id
stringlengths
9
10
submitter
stringlengths
5
46
authors
stringlengths
5
1.31k
title
stringlengths
8
223
comments
stringlengths
2
574
journal-ref
stringclasses
587 values
doi
stringclasses
784 values
report-no
stringclasses
75 values
categories
stringlengths
5
72
license
stringclasses
9 values
abstract
stringlengths
82
3.31k
versions
listlengths
1
15
update_date
unknown
authors_parsed
sequencelengths
1
76
label
class label
2 classes
2102.10340
Radu Dogaru
Radu Dogaru, Ioana Dogaru
A Python Framework for Fast Modelling and Simulation of Cellular Nonlinear Networks and other Finite-difference Time-domain Systems
7 pages, preprint submitted to CSCS23 conference
null
null
null
cs.DC eess.IV
http://creativecommons.org/licenses/by/4.0/
This paper introduces and evaluates a freely available cellular nonlinear network simulator optimized for the effective use of GPUs, to achieve fast modelling and simulations. Its relevance is demonstrated for several applications in nonlinear complex dynamical systems, such as slow-growth phenomena as well as for various image processing applications such as edge detection. The simulator is designed as a Jupyter notebook written in Python and functionally tested and optimized to run on the freely available cloud platform Google Collaboratory. Although the simulator, in its actual form, is designed to model the FitzHugh Nagumo Reaction-Diffusion cellular nonlinear network, it can be easily adapted for any other type of finite-difference time-domain model. Four implementation versions are considered, namely using the PyCUDA, NUMBA respectively CUPY libraries (all three supporting GPU computations) as well as a NUMPY-based implementation to be used when GPU is not available. The specificities and performances for each of the four implementations are analyzed concluding that the PyCUDA implementation ensures a very good performance being capable to run up to 14000 Mega cells per seconds (each cell referring to the basic nonlinear dynamic system composing the cellular nonlinear network).
[ { "created": "Sat, 20 Feb 2021 13:12:19 GMT", "version": "v1" } ]
"2021-02-23T00:00:00"
[ [ "Dogaru", "Radu", "" ], [ "Dogaru", "Ioana", "" ] ]
0no_new_dataset
1802.07370
Siddhartha Brahma
Siddhartha Brahma
SufiSent - Universal Sentence Representations Using Suffix Encodings
4 pages, Submitted to ICLR 2018 workshop
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing universal distributed representations of sentences is a fundamental task in natural language processing. We propose a method to learn such representations by encoding the suffixes of word sequences in a sentence and training on the Stanford Natural Language Inference (SNLI) dataset. We demonstrate the effectiveness of our approach by evaluating it on the SentEval benchmark, improving on existing approaches on several transfer tasks.
[ { "created": "Tue, 20 Feb 2018 23:08:19 GMT", "version": "v1" } ]
"2018-03-01T00:00:00"
[ [ "Brahma", "Siddhartha", "" ] ]
1new_dataset
1611.00254
Zhong-Yuan Zhang
Hui-Min Cheng, Yi-Zi Ning, Zhao Yin, Chao Yan, Xin Liu, Zhong-Yuan Zhang
Community Detection in Complex Networks using Link Prediction
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community detection and link prediction are both of great significance in network analysis, which provide very valuable insights into topological structures of the network from different perspectives. In this paper, we propose a novel community detection algorithm with inclusion of link prediction, motivated by the question whether link prediction can be devoted to improving the accuracy of community partition. For link prediction, we propose two novel indices to compute the similarity between each pair of nodes, one of which aims to add missing links, and the other tries to remove spurious edges. Extensive experiments are conducted on benchmark data sets, and the results of our proposed algorithm are compared with two classes of baseline. In conclusion, our proposed algorithm is competitive, revealing that link prediction does improve the precision of community detection.
[ { "created": "Tue, 1 Nov 2016 14:56:13 GMT", "version": "v1" }, { "created": "Mon, 10 Jul 2017 15:29:00 GMT", "version": "v2" } ]
"2017-07-11T00:00:00"
[ [ "Cheng", "Hui-Min", "" ], [ "Ning", "Yi-Zi", "" ], [ "Yin", "Zhao", "" ], [ "Yan", "Chao", "" ], [ "Liu", "Xin", "" ], [ "Zhang", "Zhong-Yuan", "" ] ]
0no_new_dataset
1706.09886
Dominik Wojtczak
Mahmoud A. A. Mousa, Sven Schewe, and Dominik Wojtczak
Optimal Control for Multi-Mode Systems with Discrete Costs
extended version of a FORMATS 2017 paper
null
null
null
cs.LO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies optimal time-bounded control in multi-mode systems with discrete costs. Multi-mode systems are an important subclass of linear hybrid systems, in which there are no guards on transitions and all invariants are global. Each state has a continuous cost attached to it, which is linear in the sojourn time, while a discrete cost is attached to each transition taken. We show that an optimal control for this model can be computed in NEXPTIME and approximated in PSPACE. We also show that the one-dimensional case is simpler: although the problem is NP-complete (and in LOGSPACE for an infinite time horizon), we develop an FPTAS for finding an approximate solution.
[ { "created": "Thu, 29 Jun 2017 17:57:19 GMT", "version": "v1" } ]
"2017-06-30T00:00:00"
[ [ "Mousa", "Mahmoud A. A.", "" ], [ "Schewe", "Sven", "" ], [ "Wojtczak", "Dominik", "" ] ]
0no_new_dataset
2102.04540
Chen-Yu Wei
Chen-Yu Wei, Chung-Wei Lee, Mengxiao Zhang, Haipeng Luo
Last-iterate Convergence of Decentralized Optimistic Gradient Descent/Ascent in Infinite-horizon Competitive Markov Games
null
null
null
null
cs.LG cs.AI stat.ML
http://creativecommons.org/publicdomain/zero/1.0/
We study infinite-horizon discounted two-player zero-sum Markov games, and develop a decentralized algorithm that provably converges to the set of Nash equilibria under self-play. Our algorithm is based on running an Optimistic Gradient Descent Ascent algorithm on each state to learn the policies, with a critic that slowly learns the value of each state. To the best of our knowledge, this is the first algorithm in this setting that is simultaneously rational (converging to the opponent's best response when it uses a stationary policy), convergent (converging to the set of Nash equilibria under self-play), agnostic (no need to know the actions played by the opponent), symmetric (players taking symmetric roles in the algorithm), and enjoying a finite-time last-iterate convergence guarantee, all of which are desirable properties of decentralized algorithms.
[ { "created": "Mon, 8 Feb 2021 21:45:56 GMT", "version": "v1" }, { "created": "Wed, 7 Jul 2021 17:16:37 GMT", "version": "v2" } ]
"2021-07-08T00:00:00"
[ [ "Wei", "Chen-Yu", "" ], [ "Lee", "Chung-Wei", "" ], [ "Zhang", "Mengxiao", "" ], [ "Luo", "Haipeng", "" ] ]
0no_new_dataset
2012.06981
Stephen Macke
Stephen Macke, Hongpu Gong, Doris Jung-Lin Lee, Andrew Head, Doris Xin, Aditya Parameswaran
Fine-Grained Lineage for Safer Notebook Interactions
null
null
null
null
cs.SE cs.DB cs.HC cs.PL
http://creativecommons.org/licenses/by/4.0/
Computational notebooks have emerged as the platform of choice for data science and analytical workflows, enabling rapid iteration and exploration. By keeping intermediate program state in memory and segmenting units of execution into so-called "cells", notebooks allow users to execute their workflows interactively and enjoy particularly tight feedback. However, as cells are added, removed, reordered, and rerun, this hidden intermediate state accumulates in a way that is not necessarily correlated with the notebook's visible code, making execution behavior difficult to reason about, and leading to errors and lack of reproducibility. We present NBSafety, a custom Jupyter kernel that uses runtime tracing and static analysis to automatically manage lineage associated with cell execution and global notebook state. NBSafety detects and prevents errors that users make during unaided notebook interactions, all while preserving the flexibility of existing notebook semantics. We evaluate NBSafety's ability to prevent erroneous interactions by replaying and analyzing 666 real notebook sessions. Of these, NBSafety identified 117 sessions with potential safety errors, and in the remaining 549 sessions, the cells that NBSafety identified as resolving safety issues were more than $7\times$ more likely to be selected by users for re-execution compared to a random baseline, even though the users were not using NBSafety and were therefore not influenced by its suggestions.
[ { "created": "Sun, 13 Dec 2020 06:50:31 GMT", "version": "v1" }, { "created": "Sat, 19 Jun 2021 20:20:44 GMT", "version": "v2" } ]
"2021-06-22T00:00:00"
[ [ "Macke", "Stephen", "" ], [ "Gong", "Hongpu", "" ], [ "Lee", "Doris Jung-Lin", "" ], [ "Head", "Andrew", "" ], [ "Xin", "Doris", "" ], [ "Parameswaran", "Aditya", "" ] ]
0no_new_dataset
2310.09506
Jihong Park
Jihong Park, Seung-Woo Ko, Jinho Choi, Seong-Lyun Kim, Mehdi Bennis
Towards Semantic Communication Protocols for 6G: From Protocol Learning to Language-Oriented Approaches
11 pages, 13 figures, submitted to IEEE BITS the Information Theory Magazine
null
null
null
cs.IT cs.AI cs.LG cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The forthcoming 6G systems are expected to address a wide range of non-stationary tasks. This poses challenges to traditional medium access control (MAC) protocols that are static and predefined. In response, data-driven MAC protocols have recently emerged, offering ability to tailor their signaling messages for specific tasks. This article presents a novel categorization of these data-driven MAC protocols into three levels: Level 1 MAC. task-oriented neural protocols constructed using multi-agent deep reinforcement learning (MADRL); Level 2 MAC. neural network-oriented symbolic protocols developed by converting Level 1 MAC outputs into explicit symbols; and Level 3 MAC. language-oriented semantic protocols harnessing large language models (LLMs) and generative models. With this categorization, we aim to explore the opportunities and challenges of each level by delving into their foundational techniques. Drawing from information theory and associated principles as well as selected case studies, this study provides insights into the trajectory of data-driven MAC protocols and sheds light on future research directions.
[ { "created": "Sat, 14 Oct 2023 06:28:50 GMT", "version": "v1" } ]
"2023-10-17T00:00:00"
[ [ "Park", "Jihong", "" ], [ "Ko", "Seung-Woo", "" ], [ "Choi", "Jinho", "" ], [ "Kim", "Seong-Lyun", "" ], [ "Bennis", "Mehdi", "" ] ]
0no_new_dataset
2003.01296
Saurav Manchanda
Saurav Manchanda and Khoa Doan and Pranjul Yadav and S. Sathiya Keerthi
Regression via Implicit Models and Optimal Transport Cost Minimization
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the classic problem of regression, which involves the inductive learning of a map, $y=f(x,z)$, $z$ denoting noise, $f:\mathbb{R}^n\times \mathbb{R}^k \rightarrow \mathbb{R}^m$. Recently, Conditional GAN (CGAN) has been applied for regression and has shown to be advantageous over the other standard approaches like Gaussian Process Regression, given its ability to implicitly model complex noise forms. However, the current CGAN implementation for regression uses the classical generator-discriminator architecture with the minimax optimization approach, which is notorious for being difficult to train due to issues like training instability or failure to converge. In this paper, we take another step towards regression models that implicitly model the noise, and propose a solution which directly optimizes the optimal transport cost between the true probability distribution $p(y|x)$ and the estimated distribution $\hat{p}(y|x)$ and does not suffer from the issues associated with the minimax approach. On a variety of synthetic and real-world datasets, our proposed solution achieves state-of-the-art results. The code accompanying this paper is available at "https://github.com/gurdaspuriya/ot_regression".
[ { "created": "Tue, 3 Mar 2020 02:26:54 GMT", "version": "v1" } ]
"2020-03-04T00:00:00"
[ [ "Manchanda", "Saurav", "" ], [ "Doan", "Khoa", "" ], [ "Yadav", "Pranjul", "" ], [ "Keerthi", "S. Sathiya", "" ] ]
1new_dataset
2006.02824
Andrei Velichko
Andrei Velichko
Neural Network for Low-Memory IoT Devices and MNIST Image Recognition Using Kernels Based on Logistic Map
17 pages, 7 figures, 2 tables, 1 Appendix
Electronics 2020, 9(9), 1432
10.3390/electronics9091432
null
cs.NE cs.ET nlin.AO
http://creativecommons.org/licenses/by/4.0/
This study presents a neural network which uses filters based on logistic mapping (LogNNet). LogNNet has a feedforward network structure, but possesses the properties of reservoir neural networks. The input weight matrix, set by a recurrent logistic mapping, forms the kernels that transform the input space to the higher-dimensional feature space. The most effective recognition of a handwritten digit from MNIST-10 occurs under chaotic behavior of the logistic map. The correlation of classification accuracy with the value of the Lyapunov exponent was obtained. An advantage of LogNNet implementation on IoT devices is the significant savings in memory used. At the same time, LogNNet has a simple algorithm and performance indicators comparable to those of the best resource-efficient algorithms available at the moment. The presented network architecture uses an array of weights with a total memory size from 1 to 29 kB and achieves a classification accuracy of 80.3-96.3%. Memory is saved due to the processor, which sequentially calculates the required weight coefficients during the network operation using the analytical equation of the logistic mapping. The proposed neural network can be used in implementations of artificial intelligence based on constrained devices with limited memory, which are integral blocks for creating ambient intelligence in modern IoT environments. From a research perspective, LogNNet can contribute to the understanding of the fundamental issues of the influence of chaos on the behavior of reservoir-type neural networks.
[ { "created": "Thu, 4 Jun 2020 12:55:17 GMT", "version": "v1" }, { "created": "Fri, 4 Sep 2020 03:42:46 GMT", "version": "v2" } ]
"2020-09-07T00:00:00"
[ [ "Velichko", "Andrei", "" ] ]
0no_new_dataset
1402.1469
Evgeny Nikulchev
Evgeniy Pluzhnik, Evgeny Nikulchev
Use of Dynamical Systems Modeling to Hybrid Cloud Database
8 pages
International Journal of Communications, Network and System Sciences.2013.V.6. N.12. PP. 505-512
10.4236/ijcns.2013.612054
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local part or in the cloud. It is shown that the time data acquisition remains unchanged as a result of modification. Suggestions have been made about the use of the theory of dynamic systems to hybrid cloud database. The present work is aimed at attracting the attention of spe-cialists in the field of cloud database to the apparatus control theory. The experiment presented in this article allows the use of the description of the known methods for solving important practical problems.
[ { "created": "Thu, 6 Feb 2014 19:59:14 GMT", "version": "v1" } ]
"2014-02-07T00:00:00"
[ [ "Pluzhnik", "Evgeniy", "" ], [ "Nikulchev", "Evgeny", "" ] ]
0no_new_dataset
2108.13322
Luigi Libero Lucio Starace
Anna Corazza, Sergio Di Martino, Adriano Peron and Luigi Libero Lucio Starace
Web Application Testing: Using Tree Kernels to Detect Near-duplicate States in Automated Model Inference
6 pages, 3 figures, accepted for presentation at the 15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2021)
null
10.1145/3475716.3484187
null
cs.SE
http://creativecommons.org/licenses/by-nc-sa/4.0/
In the context of End-to-End testing of web applications, automated exploration techniques (a.k.a. crawling) are widely used to infer state-based models of the site under test. These models, in which states represent features of the web application and transitions represent reachability relationships, can be used for several model-based testing tasks, such as test case generation. However, current exploration techniques often lead to models containing many near-duplicate states, i.e., states representing slightly different pages that are in fact instances of the same feature. This has a negative impact on the subsequent model-based testing tasks, adversely affecting, for example, size, running time, and achieved coverage of generated test suites. As a web page can be naturally represented by its tree-structured DOM representation, we propose a novel near-duplicate detection technique to improve the model inference of web applications, based on Tree Kernel (TK) functions. TKs are a class of functions that compute similarity between tree-structured objects, largely investigated and successfully applied in the Natural Language Processing domain. To evaluate the capability of the proposed approach in detecting near-duplicate web pages, we conducted preliminary classification experiments on a freely-available massive dataset of about 100k manually annotated web page pairs. We compared the classification performance of the proposed approach with other state-of-the-art near-duplicate detection techniques. Preliminary results show that our approach performs better than state-of-the-art techniques in the near-duplicate detection classification task. These promising results show that TKs can be applied to near-duplicate detection in the context of web application model inference, and motivate further research in this direction.
[ { "created": "Mon, 30 Aug 2021 15:39:06 GMT", "version": "v1" } ]
"2021-08-31T00:00:00"
[ [ "Corazza", "Anna", "" ], [ "Di Martino", "Sergio", "" ], [ "Peron", "Adriano", "" ], [ "Starace", "Luigi Libero Lucio", "" ] ]
1new_dataset
cs/0202024
Daniel Lehmann
Daniel Lehmann
A note on Darwiche and Pearl
A small unpublished remark on a paper by Darwiche and Pearl
null
null
null
cs.AI
null
It is shown that Darwiche and Pearl's postulates imply an interesting property, not noticed by the authors.
[ { "created": "Mon, 18 Feb 2002 15:23:06 GMT", "version": "v1" } ]
"2007-05-23T00:00:00"
[ [ "Lehmann", "Daniel", "" ] ]
0no_new_dataset
2212.12145
Mengqi Yang
Mengqi Yang, Jian Chen, Zhiguo Ding, Yuanwei Liu, Lu Lv, and Long Yang
Joint Power Allocation and Decoding Order Selection for NOMA Systems: Outage-Optimal Strategies
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate joint power allocation and decoding order selection (PA-DOS) aimed at enhancing the outage performance of non-orthogonal multiple access (NOMA) systems. By considering the diverse target rates of users, new important properties of NOMA are revealed: When users' target rates satisfy certain conditions, the channel state information (CSI) is not required by PA-DOS to minimize the system outage probability, and different users' outage probabilities can be minimized simultaneously; When such conditions are not satisfied, the opposite situation occurs. Following these properties, two PA-DOS strategies are designed regarding distinct user priorities, which ensure the minimization of the system outage probability and the user outage probability of the high-priority user. Especially, these strategies do not require CSI or only require one-bit CSI feedback depending on users' target rates. Analytical and numerical results are provided to demonstrate that the proposed strategies significantly outperform the existing strategies in terms of both system and user outage performance. Furthermore, the results show that although under some target rates the minimum user outage probabilities cannot be simultaneously achieved, they can be closely approached at the same time in the high-signal-to-noise-ratio regime by the proposed strategies.
[ { "created": "Fri, 23 Dec 2022 04:39:18 GMT", "version": "v1" } ]
"2022-12-26T00:00:00"
[ [ "Yang", "Mengqi", "" ], [ "Chen", "Jian", "" ], [ "Ding", "Zhiguo", "" ], [ "Liu", "Yuanwei", "" ], [ "Lv", "Lu", "" ], [ "Yang", "Long", "" ] ]
0no_new_dataset
0911.4880
Ali Hormati
Ali Hormati, Amin Karbasi, Soheil Mohajer, Martin Vetterli
An Estimation Theoretic Approach for Sparsity Pattern Recovery in the Noisy Setting
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing deals with the reconstruction of sparse signals using a small number of linear measurements. One of the main challenges in compressed sensing is to find the support of a sparse signal. In the literature, several bounds on the scaling law of the number of measurements for successful support recovery have been derived where the main focus is on random Gaussian measurement matrices. In this paper, we investigate the noisy support recovery problem from an estimation theoretic point of view, where no specific assumption is made on the underlying measurement matrix. The linear measurements are perturbed by additive white Gaussian noise. We define the output of a support estimator to be a set of position values in increasing order. We set the error between the true and estimated supports as the $\ell_2$-norm of their difference. On the one hand, this choice allows us to use the machinery behind the $\ell_2$-norm error metric and on the other hand, converts the support recovery into a more intuitive and geometrical problem. First, by using the Hammersley-Chapman-Robbins (HCR) bound, we derive a fundamental lower bound on the performance of any \emph{unbiased} estimator of the support set. This lower bound provides us with necessary conditions on the number of measurements for reliable $\ell_2$-norm support recovery, which we specifically evaluate for uniform Gaussian measurement matrices. Then, we analyze the maximum likelihood estimator and derive conditions under which the HCR bound is achievable. This leads us to the number of measurements for the optimum decoder which is sufficient for reliable $\ell_2$-norm support recovery. Using this framework, we specifically evaluate sufficient conditions for uniform Gaussian measurement matrices.
[ { "created": "Wed, 25 Nov 2009 15:27:39 GMT", "version": "v1" } ]
"2009-11-26T00:00:00"
[ [ "Hormati", "Ali", "" ], [ "Karbasi", "Amin", "" ], [ "Mohajer", "Soheil", "" ], [ "Vetterli", "Martin", "" ] ]
0no_new_dataset
1807.01956
Markus M\"uller
Markus M\"uller, Sebastian St\"uker, and Alex Waibel
Neural Language Codes for Multilingual Acoustic Models
5 pages, 3 figures, accepted at Interspeech 2018
null
null
null
cs.CL cs.LG cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multilingual Speech Recognition is one of the most costly AI problems, because each language (7,000+) and even different accents require their own acoustic models to obtain best recognition performance. Even though they all use the same phoneme symbols, each language and accent imposes its own coloring or "twang". Many adaptive approaches have been proposed, but they require further training, additional data and generally are inferior to monolingually trained models. In this paper, we propose a different approach that uses a large multilingual model that is \emph{modulated} by the codes generated by an ancillary network that learns to code useful differences between the "twangs" or human language. We use Meta-Pi networks to have one network (the language code net) gate the activity of neurons in another (the acoustic model nets). Our results show that during recognition multilingual Meta-Pi networks quickly adapt to the proper language coloring without retraining or new data, and perform better than monolingually trained networks. The model was evaluated by training acoustic modeling nets and modulating language code nets jointly and optimize them for best recognition performance.
[ { "created": "Thu, 5 Jul 2018 12:15:34 GMT", "version": "v1" } ]
"2018-07-06T00:00:00"
[ [ "Müller", "Markus", "" ], [ "Stüker", "Sebastian", "" ], [ "Waibel", "Alex", "" ] ]
0no_new_dataset
2006.11197
Duo Wang
Duo Wang, Mateja Jamnik, Pietro Lio
Abstract Diagrammatic Reasoning with Multiplex Graph Networks
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Abstract reasoning, particularly in the visual domain, is a complex human ability, but it remains a challenging problem for artificial neural learning systems. In this work we propose MXGNet, a multilayer graph neural network for multi-panel diagrammatic reasoning tasks. MXGNet combines three powerful concepts, namely, object-level representation, graph neural networks and multiplex graphs, for solving visual reasoning tasks. MXGNet first extracts object-level representations for each element in all panels of the diagrams, and then forms a multi-layer multiplex graph capturing multiple relations between objects across different diagram panels. MXGNet summarises the multiple graphs extracted from the diagrams of the task, and uses this summarisation to pick the most probable answer from the given candidates. We have tested MXGNet on two types of diagrammatic reasoning tasks, namely Diagram Syllogisms and Raven Progressive Matrices (RPM). For an Euler Diagram Syllogism task MXGNet achieves state-of-the-art accuracy of 99.8%. For PGM and RAVEN, two comprehensive datasets for RPM reasoning, MXGNet outperforms the state-of-the-art models by a considerable margin.
[ { "created": "Fri, 19 Jun 2020 15:50:25 GMT", "version": "v1" } ]
"2020-06-22T00:00:00"
[ [ "Wang", "Duo", "" ], [ "Jamnik", "Mateja", "" ], [ "Lio", "Pietro", "" ] ]
1new_dataset
2006.13365
Mehdi Ali
Mehdi Ali, Max Berrendorf, Charles Tapley Hoyt, Laurent Vermue, Mikhail Galkin, Sahand Sharifzadeh, Asja Fischer, Volker Tresp, Jens Lehmann
Bringing Light Into the Dark: A Large-scale Evaluation of Knowledge Graph Embedding Models Under a Unified Framework
null
null
10.1109/TPAMI.2021.3124805
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The heterogeneity in recently published knowledge graph embedding models' implementations, training, and evaluation has made fair and thorough comparisons difficult. In order to assess the reproducibility of previously published results, we re-implemented and evaluated 21 interaction models in the PyKEEN software package. Here, we outline which results could be reproduced with their reported hyper-parameters, which could only be reproduced with alternate hyper-parameters, and which could not be reproduced at all as well as provide insight as to why this might be the case. We then performed a large-scale benchmarking on four datasets with several thousands of experiments and 24,804 GPU hours of computation time. We present insights gained as to best practices, best configurations for each model, and where improvements could be made over previously published best configurations. Our results highlight that the combination of model architecture, training approach, loss function, and the explicit modeling of inverse relations is crucial for a model's performances, and not only determined by the model architecture. We provide evidence that several architectures can obtain results competitive to the state-of-the-art when configured carefully. We have made all code, experimental configurations, results, and analyses that lead to our interpretations available at https://github.com/pykeen/pykeen and https://github.com/pykeen/benchmarking
[ { "created": "Tue, 23 Jun 2020 22:30:52 GMT", "version": "v1" }, { "created": "Fri, 7 Aug 2020 07:53:07 GMT", "version": "v2" }, { "created": "Tue, 29 Dec 2020 08:24:40 GMT", "version": "v3" }, { "created": "Fri, 25 Jun 2021 06:20:20 GMT", "version": "v4" }, { "created": "Mon, 1 Nov 2021 16:26:39 GMT", "version": "v5" } ]
"2021-11-02T00:00:00"
[ [ "Ali", "Mehdi", "" ], [ "Berrendorf", "Max", "" ], [ "Hoyt", "Charles Tapley", "" ], [ "Vermue", "Laurent", "" ], [ "Galkin", "Mikhail", "" ], [ "Sharifzadeh", "Sahand", "" ], [ "Fischer", "Asja", "" ], [ "Tresp", "Volker", "" ], [ "Lehmann", "Jens", "" ] ]
1new_dataset
1811.07896
Shishira Maiya
Shishira R Maiya and Sudharshan Chandra Babu
Slum Segmentation and Change Detection : A Deep Learning Approach
Presented at NIPS 2018 Workshop on Machine Learning for the Developing World
null
null
null
cs.CV cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
More than one billion people live in slums around the world. In some developing countries, slum residents make up for more than half of the population and lack reliable sanitation services, clean water, electricity, other basic services. Thus, slum rehabilitation and improvement is an important global challenge, and a significant amount of effort and resources have been put into this endeavor. These initiatives rely heavily on slum mapping and monitoring, and it is essential to have robust and efficient methods for mapping and monitoring existing slum settlements. In this work, we introduce an approach to segment and map individual slums from satellite imagery, leveraging regional convolutional neural networks for instance segmentation using transfer learning. In addition, we also introduce a method to perform change detection and monitor slum change over time. We show that our approach effectively learns slum shape and appearance, and demonstrates strong quantitative results, resulting in a maximum AP of 80.0.
[ { "created": "Mon, 19 Nov 2018 15:45:06 GMT", "version": "v1" } ]
"2018-11-21T00:00:00"
[ [ "Maiya", "Shishira R", "" ], [ "Babu", "Sudharshan Chandra", "" ] ]
1new_dataset
1912.04693
Frank Schneider
Frank E. Schneider and Dennis Wildermuth
Assessing the Search and Rescue Domain as an Applied and Realistic Benchmark for Robotic Systems
null
2016 17th International Carpathian Control Conference (ICCC)
10.1109/CarpathianCC.2016.7501177
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aim of this paper is to provide a review of the state of the art in Search and Rescue (SAR) robotics. Suitable robotic applications in the SAR domain are described, and SAR-specific demands and requirements on the various components of a robotic system are pictured. Current research and development in SAR robotics is outlined, and an overview of robotic systems and sub-systems currently in use in SAR and disaster response scenarios is given. Finally we show a number of possible research directions for SAR robots, which might change the overall design and operation of SAR robotics in the longer-term future. All this is meant to support our main idea of taking SAR applications as an applied benchmark for the Field Robotics (FR) domain.
[ { "created": "Tue, 10 Dec 2019 14:05:37 GMT", "version": "v1" } ]
"2019-12-11T00:00:00"
[ [ "Schneider", "Frank E.", "" ], [ "Wildermuth", "Dennis", "" ] ]
0no_new_dataset
1607.08227
Andres Arcia Moret
Andr\'es Arcia-Moret and Arjuna Sathiaseelan and Marco Zennaro and Freddy Rond\'on and Ermanno Pietrosemoli and David Johnson
Open and Regionalised Spectrum Repositories for Emerging Countries
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TV White Spaces have recently been proposed as an alternative to alleviate the spectrum crunch, characterised by the need to reallocate frequency bands to accommodate the ever-growing demand for wireless communications. In this paper, we discuss the motivations and challenges for collecting spectrum measurements in developing regions and discuss a scalable system for communities to gather and provide access to White Spaces information through open and regionalised repositories. We further discuss two relevant aspects. First, we propose a cooperative mechanism for sensing spectrum availability using a detector approach. Second, we propose a strategy (and an architecture) on the database side to implement spectrum governance. Other aspects of the work include discussion of an extensive measurement campaign showing a number of white spaces in developing regions, an overview of our experience on low-cost spectrum analysers, and the architecture of zebra-rfo, an application for processing crowd-sourced spectrum data.
[ { "created": "Sun, 17 Jul 2016 10:22:41 GMT", "version": "v1" } ]
"2016-07-28T00:00:00"
[ [ "Arcia-Moret", "Andrés", "" ], [ "Sathiaseelan", "Arjuna", "" ], [ "Zennaro", "Marco", "" ], [ "Rondón", "Freddy", "" ], [ "Pietrosemoli", "Ermanno", "" ], [ "Johnson", "David", "" ] ]
0no_new_dataset
2211.15428
Bumjin Park
Bumjin Park, Jaesik Choi
Explanation on Pretraining Bias of Finetuned Vision Transformer
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
As the number of fine tuning of pretrained models increased, understanding the bias of pretrained model is essential. However, there is little tool to analyse transformer architecture and the interpretation of the attention maps is still challenging. To tackle the interpretability, we propose Input-Attribution and Attention Score Vector (IAV) which measures the similarity between attention map and input-attribution and shows the general trend of interpretable attention patterns. We empirically explain the pretraining bias of supervised and unsupervised pretrained ViT models, and show that each head in ViT has a specific range of agreement on the decision of the classification. We show that generalization, robustness and entropy of attention maps are not property of pretraining types. On the other hand, IAV trend can separate the pretraining types.
[ { "created": "Fri, 18 Nov 2022 07:57:38 GMT", "version": "v1" } ]
"2022-11-29T00:00:00"
[ [ "Park", "Bumjin", "" ], [ "Choi", "Jaesik", "" ] ]
0no_new_dataset
2203.09580
James Wang
Li Yu, Kareem Metwaly, James Z. Wang, Vishal Monga
Surface Defect Detection and Evaluation for Marine Vessels using Multi-Stage Deep Learning
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting and evaluating surface coating defects is important for marine vessel maintenance. Currently, the assessment is carried out manually by qualified inspectors using international standards and their own experience. Automating the processes is highly challenging because of the high level of variation in vessel type, paint surface, coatings, lighting condition, weather condition, paint colors, areas of the vessel, and time in service. We present a novel deep learning-based pipeline to detect and evaluate the percentage of corrosion, fouling, and delamination on the vessel surface from normal photographs. We propose a multi-stage image processing framework, including ship section segmentation, defect segmentation, and defect classification, to automatically recognize different types of defects and measure the coverage percentage on the ship surface. Experimental results demonstrate that our proposed pipeline can objectively perform a similar assessment as a qualified inspector.
[ { "created": "Thu, 17 Mar 2022 19:48:38 GMT", "version": "v1" } ]
"2022-03-21T00:00:00"
[ [ "Yu", "Li", "" ], [ "Metwaly", "Kareem", "" ], [ "Wang", "James Z.", "" ], [ "Monga", "Vishal", "" ] ]
0no_new_dataset
1404.4806
Stefano Salsano
Stefano Salsano, Pier Luigi Ventre, Luca Prete, Giuseppe Siracusano, Matteo Gerola, Elio Salvadori
OSHI - Open Source Hybrid IP/SDN networking (and its emulation on Mininet and on distributed SDN testbeds)
Final version (Last updated August, 2014)
EWSDN 2014, 3rd European Workshop on Software Defined Networks, 1-3 September 2014, Budapest, Hungary
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The introduction of SDN in IP backbones requires the coexistence of regular IP forwarding and SDN based forwarding. The former is typically applied to best effort Internet traffic, the latter can be used for different types of advanced services (VPNs, Virtual Leased Lines, Traffic Engineering...). In this paper we first introduce the architecture and the services of an "hybrid" IP/SDN networking scenario. Then we describe the design and implementation of an Open Source Hybrid IP/SDN (OSHI) node. It combines Quagga for OSPF routing and Open vSwitch for OpenFlow based switching on Linux. The availability of tools for experimental validation and performance evaluation of SDN solutions is fundamental for the evolution of SDN. We provide a set of open source tools that allow to facilitate the design of hybrid IP/SDN experimental networks, their deployment on Mininet or on distributed SDN research testbeds and their test. Finally, using the provided tools, we evaluate key performance aspects of the proposed solutions. The OSHI development and test environment is available in a VirtualBox VM image that can be downloaded.
[ { "created": "Fri, 18 Apr 2014 15:00:37 GMT", "version": "v1" }, { "created": "Tue, 27 May 2014 20:21:52 GMT", "version": "v2" }, { "created": "Thu, 18 Sep 2014 11:21:15 GMT", "version": "v3" } ]
"2014-09-19T00:00:00"
[ [ "Salsano", "Stefano", "" ], [ "Ventre", "Pier Luigi", "" ], [ "Prete", "Luca", "" ], [ "Siracusano", "Giuseppe", "" ], [ "Gerola", "Matteo", "" ], [ "Salvadori", "Elio", "" ] ]
1new_dataset
1711.02010
Dimitrios Marmanis
Dimitrios Marmanis, Wei Yao, Fathalrahman Adam, Mihai Datcu, Peter Reinartz, Konrad Schindler, Jan Dirk Wegner, Uwe Stilla
Artificial Generation of Big Data for Improving Image Classification: A Generative Adversarial Network Approach on SAR Data
Submitted for review in "Big Data from Space 2017" conference
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Very High Spatial Resolution (VHSR) large-scale SAR image databases are still an unresolved issue in the Remote Sensing field. In this work, we propose such a dataset and use it to explore patch-based classification in urban and periurban areas, considering 7 distinct semantic classes. In this context, we investigate the accuracy of large CNN classification models and pre-trained networks for SAR imaging systems. Furthermore, we propose a Generative Adversarial Network (GAN) for SAR image generation and test, whether the synthetic data can actually improve classification accuracy.
[ { "created": "Mon, 6 Nov 2017 16:52:51 GMT", "version": "v1" } ]
"2017-11-07T00:00:00"
[ [ "Marmanis", "Dimitrios", "" ], [ "Yao", "Wei", "" ], [ "Adam", "Fathalrahman", "" ], [ "Datcu", "Mihai", "" ], [ "Reinartz", "Peter", "" ], [ "Schindler", "Konrad", "" ], [ "Wegner", "Jan Dirk", "" ], [ "Stilla", "Uwe", "" ] ]
1new_dataset
1903.07418
Eden Chlamt\'a\v{c}
Eden Chlamt\'a\v{c}, Michael Dinitz, Thomas Robinson
The Norms of Graph Spanners
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A $t$-spanner of a graph $G$ is a subgraph $H$ in which all distances are preserved up to a multiplicative $t$ factor. A classical result of Alth\"ofer et al. is that for every integer $k$ and every graph $G$, there is a $(2k-1)$-spanner of $G$ with at most $O(n^{1+1/k})$ edges. But for some settings the more interesting notion is not the number of edges, but the degrees of the nodes. This spurred interest in and study of spanners with small maximum degree. However, this is not necessarily a robust enough objective: we would like spanners that not only have small maximum degree, but also have "few" nodes of "large" degree. To interpolate between these two extremes, in this paper we initiate the study of graph spanners with respect to the $\ell_p$-norm of their degree vector, thus simultaneously modeling the number of edges (the $\ell_1$-norm) and the maximum degree (the $\ell_{\infty}$-norm). We give precise upper bounds for all ranges of $p$ and stretch $t$: we prove that the greedy $(2k-1)$-spanner has $\ell_p$ norm of at most $\max(O(n), O(n^{(k+p)/(kp)}))$, and that this bound is tight (assuming the Erd\H{o}s girth conjecture). We also study universal lower bounds, allowing us to give "generic" guarantees on the approximation ratio of the greedy algorithm which generalize and interpolate between the known approximations for the $\ell_1$ and $\ell_{\infty}$ norm. Finally, we show that at least in some situations, the $\ell_p$ norm behaves fundamentally differently from $\ell_1$ or $\ell_{\infty}$: there are regimes ($p=2$ and stretch $3$ in particular) where the greedy spanner has a provably superior approximation to the generic guarantee.
[ { "created": "Mon, 18 Mar 2019 13:13:47 GMT", "version": "v1" } ]
"2019-03-19T00:00:00"
[ [ "Chlamtáč", "Eden", "" ], [ "Dinitz", "Michael", "" ], [ "Robinson", "Thomas", "" ] ]
0no_new_dataset
1904.03110
Magdalini Paschali
Magdalini Paschali, Stefano Gasperini, Abhijit Guha Roy, Michael Y.-S. Fang, Nassir Navab
3DQ: Compact Quantized Neural Networks for Volumetric Whole Brain Segmentation
Accepted to MICCAI 2019
null
10.1007/978-3-030-32248-9_49
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Model architectures have been dramatically increasing in size, improving performance at the cost of resource requirements. In this paper we propose 3DQ, a ternary quantization method, applied for the first time to 3D Fully Convolutional Neural Networks (F-CNNs), enabling 16x model compression while maintaining performance on par with full precision models. We extensively evaluate 3DQ on two datasets for the challenging task of whole brain segmentation. Additionally, we showcase our method's ability to generalize on two common 3D architectures, namely 3D U-Net and V-Net. Outperforming a variety of baselines, the proposed method is capable of compressing large 3D models to a few MBytes, alleviating the storage needs in space critical applications.
[ { "created": "Fri, 5 Apr 2019 15:09:07 GMT", "version": "v1" }, { "created": "Tue, 16 Apr 2019 08:01:14 GMT", "version": "v2" }, { "created": "Mon, 1 Jul 2019 11:07:17 GMT", "version": "v3" } ]
"2023-08-22T00:00:00"
[ [ "Paschali", "Magdalini", "" ], [ "Gasperini", "Stefano", "" ], [ "Roy", "Abhijit Guha", "" ], [ "Fang", "Michael Y. -S.", "" ], [ "Navab", "Nassir", "" ] ]
1new_dataset
2111.15053
Aman Bhargava
Aman Bhargava, Alice X. Zhou, Adam Carnaffan, Steve Mann
Deep Learning for Enhanced Scratch Input
15 pages, 11 figures
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
The vibrations generated from scratching and tapping on surfaces can be highly expressive and recognizable, and have therefore been proposed as a method of natural user interface (NUI). Previous systems require custom sensor hardware such as contact microphones and have struggled with gesture classification accuracy. We propose a deep learning approach to scratch input. Using smartphones and tablets laid on tabletops or other similar surfaces, our system achieved a gesture classification accuracy of 95.8\%, substantially reducing gesture misclassification from previous works. Further, our system achieved this performance when tested on a wide variety of surfaces, mobile devices, and in high noise environments. The results indicate high potential for the application of deep learning techniques to natural user interface (NUI) systems that can readily convert large unpowered surfaces into a user interface using just a smartphone with no special-purpose sensors or hardware.
[ { "created": "Tue, 30 Nov 2021 01:21:43 GMT", "version": "v1" } ]
"2021-12-01T00:00:00"
[ [ "Bhargava", "Aman", "" ], [ "Zhou", "Alice X.", "" ], [ "Carnaffan", "Adam", "" ], [ "Mann", "Steve", "" ] ]
0no_new_dataset
1210.4881
Tamir Hazan
Tamir Hazan, Jian Peng, Amnon Shashua
Tightening Fractional Covering Upper Bounds on the Partition Function for High-Order Region Graphs
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
null
null
UAI-P-2012-PG-356-366
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new approach for tightening upper bounds on the partition function. Our upper bounds are based on fractional covering bounds on the entropy function, and result in a concave program to compute these bounds and a convex program to tighten them. To solve these programs effectively for general region graphs we utilize the entropy barrier method, thus decomposing the original programs by their dual programs and solve them with dual block optimization scheme. The entropy barrier method provides an elegant framework to generalize the message-passing scheme to high-order region graph, as well as to solve the block dual steps in closed-form. This is a key for computational relevancy for large problems with thousands of regions.
[ { "created": "Tue, 16 Oct 2012 17:43:59 GMT", "version": "v1" } ]
"2012-10-19T00:00:00"
[ [ "Hazan", "Tamir", "" ], [ "Peng", "Jian", "" ], [ "Shashua", "Amnon", "" ] ]
0no_new_dataset
1810.10855
Davide Taibi
Valentina Lenarduzzi, Davide Taibi
Microservices, Continuous Architecture, and Technical Debt Interest: An Empirical Study
null
Davide Taibi, Valentina Lenarduzzi. Microservices, Continuous Architecture, and Technical Debt Interest: An Empirical Study. Euromicro SEAA. Work in Progress. 2018
null
null
cs.SE
http://creativecommons.org/licenses/by-nc-sa/4.0/
Continuous Architecture (CA) is an approach that supports companies in decreasing the time between deliveries. Migration to microservices is one of the most common situations when companies adopt continuous architecting processes [4]. Companies commonly adopt an initial migration strategy to extract some components from the monolithic system as microservices, making use of simplified microservices patterns [5][4]. As an example, companies commonly directly connect the microservices to the legacy monolithic system and do not adopt any message bus at the beginning. When the system starts to grow in complexity, they usually start re-architecting their systems, considering different architectural patterns. Some companies introduce API gateway patterns to simplify the management and load balancing of the different services, while others also consider a lightweight message bus [4][5][6]. All these architectural changes require deep refactoring of the system, thereby increasing the risk of new faults being introduced. In this paper, we report the preliminary results of work in progress, where we monitored the TD of an SME (SMEs = small and medium enterprises) that adopted a CA approach while migrating a legacy monolithic system to an ecosystem of microservices. To the best of our knowledge, no studies exist on the impact of postponed activities on the TD, especially in the context of CA and microservices. This work will help companies understand how TD grows and changes over time while at the same time opening up new avenues for future research on the analysis of TD interest in continuous architecting processes.
[ { "created": "Thu, 25 Oct 2018 13:08:27 GMT", "version": "v1" } ]
"2018-10-26T00:00:00"
[ [ "Lenarduzzi", "Valentina", "" ], [ "Taibi", "Davide", "" ] ]
0no_new_dataset
1906.07849
Marius Arvinte
Marius Arvinte and Sriram Vishwanath and Ahmed H. Tewfik
Deep Learning-Based Quantization of L-Values for Gray-Coded Modulation
Submitted to IEEE Globecom 2019
null
null
null
cs.LG eess.SP stat.ML
http://creativecommons.org/licenses/by/4.0/
In this work, a deep learning-based quantization scheme for log-likelihood ratio (L-value) storage is introduced. We analyze the dependency between the average magnitude of different L-values from the same quadrature amplitude modulation (QAM) symbol and show they follow a consistent ordering. Based on this we design a deep autoencoder that jointly compresses and separately reconstructs each L-value, allowing the use of a weighted loss function that aims to more accurately reconstructs low magnitude inputs. Our method is shown to be competitive with state-of-the-art maximum mutual information quantization schemes, reducing the required memory footprint by a ratio of up to two and a loss of performance smaller than 0.1 dB with less than two effective bits per L-value or smaller than 0.04 dB with 2.25 effective bits. We experimentally show that our proposed method is a universal compression scheme in the sense that after training on an LDPC-coded Rayleigh fading scenario we can reuse the same network without further training on other channel models and codes while preserving the same performance benefits.
[ { "created": "Tue, 18 Jun 2019 23:43:38 GMT", "version": "v1" }, { "created": "Sun, 9 May 2021 23:31:07 GMT", "version": "v2" } ]
"2021-05-11T00:00:00"
[ [ "Arvinte", "Marius", "" ], [ "Vishwanath", "Sriram", "" ], [ "Tewfik", "Ahmed H.", "" ] ]
0no_new_dataset
2311.09706
Shiro Takagi
Shiro Takagi, Ryutaro Yamauchi, Wataru Kumagai
Towards Autonomous Hypothesis Verification via Language Models with Minimal Guidance
null
null
null
null
cs.AI cs.HC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research automation efforts usually employ AI as a tool to automate specific tasks within the research process. To create an AI that truly conduct research themselves, it must independently generate hypotheses, design verification plans, and execute verification. Therefore, we investigated if an AI itself could autonomously generate and verify hypothesis for a toy machine learning research problem. We prompted GPT-4 to generate hypotheses and Python code for hypothesis verification with limited methodological guidance. Our findings suggest that, in some instances, GPT-4 can autonomously generate and validate hypotheses without detailed guidance. While this is a promising result, we also found that none of the verifications were flawless, and there remain significant challenges in achieving autonomous, human-level research using only generic instructions. These findings underscore the need for continued exploration to develop a general and autonomous AI researcher.
[ { "created": "Thu, 16 Nov 2023 09:34:23 GMT", "version": "v1" } ]
"2023-11-17T00:00:00"
[ [ "Takagi", "Shiro", "" ], [ "Yamauchi", "Ryutaro", "" ], [ "Kumagai", "Wataru", "" ] ]
0no_new_dataset
1811.09688
Haruna Isah
Mandeep Singh Kandhari, Farhana Zulkernine, Haruna Isah
A Voice Controlled E-Commerce Web Application
7 pages
null
10.1109/IEMCON.2018.8614771
null
cs.CY cs.CL cs.HC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic voice-controlled systems have changed the way humans interact with a computer. Voice or speech recognition systems allow a user to make a hands-free request to the computer, which in turn processes the request and serves the user with appropriate responses. After years of research and developments in machine learning and artificial intelligence, today voice-controlled technologies have become more efficient and are widely applied in many domains to enable and improve human-to-human and human-to-computer interactions. The state-of-the-art e-commerce applications with the help of web technologies offer interactive and user-friendly interfaces. However, there are some instances where people, especially with visual disabilities, are not able to fully experience the serviceability of such applications. A voice-controlled system embedded in a web application can enhance user experience and can provide voice as a means to control the functionality of e-commerce websites. In this paper, we propose a taxonomy of speech recognition systems (SRS) and present a voice-controlled commodity purchase e-commerce application using IBM Watson speech-to-text to demonstrate its usability. The prototype can be extended to other application scenarios such as government service kiosks and enable analytics of the converted text data for scenarios such as medical diagnosis at the clinics.
[ { "created": "Fri, 16 Nov 2018 01:35:09 GMT", "version": "v1" } ]
"2019-07-23T00:00:00"
[ [ "Kandhari", "Mandeep Singh", "" ], [ "Zulkernine", "Farhana", "" ], [ "Isah", "Haruna", "" ] ]
0no_new_dataset
2310.15363
Da Wei Zheng
Timothy M. Chan and Pingan Cheng and Da Wei Zheng
An Optimal Algorithm for Higher-Order Voronoi Diagrams in the Plane: The Usefulness of Nondeterminism
To appear in SODA 2024. 16 pages, 1 figure
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the first optimal randomized algorithm for constructing the order-$k$ Voronoi diagram of $n$ points in two dimensions. The expected running time is $O(n\log n + nk)$, which improves the previous, two-decades-old result of Ramos (SoCG'99) by a $2^{O(\log^*k)}$ factor. To obtain our result, we (i) use a recent decision-tree technique of Chan and Zheng (SODA'22) in combination with Ramos's cutting construction, to reduce the problem to verifying an order-$k$ Voronoi diagram, and (ii) solve the verification problem by a new divide-and-conquer algorithm using planar-graph separators. We also describe a deterministic algorithm for constructing the $k$-level of $n$ lines in two dimensions in $O(n\log n + nk^{1/3})$ time, and constructing the $k$-level of $n$ planes in three dimensions in $O(n\log n + nk^{3/2})$ time. These time bounds (ignoring the $n\log n$ term) match the current best upper bounds on the combinatorial complexity of the $k$-level. Previously, the same time bound in two dimensions was obtained by Chan (1999) but with randomization.
[ { "created": "Mon, 23 Oct 2023 20:55:43 GMT", "version": "v1" } ]
"2023-10-25T00:00:00"
[ [ "Chan", "Timothy M.", "" ], [ "Cheng", "Pingan", "" ], [ "Zheng", "Da Wei", "" ] ]
0no_new_dataset
1806.07757
Giuseppe De Nittis
Giuseppe De Nittis and Nicola Gatti
How to Maximize the Spread of Social Influence: A Survey
arXiv admin note: text overlap with arXiv:1601.06551, arXiv:1602.05240, arXiv:1408.6282, arXiv:1212.0884, arXiv:1503.00024, arXiv:1602.00165, arXiv:1111.4795 by other authors
null
null
null
cs.SI cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This survey presents the main results achieved for the influence maximization problem in social networks. This problem is well studied in the literature and, thanks to its recent applications, some of which currently deployed on the field, it is receiving more and more attention in the scientific community. The problem can be formulated as follows: given a graph, with each node having a certain probability of influencing its neighbors, select a subset of vertices so that the number of nodes in the network that are influenced is maximized. Starting from this model, we introduce the main theoretical developments and computational results that have been achieved, taking into account different diffusion models describing how the information spreads throughout the network, various ways in which the sources of information could be placed, and how to tackle the problem in the presence of uncertainties affecting the network. Finally, we present one of the main application that has been developed and deployed exploiting tools and techniques previously discussed.
[ { "created": "Tue, 19 Jun 2018 14:57:22 GMT", "version": "v1" } ]
"2018-06-21T00:00:00"
[ [ "De Nittis", "Giuseppe", "" ], [ "Gatti", "Nicola", "" ] ]
0no_new_dataset
2108.05857
Or Castel
Or Castel, Ori Ram, Avia Efrat, Omer Levy
How Optimal is Greedy Decoding for Extractive Question Answering?
AKBC 2022 12 pages, 3 figures
null
null
null
cs.CL
http://creativecommons.org/publicdomain/zero/1.0/
Fine-tuned language models use greedy decoding to answer reading comprehension questions with relative success. However, this approach does not ensure that the answer is a span in the given passage, nor does it guarantee that it is the most probable one. Does greedy decoding actually perform worse than an algorithm that does adhere to these properties? To study the performance and optimality of greedy decoding, we present exact-extract, a decoding algorithm that efficiently finds the most probable answer span in the context. We compare the performance of T5 with both decoding algorithms on zero-shot and few-shot extractive question answering. When no training examples are available, exact-extract significantly outperforms greedy decoding. However, greedy decoding quickly converges towards the performance of exact-extract with the introduction of a few training examples, becoming more extractive and increasingly likelier to generate the most probable span as the training set grows. We also show that self-supervised training can bias the model towards extractive behavior, increasing performance in the zero-shot setting without resorting to annotated examples. Overall, our results suggest that pretrained language models are so good at adapting to extractive question answering, that it is often enough to fine-tune on a small training set for the greedy algorithm to emulate the optimal decoding strategy.
[ { "created": "Thu, 12 Aug 2021 17:07:31 GMT", "version": "v1" }, { "created": "Tue, 8 Nov 2022 09:05:38 GMT", "version": "v2" } ]
"2022-11-09T00:00:00"
[ [ "Castel", "Or", "" ], [ "Ram", "Ori", "" ], [ "Efrat", "Avia", "" ], [ "Levy", "Omer", "" ] ]
0no_new_dataset
2405.06301
David Lindsay Dr.
David Lindsay and Sian Lindsay
Learning from String Sequences
10 pages, 1 figure, 4 tables, Technical Report
null
null
null
cs.LG cs.AI cs.CE cs.CL cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Universal Similarity Metric (USM) has been demonstrated to give practically useful measures of "similarity" between sequence data. Here we have used the USM as an alternative distance metric in a K-Nearest Neighbours (K-NN) learner to allow effective pattern recognition of variable length sequence data. We compare this USM approach with the commonly used string-to-word vector approach. Our experiments have used two data sets of divergent domains: (1) spam email filtering and (2) protein subcellular localization. Our results with this data reveal that the USM-based K-NN learner (1) gives predictions with higher classification accuracy than those output by techniques that use the string-to-word vector approach, and (2) can be used to generate reliable probability forecasts.
[ { "created": "Fri, 10 May 2024 08:09:53 GMT", "version": "v1" } ]
"2024-05-13T00:00:00"
[ [ "Lindsay", "David", "" ], [ "Lindsay", "Sian", "" ] ]
1new_dataset
2406.11750
Alvise Spano'
Alvise Span\`o
Flexible and Reversible Conversion between Extensible Records and Overloading Constraints for ML
47 pages. Accepted by Journal of Systems and Software - Special Issue on Software Language Engeneering
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most ML-like functional languages provide records and overloading as unrelated features. Records not only represent data structures, but are also used to implement dictionary passing, whereas overloading produces type constraints that are basically dictionaries subject to compiler-driven dispatching. In this paper we explore how records and overloading constraints can be converted one into the other, allowing the programmer to switch between the two at a very reasonable cost in terms of syntactic overhead. To achieve this we introduce two language constructs, namely inject and eject, performing a type-driven syntactic transformation. The former literally injects constraints into the type and produces a function adding an extra record argument. The latter does the opposite, ejecting a record argument from a function and turning fields into type constraints. The conversion is reversible and can be restricted to a subset of symbols, granting additional control to the programmer. Although what we call inject has already been proposed in literature, making it a language operator and coupling it with its reverse counterpart represent a novel design. The goal is to allow the programmer to switch from a dictionary-passing style to compiler-assisted constraint resolution, and vice versa, enabling reuse between libraries that otherwise would not interoperate.
[ { "created": "Mon, 17 Jun 2024 17:04:50 GMT", "version": "v1" } ]
"2024-06-19T00:00:00"
[ [ "Spanò", "Alvise", "" ] ]
0no_new_dataset
1804.07334
Jeffrey Uhlmann
Jeffrey Uhlmann
A Rank-Preserving Generalized Matrix Inverse for Consistency with Respect to Similarity
Included simulation results and revised text in preparation for journal submission
IEEE Control Systems Letters (2018)
10.1109/LCSYS.2018.2854240
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has recently been renewed recognition of the need to understand the consistency properties that must be preserved when a generalized matrix inverse is required. The most widely known generalized inverse, the Moore-Penrose pseudoinverse, provides consistency with respect to orthonormal transformations (e.g., rotations of a coordinate frame), and a recently derived inverse provides consistency with respect to diagonal transformations (e.g., a change of units on state variables). Another well-known and theoretically important generalized inverse is the Drazin inverse, which preserves consistency with respect to similarity transformations. In this paper we note a limitation of the Drazin inverse is that it does not generally preserve the rank of the linear system of interest. We then introduce an alternative generalized inverse that both preserves rank and provides consistency with respect to similarity transformations. Lastly we provide an example and discuss experiments which suggest the need for algorithms with improved numerical stability.
[ { "created": "Thu, 19 Apr 2018 18:46:08 GMT", "version": "v1" }, { "created": "Mon, 30 Apr 2018 16:03:08 GMT", "version": "v2" }, { "created": "Sun, 6 May 2018 15:15:55 GMT", "version": "v3" } ]
"2018-08-03T00:00:00"
[ [ "Uhlmann", "Jeffrey", "" ] ]
0no_new_dataset
1605.00167
Bahman Kalantari
Bahman Kalantari
Approximating Nash Equilibrium Via Multilinear Minimax
Error in correct relationship between minimax and maximin. superseded by arXiv:1809.01717v3
null
null
null
cs.GT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nash equilibrium} (NE) can be stated as a formal theorem on a multilinear form, free of game theory terminology. On the other hand, inspired by this formalism, we state and prove a {\it multilinear minimax theorem}, a generalization of von Neumann's bilinear minimax theorem. As in the bilinear case, the proof is based on relating the underlying optimizations to a primal-dual pair of linear programming problems, albeit more complicated LPs. The theorem together with its proof is of independent interest. Next, we use the theorem to associate to a multilinear form in NE a {\it multilinear minimax relaxation} (MMR), where the primal-dual pair of solutions induce an approximate equilibrium point that provides a nontrivial upper bound on a convex combination of {\it expected payoffs} in any NE solution. In fact we show any positive probability vector associated to the players induces a corresponding {\it diagonally-scaled} MMR approximate equilibrium with its associated upper bound. By virtue of the proof of the multilinear minimax theorem, MMR solution can be computed in polynomial-time. On the other hand, it is known that even in bimatrix games NE is {\it PPAD-complete}, a complexity class in NP not known to be in P. The quality of MMR solution and the efficiency of solving the underlying LPs are the subject of further investigation. However, as shown in a separate article, for a large set of test problems in bimatrix games, not only the MMR payoffs for both players are better than any NE payoffs, so is the computing time of MMR in contrast with that of Lemke-Howsen algorithm. In large size problems the latter algorithm even fails to produce a Nash equilibrium. In summary, solving MMR provides a worthy approximation even if Nash equilibrium is shown to be computable in polynomial-time.
[ { "created": "Sat, 30 Apr 2016 21:07:16 GMT", "version": "v1" }, { "created": "Fri, 5 Jul 2019 17:47:26 GMT", "version": "v2" }, { "created": "Fri, 29 Dec 2023 04:10:40 GMT", "version": "v3" } ]
"2024-01-01T00:00:00"
[ [ "Kalantari", "Bahman", "" ] ]
0no_new_dataset
1910.02059
Georgios Birmpas
Georgios Birmpas, Elias Koutsoupias, Philip Lazos, Francisco J. Marmolejo-Coss\'io
Fairness and Efficiency in DAG-based Cryptocurrencies
null
null
null
null
cs.CR cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bitcoin is a decentralised digital currency that serves as an alternative to existing transaction systems based on an external central authority for security. Although Bitcoin has many desirable properties, one of its fundamental shortcomings is its inability to process transactions at high rates. To address this challenge, many subsequent protocols either modify the rules of block acceptance (longest chain rule) and reward, or alter the graphical structure of the public ledger from a tree to a directed acyclic graph (DAG). Motivated by these approaches, we introduce a new general framework that captures ledger growth for a large class of DAG-based implementations. With this in hand, and by assuming honest miner behaviour, we (experimentally) explore how different DAG-based protocols perform in terms of fairness, i.e., if the block reward of a miner is proportional to their hash power, as well as efficiency, i.e. what proportion of user transactions a ledger deems valid after a certain length of time. Our results demonstrate fundamental structural limits on how well DAG-based ledger protocols cope with a high transaction load. More specifically, we show that even in a scenario where every miner on the system is honest in terms of when they publish blocks, what they point to, and what transactions each block contains, fairness and efficiency of the ledger can break down at specific hash rates if miners have differing levels of connectivity to the P2P network sustaining the protocol.
[ { "created": "Fri, 4 Oct 2019 17:35:46 GMT", "version": "v1" } ]
"2019-10-07T00:00:00"
[ [ "Birmpas", "Georgios", "" ], [ "Koutsoupias", "Elias", "" ], [ "Lazos", "Philip", "" ], [ "Marmolejo-Cossío", "Francisco J.", "" ] ]
0no_new_dataset
1607.07950
Pierre Le Bodic
C\'edric Bentz and Pierre Le Bodic
A note on "Approximation schemes for a subclass of subset selection problems", and a faster FPTAS for the Minimum Knapsack Problem
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pruhs and Woeginger prove the existence of FPTAS's for a general class of minimization and maximization subset selection problems. Without losing generality from the original framework, we prove how better asymptotic worst-case running times can be achieved if a $\rho$-approximation algorithm is available, and in particular we obtain matching running times between maximization and minimization subset selection problems. We directly apply this result to the Minimum Knapsack Problem, for which the original framework yields an FPTAS with running time $O(n^5/\epsilon)$, where $\epsilon$ is the required accuracy and $n$ is the number of items, and obtain an FPTAS with running time $O(n^3/\epsilon)$, thus improving the running time by a quadratic factor in the worst case.
[ { "created": "Wed, 27 Jul 2016 04:13:46 GMT", "version": "v1" } ]
"2016-07-28T00:00:00"
[ [ "Bentz", "Cédric", "" ], [ "Bodic", "Pierre Le", "" ] ]
0no_new_dataset
1805.09875
Andrey Kolobov
Iain Guilliard, Richard Rogahn, Jim Piavis, Andrey Kolobov
Autonomous Thermalling as a Partially Observable Markov Decision Process (Extended Version)
null
null
null
null
cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Small uninhabited aerial vehicles (sUAVs) commonly rely on active propulsion to stay airborne, which limits flight time and range. To address this, autonomous soaring seeks to utilize free atmospheric energy in the form of updrafts (thermals). However, their irregular nature at low altitudes makes them hard to exploit for existing methods. We model autonomous thermalling as a POMDP and present a receding-horizon controller based on it. We implement it as part of ArduPlane, a popular open-source autopilot, and compare it to an existing alternative in a series of live flight tests involving two sUAVs thermalling simultaneously, with our POMDP-based controller showing a significant advantage.
[ { "created": "Thu, 24 May 2018 19:58:37 GMT", "version": "v1" } ]
"2018-05-28T00:00:00"
[ [ "Guilliard", "Iain", "" ], [ "Rogahn", "Richard", "" ], [ "Piavis", "Jim", "" ], [ "Kolobov", "Andrey", "" ] ]
0no_new_dataset
2309.09844
Efimia Panagiotaki
George Drayson, Efimia Panagiotaki, Daniel Omeiza, Lars Kunze
CC-SGG: Corner Case Scenario Generation using Learned Scene Graphs
The first two authors contributed equally to this work
null
null
null
cs.RO cs.AI cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Corner case scenarios are an essential tool for testing and validating the safety of autonomous vehicles (AVs). As these scenarios are often insufficiently present in naturalistic driving datasets, augmenting the data with synthetic corner cases greatly enhances the safe operation of AVs in unique situations. However, the generation of synthetic, yet realistic, corner cases poses a significant challenge. In this work, we introduce a novel approach based on Heterogeneous Graph Neural Networks (HGNNs) to transform regular driving scenarios into corner cases. To achieve this, we first generate concise representations of regular driving scenes as scene graphs, minimally manipulating their structure and properties. Our model then learns to perturb those graphs to generate corner cases using attention and triple embeddings. The input and perturbed graphs are then imported back into the simulation to generate corner case scenarios. Our model successfully learned to produce corner cases from input scene graphs, achieving 89.9% prediction accuracy on our testing dataset. We further validate the generated scenarios on baseline autonomous driving methods, demonstrating our model's ability to effectively create critical situations for the baselines.
[ { "created": "Mon, 18 Sep 2023 14:59:11 GMT", "version": "v1" }, { "created": "Tue, 6 Feb 2024 17:53:02 GMT", "version": "v2" } ]
"2024-02-07T00:00:00"
[ [ "Drayson", "George", "" ], [ "Panagiotaki", "Efimia", "" ], [ "Omeiza", "Daniel", "" ], [ "Kunze", "Lars", "" ] ]
1new_dataset
2402.18085
Govind Mittal
Govind Mittal, Arthur Jakobsson, Kelly O. Marshall, Chinmay Hegde, Nasir Memon
AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response
Dataset will be made public by end of March 2024
null
null
null
cs.SD cs.CR eess.AS
http://creativecommons.org/licenses/by-sa/4.0/
Scammers are aggressively leveraging AI voice-cloning technology for social engineering attacks, a situation significantly worsened by the advent of audio Real-time Deepfakes (RTDFs). RTDFs can clone a target's voice in real-time over phone calls, making these interactions highly interactive and thus far more convincing. Our research confidently addresses the gap in the existing literature on deepfake detection, which has largely been ineffective against RTDF threats. We introduce a robust challenge-response-based method to detect deepfake audio calls, pioneering a comprehensive taxonomy of audio challenges. Our evaluation pitches 20 prospective challenges against a leading voice-cloning system. We have compiled a novel open-source challenge dataset with contributions from 100 smartphone and desktop users, yielding 18,600 original and 1.6 million deepfake samples. Through rigorous machine and human evaluations of this dataset, we achieved a deepfake detection rate of 86% and an 80% AUC score, respectively. Notably, utilizing a set of 11 challenges significantly enhances detection capabilities. Our findings reveal that combining human intuition with machine precision offers complementary advantages. Consequently, we have developed an innovative human-AI collaborative system that melds human discernment with algorithmic accuracy, boosting final joint accuracy to 82.9%. This system highlights the significant advantage of AI-assisted pre-screening in call verification processes. Samples can be heard at https://mittalgovind.github.io/autch-samples/
[ { "created": "Wed, 28 Feb 2024 06:17:55 GMT", "version": "v1" } ]
"2024-02-29T00:00:00"
[ [ "Mittal", "Govind", "" ], [ "Jakobsson", "Arthur", "" ], [ "Marshall", "Kelly O.", "" ], [ "Hegde", "Chinmay", "" ], [ "Memon", "Nasir", "" ] ]
1new_dataset
1610.08691
Nick Brown
Nick Brown
Type oriented parallel programming for Exascale
As presented at the Exascale Applications and Software Conference (EASC), 9th-11th April 2013
null
null
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Whilst there have been great advances in HPC hardware and software in recent years, the languages and models that we use to program these machines have remained much more static. This is not from a lack of effort, but instead by virtue of the fact that the foundation that many programming languages are built on is not sufficient for the level of expressivity required for parallel work. The result is an implicit trade-off between programmability and performance which is made worse due to the fact that, whilst many scientific users are experts within their own fields, they are not HPC experts. Type oriented programming looks to address this by encoding the complexity of a language via the type system. Most of the language functionality is contained within a loosely coupled type library that can be flexibly used to control many aspects such as parallelism. Due to the high level nature of this approach there is much information available during compilation which can be used for optimisation and, in the absence of type information, the compiler can apply sensible default options thus supporting both the expert programmer and novice alike. We demonstrate that, at no performance or scalability penalty when running on up to 8196 cores of a Cray XE6 system, codes written in this type oriented manner provide improved programmability. The programmer is able to write simple, implicit parallel, HPC code at a high level and then explicitly tune by adding additional type information if required.
[ { "created": "Thu, 27 Oct 2016 10:28:53 GMT", "version": "v1" } ]
"2016-10-31T00:00:00"
[ [ "Brown", "Nick", "" ] ]
0no_new_dataset
1905.01713
Hao Wu
Hao Wu and Raj Rao Nadakuditi
Free Component Analysis: Theory, Algorithms & Applications
72 pages, 16 figures
null
null
null
cs.LG math.ST stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a method for unmixing mixtures of freely independent random variables in a manner analogous to the independent component analysis (ICA) based method for unmixing independent random variables from their additive mixtures. Random matrices play the role of free random variables in this context so the method we develop, which we call Free component analysis (FCA), unmixes matrices from additive mixtures of matrices. Thus, while the mixing model is standard, the novelty and difference in unmixing performance comes from the introduction of a new statistical criteria, derived from free probability theory, that quantify freeness analogous to how kurtosis and entropy quantify independence. We describe the theory, the various algorithms, and compare FCA to vanilla ICA which does not account for spatial or temporal structure. We highlight why the statistical criteria make FCA also vanilla despite its matricial underpinnings and show that FCA performs comparably to, and sometimes better than, (vanilla) ICA in every application, such as image and speech unmixing, where ICA has been known to succeed. Our computational experiments suggest that not-so-random matrices, such as images and short time fourier transform matrix of waveforms are (closer to being) freer "in the wild" than we might have theoretically expected.
[ { "created": "Sun, 5 May 2019 16:20:21 GMT", "version": "v1" }, { "created": "Thu, 1 Apr 2021 02:27:41 GMT", "version": "v2" }, { "created": "Mon, 7 Feb 2022 01:29:25 GMT", "version": "v3" } ]
"2022-02-08T00:00:00"
[ [ "Wu", "Hao", "" ], [ "Nadakuditi", "Raj Rao", "" ] ]
0no_new_dataset
2405.11618
Guillaume Jaume
Guillaume Jaume, Lukas Oldenburg, Anurag Vaidya, Richard J. Chen, Drew F.K. Williamson, Thomas Peeters, Andrew H. Song, Faisal Mahmood
Transcriptomics-guided Slide Representation Learning in Computational Pathology
CVPR'24, Oral
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Self-supervised learning (SSL) has been successful in building patch embeddings of small histology images (e.g., 224x224 pixels), but scaling these models to learn slide embeddings from the entirety of giga-pixel whole-slide images (WSIs) remains challenging. Here, we leverage complementary information from gene expression profiles to guide slide representation learning using multimodal pre-training. Expression profiles constitute highly detailed molecular descriptions of a tissue that we hypothesize offer a strong task-agnostic training signal for learning slide embeddings. Our slide and expression (S+E) pre-training strategy, called Tangle, employs modality-specific encoders, the outputs of which are aligned via contrastive learning. Tangle was pre-trained on samples from three different organs: liver (n=6,597 S+E pairs), breast (n=1,020), and lung (n=1,012) from two different species (Homo sapiens and Rattus norvegicus). Across three independent test datasets consisting of 1,265 breast WSIs, 1,946 lung WSIs, and 4,584 liver WSIs, Tangle shows significantly better few-shot performance compared to supervised and SSL baselines. When assessed using prototype-based classification and slide retrieval, Tangle also shows a substantial performance improvement over all baselines. Code available at https://github.com/mahmoodlab/TANGLE.
[ { "created": "Sun, 19 May 2024 17:17:35 GMT", "version": "v1" } ]
"2024-05-21T00:00:00"
[ [ "Jaume", "Guillaume", "" ], [ "Oldenburg", "Lukas", "" ], [ "Vaidya", "Anurag", "" ], [ "Chen", "Richard J.", "" ], [ "Williamson", "Drew F. K.", "" ], [ "Peeters", "Thomas", "" ], [ "Song", "Andrew H.", "" ], [ "Mahmood", "Faisal", "" ] ]
0no_new_dataset
1512.04170
Rakesh Venkat
Amit Deshpande, Prahladh Harsha, Rakesh Venkat
Embedding approximately low-dimensional $\ell_2^2$ metrics into $\ell_1$
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Goemans showed that any $n$ points $x_1, \dotsc x_n$ in $d$-dimensions satisfying $\ell_2^2$ triangle inequalities can be embedded into $\ell_{1}$, with worst-case distortion at most $\sqrt{d}$. We extend this to the case when the points are approximately low-dimensional, albeit with average distortion guarantees. More precisely, we give an $\ell_{2}^{2}$-to-$\ell_{1}$ embedding with average distortion at most the stable rank, $\mathrm{sr}(M)$, of the matrix $M$ consisting of columns $\{x_i-x_j\}_{i<j}$. Average distortion embedding suffices for applications such as the Sparsest Cut problem. Our embedding gives an approximation algorithm for the \sparsestcut problem on low threshold-rank graphs, where earlier work was inspired by Lasserre SDP hierarchy, and improves on a previous result of the first and third author [Deshpande and Venkat, In Proc. 17th APPROX, 2014]. Our ideas give a new perspective on $\ell_{2}^{2}$ metric, an alternate proof of Goemans' theorem, and a simpler proof for average distortion $\sqrt{d}$. Furthermore, while the seminal result of Arora, Rao and Vazirani giving a $O(\sqrt{\log n})$ guarantee for Uniform Sparsest Cut can be seen to imply Goemans' theorem with average distortion, our work opens up the possibility of proving such a result directly via a Goemans'-like theorem.
[ { "created": "Mon, 14 Dec 2015 04:54:08 GMT", "version": "v1" } ]
"2015-12-15T00:00:00"
[ [ "Deshpande", "Amit", "" ], [ "Harsha", "Prahladh", "" ], [ "Venkat", "Rakesh", "" ] ]
0no_new_dataset
1611.01990
Yoni Choukroun
Yoni Choukroun, Alon Shtern, Alex Bronstein and Ron Kimmel
Hamiltonian operator for spectral shape analysis
null
null
null
null
cs.GR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many shape analysis methods treat the geometry of an object as a metric space that can be captured by the Laplace-Beltrami operator. In this paper, we propose to adapt the classical Hamiltonian operator from quantum mechanics to the field of shape analysis. To this end we study the addition of a potential function to the Laplacian as a generator for dual spaces in which shape processing is performed. We present a general optimization approach for solving variational problems involving the basis defined by the Hamiltonian using perturbation theory for its eigenvectors. The suggested operator is shown to produce better functional spaces to operate with, as demonstrated on different shape analysis tasks.
[ { "created": "Mon, 7 Nov 2016 11:11:10 GMT", "version": "v1" }, { "created": "Sun, 25 Jun 2017 17:45:00 GMT", "version": "v2" } ]
"2017-06-27T00:00:00"
[ [ "Choukroun", "Yoni", "" ], [ "Shtern", "Alon", "" ], [ "Bronstein", "Alex", "" ], [ "Kimmel", "Ron", "" ] ]
0no_new_dataset
2404.17844
Lei Cheng
Lei Cheng, Xiaowen Huang, Jitao Sang, Jian Yu
Towards Robust Recommendation: A Review and an Adversarial Robustness Evaluation Library
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, recommender system has achieved significant success. However, due to the openness of recommender systems, they remain vulnerable to malicious attacks. Additionally, natural noise in training data and issues such as data sparsity can also degrade the performance of recommender systems. Therefore, enhancing the robustness of recommender systems has become an increasingly important research topic. In this survey, we provide a comprehensive overview of the robustness of recommender systems. Based on our investigation, we categorize the robustness of recommender systems into adversarial robustness and non-adversarial robustness. In the adversarial robustness, we introduce the fundamental principles and classical methods of recommender system adversarial attacks and defenses. In the non-adversarial robustness, we analyze non-adversarial robustness from the perspectives of data sparsity, natural noise, and data imbalance. Additionally, we summarize commonly used datasets and evaluation metrics for evaluating the robustness of recommender systems. Finally, we also discuss the current challenges in the field of recommender system robustness and potential future research directions. Additionally, to facilitate fair and efficient evaluation of attack and defense methods in adversarial robustness, we propose an adversarial robustness evaluation library--ShillingREC, and we conduct evaluations of basic attack models and recommendation models. ShillingREC project is released at https://github.com/chengleileilei/ShillingREC.
[ { "created": "Sat, 27 Apr 2024 09:44:56 GMT", "version": "v1" } ]
"2024-04-30T00:00:00"
[ [ "Cheng", "Lei", "" ], [ "Huang", "Xiaowen", "" ], [ "Sang", "Jitao", "" ], [ "Yu", "Jian", "" ] ]
0no_new_dataset
1709.09534
Lydia Manikonda
Lydia Manikonda, Subbarao Kambhampati
Tweeting AI: Perceptions of Lay vs Expert Twitterati
arXiv admin note: substantial text overlap with arXiv:1704.08389
null
null
null
cs.AI cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the recent advancements in Artificial Intelligence (AI), various organizations and individuals are debating about the progress of AI as a blessing or a curse for the future of the society. This paper conducts an investigation on how the public perceives the progress of AI by utilizing the data shared on Twitter. Specifically, this paper performs a comparative analysis on the understanding of users belonging to two categories -- general AI-Tweeters (AIT) and expert AI-Tweeters (EAIT) who share posts about AI on Twitter. Our analysis revealed that users from both the categories express distinct emotions and interests towards AI. Users from both the categories regard AI as positive and are optimistic about the progress of AI but the experts are more negative than the general AI-Tweeters. Expert AI-Tweeters share relatively large percentage of tweets about their personal news compared to technical aspects of AI. However, the effects of automation on the future are of primary concern to AIT than to EAIT. When the expert category is sub-categorized, the emotion analysis revealed that students and industry professionals have more insights in their tweets about AI than academicians.
[ { "created": "Mon, 25 Sep 2017 19:14:21 GMT", "version": "v1" } ]
"2017-09-28T00:00:00"
[ [ "Manikonda", "Lydia", "" ], [ "Kambhampati", "Subbarao", "" ] ]
0no_new_dataset
2311.13647
John Morris
John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush
Language Model Inversion
null
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Language models produce a distribution over the next token; can we use this information to recover the prompt tokens? We consider the problem of language model inversion and show that next-token probabilities contain a surprising amount of information about the preceding text. Often we can recover the text in cases where it is hidden from the user, motivating a method for recovering unknown prompts given only the model's current distribution output. We consider a variety of model access scenarios, and show how even without predictions for every token in the vocabulary we can recover the probability vector through search. On Llama-2 7b, our inversion method reconstructs prompts with a BLEU of $59$ and token-level F1 of $78$ and recovers $27\%$ of prompts exactly. Code for reproducing all experiments is available at http://github.com/jxmorris12/vec2text.
[ { "created": "Wed, 22 Nov 2023 19:04:04 GMT", "version": "v1" } ]
"2023-11-27T00:00:00"
[ [ "Morris", "John X.", "" ], [ "Zhao", "Wenting", "" ], [ "Chiu", "Justin T.", "" ], [ "Shmatikov", "Vitaly", "" ], [ "Rush", "Alexander M.", "" ] ]
0no_new_dataset
1710.10657
Giulia DeSalvo
Corinna Cortes, Giulia DeSalvo, Vitaly Kuznetsov, Mehryar Mohri, and Scott Yang
Discrepancy-Based Algorithms for Non-Stationary Rested Bandits
Unfinished work
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the multi-armed bandit problem where the rewards are realizations of general non-stationary stochastic processes, a setting that generalizes many existing lines of work and analyses. In particular, we present a theoretical analysis and derive regret guarantees for rested bandits in which the reward distribution of each arm changes only when we pull that arm. Remarkably, our regret bounds are logarithmic in the number of rounds under several natural conditions. We introduce a new algorithm based on classical UCB ideas combined with the notion of weighted discrepancy, a useful tool for measuring the non-stationarity of a stochastic process. We show that the notion of discrepancy can be used to design very general algorithms and a unified framework for the analysis of multi-armed rested bandit problems with non-stationary rewards. In particular, we show that we can recover the regret guarantees of many specific instances of bandit problems with non-stationary rewards that have been studied in the literature. We also provide experiments demonstrating that our algorithms can enjoy a significant improvement in practice compared to standard benchmarks.
[ { "created": "Sun, 29 Oct 2017 17:59:19 GMT", "version": "v1" }, { "created": "Tue, 27 Feb 2018 23:16:33 GMT", "version": "v2" }, { "created": "Thu, 3 Sep 2020 16:48:29 GMT", "version": "v3" } ]
"2020-09-04T00:00:00"
[ [ "Cortes", "Corinna", "" ], [ "DeSalvo", "Giulia", "" ], [ "Kuznetsov", "Vitaly", "" ], [ "Mohri", "Mehryar", "" ], [ "Yang", "Scott", "" ] ]
0no_new_dataset
1908.01826
Mihai Oltean
Mihai Oltean
Jenny 5 -- the robot
39 pages, 9 figures, 7 tables
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Jenny 5 is a fully open-source robot intended to be used mainly for research but can also act as a human assistant. It has a mobile platform with rubber tracks, a flexible leg, two arms with 7 degrees of freedom each and head with 2 degrees of freedom. The robot is actuated by 20 motors (DC, steppers and servos) and its state is read with the help of many sensors. The robot also has 3 webcams for computer vision tasks. In this paper the current state of the robot is described.
[ { "created": "Mon, 5 Aug 2019 19:53:28 GMT", "version": "v1" }, { "created": "Sat, 10 Aug 2019 08:45:14 GMT", "version": "v2" } ]
"2019-08-13T00:00:00"
[ [ "Oltean", "Mihai", "" ] ]
0no_new_dataset
2303.00500
Susu Sun
Susu Sun, Stefano Woerner, Andreas Maier, Lisa M. Koch, Christian F. Baumgartner
Inherently Interpretable Multi-Label Classification Using Class-Specific Counterfactuals
Accepted to MIDL 2023
null
null
null
cs.CV cs.LG eess.IV
http://creativecommons.org/licenses/by/4.0/
Interpretability is essential for machine learning algorithms in high-stakes application fields such as medical image analysis. However, high-performing black-box neural networks do not provide explanations for their predictions, which can lead to mistrust and suboptimal human-ML collaboration. Post-hoc explanation techniques, which are widely used in practice, have been shown to suffer from severe conceptual problems. Furthermore, as we show in this paper, current explanation techniques do not perform adequately in the multi-label scenario, in which multiple medical findings may co-occur in a single image. We propose Attri-Net, an inherently interpretable model for multi-label classification. Attri-Net is a powerful classifier that provides transparent, trustworthy, and human-understandable explanations. The model first generates class-specific attribution maps based on counterfactuals to identify which image regions correspond to certain medical findings. Then a simple logistic regression classifier is used to make predictions based solely on these attribution maps. We compare Attri-Net to five post-hoc explanation techniques and one inherently interpretable classifier on three chest X-ray datasets. We find that Attri-Net produces high-quality multi-label explanations consistent with clinical knowledge and has comparable classification performance to state-of-the-art classification models.
[ { "created": "Wed, 1 Mar 2023 13:32:55 GMT", "version": "v1" }, { "created": "Tue, 8 Aug 2023 14:50:50 GMT", "version": "v2" } ]
"2023-08-09T00:00:00"
[ [ "Sun", "Susu", "" ], [ "Woerner", "Stefano", "" ], [ "Maier", "Andreas", "" ], [ "Koch", "Lisa M.", "" ], [ "Baumgartner", "Christian F.", "" ] ]
0no_new_dataset
2311.13930
Luojun Lin
Qipeng Liu, Luojun Lin, Zhifeng Shen, Zhifeng Yang
Periodically Exchange Teacher-Student for Source-Free Object Detection
ICCV 2023
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Source-free object detection (SFOD) aims to adapt the source detector to unlabeled target domain data in the absence of source domain data. Most SFOD methods follow the same self-training paradigm using mean-teacher (MT) framework where the student model is guided by only one single teacher model. However, such paradigm can easily fall into a training instability problem that when the teacher model collapses uncontrollably due to the domain shift, the student model also suffers drastic performance degradation. To address this issue, we propose the Periodically Exchange Teacher-Student (PETS) method, a simple yet novel approach that introduces a multiple-teacher framework consisting of a static teacher, a dynamic teacher, and a student model. During the training phase, we periodically exchange the weights between the static teacher and the student model. Then, we update the dynamic teacher using the moving average of the student model that has already been exchanged by the static teacher. In this way, the dynamic teacher can integrate knowledge from past periods, effectively reducing error accumulation and enabling a more stable training process within the MT-based framework. Further, we develop a consensus mechanism to merge the predictions of two teacher models to provide higher-quality pseudo labels for student model. Extensive experiments on multiple SFOD benchmarks show that the proposed method achieves state-of-the-art performance compared with other related methods, demonstrating the effectiveness and superiority of our method on SFOD task.
[ { "created": "Thu, 23 Nov 2023 11:30:54 GMT", "version": "v1" } ]
"2023-11-27T00:00:00"
[ [ "Liu", "Qipeng", "" ], [ "Lin", "Luojun", "" ], [ "Shen", "Zhifeng", "" ], [ "Yang", "Zhifeng", "" ] ]
0no_new_dataset
1506.01414
Mark Scanlon
Mark Scanlon, Jason Farina, M-Tahar Kechadi
Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service
in Computers and Security 2015
null
10.1016/j.cose.2015.05.003
null
cs.CR cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
High availability is no longer just a business continuity concern. Users are increasingly dependant on devices that consume and produce data in ever increasing volumes. A popular solution is to have a central repository which each device accesses after centrally managed authentication. This model of use is facilitated by cloud based file synchronisation services such as Dropbox, OneDrive, Google Drive and Apple iCloud. Cloud architecture allows the provisioning of storage space with "always-on" access. Recent concerns over unauthorised access to third party systems and large scale exposure of private data have made an alternative solution desirable. These events have caused users to assess their own security practices and the level of trust placed in third party storage services. One option is BitTorrent Sync, a cloudless synchronisation utility provides data availability and redundancy. This utility replicates files stored in shares to remote peers with access controlled by keys and permissions. While lacking the economies brought about by scale, complete control over data access has made this a popular solution. The ability to replicate data without oversight introduces risk of abuse by users as well as difficulties for forensic investigators. This paper suggests a methodology for investigation and analysis of the protocol to assist in the control of data flow across security perimeters.
[ { "created": "Wed, 3 Jun 2015 21:21:41 GMT", "version": "v1" } ]
"2015-06-05T00:00:00"
[ [ "Scanlon", "Mark", "" ], [ "Farina", "Jason", "" ], [ "Kechadi", "M-Tahar", "" ] ]
0no_new_dataset
2205.03398
Ulrike Kuhl
Ulrike Kuhl and Andr\'e Artelt and Barbara Hammer
Let's Go to the Alien Zoo: Introducing an Experimental Framework to Study Usability of Counterfactual Explanations for Machine Learning
We provide the entire code, together with the underlying models and user data: https://github.com/ukuhl/IntroAlienZoo
Front.Comput.Sci. (2023), Sec. Theoretical Computer Science, Volume 5
10.3389/fcomp.2023.1087929
null
cs.HC cs.LG
http://creativecommons.org/licenses/by/4.0/
To foster usefulness and accountability of machine learning (ML), it is essential to explain a model's decisions in addition to evaluating its performance. Accordingly, the field of explainable artificial intelligence (XAI) has resurfaced as a topic of active research, offering approaches to address the "how" and "why" of automated decision-making. Within this domain, counterfactual explanations (CFEs) have gained considerable traction as a psychologically grounded approach to generate post-hoc explanations. To do so, CFEs highlight what changes to a model's input would have changed its prediction in a particular way. However, despite the introduction of numerous CFE approaches, their usability has yet to be thoroughly validated at the human level. Thus, to advance the field of XAI, we introduce the Alien Zoo, an engaging, web-based and game-inspired experimental framework. The Alien Zoo provides the means to evaluate usability of CFEs for gaining new knowledge from an automated system, targeting novice users in a domain-general context. As a proof of concept, we demonstrate the practical efficacy and feasibility of this approach in a user study. Our results suggest that users benefit from receiving CFEs compared to no explanation, both in terms of objective performance in the proposed iterative learning task, and subjective usability. With this work, we aim to equip research groups and practitioners with the means to easily run controlled and well-powered user studies to complement their otherwise often more technology-oriented work. Thus, in the interest of reproducible research, we provide the entire code, together with the underlying models and user data.
[ { "created": "Fri, 6 May 2022 17:57:05 GMT", "version": "v1" } ]
"2023-03-24T00:00:00"
[ [ "Kuhl", "Ulrike", "" ], [ "Artelt", "André", "" ], [ "Hammer", "Barbara", "" ] ]
1new_dataset
2404.07204
O\u{g}uzhan Fatih Kar
O\u{g}uzhan Fatih Kar, Alessio Tonioni, Petra Poklukar, Achin Kulshrestha, Amir Zamir, Federico Tombari
BRAVE: Broadening the visual encoding of vision-language models
Project page at https://brave-vlms.epfl.ch/
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vision-language models (VLMs) are typically composed of a vision encoder, e.g. CLIP, and a language model (LM) that interprets the encoded features to solve downstream tasks. Despite remarkable progress, VLMs are subject to several shortcomings due to the limited capabilities of vision encoders, e.g. "blindness" to certain image features, visual hallucination, etc. To address these issues, we study broadening the visual encoding capabilities of VLMs. We first comprehensively benchmark several vision encoders with different inductive biases for solving VLM tasks. We observe that there is no single encoding configuration that consistently achieves top performance across different tasks, and encoders with different biases can perform surprisingly similarly. Motivated by this, we introduce a method, named BRAVE, that consolidates features from multiple frozen encoders into a more versatile representation that can be directly fed as the input to a frozen LM. BRAVE achieves state-of-the-art performance on a broad range of captioning and VQA benchmarks and significantly reduces the aforementioned issues of VLMs, while requiring a smaller number of trainable parameters than existing methods and having a more compressed representation. Our results highlight the potential of incorporating different visual biases for a more broad and contextualized visual understanding of VLMs.
[ { "created": "Wed, 10 Apr 2024 17:59:45 GMT", "version": "v1" } ]
"2024-04-11T00:00:00"
[ [ "Kar", "Oğuzhan Fatih", "" ], [ "Tonioni", "Alessio", "" ], [ "Poklukar", "Petra", "" ], [ "Kulshrestha", "Achin", "" ], [ "Zamir", "Amir", "" ], [ "Tombari", "Federico", "" ] ]
0no_new_dataset
1908.03835
Xinyu Gong
Xinyu Gong, Shiyu Chang, Yifan Jiang, Zhangyang Wang
AutoGAN: Neural Architecture Search for Generative Adversarial Networks
accepted by ICCV 2019
null
null
null
cs.CV cs.LG eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural architecture search (NAS) has witnessed prevailing success in image classification and (very recently) segmentation tasks. In this paper, we present the first preliminary study on introducing the NAS algorithm to generative adversarial networks (GANs), dubbed AutoGAN. The marriage of NAS and GANs faces its unique challenges. We define the search space for the generator architectural variations and use an RNN controller to guide the search, with parameter sharing and dynamic-resetting to accelerate the process. Inception score is adopted as the reward, and a multi-level search strategy is introduced to perform NAS in a progressive way. Experiments validate the effectiveness of AutoGAN on the task of unconditional image generation. Specifically, our discovered architectures achieve highly competitive performance compared to current state-of-the-art hand-crafted GANs, e.g., setting new state-of-the-art FID scores of 12.42 on CIFAR-10, and 31.01 on STL-10, respectively. We also conclude with a discussion of the current limitations and future potential of AutoGAN. The code is available at https://github.com/TAMU-VITA/AutoGAN
[ { "created": "Sun, 11 Aug 2019 00:52:30 GMT", "version": "v1" } ]
"2019-08-13T00:00:00"
[ [ "Gong", "Xinyu", "" ], [ "Chang", "Shiyu", "" ], [ "Jiang", "Yifan", "" ], [ "Wang", "Zhangyang", "" ] ]
0no_new_dataset
1902.07928
John Iacono
Peyman Afshani, John Iacono, Varunkumar Jayapaul, Ben Karsin, Nodari Sitchinava
Locality
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The program performance on modern hardware is characterized by \emph{locality of reference}, that is, it is faster to access data that is close in address space to data that has been accessed recently than data in a random location. This is due to many architectural features including caches, prefetching, virtual address translation and the physical properties of a hard disk drive; attempting to model all the components that constitute the performance of a modern machine is impossible, especially for general algorithm design purposes. What if one could prove an algorithm is asymptotically optimal on all systems that reward locality of reference, no matter how it manifests itself within reasonable limits? We show that this is possible, and that excluding some pathological cases, cache-oblivious algorithms that are asymptotically optimal in the ideal-cache model are asymptotically optimal in any reasonable setting that rewards locality of reference. This is surprising as the cache-oblivious framework envisions a particular architectural model involving blocked memory transfer into a multi-level hierarchy of caches of varying sizes, and was not designed to directly model locality-of-reference correlated performance.
[ { "created": "Thu, 21 Feb 2019 09:21:57 GMT", "version": "v1" }, { "created": "Sat, 27 Apr 2019 09:39:03 GMT", "version": "v2" }, { "created": "Wed, 12 Jan 2022 20:32:01 GMT", "version": "v3" } ]
"2022-01-14T00:00:00"
[ [ "Afshani", "Peyman", "" ], [ "Iacono", "John", "" ], [ "Jayapaul", "Varunkumar", "" ], [ "Karsin", "Ben", "" ], [ "Sitchinava", "Nodari", "" ] ]
0no_new_dataset
2407.00188
Ali Raza Dr
Ali Raza (Department of Software Engineering The University Of Lahore, Lahore, Pakistan), Faizan Younas (Department of Computer Science & Information Technology, The University Of Lahore, Lahore, Pakistan)
A Novel Labeled Human Voice Signal Dataset for Misbehavior Detection
null
2024
null
null
cs.SD cs.AI eess.AS
http://creativecommons.org/licenses/by/4.0/
Voice signal classification based on human behaviours involves analyzing various aspects of speech patterns and delivery styles. In this study, a real-time dataset collection is performed where participants are instructed to speak twelve psychology questions in two distinct manners: first, in a harsh voice, which is categorized as "misbehaved"; and second, in a polite manner, categorized as "normal". These classifications are crucial in understanding how different vocal behaviours affect the interpretation and classification of voice signals. This research highlights the significance of voice tone and delivery in automated machine-learning systems for voice analysis and recognition. This research contributes to the broader field of voice signal analysis by elucidating the impact of human behaviour on the perception and categorization of voice signals, thereby enhancing the development of more accurate and context-aware voice recognition technologies.
[ { "created": "Fri, 28 Jun 2024 18:55:07 GMT", "version": "v1" } ]
"2024-07-08T00:00:00"
[ [ "Raza", "Ali", "", "Department of Software Engineering The University Of Lahore,\n Lahore, Pakistan" ], [ "Younas", "Faizan", "", "Department of Computer Science &\n Information Technology, The University Of Lahore, Lahore, Pakistan" ] ]
1new_dataset
1703.06487
Mathijs Hubertus Maria Johannes Wintraecken
Jean-Daniel Boissonnat, Mael Rouxel-Labb\'e, and Mathijs Wintraecken
Anisotropic triangulations via discrete Riemannian Voronoi diagrams
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The construction of anisotropic triangulations is desirable for various applications, such as the numerical solving of partial differential equations and the representation of surfaces in graphics. To solve this notoriously difficult problem in a practical way, we introduce the discrete Riemannian Voronoi diagram, a discrete structure that approximates the Riemannian Voronoi diagram. This structure has been implemented and was shown to lead to good triangulations in $\mathbb{R}^2$ and on surfaces embedded in $\mathbb{R}^3$ as detailed in our experimental companion paper. In this paper, we study theoretical aspects of our structure. Given a finite set of points $\cal P$ in a domain $\Omega$ equipped with a Riemannian metric, we compare the discrete Riemannian Voronoi diagram of $\cal P$ to its Riemannian Voronoi diagram. Both diagrams have dual structures called the discrete Riemannian Delaunay and the Riemannian Delaunay complex. We provide conditions that guarantee that these dual structures are identical. It then follows from previous results that the discrete Riemannian Delaunay complex can be embedded in $\Omega$ under sufficient conditions, leading to an anisotropic triangulation with curved simplices. Furthermore, we show that, under similar conditions, the simplices of this triangulation can be straightened.
[ { "created": "Sun, 19 Mar 2017 18:48:06 GMT", "version": "v1" } ]
"2017-03-21T00:00:00"
[ [ "Boissonnat", "Jean-Daniel", "" ], [ "Rouxel-Labbé", "Mael", "" ], [ "Wintraecken", "Mathijs", "" ] ]
0no_new_dataset
1907.11554
Larry Bull
Larry Bull
Autoencoding with a Learning Classifier System: Initial Results
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Autoencoders enable data dimensionality reduction and a key component of many (deep) learning systems. This short paper introduces a form of Holland's Learning Classifier System (LCS) to perform autoencoding building upon a previously presented form of LCS that utilises unsupervised learning for clustering. Initial results using a neural network representation suggest it is an effective approach to reduction.
[ { "created": "Fri, 26 Jul 2019 13:04:53 GMT", "version": "v1" }, { "created": "Mon, 29 Jul 2019 09:54:55 GMT", "version": "v2" } ]
"2019-07-30T00:00:00"
[ [ "Bull", "Larry", "" ] ]
0no_new_dataset
2206.09237
Christopher Bellman
Christopher Bellman and Paul C. van Oorschot
Systematic Analysis and Comparison of Security Advice as Datasets
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A long list of documents have been offered as security advice, codes of practice, and security guidelines for building and using security products, including Internet of Things (IoT) devices. To date, little or no systematic analysis has been carried out on the advice datasets themselves. Towards addressing this, with IoT as a case study, we begin with an informal analysis of two documents offering advice related to IoT security -- the ETSI Provisions and the UK DCMS Guidelines -- and then carry out what we believe is the first systematic analysis of these advice datasets. Our analysis explains in what ways the ETSI Provisions are a positive evolution of the UK DCMS Guidelines. We also suggest aspects of security advice warranting special attention by those offering security advice. Such parties may find the systematic analysis method, which categorizes advice into predefined categories, to be of general interest beyond IoT itself.
[ { "created": "Sat, 18 Jun 2022 16:33:41 GMT", "version": "v1" }, { "created": "Mon, 14 Nov 2022 19:05:17 GMT", "version": "v2" } ]
"2022-11-16T00:00:00"
[ [ "Bellman", "Christopher", "" ], [ "van Oorschot", "Paul C.", "" ] ]
1new_dataset
2402.10122
Betania Campello Ms.
Betania Silva C Campello, Guilherme Dean Pelegrina, Renata Pelissari, Ricardo Suyama, Leonardo Tomazeli Duarte
Mitigating subjectivity and bias in AI development indices: A robust approach to redefining country rankings
null
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Countries worldwide have been implementing different actions national strategies for Artificial Intelligence (AI) to shape policy priorities and guide their development concerning AI. Several AI indices have emerged to assess countries' progress in AI development, aiding decision-making on investments and policy choices. Typically, these indices combine multiple indicators using linear additive methods such as weighted sums, although they are limited in their ability to account for interactions among indicators. Another limitation concerns the use of deterministic weights, which can be perceived as subjective and vulnerable to debate and scrutiny, especially by nations that feel disadvantaged. Aiming at mitigating these problems, we conduct a methodological analysis to derive AI indices based on multiple criteria decision analysis. Initially, we assess correlations between different AI dimensions and employ the Choquet integral to model them. Thus, we apply the Stochastic Multicriteria Acceptability Analysis (SMAA) to conduct a sensitivity analysis using both weighted sum and Choquet integral in order to evaluate the stability of the indices with regard the weights. Finally, we introduce a novel ranking methodology based on SMAA, which considers several sets of weights to derive the ranking of countries. As a result, instead of using predefined weights, in the proposed approach, the ranking is achieved based on the probabilities of countries in occupying a specific position. In the computational analysis, we utilize the data employed in The Global AI Index proposed by Tortoise. Results reveal correlations in the data, and our approach effectively mitigates bias. In the sensitivity analysis, we scrutinize changes in the ranking resulting from weight adjustments. We demonstrate that our proposal rankings closely align with those derived from weight variations, proving to be more robust.
[ { "created": "Thu, 15 Feb 2024 17:20:55 GMT", "version": "v1" } ]
"2024-02-16T00:00:00"
[ [ "Campello", "Betania Silva C", "" ], [ "Pelegrina", "Guilherme Dean", "" ], [ "Pelissari", "Renata", "" ], [ "Suyama", "Ricardo", "" ], [ "Duarte", "Leonardo Tomazeli", "" ] ]
0no_new_dataset
2103.12941
Chuan Fang
Chuan Fang, Shuai Ding, Zilong Dong, Honghua Li, Siyu Zhu, Ping Tan
Single-Shot is Enough: Panoramic Infrastructure Based Calibration of Multiple Cameras and 3D LiDARs
null
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
The integration of multiple cameras and 3D Li- DARs has become basic configuration of augmented reality devices, robotics, and autonomous vehicles. The calibration of multi-modal sensors is crucial for a system to properly function, but it remains tedious and impractical for mass production. Moreover, most devices require re-calibration after usage for certain period of time. In this paper, we propose a single-shot solution for calibrating extrinsic transformations among multiple cameras and 3D LiDARs. We establish a panoramic infrastructure, in which a camera or LiDAR can be robustly localized using data from single frame. Experiments are conducted on three devices with different camera-LiDAR configurations, showing that our approach achieved comparable calibration accuracy with the state-of-the-art approaches but with much greater efficiency.
[ { "created": "Wed, 24 Mar 2021 02:31:38 GMT", "version": "v1" }, { "created": "Sat, 10 Jul 2021 12:44:10 GMT", "version": "v2" } ]
"2021-07-13T00:00:00"
[ [ "Fang", "Chuan", "" ], [ "Ding", "Shuai", "" ], [ "Dong", "Zilong", "" ], [ "Li", "Honghua", "" ], [ "Zhu", "Siyu", "" ], [ "Tan", "Ping", "" ] ]
0no_new_dataset
2201.01853
Mengda Xu
Mengda Xu, Sumitra Ganesh, Pranay Pasula
Mixture of basis for interpretable continual learning with distribution shifts
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Continual learning in environments with shifting data distributions is a challenging problem with several real-world applications. In this paper we consider settings in which the data distribution(task) shifts abruptly and the timing of these shifts are not known. Furthermore, we consider a semi-supervised task-agnostic setting in which the learning algorithm has access to both task-segmented and unsegmented data for offline training. We propose a novel approach called mixture of Basismodels (MoB) for addressing this problem setting. The core idea is to learn a small set of basis models and to construct a dynamic, task-dependent mixture of the models to predict for the current task. We also propose a new methodology to detect observations that are out-of-distribution with respect to the existing basis models and to instantiate new models as needed. We test our approach in multiple domains and show that it attains better prediction error than existing methods in most cases while using fewer models than other multiple model approaches. Moreover, we analyze the latent task representations learned by MoB and show that similar tasks tend to cluster in the latent space and that the latent representation shifts at the task boundaries when tasks are dissimilar.
[ { "created": "Wed, 5 Jan 2022 22:53:15 GMT", "version": "v1" } ]
"2022-01-07T00:00:00"
[ [ "Xu", "Mengda", "" ], [ "Ganesh", "Sumitra", "" ], [ "Pasula", "Pranay", "" ] ]
0no_new_dataset
2210.11994
Xiang Li
Xiang Li, Yuzheng Chen, Xiaohang Tang
GesPlayer: Using Augmented Gestures to Empower Video Players
5 pages, 4 figures. Published at ACM ISS 2022 as a poster
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
In this paper, we introduce GesPlayer, a gesture-based empowered video player that explores how users can experience their hands as an interface through gestures. We provide three semantic gestures based on the camera of a computer or other smart device to detect and adjust the progress of video playback, volume, and screen brightness, respectively. Our goal is to enable users to control video playback simply by their gestures in the air, without the need to use a mouse or keyboard, especially when it is not convenient to do so. Ultimately, we hope to expand our understanding of gesture-based interaction by understanding the inclusiveness of designing the hand as an interactive interface, and further broaden the state of semantic gestures in an interactive environment through computational interaction methods.
[ { "created": "Fri, 21 Oct 2022 14:37:05 GMT", "version": "v1" } ]
"2022-10-24T00:00:00"
[ [ "Li", "Xiang", "" ], [ "Chen", "Yuzheng", "" ], [ "Tang", "Xiaohang", "" ] ]
0no_new_dataset
1811.00982
Jordi Pont-Tuset
Alina Kuznetsova, Hassan Rom, Neil Alldrin, Jasper Uijlings, Ivan Krasin, Jordi Pont-Tuset, Shahab Kamali, Stefan Popov, Matteo Malloci, Alexander Kolesnikov, Tom Duerig, Vittorio Ferrari
The Open Images Dataset V4: Unified image classification, object detection, and visual relationship detection at scale
Accepted to International Journal of Computer Vision, 2020
null
10.1007/s11263-020-01316-z
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Open Images V4, a dataset of 9.2M images with unified annotations for image classification, object detection and visual relationship detection. The images have a Creative Commons Attribution license that allows to share and adapt the material, and they have been collected from Flickr without a predefined list of class names or tags, leading to natural class statistics and avoiding an initial design bias. Open Images V4 offers large scale across several dimensions: 30.1M image-level labels for 19.8k concepts, 15.4M bounding boxes for 600 object classes, and 375k visual relationship annotations involving 57 classes. For object detection in particular, we provide 15x more bounding boxes than the next largest datasets (15.4M boxes on 1.9M images). The images often show complex scenes with several objects (8 annotated objects per image on average). We annotated visual relationships between them, which support visual relationship detection, an emerging task that requires structured reasoning. We provide in-depth comprehensive statistics about the dataset, we validate the quality of the annotations, we study how the performance of several modern models evolves with increasing amounts of training data, and we demonstrate two applications made possible by having unified annotations of multiple types coexisting in the same images. We hope that the scale, quality, and variety of Open Images V4 will foster further research and innovation even beyond the areas of image classification, object detection, and visual relationship detection.
[ { "created": "Fri, 2 Nov 2018 16:58:28 GMT", "version": "v1" }, { "created": "Fri, 21 Feb 2020 15:15:33 GMT", "version": "v2" } ]
"2020-03-26T00:00:00"
[ [ "Kuznetsova", "Alina", "" ], [ "Rom", "Hassan", "" ], [ "Alldrin", "Neil", "" ], [ "Uijlings", "Jasper", "" ], [ "Krasin", "Ivan", "" ], [ "Pont-Tuset", "Jordi", "" ], [ "Kamali", "Shahab", "" ], [ "Popov", "Stefan", "" ], [ "Malloci", "Matteo", "" ], [ "Kolesnikov", "Alexander", "" ], [ "Duerig", "Tom", "" ], [ "Ferrari", "Vittorio", "" ] ]
1new_dataset
1907.03548
Wenguang Yuan
Wenguang Yuan, Jia Wei, Jiabing Wang, Qianli Ma, Tolga Tasdizen
Unified Attentional Generative Adversarial Network for Brain Tumor Segmentation From Multimodal Unpaired Images
9 pages, 4 figures, Accepted by MICCAI2019
null
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In medical applications, the same anatomical structures may be observed in multiple modalities despite the different image characteristics. Currently, most deep models for multimodal segmentation rely on paired registered images. However, multimodal paired registered images are difficult to obtain in many cases. Therefore, developing a model that can segment the target objects from different modalities with unpaired images is significant for many clinical applications. In this work, we propose a novel two-stream translation and segmentation unified attentional generative adversarial network (UAGAN), which can perform any-to-any image modality translation and segment the target objects simultaneously in the case where two or more modalities are available. The translation stream is used to capture modality-invariant features of the target anatomical structures. In addition, to focus on segmentation-related features, we add attentional blocks to extract valuable features from the translation stream. Experiments on three-modality brain tumor segmentation indicate that UAGAN outperforms the existing methods in most cases.
[ { "created": "Mon, 8 Jul 2019 12:12:59 GMT", "version": "v1" } ]
"2019-07-09T00:00:00"
[ [ "Yuan", "Wenguang", "" ], [ "Wei", "Jia", "" ], [ "Wang", "Jiabing", "" ], [ "Ma", "Qianli", "" ], [ "Tasdizen", "Tolga", "" ] ]
0no_new_dataset
2311.08252
Zhenyu He
Zhenyu He, Zexuan Zhong, Tianle Cai, Jason D. Lee, and Di He
REST: Retrieval-Based Speculative Decoding
NAACL 2024, camera ready
null
null
null
cs.CL cs.AI cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce Retrieval-Based Speculative Decoding (REST), a novel algorithm designed to speed up language model generation. The key insight driving the development of REST is the observation that the process of text generation often includes certain common phases and patterns. Unlike previous methods that rely on a draft language model for speculative decoding, REST harnesses the power of retrieval to generate draft tokens. This method draws from the reservoir of existing knowledge, retrieving and employing relevant tokens based on the current context. Its plug-and-play nature allows for seamless integration and acceleration of any language models, all without necessitating additional training. When benchmarked on 7B and 13B language models in a single-batch setting, REST achieves a significant speedup of 1.62X to 2.36X on code or text generation. The code of REST is available at https://github.com/FasterDecoding/REST.
[ { "created": "Tue, 14 Nov 2023 15:43:47 GMT", "version": "v1" }, { "created": "Thu, 4 Apr 2024 11:37:01 GMT", "version": "v2" } ]
"2024-04-05T00:00:00"
[ [ "He", "Zhenyu", "" ], [ "Zhong", "Zexuan", "" ], [ "Cai", "Tianle", "" ], [ "Lee", "Jason D.", "" ], [ "He", "Di", "" ] ]
0no_new_dataset
2205.11134
Yves Bestgen
Yves Bestgen
Please, Don't Forget the Difference and the Confidence Interval when Seeking for the State-of-the-Art Status
Accepted at LREC 2022
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper argues for the widest possible use of bootstrap confidence intervals for comparing NLP system performances instead of the state-of-the-art status (SOTA) and statistical significance testing. Their main benefits are to draw attention to the difference in performance between two systems and to help assessing the degree of superiority of one system over another. Two cases studies, one comparing several systems and the other based on a K-fold cross-validation procedure, illustrate these benefits. A python module for obtaining these confidence intervals as well as a second function implementing the Fisher-Pitman test for paired samples are freely available on PyPi.
[ { "created": "Mon, 23 May 2022 08:42:17 GMT", "version": "v1" } ]
"2022-05-24T00:00:00"
[ [ "Bestgen", "Yves", "" ] ]
0no_new_dataset
2003.01090
Ahmadreza Jeddi
Ahmadreza Jeddi, Mohammad Javad Shafiee, Michelle Karg, Christian Scharfenberger and Alexander Wong
Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve Adversarial Robustness
13 pages, 6 figures To be published in proceedings of IEEE conference on Computer Vision and Pattern Recognition (CVPR 2020)
null
null
null
cs.CV cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While deep neural networks have been achieving state-of-the-art performance across a wide variety of applications, their vulnerability to adversarial attacks limits their widespread deployment for safety-critical applications. Alongside other adversarial defense approaches being investigated, there has been a very recent interest in improving adversarial robustness in deep neural networks through the introduction of perturbations during the training process. However, such methods leverage fixed, pre-defined perturbations and require significant hyper-parameter tuning that makes them very difficult to leverage in a general fashion. In this study, we introduce Learn2Perturb, an end-to-end feature perturbation learning approach for improving the adversarial robustness of deep neural networks. More specifically, we introduce novel perturbation-injection modules that are incorporated at each layer to perturb the feature space and increase uncertainty in the network. This feature perturbation is performed at both the training and the inference stages. Furthermore, inspired by the Expectation-Maximization, an alternating back-propagation training algorithm is introduced to train the network and noise parameters consecutively. Experimental results on CIFAR-10 and CIFAR-100 datasets show that the proposed Learn2Perturb method can result in deep neural networks which are $4-7\%$ more robust on $l_{\infty}$ FGSM and PDG adversarial attacks and significantly outperforms the state-of-the-art against $l_2$ $C\&W$ attack and a wide range of well-known black-box attacks.
[ { "created": "Mon, 2 Mar 2020 18:27:35 GMT", "version": "v1" }, { "created": "Tue, 3 Mar 2020 16:51:46 GMT", "version": "v2" } ]
"2020-03-04T00:00:00"
[ [ "Jeddi", "Ahmadreza", "" ], [ "Shafiee", "Mohammad Javad", "" ], [ "Karg", "Michelle", "" ], [ "Scharfenberger", "Christian", "" ], [ "Wong", "Alexander", "" ] ]
0no_new_dataset
2112.13751
Tamalika Mukherjee
Jeremiah Blocki, Elena Grigorescu, Tamalika Mukherjee
Differentially-Private Sublinear-Time Clustering
null
null
null
null
cs.LG cs.CR
http://creativecommons.org/licenses/by/4.0/
Clustering is an essential primitive in unsupervised machine learning. We bring forth the problem of sublinear-time differentially-private clustering as a natural and well-motivated direction of research. We combine the $k$-means and $k$-median sublinear-time results of Mishra et al. (SODA, 2001) and of Czumaj and Sohler (Rand. Struct. and Algorithms, 2007) with recent results on private clustering of Balcan et al. (ICML 2017), Gupta et al. (SODA, 2010) and Ghazi et al. (NeurIPS, 2020) to obtain sublinear-time private $k$-means and $k$-median algorithms via subsampling. We also investigate the privacy benefits of subsampling for group privacy.
[ { "created": "Mon, 27 Dec 2021 16:01:30 GMT", "version": "v1" } ]
"2021-12-28T00:00:00"
[ [ "Blocki", "Jeremiah", "" ], [ "Grigorescu", "Elena", "" ], [ "Mukherjee", "Tamalika", "" ] ]
0no_new_dataset
2009.00365
Ievgen Redko
Charlotte Laclau, Franck Iutzeler, Ievgen Redko
Rank-one partitioning: formalization, illustrative examples, and a new cluster enhancing strategy
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce and formalize a rank-one partitioning learning paradigm that unifies partitioning methods that proceed by summarizing a data set using a single vector that is further used to derive the final clustering partition. Using this unification as a starting point, we propose a novel algorithmic solution for the partitioning problem based on rank-one matrix factorization and denoising of piecewise constant signals. Finally, we propose an empirical demonstration of our findings and demonstrate the robustness of the proposed denoising step. We believe that our work provides a new point of view for several unsupervised learning techniques that helps to gain a deeper understanding about the general mechanisms of data partitioning.
[ { "created": "Tue, 1 Sep 2020 11:37:28 GMT", "version": "v1" } ]
"2020-09-02T00:00:00"
[ [ "Laclau", "Charlotte", "" ], [ "Iutzeler", "Franck", "" ], [ "Redko", "Ievgen", "" ] ]
1new_dataset
2011.11961
Zhanghan Ke
Zhanghan Ke, Jiayu Sun, Kaican Li, Qiong Yan, Rynson W.H. Lau
MODNet: Real-Time Trimap-Free Portrait Matting via Objective Decomposition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing portrait matting methods either require auxiliary inputs that are costly to obtain or involve multiple stages that are computationally expensive, making them less suitable for real-time applications. In this work, we present a light-weight matting objective decomposition network (MODNet) for portrait matting in real-time with a single input image. The key idea behind our efficient design is by optimizing a series of sub-objectives simultaneously via explicit constraints. In addition, MODNet includes two novel techniques for improving model efficiency and robustness. First, an Efficient Atrous Spatial Pyramid Pooling (e-ASPP) module is introduced to fuse multi-scale features for semantic estimation. Second, a self-supervised sub-objectives consistency (SOC) strategy is proposed to adapt MODNet to real-world data to address the domain shift problem common to trimap-free methods. MODNet is easy to be trained in an end-to-end manner. It is much faster than contemporaneous methods and runs at 67 frames per second on a 1080Ti GPU. Experiments show that MODNet outperforms prior trimap-free methods by a large margin on both Adobe Matting Dataset and a carefully designed photographic portrait matting (PPM-100) benchmark proposed by us. Further, MODNet achieves remarkable results on daily photos and videos. Our code and models are available at https://github.com/ZHKKKe/MODNet, and the PPM-100 benchmark is released at https://github.com/ZHKKKe/PPM.
[ { "created": "Tue, 24 Nov 2020 08:38:36 GMT", "version": "v1" }, { "created": "Sun, 29 Nov 2020 03:27:58 GMT", "version": "v2" }, { "created": "Thu, 27 Jan 2022 09:17:31 GMT", "version": "v3" }, { "created": "Fri, 18 Mar 2022 04:49:53 GMT", "version": "v4" } ]
"2022-03-21T00:00:00"
[ [ "Ke", "Zhanghan", "" ], [ "Sun", "Jiayu", "" ], [ "Li", "Kaican", "" ], [ "Yan", "Qiong", "" ], [ "Lau", "Rynson W. H.", "" ] ]
0no_new_dataset
1301.6692
Didier Dubois
Didier Dubois, Michel Grabisch, Henri Prade, Philippe Smets
Assessing the value of a candidate. Comparing belief function and possibility theories
Appears in Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence (UAI1999)
null
null
UAI-P-1999-PG-170-177
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of assessing the value of a candidate is viewed here as a multiple combination problem. On the one hand a candidate can be evaluated according to different criteria, and on the other hand several experts are supposed to assess the value of candidates according to each criterion. Criteria are not equally important, experts are not equally competent or reliable. Moreover levels of satisfaction of criteria, or levels of confidence are only assumed to take their values in qualitative scales which are just linearly ordered. The problem is discussed within two frameworks, the transferable belief model and the qualitative possibility theory. They respectively offer a quantitative and a qualitative setting for handling the problem, providing thus a way to compare the nature of the underlying assumptions.
[ { "created": "Wed, 23 Jan 2013 15:57:47 GMT", "version": "v1" } ]
"2013-01-30T00:00:00"
[ [ "Dubois", "Didier", "" ], [ "Grabisch", "Michel", "" ], [ "Prade", "Henri", "" ], [ "Smets", "Philippe", "" ] ]
0no_new_dataset
1610.06984
Joao Marques-Silva
Lu\'is Cruz-Filipe and Joao Marques-Silva and Peter Schneider-Kamp
Efficient Certified Resolution Proof Checking
null
null
10.1007/978-3-662-54577-5_7
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel propositional proof tracing format that eliminates complex processing, thus enabling efficient (formal) proof checking. The benefits of this format are demonstrated by implementing a proof checker in C, which outperforms a state-of-the-art checker by two orders of magnitude. We then formalize the theory underlying propositional proof checking in Coq, and extract a correct-by-construction proof checker for our format from the formalization. An empirical evaluation using 280 unsatisfiable instances from the 2015 and 2016 SAT competitions shows that this certified checker usually performs comparably to a state-of-the-art non-certified proof checker. Using this format, we formally verify the recent 200 TB proof of the Boolean Pythagorean Triples conjecture.
[ { "created": "Sat, 22 Oct 2016 01:43:43 GMT", "version": "v1" }, { "created": "Sat, 29 Oct 2016 16:23:56 GMT", "version": "v2" } ]
"2017-08-09T00:00:00"
[ [ "Cruz-Filipe", "Luís", "" ], [ "Marques-Silva", "Joao", "" ], [ "Schneider-Kamp", "Peter", "" ] ]
0no_new_dataset
2105.12210
George Philipp
George Philipp
The Nonlinearity Coefficient - A Practical Guide to Neural Architecture Design
This work is based on the PhD thesis with the same name, author, year and institution. Both works may be cited interchangeably
null
null
null
cs.LG cs.CV cs.NE
http://creativecommons.org/licenses/by/4.0/
In essence, a neural network is an arbitrary differentiable, parametrized function. Choosing a neural network architecture for any task is as complex as searching the space of those functions. For the last few years, 'neural architecture design' has been largely synonymous with 'neural architecture search' (NAS), i.e. brute-force, large-scale search. NAS has yielded significant gains on practical tasks. However, NAS methods end up searching for a local optimum in architecture space in a small neighborhood around architectures that often go back decades, based on CNN or LSTM. In this work, we present a different and complementary approach to architecture design, which we term 'zero-shot architecture design' (ZSAD). We develop methods that can predict, without any training, whether an architecture will achieve a relatively high test or training error on a task after training. We then go on to explain the error in terms of the architecture definition itself and develop tools for modifying the architecture based on this explanation. This confers an unprecedented level of control on the deep learning practitioner. They can make informed design decisions before the first line of code is written, even for tasks for which no prior art exists. Our first major contribution is to show that the 'degree of nonlinearity' of a neural architecture is a key causal driver behind its performance, and a primary aspect of the architecture's model complexity. We introduce the 'nonlinearity coefficient' (NLC), a scalar metric for measuring nonlinearity. Via extensive empirical study, we show that the value of the NLC in the architecture's randomly initialized state before training is a powerful predictor of test error after training and that attaining a right-sized NLC is essential for attaining an optimal test error. The NLC is also conceptually simple, well-defined for any feedforward network, easy and cheap to compute, has extensive theoretical, empirical and conceptual grounding, follows instructively from the architecture definition, and can be easily controlled via our 'nonlinearity normalization' algorithm. We argue that the NLC is the most powerful scalar statistic for architecture design specifically and neural network analysis in general. Our analysis is fueled by mean field theory, which we use to uncover the 'meta-distribution' of layers. Beyond the NLC, we uncover and flesh out a range of metrics and properties that have a significant explanatory influence on test and training error. We go on to explain the majority of the error variation across a wide range of randomly generated architectures with these metrics and properties. We compile our insights into a practical guide for architecture designers, which we argue can significantly shorten the trial-and-error phase of deep learning deployment. Our results are grounded in an experimental protocol that exceeds that of the vast majority of other deep learning studies in terms of carefulness and rigor. We study the impact of e.g. dataset, learning rate, floating-point precision, loss function, statistical estimation error and batch inter-dependency on performance and other key properties. We promote research practices that we believe can significantly accelerate progress in architecture design research.
[ { "created": "Tue, 25 May 2021 20:47:43 GMT", "version": "v1" } ]
"2021-06-01T00:00:00"
[ [ "Philipp", "George", "" ] ]
0no_new_dataset
2108.13637
Haoyin Xu
Haoyin Xu, Kaleab A. Kinfu, Will LeVine, Sambit Panda, Jayanta Dey, Michael Ainsworth, Yu-Chung Peng, Madi Kusmanov, Florian Engert, Christopher M. White, Joshua T. Vogelstein, Carey E. Priebe
When are Deep Networks really better than Decision Forests at small sample sizes, and how?
null
null
null
null
cs.LG cs.AI q-bio.NC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep networks and decision forests (such as random forests and gradient boosted trees) are the leading machine learning methods for structured and tabular data, respectively. Many papers have empirically compared large numbers of classifiers on one or two different domains (e.g., on 100 different tabular data settings). However, a careful conceptual and empirical comparison of these two strategies using the most contemporary best practices has yet to be performed. Conceptually, we illustrate that both can be profitably viewed as "partition and vote" schemes. Specifically, the representation space that they both learn is a partitioning of feature space into a union of convex polytopes. For inference, each decides on the basis of votes from the activated nodes. This formulation allows for a unified basic understanding of the relationship between these methods. Empirically, we compare these two strategies on hundreds of tabular data settings, as well as several vision and auditory settings. Our focus is on datasets with at most 10,000 samples, which represent a large fraction of scientific and biomedical datasets. In general, we found forests to excel at tabular and structured data (vision and audition) with small sample sizes, whereas deep nets performed better on structured data with larger sample sizes. This suggests that further gains in both scenarios may be realized via further combining aspects of forests and networks. We will continue revising this technical report in the coming months with updated results.
[ { "created": "Tue, 31 Aug 2021 06:33:17 GMT", "version": "v1" }, { "created": "Tue, 28 Sep 2021 18:44:50 GMT", "version": "v2" }, { "created": "Tue, 5 Oct 2021 17:01:07 GMT", "version": "v3" }, { "created": "Tue, 2 Nov 2021 21:40:52 GMT", "version": "v4" } ]
"2021-11-04T00:00:00"
[ [ "Xu", "Haoyin", "" ], [ "Kinfu", "Kaleab A.", "" ], [ "LeVine", "Will", "" ], [ "Panda", "Sambit", "" ], [ "Dey", "Jayanta", "" ], [ "Ainsworth", "Michael", "" ], [ "Peng", "Yu-Chung", "" ], [ "Kusmanov", "Madi", "" ], [ "Engert", "Florian", "" ], [ "White", "Christopher M.", "" ], [ "Vogelstein", "Joshua T.", "" ], [ "Priebe", "Carey E.", "" ] ]
0no_new_dataset
cs/0608054
Luis Rademacher
Luis Rademacher, Santosh Vempala
Dispersion of Mass and the Complexity of Randomized Geometric Algorithms
Full version of L. Rademacher, S. Vempala: Dispersion of Mass and the Complexity of Randomized Geometric Algorithms. Proc. 47th IEEE Annual Symp. on Found. of Comp. Sci. (2006). A version of it to appear in Advances in Mathematics
null
null
null
cs.CC cs.CG cs.DS math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How much can randomness help computation? Motivated by this general question and by volume computation, one of the few instances where randomness provably helps, we analyze a notion of dispersion and connect it to asymptotic convex geometry. We obtain a nearly quadratic lower bound on the complexity of randomized volume algorithms for convex bodies in R^n (the current best algorithm has complexity roughly n^4, conjectured to be n^3). Our main tools, dispersion of random determinants and dispersion of the length of a random point from a convex body, are of independent interest and applicable more generally; in particular, the latter is closely related to the variance hypothesis from convex geometry. This geometric dispersion also leads to lower bounds for matrix problems and property testing.
[ { "created": "Sat, 12 Aug 2006 23:31:07 GMT", "version": "v1" }, { "created": "Tue, 17 Jun 2008 19:14:43 GMT", "version": "v2" } ]
"2008-06-17T00:00:00"
[ [ "Rademacher", "Luis", "" ], [ "Vempala", "Santosh", "" ] ]
0no_new_dataset
1705.08464
Linqi Song
Linqi Song, Sundara Rajan Srinivasavaradhan, Christina Fragouli
The Benefit of Being Flexible in Distributed Computation
Published in ITW, 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless distributed computing, networked nodes perform intermediate computations over data placed in their memory and exchange these intermediate values to calculate function values. In this paper we consider an asymmetric setting where each node has access to a random subset of the data, i.e., we cannot control the data placement. The paper makes a simple point: we can realize significant benefits if we are allowed to be "flexible", and decide which node computes which function, in our system. We make this argument in the case where each function depends on only two of the data messages, as is the case in similarity searches. We establish a percolation in the behavior of the system, where, depending on the amount of observed data, by being flexible, we may need no communication at all.
[ { "created": "Tue, 23 May 2017 18:24:43 GMT", "version": "v1" }, { "created": "Tue, 8 Aug 2017 18:05:16 GMT", "version": "v2" } ]
"2017-08-10T00:00:00"
[ [ "Song", "Linqi", "" ], [ "Srinivasavaradhan", "Sundara Rajan", "" ], [ "Fragouli", "Christina", "" ] ]
0no_new_dataset
1404.0588
David Adjiashvili
David Adjiashvili and Noy Rotbart
Labeling Schemes for Bounded Degree Graphs
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate adjacency labeling schemes for graphs of bounded degree $\Delta = O(1)$. In particular, we present an optimal (up to an additive constant) $\log n + O(1)$ adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 10], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 02]. We also provide improved labeling schemes for bounded degree planar graphs. Finally, we use combinatorial number systems and present an improved adjacency labeling schemes for graphs of bounded degree $\Delta$ with $(e+1)\sqrt{n} < \Delta \leq n/5$.
[ { "created": "Wed, 2 Apr 2014 15:34:57 GMT", "version": "v1" } ]
"2014-04-03T00:00:00"
[ [ "Adjiashvili", "David", "" ], [ "Rotbart", "Noy", "" ] ]
0no_new_dataset
2012.01461
Jihua Huang
Jihua Huang, Amir Tamrakar
ACE-Net: Fine-Level Face Alignment through Anchors and Contours Estimation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel facial Anchors and Contours Estimation framework, ACE-Net, for fine-level face alignment tasks. ACE-Net predicts facial anchors and contours that are richer than traditional facial landmarks while overcoming ambiguities and inconsistencies in their definitions. We introduce a weakly supervised loss enabling ACE-Net to learn from existing facial landmarks datasets without the need for reannotation. Instead, synthetic data, from which GT contours can be easily obtained, is used during training to bridge the density gap between landmarks and true facial contours. We evaluate the face alignment accuracy of ACE-Net with respect to the HELEN dataset which has 194 annotated facial landmarks, while it is trained with only 68 or 36 landmarks from the 300-W dataset. We show that ACE-Net generated contours are better than contours interpolated straight from the 68 GT landmarks and ACE-Net also outperforms models trained only with full supervision from GT landmarks-based contours.
[ { "created": "Wed, 2 Dec 2020 19:04:12 GMT", "version": "v1" }, { "created": "Sun, 9 Jan 2022 07:40:21 GMT", "version": "v2" } ]
"2022-01-11T00:00:00"
[ [ "Huang", "Jihua", "" ], [ "Tamrakar", "Amir", "" ] ]
0no_new_dataset
1906.08819
Batuhan Hangun
Batuhan Hang\"un and \"Onder Eyecio\u{g}lu
Performance Comparison Between OpenCV Built in CPU and GPU Functions on Image Processing Operations
Image Processing, CUDA, Parallel Processing, OpenCV, GPU
International Journal of Engineering Science and Application 1, 2 (2017), 34-41
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
Image Processing is a specialized area of Digital Signal Processing which contains various mathematical and algebraic operations such as matrix inversion, transpose of matrix, derivative, convolution, Fourier Transform etc. Operations like those require higher computational capabilities than daily usage purposes of computers. At that point, with increased image sizes and more complex operations, CPUs may be unsatisfactory since they use Serial Processing by default. GPUs are the solution that come up with greater speed compared to CPUs because of their Parallel Processing/Computation nature. A parallel computing platform and programming model named CUDA was created by NVIDIA and implemented by the graphics processing units (GPUs) which were produced by them. In this paper, computing performance of some commonly used Image Processing operations will be compared on OpenCV's built in CPU and GPU functions that use CUDA.
[ { "created": "Thu, 20 Jun 2019 19:38:13 GMT", "version": "v1" } ]
"2019-06-24T00:00:00"
[ [ "Hangün", "Batuhan", "" ], [ "Eyecioğlu", "Önder", "" ] ]
0no_new_dataset
2106.06755
Dishant Goyal
Dishant Goyal and Ragesh Jaiswal
Tight FPT Approximation for Socially Fair Clustering
The new version gives tight approximation results. However, the old version uses techniques that work in the streaming setting albeit at the cost of weaker approximation guarantees. So, readers interested in the streaming setting may want to see the older version
null
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we study the socially fair $k$-median/$k$-means problem. We are given a set of points $P$ in a metric space $\mathcal{X}$ with a distance function $d(.,.)$. There are $\ell$ groups: $P_1,\dotsc,P_{\ell} \subseteq P$. We are also given a set $F$ of feasible centers in $\mathcal{X}$. The goal in the socially fair $k$-median problem is to find a set $C \subseteq F$ of $k$ centers that minimizes the maximum average cost over all the groups. That is, find $C$ that minimizes the objective function $\Phi(C,P) \equiv \max_{j} \Big\{ \sum_{x \in P_j} d(C,x)/|P_j| \Big\}$, where $d(C,x)$ is the distance of $x$ to the closest center in $C$. The socially fair $k$-means problem is defined similarly by using squared distances, i.e., $d^{2}(.,.)$ instead of $d(.,.)$. The current best approximation guarantee for both the problems is $O\left( \frac{\log \ell}{\log \log \ell} \right)$ due to Makarychev and Vakilian [COLT 2021]. In this work, we study the fixed parameter tractability of the problems with respect to parameter $k$. We design $(3+\varepsilon)$ and $(9 + \varepsilon)$ approximation algorithms for the socially fair $k$-median and $k$-means problems, respectively, in FPT (fixed parameter tractable) time $f(k,\varepsilon) \cdot n^{O(1)}$, where $f(k,\varepsilon) = (k/\varepsilon)^{{O}(k)}$ and $n = |P \cup F|$. Furthermore, we show that if Gap-ETH holds, then better approximation guarantees are not possible in FPT time.
[ { "created": "Sat, 12 Jun 2021 11:53:18 GMT", "version": "v1" }, { "created": "Mon, 13 Sep 2021 15:55:26 GMT", "version": "v2" } ]
"2021-09-14T00:00:00"
[ [ "Goyal", "Dishant", "" ], [ "Jaiswal", "Ragesh", "" ] ]
0no_new_dataset
2404.00047
Amparo G\"uemes
Amparo Guemes Gonzalez, Tiago da Silva Costa, Tamar Makin
Guidelines for Public and Patient Involvement in Neurotechnology in the United Kingdom
null
null
null
null
cs.HC cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
Neurotechnologies are increasingly becoming integrated in our everyday lives, our bodies and minds. As the popularity and impact of neurotech grows, so does our responsibility to ensure we understand its particular ethical and societal implications. Enabling end-users and other stakeholders to participate in the development of neurotechnology, even at its earliest stages of conception, will help us better navigate our design around these serious considerations, and deliver more impactful technologies. There are many different terms and frameworks to articulate the concept of involving end users in the technology development lifecycle: 'Public and Patient Involvement and Engagement' (PPIE), 'lived experience', 'co-design', 'co-production'. What is lacking are clear guidelines for implementing a robust PPIE process in neurotechnology. While general advice is available online, it is down to individuals (and their funders) to carve up their own approach to meaningful involvement. Here we present guidance for UK-based researchers and engineers to conduct PPI for neurotechnology. The overall aim is the establishment of gold-standard PPIE methodologies in the neurotechnology space that bring patient and public insights at the forefront of our scientific inquiry and product development.
[ { "created": "Mon, 25 Mar 2024 09:43:20 GMT", "version": "v1" } ]
"2024-04-02T00:00:00"
[ [ "Gonzalez", "Amparo Guemes", "" ], [ "Costa", "Tiago da Silva", "" ], [ "Makin", "Tamar", "" ] ]
0no_new_dataset
2405.14616
James Yiming Zhang
Shiyu Wang, Haixu Wu, Xiaoming Shi, Tengge Hu, Huakun Luo, Lintao Ma, James Y. Zhang, Jun Zhou
TimeMixer: Decomposable Multiscale Mixing for Time Series Forecasting
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
Time series forecasting is widely used in extensive applications, such as traffic planning and weather forecasting. However, real-world time series usually present intricate temporal variations, making forecasting extremely challenging. Going beyond the mainstream paradigms of plain decomposition and multiperiodicity analysis, we analyze temporal variations in a novel view of multiscale-mixing, which is based on an intuitive but important observation that time series present distinct patterns in different sampling scales. The microscopic and the macroscopic information are reflected in fine and coarse scales respectively, and thereby complex variations can be inherently disentangled. Based on this observation, we propose TimeMixer as a fully MLP-based architecture with Past-Decomposable-Mixing (PDM) and Future-Multipredictor-Mixing (FMM) blocks to take full advantage of disentangled multiscale series in both past extraction and future prediction phases. Concretely, PDM applies the decomposition to multiscale series and further mixes the decomposed seasonal and trend components in fine-to-coarse and coarse-to-fine directions separately, which successively aggregates the microscopic seasonal and macroscopic trend information. FMM further ensembles multiple predictors to utilize complementary forecasting capabilities in multiscale observations. Consequently, TimeMixer is able to achieve consistent state-of-the-art performances in both long-term and short-term forecasting tasks with favorable run-time efficiency.
[ { "created": "Thu, 23 May 2024 14:27:07 GMT", "version": "v1" } ]
"2024-05-24T00:00:00"
[ [ "Wang", "Shiyu", "" ], [ "Wu", "Haixu", "" ], [ "Shi", "Xiaoming", "" ], [ "Hu", "Tengge", "" ], [ "Luo", "Huakun", "" ], [ "Ma", "Lintao", "" ], [ "Zhang", "James Y.", "" ], [ "Zhou", "Jun", "" ] ]
0no_new_dataset
2311.07044
Liangchen Li
Liangchen Li, Juyong Zhang
$L_0$-Sampler: An $L_{0}$ Model Guided Volume Sampling for NeRF
Project page: https://ustc3dv.github.io/L0-Sampler/
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since being proposed, Neural Radiance Fields (NeRF) have achieved great success in related tasks, mainly adopting the hierarchical volume sampling (HVS) strategy for volume rendering. However, the HVS of NeRF approximates distributions using piecewise constant functions, which provides a relatively rough estimation. Based on the observation that a well-trained weight function $w(t)$ and the $L_0$ distance between points and the surface have very high similarity, we propose $L_0$-Sampler by incorporating the $L_0$ model into $w(t)$ to guide the sampling process. Specifically, we propose to use piecewise exponential functions rather than piecewise constant functions for interpolation, which can not only approximate quasi-$L_0$ weight distributions along rays quite well but also can be easily implemented with few lines of code without additional computational burden. Stable performance improvements can be achieved by applying $L_0$-Sampler to NeRF and its related tasks like 3D reconstruction. Code is available at https://ustc3dv.github.io/L0-Sampler/ .
[ { "created": "Mon, 13 Nov 2023 03:05:16 GMT", "version": "v1" } ]
"2023-11-14T00:00:00"
[ [ "Li", "Liangchen", "" ], [ "Zhang", "Juyong", "" ] ]
0no_new_dataset
1610.03474
Brandon Fain
Brandon Fain, Ashish Goel, Kamesh Munagala
The Core of the Participatory Budgeting Problem
null
null
null
null
cs.GT cs.CY cs.DS cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In participatory budgeting, communities collectively decide on the allocation of public tax dollars for local public projects. In this work, we consider the question of fairly aggregating the preferences of community members to determine an allocation of funds to projects. This problem is different from standard fair resource allocation because of public goods: The allocated goods benefit all users simultaneously. Fairness is crucial in participatory decision making, since generating equitable outcomes is an important goal of these processes. We argue that the classic game theoretic notion of core captures fairness in the setting. To compute the core, we first develop a novel characterization of a public goods market equilibrium called the Lindahl equilibrium, which is always a core solution. We then provide the first (to our knowledge) polynomial time algorithm for computing such an equilibrium for a broad set of utility functions; our algorithm also generalizes (in a non-trivial way) the well-known concept of proportional fairness. We use our theoretical insights to perform experiments on real participatory budgeting voting data. We empirically show that the core can be efficiently computed for utility functions that naturally model our practical setting, and examine the relation of the core with the familiar welfare objective. Finally, we address concerns of incentives and mechanism design by developing a randomized approximately dominant-strategy truthful mechanism building on the exponential mechanism from differential privacy.
[ { "created": "Tue, 11 Oct 2016 19:37:05 GMT", "version": "v1" }, { "created": "Fri, 14 Oct 2016 13:30:38 GMT", "version": "v2" } ]
"2016-10-17T00:00:00"
[ [ "Fain", "Brandon", "" ], [ "Goel", "Ashish", "" ], [ "Munagala", "Kamesh", "" ] ]
0no_new_dataset
2201.01105
\'Angel Gim\'enez
Angel Gim\'enez, Miguel A. Murcia, Jos\'e M. Amig\'o, Oscar Mart\'inez-Bonastre, Jos\'e Valero
New RED-type TCP-AQM algorithms based on beta distribution drop functions
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, Active Queue Management (AQM) mechanisms to improve the performance of TCP/IP networks have acquired a relevant role. In this paper we present a simple and robust RED-type algorithm together with a couple of dynamical variants with the ability to adapt to the specific characteristics of different network environments, as well as to the user needs. We first present a basic version called Beta RED (BetaRED), where the user is free to adjust the parameters according to the network conditions. The aim is to make the parameter setting easy and intuitive so that a good performance is obtained over a wide range of parameters. Secondly, BetaRED is used as a framework to design two dynamic algorithms, which we will call Adaptive Beta RED (ABetaRED) and Dynamic Beta RED (DBetaRED). In those new algorithms certain parameters are dynamically adjusted so that the queue length remains stable around a predetermined reference value and according to changing network traffic conditions. Finally, we present a battery of simulations using the Network Simulator 3 (ns-3) software with a two-fold objective: to guide the user on how to adjust the parameters of the BetaRED mechanism, and to show a performance comparison of ABetaRED and DBetaRED with other representative algorithms that pursue a similar objective.
[ { "created": "Tue, 4 Jan 2022 12:14:42 GMT", "version": "v1" }, { "created": "Wed, 1 Jun 2022 04:29:36 GMT", "version": "v2" }, { "created": "Thu, 22 Sep 2022 20:46:30 GMT", "version": "v3" } ]
"2022-09-26T00:00:00"
[ [ "Giménez", "Angel", "" ], [ "Murcia", "Miguel A.", "" ], [ "Amigó", "José M.", "" ], [ "Martínez-Bonastre", "Oscar", "" ], [ "Valero", "José", "" ] ]
0no_new_dataset
1904.07605
Bob Briscoe
Bob Briscoe and Koen De Schepper
Resolving Tensions between Congestion Control Scaling Requirements
Simula Research Lab Technical Report
null
null
TR-CS-2016-001
cs.NI cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low Latency, Low Loss Scalable throughput (L4S) is being proposed as the new default Internet service. L4S can be considered as an `incrementally deployable clean-slate' for new Internet flow-rate control mechanisms. Because, for a brief period, researchers are free to develop host and network mechanisms in tandem, somewhat unconstrained by any pre-existing legacy. Scaling requirements represent the main constraints on a clean-slate design space. This document confines its scope to the steady state. It aims to resolve the tensions between a number of apparently conflicting scalability requirements for L4S congestion controllers. It has been produced to inform and provide structure to the debate as researchers work towards pre-standardization consensus on this issue. This work is important, because clean-slate opportunities like this arise only rarely and will only be available briefly---for roughly one year. The decisions we make now will tend to dirty the slate again, probably for many decades.
[ { "created": "Tue, 16 Apr 2019 11:37:26 GMT", "version": "v1" } ]
"2019-04-17T00:00:00"
[ [ "Briscoe", "Bob", "" ], [ "De Schepper", "Koen", "" ] ]
0no_new_dataset
1811.04322
Mohammad Fereydounian
Mohammad Fereydounian, Hamed Hassani, Mohammad Vahid Jamali, Hessam Mahdavifar
Channel Coding at Low Capacity
52 pages
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
Low-capacity scenarios have become increasingly important in the technology of the Internet of Things (IoT) and the next generation of wireless networks. Such scenarios require efficient and reliable transmission over channels with an extremely small capacity. Within these constraints, the state-of-the-art coding techniques may not be directly applicable. Moreover, the prior work on the finite-length analysis of optimal channel coding provides inaccurate predictions of the limits in the low-capacity regime. In this paper, we study channel coding at low capacity from two perspectives: fundamental limits at finite length and code constructions. We first specify what a low-capacity regime means. We then characterize finite-length fundamental limits of channel coding in the low-capacity regime for various types of channels, including binary erasure channels (BECs), binary symmetric channels (BSCs), and additive white Gaussian noise (AWGN) channels. From the code construction perspective, we characterize the optimal number of repetitions for transmission over binary memoryless symmetric (BMS) channels, in terms of the code blocklength and the underlying channel capacity, such that the capacity loss due to the repetition is negligible. Furthermore, it is shown that capacity-achieving polar codes naturally adopt the aforementioned optimal number of repetitions.
[ { "created": "Sat, 10 Nov 2018 22:52:59 GMT", "version": "v1" }, { "created": "Wed, 18 Mar 2020 21:38:35 GMT", "version": "v2" }, { "created": "Sat, 4 Feb 2023 11:04:54 GMT", "version": "v3" } ]
"2023-02-07T00:00:00"
[ [ "Fereydounian", "Mohammad", "" ], [ "Hassani", "Hamed", "" ], [ "Jamali", "Mohammad Vahid", "" ], [ "Mahdavifar", "Hessam", "" ] ]
0no_new_dataset
1210.8025
Ka Chun Lam
Lok Ming Lui, Ka Chun Lam, Tsz Wai Wong, XianFeng Gu
Beltrami Representation and its applications to texture map and video compression
30 pages, 23 figures
null
null
null
cs.MM cs.GR math.DG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Surface parameterizations and registrations are important in computer graphics and imaging, where 1-1 correspondences between meshes are computed. In practice, surface maps are usually represented and stored as 3D coordinates each vertex is mapped to, which often requires lots of storage memory. This causes inconvenience in data transmission and data storage. To tackle this problem, we propose an effective algorithm for compressing surface homeomorphisms using Fourier approximation of the Beltrami representation. The Beltrami representation is a complex-valued function defined on triangular faces of the surface mesh with supreme norm strictly less than 1. Under suitable normalization, there is a 1-1 correspondence between the set of surface homeomorphisms and the set of Beltrami representations. Hence, every bijective surface map is associated with a unique Beltrami representation. Conversely, given a Beltrami representation, the corresponding bijective surface map can be exactly reconstructed using the Linear Beltrami Solver introduced in this paper. Using the Beltrami representation, the surface homeomorphism can be easily compressed by Fourier approximation, without distorting the bijectivity of the map. The storage memory can be effectively reduced, which is useful for many practical problems in computer graphics and imaging. In this paper, we proposed to apply the algorithm to texture map compression and video compression. With our proposed algorithm, the storage requirement for the texture properties of a textured surface can be significantly reduced. Our algorithm can further be applied to compressing motion vector fields for video compression, which effectively improve the compression ratio.
[ { "created": "Thu, 18 Oct 2012 12:17:12 GMT", "version": "v1" } ]
"2012-10-31T00:00:00"
[ [ "Lui", "Lok Ming", "" ], [ "Lam", "Ka Chun", "" ], [ "Wong", "Tsz Wai", "" ], [ "Gu", "XianFeng", "" ] ]
0no_new_dataset
1907.00181
Anders Edelbo Lillie
Anders Edelbo Lillie and Emil Refsgaard Middelboe
Fake News Detection using Stance Classification: A Survey
19 pages, 1 figure
null
null
null
cs.CL cs.CY cs.SI
http://creativecommons.org/licenses/by/4.0/
This paper surveys and presents recent academic work carried out within the field of stance classification and fake news detection. Echo chambers and the model organism problem are examples that pose challenges to acquire data with high quality, due to opinions being polarised in microblogs. Nevertheless it is shown that several machine learning approaches achieve promising results in classifying stance. Some use crowd stance for fake news detection, such as the approach in [Dungs et al., 2018] using Hidden Markov Models. Furthermore feature engineering have significant importance in several approaches, which is shown in [Aker et al., 2017]. This paper additionally includes a proposal of a system implementation based on the presented survey.
[ { "created": "Sat, 29 Jun 2019 11:00:22 GMT", "version": "v1" } ]
"2019-07-02T00:00:00"
[ [ "Lillie", "Anders Edelbo", "" ], [ "Middelboe", "Emil Refsgaard", "" ] ]
0no_new_dataset
2104.04797
Anda Trifan
Alexander Brace, Igor Yakushin, Heng Ma, Anda Trifan, Todd Munson, Ian Foster, Arvind Ramanathan, Hyungro Lee, Matteo Turilli, Shantenu Jha
Coupling streaming AI and HPC ensembles to achieve 100-1000x faster biomolecular simulations
null
null
null
null
cs.DC cs.LG
http://creativecommons.org/licenses/by/4.0/
Machine learning (ML)-based steering can improve the performance of ensemble-based simulations by allowing for online selection of more scientifically meaningful computations. We present DeepDriveMD, a framework for ML-driven steering of scientific simulations that we have used to achieve orders-of-magnitude improvements in molecular dynamics (MD) performance via effective coupling of ML and HPC on large parallel computers. We discuss the design of DeepDriveMD and characterize its performance. We demonstrate that DeepDriveMD can achieve between 100-1000x acceleration for protein folding simulations relative to other methods, as measured by the amount of simulated time performed, while covering the same conformational landscape as quantified by the states sampled during a simulation. Experiments are performed on leadership-class platforms on up to 1020 nodes. The results establish DeepDriveMD as a high-performance framework for ML-driven HPC simulation scenarios, that supports diverse MD simulation and ML back-ends, and which enables new scientific insights by improving the length and time scales accessible with current computing capacity.
[ { "created": "Sat, 10 Apr 2021 15:52:39 GMT", "version": "v1" }, { "created": "Mon, 26 Apr 2021 16:35:20 GMT", "version": "v2" }, { "created": "Wed, 23 Mar 2022 15:59:36 GMT", "version": "v3" }, { "created": "Fri, 8 Jul 2022 20:33:46 GMT", "version": "v4" }, { "created": "Tue, 12 Jul 2022 17:08:47 GMT", "version": "v5" } ]
"2022-07-13T00:00:00"
[ [ "Brace", "Alexander", "" ], [ "Yakushin", "Igor", "" ], [ "Ma", "Heng", "" ], [ "Trifan", "Anda", "" ], [ "Munson", "Todd", "" ], [ "Foster", "Ian", "" ], [ "Ramanathan", "Arvind", "" ], [ "Lee", "Hyungro", "" ], [ "Turilli", "Matteo", "" ], [ "Jha", "Shantenu", "" ] ]
0no_new_dataset
cs/0006020
Frankie James
Beth Ann Hockey, Manny Rayner, Frankie James
A Comparison of the XTAG and CLE Grammars for English
5th International Workshop on Tree Adjoining Grammars and Related Formalisms. 25-27 May 2000, Paris, France
null
null
null
cs.CL
null
When people develop something intended as a large broad-coverage grammar, they usually have a more specific goal in mind. Sometimes this goal is covering a corpus; sometimes the developers have theoretical ideas they wish to investigate; most often, work is driven by a combination of these two main types of goal. What tends to happen after a while is that the community of people working with the grammar starts thinking of some phenomena as ``central'', and makes serious efforts to deal with them; other phenomena are labelled ``marginal'', and ignored. Before long, the distinction between ``central'' and ``marginal'' becomes so ingrained that it is automatic, and people virtually stop thinking about the ``marginal'' phenomena. In practice, the only way to bring the marginal things back into focus is to look at what other people are doing and compare it with one's own work. In this paper, we will take two large grammars, XTAG and the CLE, and examine each of them from the other's point of view. We will find in both cases not only that important things are missing, but that the perspective offered by the other grammar suggests simple and practical ways of filling in the holes. It turns out that there is a pleasing symmetry to the picture. XTAG has a very good treatment of complement structure, which the CLE to some extent lacks; conversely, the CLE offers a powerful and general account of adjuncts, which the XTAG grammar does not fully duplicate. If we examine the way in which each grammar does the thing it is good at, we find that the relevant methods are quite easy to port to the other framework, and in fact only involve generalization and systematization of existing mechanisms.
[ { "created": "Fri, 9 Jun 2000 20:49:03 GMT", "version": "v1" } ]
"2007-05-23T00:00:00"
[ [ "Hockey", "Beth Ann", "" ], [ "Rayner", "Manny", "" ], [ "James", "Frankie", "" ] ]
0no_new_dataset
2103.11084
Jihua Zhu
Jihua Zhu and Di Wang and Jiaxi Mu and Huimin Lu and Zhiqiang Tian and Zhongyu Li
3DMNDT:3D multi-view registration method based on the normal distributions transform
null
null
null
null
cs.CV cs.RO
http://creativecommons.org/licenses/by/4.0/
The normal distributions transform (NDT) is an effective paradigm for the point set registration. This method is originally designed for pair-wise registration and it will suffer from great challenges when applied to multi-view registration. Under the NDT framework, this paper proposes a novel multi-view registration method, named 3D multi-view registration based on the normal distributions transform (3DMNDT), which integrates the K-means clustering and Lie algebra solver to achieve multi-view registration. More specifically, the multi-view registration is cast into the problem of maximum likelihood estimation. Then, the K-means algorithm is utilized to divide all data points into different clusters, where a normal distribution is computed to locally models the probability of measuring a data point in each cluster. Subsequently, the registration problem is formulated by the NDT-based likelihood function. To maximize this likelihood function, the Lie algebra solver is developed to sequentially optimize each rigid transformation. The proposed method alternately implements data point clustering, NDT computing, and likelihood maximization until desired registration results are obtained. Experimental results tested on benchmark data sets illustrate that the proposed method can achieve state-of-the-art performance for multi-view registration.
[ { "created": "Sat, 20 Mar 2021 03:20:31 GMT", "version": "v1" } ]
"2021-03-23T00:00:00"
[ [ "Zhu", "Jihua", "" ], [ "Wang", "Di", "" ], [ "Mu", "Jiaxi", "" ], [ "Lu", "Huimin", "" ], [ "Tian", "Zhiqiang", "" ], [ "Li", "Zhongyu", "" ] ]
1new_dataset
1809.09558
Evangelos Boukas Prof
Jordi Spranger, Roxana Buzatoiu, Athanasios Polydoros, Lazaros Nalpantidis and Evangelos Boukas
Human-Machine Interface for Remote Training of Robot Tasks
Accepted in IEEE International Conference on Imaging Systems and Techniques - IST2018
null
null
null
cs.RO cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Regardless of their industrial or research application, the streamlining of robot operations is limited by the proximity of experienced users to the actual hardware. Be it massive open online robotics courses, crowd-sourcing of robot task training, or remote research on massive robot farms for machine learning, the need to create an apt remote Human-Machine Interface is quite prevalent. The paper at hand proposes a novel solution to the programming/training of remote robots employing an intuitive and accurate user-interface which offers all the benefits of working with real robots without imposing delays and inefficiency. The system includes: a vision-based 3D hand detection and gesture recognition subsystem, a simulated digital twin of a robot as visual feedback, and the "remote" robot learning/executing trajectories using dynamic motion primitives. Our results indicate that the system is a promising solution to the problem of remote training of robot tasks.
[ { "created": "Tue, 25 Sep 2018 15:44:35 GMT", "version": "v1" } ]
"2018-09-26T00:00:00"
[ [ "Spranger", "Jordi", "" ], [ "Buzatoiu", "Roxana", "" ], [ "Polydoros", "Athanasios", "" ], [ "Nalpantidis", "Lazaros", "" ], [ "Boukas", "Evangelos", "" ] ]
0no_new_dataset