2] dataset is 78.1%, and the IOU value is 66.0%.
[ { "created": "Tue, 9 May 2023 02:35:58 GMT", "version": "v1" }, { "created": "Tue, 16 May 2023 13:26:54 GMT", "version": "v2" } ]
"2023-05-17T00:00:00"
[ [ "Duan", "Yuwei", "" ] ]
1new_dataset
2110.13501
Kim Batselier
Maximilian Lucassen, Johan A.K. Suykens, Kim Batselier
Tensor Network Kalman Filtering for Large-Scale LS-SVMs
null
null
null
null
cs.LG cs.SY eess.SY
http://creativecommons.org/licenses/by/4.0/
Least squares support vector machines are a commonly used supervised learning method for nonlinear regression and classification. They can be implemented in either their primal or dual form. The latter requires solving a linear system, which can be advantageous as an explicit mapping of the data to a possibly infinite-dimensional feature space is avoided. However, for large-scale applications, current low-rank approximation methods can perform inadequately. For example, current methods are probabilistic due to their sampling procedures, and/or suffer from a poor trade-off between the ranks and approximation power. In this paper, a recursive Bayesian filtering framework based on tensor networks and the Kalman filter is presented to alleviate the demanding memory and computational complexities associated with solving large-scale dual problems. The proposed method is iterative, does not require explicit storage of the kernel matrix, and allows the formulation of early stopping conditions. Additionally, the framework yields confidence estimates of obtained models, unlike alternative methods. The performance is tested on two regression and three classification experiments, and compared to the Nystr\"om and fixed size LS-SVM methods. Results show that our method can achieve high performance and is particularly useful when alternative methods are computationally infeasible due to a slowly decaying kernel matrix spectrum.
[ { "created": "Tue, 26 Oct 2021 08:54:03 GMT", "version": "v1" } ]
"2021-10-27T00:00:00"
[ [ "Lucassen", "Maximilian", "" ], [ "Suykens", "Johan A. K.", "" ], [ "Batselier", "Kim", "" ] ]
0no_new_dataset
2311.02256
Sizhe Li
Weiying Lin, Che Liu, Xin Zhang, Zhen Wei, Sizhe Li, Xun Ma
Image Recognition of Oil Leakage Area Based on Logical Semantic Discrimination
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Implementing precise detection of oil leaks in peak load equipment through image analysis can significantly enhance inspection quality and ensure the system's safety and reliability. However, challenges such as varying shapes of oil-stained regions, background noise, and fluctuating lighting conditions complicate the detection process. To address this, the integration of logical rule-based discrimination into image recognition has been proposed. This approach involves recognizing the spatial relationships among objects to semantically segment images of oil spills using a Mask RCNN network. The process begins with histogram equalization to enhance the original image, followed by the use of Mask RCNN to identify the preliminary positions and outlines of oil tanks, the ground, and areas of potential oil contamination. Subsequent to this identification, the spatial relationships between these objects are analyzed. Logical rules are then applied to ascertain whether the suspected areas are indeed oil spills. This method's effectiveness has been confirmed by testing on images captured from peak power equipment in the field. The results indicate that this approach can adeptly tackle the challenges in identifying oil-contaminated areas, showing a substantial improvement in accuracy compared to existing methods.
[ { "created": "Fri, 3 Nov 2023 22:13:58 GMT", "version": "v1" }, { "created": "Fri, 17 Nov 2023 06:58:21 GMT", "version": "v2" } ]
"2023-11-20T00:00:00"
[ [ "Lin", "Weiying", "" ], [ "Liu", "Che", "" ], [ "Zhang", "Xin", "" ], [ "Wei", "Zhen", "" ], [ "Li", "Sizhe", "" ], [ "Ma", "Xun", "" ] ]
0no_new_dataset
1902.04699
Anders Host-Madsen
Mojtaba Abolfazli, Anders Host-Madsen, June Zhang
Differential Description Length for Hyperparameter Selection in Machine Learning
Submitted to NeurIPS 2019
null
null
null
cs.LG cs.IT math.IT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new method for model selection and more generally hyperparameter selection in machine learning. Minimum description length (MDL) is an established method for model selection, which is however not directly aimed at minimizing generalization error, which is often the primary goal in machine learning. The paper demonstrates a relationship between generalization error and a difference of description lengths of the training data; we call this difference differential description length (DDL). This allows prediction of generalization error from the training data alone by performing encoding of the training data. DDL can then be used for model selection by choosing the model with the smallest predicted generalization error. We show how this method can be used for linear regression and neural networks and deep learning. Experimental results show that DDL leads to smaller generalization error than cross-validation and traditional MDL and Bayes methods.
[ { "created": "Wed, 13 Feb 2019 01:48:58 GMT", "version": "v1" }, { "created": "Wed, 22 May 2019 08:30:16 GMT", "version": "v2" } ]
"2019-05-23T00:00:00"
[ [ "Abolfazli", "Mojtaba", "" ], [ "Host-Madsen", "Anders", "" ], [ "Zhang", "June", "" ] ]
0no_new_dataset
2212.02323
Alexander Razborov
Alexander Razborov
Improved Convergence Guarantees for Shallow Neural Networks
55 pages, 5 figures
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
We continue a long line of research aimed at proving convergence of depth 2 neural networks, trained via gradient descent, to a global minimum. Like in many previous works, our model has the following features: regression with quadratic loss function, fully connected feedforward architecture, RelU activations, Gaussian data instances and network initialization, adversarial labels. It is more general in the sense that we allow both layers to be trained simultaneously and at {\em different} rates. Our results improve on state-of-the-art [Oymak Soltanolkotabi 20] (training the first layer only) and [Nguyen 21, Section 3.2] (training both layers with Le Cun's initialization). We also report several simple experiments with synthetic data. They strongly suggest that, at least in our model, the convergence phenomenon extends well beyond the ``NTK regime''.
[ { "created": "Mon, 5 Dec 2022 14:47:52 GMT", "version": "v1" } ]
"2022-12-06T00:00:00"
[ [ "Razborov", "Alexander", "" ] ]
0no_new_dataset
2208.08759
Benjamin Doerr
Benjamin Doerr and Zhongdi Qu
Runtime Analysis for the NSGA-II: Provable Speed-Ups From Crossover
Extended version of a paper that appears in the proceedings of AAAI 2023
null
null
null
cs.NE cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Very recently, the first mathematical runtime analyses for the NSGA-II, the most common multi-objective evolutionary algorithm, have been conducted. Continuing this research direction, we prove that the NSGA-II optimizes the OneJumpZeroJump benchmark asymptotically faster when crossover is employed. Together with a parallel independent work by Dang, Opris, Salehi, and Sudholt, this is the first time such an advantage of crossover is proven for the NSGA-II. Our arguments can be transferred to single-objective optimization. They then prove that crossover can speed up the $(\mu+1)$ genetic algorithm in a different way and more pronounced than known before. Our experiments confirm the added value of crossover and show that the observed advantages are even larger than what our proofs can guarantee.
[ { "created": "Thu, 18 Aug 2022 10:41:44 GMT", "version": "v1" }, { "created": "Wed, 15 Mar 2023 08:58:10 GMT", "version": "v2" } ]
"2023-03-16T00:00:00"
[ [ "Doerr", "Benjamin", "" ], [ "Qu", "Zhongdi", "" ] ]
0no_new_dataset
1912.13458
Lingzhi Li
Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, Baining Guo
Face X-ray for More General Face Forgery Detection
Accepted to CVPR 2020 (Oral)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a novel image representation called face X-ray for detecting forgery in face images. The face X-ray of an input face image is a greyscale image that reveals whether the input image can be decomposed into the blending of two images from different sources. It does so by showing the blending boundary for a forged image and the absence of blending for a real image. We observe that most existing face manipulation methods share a common step: blending the altered face into an existing background image. For this reason, face X-ray provides an effective way for detecting forgery generated by most existing face manipulation algorithms. Face X-ray is general in the sense that it only assumes the existence of a blending step and does not rely on any knowledge of the artifacts associated with a specific face manipulation technique. Indeed, the algorithm for computing face X-ray can be trained without fake images generated by any of the state-of-the-art face manipulation methods. Extensive experiments show that face X-ray remains effective when applied to forgery generated by unseen face manipulation techniques, while most existing face forgery detection or deepfake detection algorithms experience a significant performance drop.
[ { "created": "Tue, 31 Dec 2019 17:57:56 GMT", "version": "v1" }, { "created": "Sun, 19 Apr 2020 02:22:40 GMT", "version": "v2" } ]
"2020-04-21T00:00:00"
[ [ "Li", "Lingzhi", "" ], [ "Bao", "Jianmin", "" ], [ "Zhang", "Ting", "" ], [ "Yang", "Hao", "" ], [ "Chen", "Dong", "" ], [ "Wen", "Fang", "" ], [ "Guo", "Baining", "" ] ]
0no_new_dataset
1711.06318
Nicola Gatti
Nicola Gatti, Marco Rocco, Tuomas Sandholm
On the Verification and Computation of Strong Nash Equilibrium
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing equilibria of games is a central task in computer science. A large number of results are known for \emph{Nash equilibrium} (NE). However, these can be adopted only when coalitions are not an issue. When instead agents can form coalitions, NE is inadequate and an appropriate solution concept is \emph{strong Nash equilibrium} (SNE). Few computational results are known about SNE. In this paper, we first study the problem of verifying whether a strategy profile is an SNE, showing that the problem is in $\mathcal{P}$. We then design a spatial branch--and--bound algorithm to find an SNE, and we experimentally evaluate the algorithm.
[ { "created": "Thu, 16 Nov 2017 20:56:43 GMT", "version": "v1" } ]
"2017-11-20T00:00:00"
[ [ "Gatti", "Nicola", "" ], [ "Rocco", "Marco", "" ], [ "Sandholm", "Tuomas", "" ] ]
0no_new_dataset
1806.05559
Francis Gr\'egoire
Francis Gr\'egoire, Philippe Langlais
Extracting Parallel Sentences with Bidirectional Recurrent Neural Networks to Improve Machine Translation
12 pages, 7 figures, COLING 2018. arXiv admin note: text overlap with arXiv:1709.09783
null
null
null
cs.CL cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Parallel sentence extraction is a task addressing the data sparsity problem found in multilingual natural language processing applications. We propose a bidirectional recurrent neural network based approach to extract parallel sentences from collections of multilingual texts. Our experiments with noisy parallel corpora show that we can achieve promising results against a competitive baseline by removing the need of specific feature engineering or additional external resources. To justify the utility of our approach, we extract sentence pairs from Wikipedia articles to train machine translation systems and show significant improvements in translation performance.
[ { "created": "Wed, 13 Jun 2018 13:57:13 GMT", "version": "v1" }, { "created": "Fri, 24 Aug 2018 18:16:03 GMT", "version": "v2" } ]
"2018-08-28T00:00:00"
[ [ "Grégoire", "Francis", "" ], [ "Langlais", "Philippe", "" ] ]
0no_new_dataset
2102.10075
Tooba Tehreem
Tooba Tehreem (Hira Tahir National University of Computer and Emerging Sciences Islamabad, Pakistan)
Sentiment Analysis for YouTube Comments in Roman Urdu
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by-sa/4.0/
Sentiment analysis is a vast area in the Machine learning domain. A lot of work is done on datasets and their analysis of the English Language. In Pakistan, a huge amount of data is in roman Urdu language, it is scattered all over the social sites including Twitter, YouTube, Facebook and similar applications. In this study the focus domain of dataset gathering is YouTube comments. The Dataset contains the comments of people over different Pakistani dramas and TV shows. The Dataset contains multi-class classification that is grouped The comments into positive, negative and neutral sentiment. In this Study comparative analysis is done for five supervised learning Algorithms including linear regression, SVM, KNN, Multi layer Perceptron and Na\"ive Bayes classifier. Accuracy, recall, precision and F-measure are used for measuring performance. Results show that accuracy of SVM is 64 percent, which is better than the rest of the list.
[ { "created": "Fri, 19 Feb 2021 18:15:52 GMT", "version": "v1" } ]
"2021-02-22T00:00:00"
[ [ "Tehreem", "Tooba", "", "Hira Tahir National University of Computer and Emerging\n Sciences Islamabad, Pakistan" ] ]
1new_dataset
2110.14771
Selim Amrouni
Selim Amrouni, Aymeric Moulin, Jared Vann, Svitlana Vyetrenko, Tucker Balch and Manuela Veloso
ABIDES-Gym: Gym Environments for Multi-Agent Discrete Event Simulation and Application to Financial Markets
null
null
10.1145/3490354.3494433
null
cs.MA cs.AI q-fin.TR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Model-free Reinforcement Learning (RL) requires the ability to sample trajectories by taking actions in the original problem environment or a simulated version of it. Breakthroughs in the field of RL have been largely facilitated by the development of dedicated open source simulators with easy to use frameworks such as OpenAI Gym and its Atari environments. In this paper we propose to use the OpenAI Gym framework on discrete event time based Discrete Event Multi-Agent Simulation (DEMAS). We introduce a general technique to wrap a DEMAS simulator into the Gym framework. We expose the technique in detail and implement it using the simulator ABIDES as a base. We apply this work by specifically using the markets extension of ABIDES, ABIDES-Markets, and develop two benchmark financial markets OpenAI Gym environments for training daily investor and execution agents. As a result, these two environments describe classic financial problems with a complex interactive market behavior response to the experimental agent's action.
[ { "created": "Wed, 27 Oct 2021 21:05:08 GMT", "version": "v1" } ]
"2021-11-03T00:00:00"
[ [ "Amrouni", "Selim", "" ], [ "Moulin", "Aymeric", "" ], [ "Vann", "Jared", "" ], [ "Vyetrenko", "Svitlana", "" ], [ "Balch", "Tucker", "" ], [ "Veloso", "Manuela", "" ] ]
1new_dataset
2012.08300
Hyeryung Jang
Hyeryung Jang and Nicolas Skatchkovsky and Osvaldo Simeone
BiSNN: Training Spiking Neural Networks with Binary Weights via Bayesian Learning
Submitted
null
null
null
cs.LG cs.NE eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial Neural Network (ANN)-based inference on battery-powered devices can be made more energy-efficient by restricting the synaptic weights to be binary, hence eliminating the need to perform multiplications. An alternative, emerging, approach relies on the use of Spiking Neural Networks (SNNs), biologically inspired, dynamic, event-driven models that enhance energy efficiency via the use of binary, sparse, activations. In this paper, an SNN model is introduced that combines the benefits of temporally sparse binary activations and of binary weights. Two learning rules are derived, the first based on the combination of straight-through and surrogate gradient techniques, and the second based on a Bayesian paradigm. Experiments validate the performance loss with respect to full-precision implementations, and demonstrate the advantage of the Bayesian paradigm in terms of accuracy and calibration.
[ { "created": "Tue, 15 Dec 2020 14:06:36 GMT", "version": "v1" } ]
"2020-12-16T00:00:00"
[ [ "Jang", "Hyeryung", "" ], [ "Skatchkovsky", "Nicolas", "" ], [ "Simeone", "Osvaldo", "" ] ]
0no_new_dataset
1609.09025
Lerrel Pinto Mr
Lerrel Pinto and Abhinav Gupta
Learning to Push by Grasping: Using multiple tasks for effective learning
Under review at the International Conference on Robotics and Automation (ICRA) 2017
null
null
null
cs.RO cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, end-to-end learning frameworks are gaining prevalence in the field of robot control. These frameworks input states/images and directly predict the torques or the action parameters. However, these approaches are often critiqued due to their huge data requirements for learning a task. The argument of the difficulty in scalability to multiple tasks is well founded, since training these tasks often require hundreds or thousands of examples. But do end-to-end approaches need to learn a unique model for every task? Intuitively, it seems that sharing across tasks should help since all tasks require some common understanding of the environment. In this paper, we attempt to take the next step in data-driven end-to-end learning frameworks: move from the realm of task-specific models to joint learning of multiple robot tasks. In an astonishing result we show that models with multi-task learning tend to perform better than task-specific models trained with same amounts of data. For example, a deep-network learned with 2.5K grasp and 2.5K push examples performs better on grasping than a network trained on 5K grasp examples.
[ { "created": "Wed, 28 Sep 2016 18:13:02 GMT", "version": "v1" } ]
"2016-09-29T00:00:00"
[ [ "Pinto", "Lerrel", "" ], [ "Gupta", "Abhinav", "" ] ]
0no_new_dataset
2209.00841
Zeyong Wei
Honghua Chen, Mingqiang Wei, Jun Wang
Geometric and Learning-based Mesh Denoising: A Comprehensive Survey
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mesh denoising is a fundamental problem in digital geometry processing. It seeks to remove surface noise, while preserving surface intrinsic signals as accurately as possible. While the traditional wisdom has been built upon specialized priors to smooth surfaces, learning-based approaches are making their debut with great success in generalization and automation. In this work, we provide a comprehensive review of the advances in mesh denoising, containing both traditional geometric approaches and recent learning-based methods. First, to familiarize readers with the denoising tasks, we summarize four common issues in mesh denoising. We then provide two categorizations of the existing denoising methods. Furthermore, three important categories, including optimization-, filter-, and data-driven-based techniques, are introduced and analyzed in detail, respectively. Both qualitative and quantitative comparisons are illustrated, to demonstrate the effectiveness of the state-of-the-art denoising methods. Finally, potential directions of future work are pointed out to solve the common problems of these approaches. A mesh denoising benchmark is also built in this work, and future researchers will easily and conveniently evaluate their methods with the state-of-the-art approaches.
[ { "created": "Fri, 2 Sep 2022 06:54:32 GMT", "version": "v1" } ]
"2022-09-05T00:00:00"
[ [ "Chen", "Honghua", "" ], [ "Wei", "Mingqiang", "" ], [ "Wang", "Jun", "" ] ]
0no_new_dataset
1810.02848
Peter Robinson
Calvin Newport and Peter Robinson
Fault-Tolerant Consensus with an Abstract MAC Layer
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study fault-tolerant distributed consensus in wireless systems. In more detail, we produce two new randomized algorithms that solve this problem in the abstract MAC layer model, which captures the basic interface and communication guarantees provided by most wireless MAC layers. Our algorithms work for any number of failures, require no advance knowledge of the network participants or network size, and guarantee termination with high probability after a number of broadcasts that are polynomial in the network size. Our first algorithm satisfies the standard agreement property, while our second trades a faster termination guarantee in exchange for a looser agreement property in which most nodes agree on the same value. These are the first known fault-tolerant consensus algorithms for this model. In addition to our main upper bound results, we explore the gap between the abstract MAC layer and the standard asynchronous message passing model by proving fault-tolerant consensus is impossible in the latter in the absence of information regarding the network participants, even if we assume no faults, allow randomized solutions, and provide the algorithm a constant-factor approximation of the network size.
[ { "created": "Fri, 5 Oct 2018 18:51:19 GMT", "version": "v1" } ]
"2018-10-09T00:00:00"
[ [ "Newport", "Calvin", "" ], [ "Robinson", "Peter", "" ] ]
0no_new_dataset
2308.00783
Mingzhan Yang
Mingzhan Yang, Guangxin Han, Bin Yan, Wenhua Zhang, Jinqing Qi, Huchuan Lu, Dong Wang
Hybrid-SORT: Weak Cues Matter for Online Multi-Object Tracking
Accepted to AAAI 2024
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-Object Tracking (MOT) aims to detect and associate all desired objects across frames. Most methods accomplish the task by explicitly or implicitly leveraging strong cues (i.e., spatial and appearance information), which exhibit powerful instance-level discrimination. However, when object occlusion and clustering occur, spatial and appearance information will become ambiguous simultaneously due to the high overlap among objects. In this paper, we demonstrate this long-standing challenge in MOT can be efficiently and effectively resolved by incorporating weak cues to compensate for strong cues. Along with velocity direction, we introduce the confidence and height state as potential weak cues. With superior performance, our method still maintains Simple, Online and Real-Time (SORT) characteristics. Also, our method shows strong generalization for diverse trackers and scenarios in a plug-and-play and training-free manner. Significant and consistent improvements are observed when applying our method to 5 different representative trackers. Further, with both strong and weak cues, our method Hybrid-SORT achieves superior performance on diverse benchmarks, including MOT17, MOT20, and especially DanceTrack where interaction and severe occlusion frequently happen with complex motions. The code and models are available at https://github.com/ymzis69/HybridSORT.
[ { "created": "Tue, 1 Aug 2023 18:53:24 GMT", "version": "v1" }, { "created": "Sat, 20 Jan 2024 08:06:05 GMT", "version": "v2" } ]
"2024-01-23T00:00:00"
[ [ "Yang", "Mingzhan", "" ], [ "Han", "Guangxin", "" ], [ "Yan", "Bin", "" ], [ "Zhang", "Wenhua", "" ], [ "Qi", "Jinqing", "" ], [ "Lu", "Huchuan", "" ], [ "Wang", "Dong", "" ] ]
0no_new_dataset
2209.11335
Thomas Dubail
Thomas Dubail, Fidel Alejandro Guerrero Pe\~na, Heitor Rapela Medeiros, Masih Aminbeidokhti, Eric Granger, Marco Pedersoli
Privacy-Preserving Person Detection Using Low-Resolution Infrared Cameras
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In intelligent building management, knowing the number of people and their location in a room are important for better control of its illumination, ventilation, and heating with reduced costs and improved comfort. This is typically achieved by detecting people using compact embedded devices that are installed on the room's ceiling, and that integrate low-resolution infrared camera, which conceals each person's identity. However, for accurate detection, state-of-the-art deep learning models still require supervised training using a large annotated dataset of images. In this paper, we investigate cost-effective methods that are suitable for person detection based on low-resolution infrared images. Results indicate that for such images, we can reduce the amount of supervision and computation, while still achieving a high level of detection accuracy. Going from single-shot detectors that require bounding box annotations of each person in an image, to auto-encoders that only rely on unlabelled images that do not contain people, allows for considerable savings in terms of annotation costs, and for models with lower computational costs. We validate these experimental findings on two challenging top-view datasets with low-resolution infrared images.
[ { "created": "Thu, 22 Sep 2022 22:20:30 GMT", "version": "v1" } ]
"2022-09-26T00:00:00"
[ [ "Dubail", "Thomas", "" ], [ "Peña", "Fidel Alejandro Guerrero", "" ], [ "Medeiros", "Heitor Rapela", "" ], [ "Aminbeidokhti", "Masih", "" ], [ "Granger", "Eric", "" ], [ "Pedersoli", "Marco", "" ] ]
0no_new_dataset
2106.11035
Marc Zeller
Kai Hoefig, Cornel Klein, Stefan Rothbauer, Marc Zeller, Marian Vorderer, Chee Hung Koo
A Meta-model for Process Failure Mode and Effects Analysis (PFMEA)
arXiv admin note: text overlap with arXiv:2105.14817
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)
10.1109/ETFA.2019.8869087
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Short product lifecycles and a high variety of products force industrial manufacturing processes to change frequently. Due to the manual approach of many quality analysis techniques, they can significantly slow down adaption processes of production systems or make production unprofitable. Therefore, automating them can be a key technology for keeping pace with market demand of the future. The methodology presented here aims at a meta-model supporting automation for PFMEA. The method differentiates product requirements, production steps and quality measures in such a way, that complex quality requirements can be addressed in any instance of a factory using a common meta-modeling language.
[ { "created": "Mon, 31 May 2021 14:00:19 GMT", "version": "v1" } ]
"2021-06-22T00:00:00"
[ [ "Hoefig", "Kai", "" ], [ "Klein", "Cornel", "" ], [ "Rothbauer", "Stefan", "" ], [ "Zeller", "Marc", "" ], [ "Vorderer", "Marian", "" ], [ "Koo", "Chee Hung", "" ] ]
0no_new_dataset
1902.06966
Guodong Shi
Yang Liu, Junfeng Wu, Ian R. Manchester, Guodong Shi
Dynamical Privacy in Distributed Computing -- Part I: Privacy Loss and PPSC Mechanism
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed computing protocol consists of three components: (i) Data Localization: a network-wide dataset is decomposed into local datasets separately preserved at a network of nodes; (ii) Node Communication: the nodes hold individual dynamical states and communicate with the neighbors about these dynamical states; (iii) Local Computation: state recursions are computed at each individual node. Information about the local datasets enters the computation process through the node-to-node communication and the local computations, which may be leaked to dynamics eavesdroppers having access to global or local node states. In this paper, we systematically investigate this potential computational privacy risks in distributed computing protocols in the form of structured system identification, and then propose and thoroughly analyze a Privacy-Preserving-Summation-Consistent (PPSC) mechanism as a generic privacy encryption subroutine for consensus-based distributed computations. The central idea is that the consensus manifold is where we can both hide node privacy and achieve computational accuracy. In this first part of the paper, we demonstrate the computational privacy risks in distributed algorithms against dynamics eavesdroppers and particularly in distributed linear equation solvers, and then propose the PPSC mechanism and illustrate its usefulness.
[ { "created": "Tue, 19 Feb 2019 09:31:15 GMT", "version": "v1" } ]
"2019-02-20T00:00:00"
[ [ "Liu", "Yang", "" ], [ "Wu", "Junfeng", "" ], [ "Manchester", "Ian R.", "" ], [ "Shi", "Guodong", "" ] ]
0no_new_dataset
2207.09395
Tao Zhang
Tao Zhang
Incentive Design for Large Congestion Games: Publicness-Specific Bayes Correlated Wardrop Equilibrium (Extended Abstract)
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The travel costs of the players (travelers) in anonymous congestion games depend on their choices of routes and also on the states of the transportation network such as incidents, weather, and road work. In this extended abstract, we consider an incomplete-information environment in which the realizations of the states are unobserved by the travelers. We study how a planner can incentivize the travelers to behave in her favor by strategically designing what and how the travelers get informed about the realizations of the states.
[ { "created": "Tue, 19 Jul 2022 16:44:33 GMT", "version": "v1" } ]
"2022-07-20T00:00:00"
[ [ "Zhang", "Tao", "" ] ]
0no_new_dataset
2009.09929
Vincenzo Lomonaco PhD
Vincenzo Lomonaco, Lorenzo Pellegrini, Pau Rodriguez, Massimo Caccia, Qi She, Yu Chen, Quentin Jodelet, Ruiping Wang, Zheda Mai, David Vazquez, German I. Parisi, Nikhil Churamani, Marc Pickett, Issam Laradji, Davide Maltoni
CVPR 2020 Continual Learning in Computer Vision Competition: Approaches, Results, Current Challenges and Future Directions
Pre-print v1: 12 pages, 3 figures, 8 tables
null
null
null
cs.CV cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last few years, we have witnessed a renewed and fast-growing interest in continual learning with deep neural networks with the shared objective of making current AI systems more adaptive, efficient and autonomous. However, despite the significant and undoubted progress of the field in addressing the issue of catastrophic forgetting, benchmarking different continual learning approaches is a difficult task by itself. In fact, given the proliferation of different settings, training and evaluation protocols, metrics and nomenclature, it is often tricky to properly characterize a continual learning algorithm, relate it to other solutions and gauge its real-world applicability. The first Continual Learning in Computer Vision challenge held at CVPR in 2020 has been one of the first opportunities to evaluate different continual learning algorithms on a common hardware with a large set of shared evaluation metrics and 3 different settings based on the realistic CORe50 video benchmark. In this paper, we report the main results of the competition, which counted more than 79 teams registered, 11 finalists and 2300$ in prizes. We also summarize the winning approaches, current challenges and future research directions.
[ { "created": "Mon, 14 Sep 2020 08:53:05 GMT", "version": "v1" } ]
"2020-09-22T00:00:00"
[ [ "Lomonaco", "Vincenzo", "" ], [ "Pellegrini", "Lorenzo", "" ], [ "Rodriguez", "Pau", "" ], [ "Caccia", "Massimo", "" ], [ "She", "Qi", "" ], [ "Chen", "Yu", "" ], [ "Jodelet", "Quentin", "" ], [ "Wang", "Ruiping", "" ], [ "Mai", "Zheda", "" ], [ "Vazquez", "David", "" ], [ "Parisi", "German I.", "" ], [ "Churamani", "Nikhil", "" ], [ "Pickett", "Marc", "" ], [ "Laradji", "Issam", "" ], [ "Maltoni", "Davide", "" ] ]
0no_new_dataset
1805.01024
Shu Kong
Feng Zhou, Shu Kong, Charless Fowlkes, Tao Chen, Baiying Lei
Fine-Grained Facial Expression Analysis Using Dimensional Emotion Model
code: http://www.ics.uci.edu/~skong2/DimensionalEmotionModel.html
null
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated facial expression analysis has a variety of applications in human-computer interaction. Traditional methods mainly analyze prototypical facial expressions of no more than eight discrete emotions as a classification task. However, in practice, spontaneous facial expressions in naturalistic environment can represent not only a wide range of emotions, but also different intensities within an emotion family. In such situation, these methods are not reliable or adequate. In this paper, we propose to train deep convolutional neural networks (CNNs) to analyze facial expressions explainable in a dimensional emotion model. The proposed method accommodates not only a set of basic emotion expressions, but also a full range of other emotions and subtle emotion intensities that we both feel in ourselves and perceive in others in our daily life. Specifically, we first mapped facial expressions into dimensional measures so that we transformed facial expression analysis from a classification problem to a regression one. We then tested our CNN-based methods for facial expression regression and these methods demonstrated promising performance. Moreover, we improved our method by a bilinear pooling which encodes second-order statistics of features. We showed such bilinear-CNN models significantly outperformed their respective baselines.
[ { "created": "Wed, 2 May 2018 21:08:47 GMT", "version": "v1" } ]
"2018-05-04T00:00:00"
[ [ "Zhou", "Feng", "" ], [ "Kong", "Shu", "" ], [ "Fowlkes", "Charless", "" ], [ "Chen", "Tao", "" ], [ "Lei", "Baiying", "" ] ]
0no_new_dataset
1301.6703
David Harmanec
David Harmanec
Faithful Approximations of Belief Functions
Appears in Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence (UAI1999)
null
null
UAI-P-1999-PG-271-278
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A conceptual foundation for approximation of belief functions is proposed and investigated. It is based on the requirements of consistency and closeness. An optimal approximation is studied. Unfortunately, the computation of the optimal approximation turns out to be intractable. Hence, various heuristic methods are proposed and experimantally evaluated both in terms of their accuracy and in terms of the speed of computation. These methods are compared to the earlier proposed approximations of belief functions.
[ { "created": "Wed, 23 Jan 2013 15:58:34 GMT", "version": "v1" } ]
"2013-01-30T00:00:00"
[ [ "Harmanec", "David", "" ] ]
0no_new_dataset
1903.11771
Yuta Hitomi
Yuta Hitomi, Yuya Taguchi, Hideaki Tamori, Ko Kikuta, Jiro Nishitoba, Naoaki Okazaki, Kentaro Inui, Manabu Okumura
A Large-Scale Multi-Length Headline Corpus for Analyzing Length-Constrained Headline Generation Model Evaluation
Accepted by INLG 2019
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Browsing news articles on multiple devices is now possible. The lengths of news article headlines have precise upper bounds, dictated by the size of the display of the relevant device or interface. Therefore, controlling the length of headlines is essential when applying the task of headline generation to news production. However, because there is no corpus of headlines of multiple lengths for a given article, previous research on controlling output length in headline generation has not discussed whether the system outputs could be adequately evaluated without multiple references of different lengths. In this paper, we introduce two corpora, which are Japanese News Corpus (JNC) and JApanese MUlti-Length Headline Corpus (JAMUL), to confirm the validity of previous evaluation settings. The JNC provides common supervision data for headline generation. The JAMUL is a large-scale evaluation dataset for headlines of three different lengths composed by professional editors. We report new findings on these corpora; for example, although the longest length reference summary can appropriately evaluate the existing methods controlling output length, this evaluation setting has several problems.
[ { "created": "Thu, 28 Mar 2019 03:09:33 GMT", "version": "v1" }, { "created": "Fri, 29 Mar 2019 02:42:38 GMT", "version": "v2" }, { "created": "Tue, 24 Sep 2019 02:24:28 GMT", "version": "v3" }, { "created": "Thu, 26 Sep 2019 10:35:14 GMT", "version": "v4" } ]
"2019-09-27T00:00:00"
[ [ "Hitomi", "Yuta", "" ], [ "Taguchi", "Yuya", "" ], [ "Tamori", "Hideaki", "" ], [ "Kikuta", "Ko", "" ], [ "Nishitoba", "Jiro", "" ], [ "Okazaki", "Naoaki", "" ], [ "Inui", "Kentaro", "" ], [ "Okumura", "Manabu", "" ] ]
1new_dataset