id
stringlengths 9
10
| submitter
stringlengths 5
46
⌀ | authors
stringlengths 5
1.31k
| title
stringlengths 8
223
| comments
stringlengths 2
574
⌀ | journal-ref
stringclasses 587
values | doi
stringclasses 784
values | report-no
stringclasses 75
values | categories
stringlengths 5
72
| license
stringclasses 9
values | abstract
stringlengths 82
3.31k
| versions
listlengths 1
15
| update_date
timestamp[us] | authors_parsed
sequencelengths 1
76
| label
class label 2
classes |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1909.05638 | Lahiru D. Chamain Hewa Gamage | Lahiru D. Chamain, Zhi Ding | Faster and Accurate Classification for JPEG2000 Compressed Images in
Networked Applications | 9 pages | null | null | null | cs.CV cs.LG cs.MM eess.IV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | JPEG2000 (j2k) is a highly popular format for image and video
compression.With the rapidly growing applications of cloud based image
classification, most existing j2k-compatible schemes would stream compressed
color images from the source before reconstruction at the processing center as
inputs to deep CNNs. We propose to remove the computationally costly
reconstruction step by training a deep CNN image classifier using the CDF 9/7
Discrete Wavelet Transformed (DWT) coefficients directly extracted from
j2k-compressed images. We demonstrate additional computation savings by
utilizing shallower CNN to achieve classification of good accuracy in the DWT
domain. Furthermore, we show that traditional augmentation transforms such as
flipping/shifting are ineffective in the DWT domain and present different
augmentation transformations to achieve more accurate classification without
any additional cost. This way, faster and more accurate classification is
possible for j2k encoded images without image reconstruction. Through
experiments on CIFAR-10 and Tiny ImageNet data sets, we show that the
performance of the proposed solution is consistent for image transmission over
limited channel bandwidth.
| [
{
"created": "Wed, 4 Sep 2019 19:03:35 GMT",
"version": "v1"
}
] | 2019-09-13T00:00:00 | [
[
"Chamain",
"Lahiru D.",
""
],
[
"Ding",
"Zhi",
""
]
] | 0no_new_dataset
|
1901.10165 | Fabio Cunial | Fabio Cunial and Djamal Belazzougui | Fully-functional bidirectional Burrows-Wheeler indexes | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a string $T$ on an alphabet of size $\sigma$, we describe a
bidirectional Burrows-Wheeler index that takes $O(|T|\log{\sigma})$ bits of
space, and that supports the addition \emph{and removal} of one character, on
the left or right side of any substring of $T$, in constant time. Previously
known data structures that used the same space allowed constant-time addition
to any substring of $T$, but they could support removal only from specific
substrings of $T$. We also describe an index that supports bidirectional
addition and removal in $O(\log{\log{|T|}})$ time, and that occupies a number
of words proportional to the number of left and right extensions of the maximal
repeats of $T$. We use such fully-functional indexes to implement
bidirectional, frequency-aware, variable-order de Bruijn graphs in small space,
with no upper bound on their order, and supporting natural criteria for
increasing and decreasing the order during traversal.
| [
{
"created": "Tue, 29 Jan 2019 08:33:09 GMT",
"version": "v1"
},
{
"created": "Sun, 9 Jun 2019 14:08:49 GMT",
"version": "v2"
}
] | 2019-06-11T00:00:00 | [
[
"Cunial",
"Fabio",
""
],
[
"Belazzougui",
"Djamal",
""
]
] | 0no_new_dataset
|
2210.15917 | Yanqing Xu | Yanqing Xu and Bo Wang and Enbin Song and Qingjiang Shi and Tsung-Hui
Chang | Low-Complexity Channel Estimation for Massive MIMO Systems with
Decentralized Baseband Processing | Submitted for publication | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The traditional centralized baseband processing architecture is faced with
the bottlenecks of high computation complexity and excessive fronthaul
communication, especially when the number of antennas at the base station (BS)
is large. To cope with these two challenges, the decentralized baseband
processing (DPB) architecture has been proposed, where the BS antennas are
partitioned into multiple clusters, and each is connected to a local baseband
unit (BBU). In this paper, we are interested in the low-complexity distributed
channel estimation (CE) method under such DBP architecture, which is rarely
studied in the literature. The aim is to devise distributed CE algorithms that
can perform as well as the centralized scheme but with a small inter-BBU
communication cost. Specifically, based on the low-complexity diagonal minimum
mean square error channel estimator, we propose two distributed CE algorithms,
namely the aggregate-then-estimate algorithm and the estimate-then-aggregate
algorithm. In contrast to the existing distributed CE algorithm which requires
iterative information exchanges among the nodes, our algorithms only require
one roundtrip communication among BBUs. Extensive experiment results are
presented to demonstrate the advantages of the proposed distributed CE
algorithms in terms of estimation accuracy, inter-BBU communication cost, and
computation complexity.
| [
{
"created": "Fri, 28 Oct 2022 05:50:54 GMT",
"version": "v1"
}
] | 2022-10-31T00:00:00 | [
[
"Xu",
"Yanqing",
""
],
[
"Wang",
"Bo",
""
],
[
"Song",
"Enbin",
""
],
[
"Shi",
"Qingjiang",
""
],
[
"Chang",
"Tsung-Hui",
""
]
] | 0no_new_dataset
|
1912.01451 | Richard Tomsett | Richard Tomsett, Dan Harborne, Supriyo Chakraborty, Prudhvi Gurram,
Alun Preece | Sanity Checks for Saliency Metrics | Accepted for publication at the Thirty Fourth AAAI conference on
Artificial Intelligence (AAAI-20) | null | null | null | cs.LG cs.CV eess.IV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Saliency maps are a popular approach to creating post-hoc explanations of
image classifier outputs. These methods produce estimates of the relevance of
each pixel to the classification output score, which can be displayed as a
saliency map that highlights important pixels. Despite a proliferation of such
methods, little effort has been made to quantify how good these saliency maps
are at capturing the true relevance of the pixels to the classifier output
(i.e. their "fidelity"). We therefore investigate existing metrics for
evaluating the fidelity of saliency methods (i.e. saliency metrics). We find
that there is little consistency in the literature in how such metrics are
calculated, and show that such inconsistencies can have a significant effect on
the measured fidelity. Further, we apply measures of reliability developed in
the psychometric testing literature to assess the consistency of saliency
metrics when applied to individual saliency maps. Our results show that
saliency metrics can be statistically unreliable and inconsistent, indicating
that comparative rankings between saliency methods generated using such metrics
can be untrustworthy.
| [
{
"created": "Fri, 29 Nov 2019 14:30:56 GMT",
"version": "v1"
}
] | 2019-12-04T00:00:00 | [
[
"Tomsett",
"Richard",
""
],
[
"Harborne",
"Dan",
""
],
[
"Chakraborty",
"Supriyo",
""
],
[
"Gurram",
"Prudhvi",
""
],
[
"Preece",
"Alun",
""
]
] | 0no_new_dataset
|
2207.14270 | F. J. Lobillo | Jos\'e G\'omez-Torrecillas and F. J. Lobillo and Gabriel Navarro | Skew differential Goppa codes and their application to McEliece
cryptosystem | null | null | null | null | cs.IT cs.CR math.IT math.RA | http://creativecommons.org/licenses/by-nc-sa/4.0/ | A class of linear codes that extends classic Goppa codes to a non-commutative
context is defined. An efficient decoding algorithm, based on the solution of a
non-commutative key equation, is designed. We show how the parameters of these
codes, when the alphabet is a finite field, may be adjusted to propose a
McEliece-type cryptosystem.
| [
{
"created": "Thu, 28 Jul 2022 17:52:27 GMT",
"version": "v1"
}
] | 2022-07-29T00:00:00 | [
[
"Gómez-Torrecillas",
"José",
""
],
[
"Lobillo",
"F. J.",
""
],
[
"Navarro",
"Gabriel",
""
]
] | 0no_new_dataset
|
2403.15123 | Pablo Gonz\'alez | Olaya P\'erez-Mon, Alejandro Moreo, Juan Jos\'e del Coz, Pablo
Gonz\'alez | Quantification using Permutation-Invariant Networks based on Histograms | null | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | Quantification, also known as class prevalence estimation, is the supervised
learning task in which a model is trained to predict the prevalence of each
class in a given bag of examples. This paper investigates the application of
deep neural networks to tasks of quantification in scenarios where it is
possible to apply a symmetric supervised approach that eliminates the need for
classification as an intermediary step, directly addressing the quantification
problem. Additionally, it discusses existing permutation-invariant layers
designed for set processing and assesses their suitability for quantification.
In light of our analysis, we propose HistNetQ, a novel neural architecture that
relies on a permutation-invariant representation based on histograms that is
specially suited for quantification problems. Our experiments carried out in
the only quantification competition held to date, show that HistNetQ
outperforms other deep neural architectures devised for set processing, as well
as the state-of-the-art quantification methods. Furthermore, HistNetQ offers
two significant advantages over traditional quantification methods: i) it does
not require the labels of the training examples but only the prevalence values
of a collection of training bags, making it applicable to new scenarios; and
ii) it is able to optimize any custom quantification-oriented loss function.
| [
{
"created": "Fri, 22 Mar 2024 11:25:38 GMT",
"version": "v1"
}
] | 2024-03-25T00:00:00 | [
[
"Pérez-Mon",
"Olaya",
""
],
[
"Moreo",
"Alejandro",
""
],
[
"del Coz",
"Juan José",
""
],
[
"González",
"Pablo",
""
]
] | 0no_new_dataset
|
2009.14441 | Shay Deutsch Dr. | Shay Deutsch, Stefano Soatto | Spectral Embedding of Graph Networks | null | null | null | null | cs.LG cs.AI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an unsupervised graph embedding that trades off local node
similarity and connectivity, and global structure. The embedding is based on a
generalized graph Laplacian, whose eigenvectors compactly capture both network
structure and neighborhood proximity in a single representation. The key idea
is to transform the given graph into one whose weights measure the centrality
of an edge by the fraction of the number of shortest paths that pass through
that edge, and employ its spectral proprieties in the representation. Testing
the resulting graph network representation shows significant improvement over
the sate of the art in data analysis tasks including social networks and
material science. We also test our method on node classification from the
human-SARS CoV-2 protein-protein interactome.
| [
{
"created": "Wed, 30 Sep 2020 04:59:10 GMT",
"version": "v1"
}
] | 2020-10-01T00:00:00 | [
[
"Deutsch",
"Shay",
""
],
[
"Soatto",
"Stefano",
""
]
] | 0no_new_dataset
|
2308.09862 | Onkar Litake | Maithili Sabane and Onkar Litake and Aman Chadha | Breaking Language Barriers: A Question Answering Dataset for Hindi and
Marathi | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recent advances in deep-learning have led to the development of highly
sophisticated systems with an unquenchable appetite for data. On the other
hand, building good deep-learning models for low-resource languages remains a
challenging task. This paper focuses on developing a Question Answering dataset
for two such languages- Hindi and Marathi. Despite Hindi being the 3rd most
spoken language worldwide, with 345 million speakers, and Marathi being the
11th most spoken language globally, with 83.2 million speakers, both languages
face limited resources for building efficient Question Answering systems. To
tackle the challenge of data scarcity, we have developed a novel approach for
translating the SQuAD 2.0 dataset into Hindi and Marathi. We release the
largest Question-Answering dataset available for these languages, with each
dataset containing 28,000 samples. We evaluate the dataset on various
architectures and release the best-performing models for both Hindi and
Marathi, which will facilitate further research in these languages. Leveraging
similarity tools, our method holds the potential to create datasets in diverse
languages, thereby enhancing the understanding of natural language across
varied linguistic contexts. Our fine-tuned models, code, and dataset will be
made publicly available.
| [
{
"created": "Sat, 19 Aug 2023 00:39:21 GMT",
"version": "v1"
},
{
"created": "Fri, 1 Sep 2023 00:37:43 GMT",
"version": "v2"
},
{
"created": "Sat, 17 Feb 2024 07:02:26 GMT",
"version": "v3"
}
] | 2024-02-20T00:00:00 | [
[
"Sabane",
"Maithili",
""
],
[
"Litake",
"Onkar",
""
],
[
"Chadha",
"Aman",
""
]
] | 1new_dataset
|
2401.00722 | Libin Lan | Libin Lan, Pengzhou Cai, Lu Jiang, Xiaojuan Liu, Yongmei Li, and
Yudong Zhang | BRAU-Net++: U-Shaped Hybrid CNN-Transformer Network for Medical Image
Segmentation | 12 pages, 6 figures, 9 tables code:
https://github.com/Caipengzhou/BRAU-Netplusplus | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurate medical image segmentation is essential for clinical quantification,
disease diagnosis, treatment planning and many other applications. Both
convolution-based and transformer-based u-shaped architectures have made
significant success in various medical image segmentation tasks. The former can
efficiently learn local information of images while requiring much more
image-specific inductive biases inherent to convolution operation. The latter
can effectively capture long-range dependency at different feature scales using
self-attention, whereas it typically encounters the challenges of quadratic
compute and memory requirements with sequence length increasing. To address
this problem, through integrating the merits of these two paradigms in a
well-designed u-shaped architecture, we propose a hybrid yet effective
CNN-Transformer network, named BRAU-Net++, for an accurate medical image
segmentation task. Specifically, BRAU-Net++ uses bi-level routing attention as
the core building block to design our u-shaped encoder-decoder structure, in
which both encoder and decoder are hierarchically constructed, so as to learn
global semantic information while reducing computational complexity.
Furthermore, this network restructures skip connection by incorporating
channel-spatial attention which adopts convolution operations, aiming to
minimize local spatial information loss and amplify global
dimension-interaction of multi-scale features. Extensive experiments on three
public benchmark datasets demonstrate that our proposed approach surpasses
other state-of-the-art methods including its baseline: BRAU-Net under almost
all evaluation metrics. We achieve the average Dice-Similarity Coefficient
(DSC) of 82.47, 90.10, and 92.94 on Synapse multi-organ segmentation, ISIC-2018
Challenge, and CVC-ClinicDB, as well as the mIoU of 84.01 and 88.17 on
ISIC-2018 Challenge and CVC-ClinicDB, respectively.
| [
{
"created": "Mon, 1 Jan 2024 10:49:09 GMT",
"version": "v1"
}
] | 2024-01-02T00:00:00 | [
[
"Lan",
"Libin",
""
],
[
"Cai",
"Pengzhou",
""
],
[
"Jiang",
"Lu",
""
],
[
"Liu",
"Xiaojuan",
""
],
[
"Li",
"Yongmei",
""
],
[
"Zhang",
"Yudong",
""
]
] | 0no_new_dataset
|
2110.05044 | Vedrana Krivoku\'ca Hahn | Vedrana Krivoku\'ca Hahn and S\'ebastien Marcel | Biometric Template Protection for Neural-Network-based Face Recognition
Systems: A Survey of Methods and Evaluation Techniques | Version 4 corresponds to the version of the manuscript accepted for
publication in IEEE TIFS. Revisions: A few broken URLs have been fixed.
Consists of: 29 pages, 2 figures, 10 tables | null | 10.1109/TIFS.2022.3228494 | null | cs.CV cs.CR | http://creativecommons.org/licenses/by/4.0/ | As automated face recognition applications tend towards ubiquity, there is a
growing need to secure the sensitive face data used within these systems. This
paper presents a survey of biometric template protection (BTP) methods proposed
for securing face templates (images/features) in neural-network-based face
recognition systems. The BTP methods are categorised into two types: Non-NN and
NN-learned. Non-NN methods use a neural network (NN) as a feature extractor,
but the BTP part is based on a non-NN algorithm, whereas NN-learned methods
employ a NN to learn a protected template from the unprotected template. We
present examples of Non-NN and NN-learned face BTP methods from the literature,
along with a discussion of their strengths and weaknesses. We also investigate
the techniques used to evaluate these methods in terms of the three most common
BTP criteria: recognition accuracy, irreversibility, and
renewability/unlinkability. The recognition accuracy of protected face
recognition systems is generally evaluated using the same (empirical)
techniques employed for evaluating standard (unprotected) biometric systems.
However, most irreversibility and renewability/unlinkability evaluations are
found to be based on theoretical assumptions/estimates or verbal implications,
with a lack of empirical validation in a practical face recognition context.
So, we recommend a greater focus on empirical evaluations to provide more
concrete insights into the irreversibility and renewability/unlinkability of
face BTP methods in practice. Additionally, an exploration of the
reproducibility of the studied BTP works, in terms of the public availability
of their implementation code and evaluation datasets/procedures, suggests that
it would be difficult to faithfully replicate most of the reported findings.
So, we advocate for a push towards reproducibility, in the hope of advancing
face BTP research.
| [
{
"created": "Mon, 11 Oct 2021 07:25:24 GMT",
"version": "v1"
},
{
"created": "Thu, 27 Jan 2022 16:53:38 GMT",
"version": "v2"
},
{
"created": "Fri, 7 Oct 2022 09:43:55 GMT",
"version": "v3"
},
{
"created": "Tue, 6 Dec 2022 15:07:30 GMT",
"version": "v4"
}
] | 2023-09-07T00:00:00 | [
[
"Hahn",
"Vedrana Krivokuća",
""
],
[
"Marcel",
"Sébastien",
""
]
] | 0no_new_dataset
|
1906.06651 | Min Qiu | Min Qiu | Lattice Coding for Downlink Multiuser Transmission | 353 pages, PhD thesis | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this thesis, we mainly investigate the lattice coding problem of the
downlink communication between a base station and multiple users. The base
station broadcasts a message containing each user's intended message. The
capacity limit of such a system setting is already well-known while the design
of practical coding and modulation schemes to approach the theoretical limit
has not been fully studied and investigated in the literature. This thesis
attempts to address this problem by providing a systematic design on lattice
coding and modulation schemes for downlink multiuser communication systems. The
main idea is to exploit the structure property of lattices to harness
interference from downlink users.
| [
{
"created": "Sun, 16 Jun 2019 06:06:40 GMT",
"version": "v1"
}
] | 2019-06-18T00:00:00 | [
[
"Qiu",
"Min",
""
]
] | 0no_new_dataset
|
2111.12690 | Juan-Pablo Ramirez-Paredes | V. Ayala-Alfaro, J. A. Vilchis-Mar, F. E. Correa-Tome and J. P.
Ramirez-Paredes | Automatic Mapping with Obstacle Identification for Indoor Human Mobility
Assessment | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a framework that allows a mobile robot to build a map of an indoor
scenario, identifying and highlighting objects that may be considered a
hindrance to people with limited mobility. The map is built by combining recent
developments in monocular SLAM with information from inertial sensors of the
robot platform, resulting in a metric point cloud that can be further processed
to obtain a mesh. The images from the monocular camera are simultaneously
analyzed with an object recognition neural network, tuned to detect a
particular class of targets. This information is then processed and
incorporated on the metric map, resulting in a detailed survey of the locations
and bounding volumes of the objects of interest. The result can be used to
inform policy makers and users with limited mobility of the hazards present in
a particular indoor location. Our initial tests were performed using a
micro-UAV and will be extended to other robotic platforms.
| [
{
"created": "Wed, 24 Nov 2021 18:36:33 GMT",
"version": "v1"
}
] | 2021-11-25T00:00:00 | [
[
"Ayala-Alfaro",
"V.",
""
],
[
"Vilchis-Mar",
"J. A.",
""
],
[
"Correa-Tome",
"F. E.",
""
],
[
"Ramirez-Paredes",
"J. P.",
""
]
] | 0no_new_dataset
|
1904.00328 | Lin Zhang | Lin Zhang | An Efficient Approach for Cell Segmentation in Phase Contrast Microscopy
Images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a new model to segment cells in phase contrast
microscopy images. Cell images collected from the similar scenario share a
similar background. Inspired by this, we separate cells from the background in
images by formulating the problem as a low-rank and structured sparse matrix
decomposition problem. Then, we propose the inverse diffraction pattern
filtering method to further segment individual cells in the images. This is a
deconvolution process that has a much lower computational complexity when
compared to the other restoration methods. Experiments demonstrate the
effectiveness of the proposed model when it is compared with recent works.
| [
{
"created": "Sun, 31 Mar 2019 03:01:10 GMT",
"version": "v1"
}
] | 2019-04-02T00:00:00 | [
[
"Zhang",
"Lin",
""
]
] | 0no_new_dataset
|
1312.4587 | Jingwei Lu | Jingwei Lu, Pengwen Chen, Chin-Chih Chang, Lu Sha, Dennis Jen-Hsin
Huang, Chin-Chi Teng, Chung-Kuan Cheng | FFTPL: An Analytic Placement Algorithm Using Fast Fourier Transform for
Density Equalization | null | null | null | null | cs.CE cs.AR cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a flat nonlinear placement algorithm FFTPL using fast Fourier
transform for density equalization. The placement instance is modeled as an
electrostatic system with the analogy of density cost to the potential energy.
A well-defined Poisson's equation is proposed for gradient and cost
computation. Our placer outperforms state-of-the-art placers with better
solution quality and efficiency.
| [
{
"created": "Mon, 16 Dec 2013 23:01:46 GMT",
"version": "v1"
}
] | 2013-12-18T00:00:00 | [
[
"Lu",
"Jingwei",
""
],
[
"Chen",
"Pengwen",
""
],
[
"Chang",
"Chin-Chih",
""
],
[
"Sha",
"Lu",
""
],
[
"Huang",
"Dennis Jen-Hsin",
""
],
[
"Teng",
"Chin-Chi",
""
],
[
"Cheng",
"Chung-Kuan",
""
]
] | 0no_new_dataset
|
2209.10589 | Weizi Li | Weizi Li | Understanding and Developing Equitable and Fair Transportation Systems | null | null | null | null | cs.CY | http://creativecommons.org/licenses/by/4.0/ | The transportation system is an interplay between infrastructure, vehicles,
and policy. During the past century, the rapid expansion of the road network,
blended with increasing vehicle production and mobility demands, has been
stressing the system's capacity and resulting in a shocking amount of annual
costs. To alleviate these costs while providing passengers with safe and
efficient travel experiences, we need to better design and plan our
transportation system. To start with, not only the design of our road network
is topologically flawed but also our infrastructure likely facilitates
inequality: roads and bridges are found to better connect affluent sectors
while excluding the poor. While technological advancements such as connected
and autonomous vehicles (CAVs) and novel operation modes such as shared economy
have offered new opportunities, questions remain. First, what is the
relationship between the road network, community development, demographics, and
mobility behaviors? Second, by leveraging the insights from studying the first
question, can we better plan, coordinate, and optimize vehicles in different
modalities such as human-driven and autonomous to construct safe, efficient,
and resilient traffic flows? Third, how can we build an intelligent
transportation system to promote equity and fairness in our community
development? This proposal is the first step toward answering these questions.
| [
{
"created": "Wed, 21 Sep 2022 18:26:19 GMT",
"version": "v1"
}
] | 2022-09-23T00:00:00 | [
[
"Li",
"Weizi",
""
]
] | 0no_new_dataset
|
1409.0079 | Mao Yang | Mao Yang, Yong Li, Depeng Jin, Lieguang Zeng, Xin Wu, Athanasios V.
Vasilakos | Software-Defined and Virtualized Future Mobile and Wireless Networks: A
Survey | 12 pages, 3 figures, submitted to "Mobile Networks and Applications"
(MONET) | null | 10.1007/s11036-014-0533-8 | MONE-D-14-00029R1 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the proliferation of mobile demands and increasingly multifarious
services and applications, mobile Internet has been an irreversible trend.
Unfortunately, the current mobile and wireless network (MWN) faces a series of
pressing challenges caused by the inherent design. In this paper, we extend two
latest and promising innovations of Internet, software-defined networking and
network virtualization, to mobile and wireless scenarios. We first describe the
challenges and expectations of MWN, and analyze the opportunities provided by
the software-defined wireless network (SDWN) and wireless network
virtualization (WNV). Then, this paper focuses on SDWN and WNV by presenting
the main ideas, advantages, ongoing researches and key technologies, and open
issues respectively. Moreover, we interpret that these two technologies highly
complement each other, and further investigate efficient joint design between
them. This paper confirms that SDWN and WNV may efficiently address the crucial
challenges of MWN and significantly benefit the future mobile and wireless
network.
| [
{
"created": "Sat, 30 Aug 2014 04:02:48 GMT",
"version": "v1"
}
] | 2014-09-05T00:00:00 | [
[
"Yang",
"Mao",
""
],
[
"Li",
"Yong",
""
],
[
"Jin",
"Depeng",
""
],
[
"Zeng",
"Lieguang",
""
],
[
"Wu",
"Xin",
""
],
[
"Vasilakos",
"Athanasios V.",
""
]
] | 0no_new_dataset
|
2406.16777 | Sai Koneru | Sai Koneru, Thai-Binh Nguyen, Ngoc-Quan Pham, Danni Liu, Zhaolin Li,
Alexander Waibel, Jan Niehues | Blending LLMs into Cascaded Speech Translation: KIT's Offline Speech
Translation System for IWSLT 2024 | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) are currently under exploration for various
tasks, including Automatic Speech Recognition (ASR), Machine Translation (MT),
and even End-to-End Speech Translation (ST). In this paper, we present KIT's
offline submission in the constrained + LLM track by incorporating recently
proposed techniques that can be added to any cascaded speech translation.
Specifically, we integrate
Mistral-7B\footnote{mistralai/Mistral-7B-Instruct-v0.1} into our system to
enhance it in two ways. Firstly, we refine the ASR outputs by utilizing the
N-best lists generated by our system and fine-tuning the LLM to predict the
transcript accurately. Secondly, we refine the MT outputs at the document level
by fine-tuning the LLM, leveraging both ASR and MT predictions to improve
translation quality. We find that integrating the LLM into the ASR and MT
systems results in an absolute improvement of $0.3\%$ in Word Error Rate and
$0.65\%$ in COMET for tst2019 test set. In challenging test sets with
overlapping speakers and background noise, we find that integrating LLM is not
beneficial due to poor ASR performance. Here, we use ASR with chunked long-form
decoding to improve context usage that may be unavailable when transcribing
with Voice Activity Detection segmentation alone.
| [
{
"created": "Mon, 24 Jun 2024 16:38:17 GMT",
"version": "v1"
}
] | 2024-06-25T00:00:00 | [
[
"Koneru",
"Sai",
""
],
[
"Nguyen",
"Thai-Binh",
""
],
[
"Pham",
"Ngoc-Quan",
""
],
[
"Liu",
"Danni",
""
],
[
"Li",
"Zhaolin",
""
],
[
"Waibel",
"Alexander",
""
],
[
"Niehues",
"Jan",
""
]
] | 0no_new_dataset
|
2310.11589 | Belinda Z. Li | Belinda Z. Li, Alex Tamkin, Noah Goodman, Jacob Andreas | Eliciting Human Preferences with Language Models | 26 pages, 15 figures | null | null | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Language models (LMs) can be directed to perform target tasks by using
labeled examples or natural language prompts. But selecting examples or writing
prompts for can be challenging--especially in tasks that involve unusual edge
cases, demand precise articulation of nebulous preferences, or require an
accurate mental model of LM behavior. We propose to use *LMs themselves* to
guide the task specification process. In this paper, we introduce **Generative
Active Task Elicitation (GATE)**: a learning framework in which models elicit
and infer intended behavior through free-form, language-based interaction with
users. We study GATE in three domains: email validation, content
recommendation, and moral reasoning. In preregistered experiments, we show that
LMs prompted to perform GATE (e.g., by generating open-ended questions or
synthesizing informative edge cases) elicit responses that are often more
informative than user-written prompts or labels. Users report that interactive
task elicitation requires less effort than prompting or example labeling and
surfaces novel considerations not initially anticipated by users. Our findings
suggest that LM-driven elicitation can be a powerful tool for aligning models
to complex human preferences and values.
| [
{
"created": "Tue, 17 Oct 2023 21:11:21 GMT",
"version": "v1"
}
] | 2023-10-19T00:00:00 | [
[
"Li",
"Belinda Z.",
""
],
[
"Tamkin",
"Alex",
""
],
[
"Goodman",
"Noah",
""
],
[
"Andreas",
"Jacob",
""
]
] | 0no_new_dataset
|
2109.15117 | Jakob Weissteiner | Jakob Weissteiner, Jakob Heiss, Julien Siems, Sven Seuken | Monotone-Value Neural Networks: Exploiting Preference Monotonicity in
Combinatorial Assignment | null | Proceedings of the Thirty-First International Joint Conference on
Artificial Intelligence Main Track (2022). Pages 541-548 | 10.24963/ijcai.2022/77 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many important resource allocation problems involve the combinatorial
assignment of items, e.g., auctions or course allocation. Because the bundle
space grows exponentially in the number of items, preference elicitation is a
key challenge in these domains. Recently, researchers have proposed ML-based
mechanisms that outperform traditional mechanisms while reducing preference
elicitation costs for agents. However, one major shortcoming of the ML
algorithms that were used is their disregard of important prior knowledge about
agents' preferences. To address this, we introduce monotone-value neural
networks (MVNNs), which are designed to capture combinatorial valuations, while
enforcing monotonicity and normality. On a technical level, we prove that our
MVNNs are universal in the class of monotone and normalized value functions,
and we provide a mixed-integer linear program (MILP) formulation to make
solving MVNN-based winner determination problems (WDPs) practically feasible.
We evaluate our MVNNs experimentally in spectrum auction domains. Our results
show that MVNNs improve the prediction performance, they yield state-of-the-art
allocative efficiency in the auction, and they also reduce the run-time of the
WDPs. Our code is available on GitHub:
https://github.com/marketdesignresearch/MVNN.
| [
{
"created": "Thu, 30 Sep 2021 13:31:30 GMT",
"version": "v1"
},
{
"created": "Fri, 1 Oct 2021 11:37:06 GMT",
"version": "v2"
},
{
"created": "Thu, 16 Jun 2022 11:26:50 GMT",
"version": "v3"
},
{
"created": "Mon, 29 Aug 2022 13:58:11 GMT",
"version": "v4"
},
{
"created": "Sat, 11 Mar 2023 17:36:20 GMT",
"version": "v5"
}
] | 2023-03-14T00:00:00 | [
[
"Weissteiner",
"Jakob",
""
],
[
"Heiss",
"Jakob",
""
],
[
"Siems",
"Julien",
""
],
[
"Seuken",
"Sven",
""
]
] | 0no_new_dataset
|
2111.10365 | Dang Qua Nguyen | Dang Qua Nguyen and Taejoon Kim | Joint Delay and Phase Precoding Under True-Time Delay Constraints for
THz Massive MIMO | null | null | null | null | cs.IT eess.SP math.IT | http://creativecommons.org/licenses/by/4.0/ | A new approach is presented to the problem of compensating the beam squint
effect arising in wideband terahertz (THz) hybrid massive multiple-input
multiple-output (MIMO) systems, based on the joint optimization of the phase
shifter (PS) and true-time delay (TTD) values under per-TTD device time delay
constraints. Unlike the prior approaches, the new approach does not require the
unbounded time delay assumption; the range of time delay values that a TTD
device can produce is strictly limited in our approach. Instead of focusing on
the design of TTD values, we jointly optimize both the TTD and PS values to
effectively cope with the practical time delay constraints. Simulation results
that illustrate the performance benefits of the new method for the beam squint
compensation are presented. Through simulations and analysis, we show that our
approach is a generalization of the prior TTD-based precoding approaches.
| [
{
"created": "Fri, 19 Nov 2021 18:58:22 GMT",
"version": "v1"
},
{
"created": "Sat, 12 Feb 2022 15:44:47 GMT",
"version": "v2"
},
{
"created": "Wed, 14 Dec 2022 17:51:45 GMT",
"version": "v3"
},
{
"created": "Sat, 21 Jan 2023 20:29:24 GMT",
"version": "v4"
}
] | 2023-01-24T00:00:00 | [
[
"Nguyen",
"Dang Qua",
""
],
[
"Kim",
"Taejoon",
""
]
] | 0no_new_dataset
|
1401.3381 | Jan Bergstra | Jan A. Bergstra and Mark Burgess | Promises, Impositions, and other Directionals | 55 pages | null | null | null | cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Promises, impositions, proposals, predictions, and suggestions are
categorized as voluntary co-operational methods. The class of voluntary
co-operational methods is included in the class of so-called directionals.
Directionals are mechanisms supporting the mutual coordination of autonomous
agents.
Notations are provided capable of expressing residual fragments of
directionals. An extensive example, involving promises about the suitability of
programs for tasks imposed on the promisee is presented. The example
illustrates the dynamics of promises and more specifically the corresponding
mechanism of trust updating and credibility updating. Trust levels and
credibility levels then determine the way certain promises and impositions are
handled.
The ubiquity of promises and impositions is further demonstrated with two
extensive examples involving human behaviour: an artificial example about an
agent planning a purchase, and a realistic example describing technology
mediated interaction concerning the solution of pay station failure related
problems arising for an agent intending to leave the parking area.
| [
{
"created": "Tue, 14 Jan 2014 22:55:11 GMT",
"version": "v1"
}
] | 2014-01-16T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Burgess",
"Mark",
""
]
] | 0no_new_dataset
|
1610.01922 | Mohamad Ivan Fanany | Arif Budiman, Mohamad Ivan Fanany, Chan Basaruddin | Adaptive Online Sequential ELM for Concept Drift Tackling | Hindawi Publishing. Computational Intelligence and Neuroscience
Volume 2016 (2016), Article ID 8091267, 17 pages Received 29 January 2016,
Accepted 17 May 2016. Special Issue on "Advances in Neural Networks and
Hybrid-Metaheuristics: Theory, Algorithms, and Novel Engineering
Applications". Academic Editor: Stefan Haufe | Computational Intelligence and Neuroscience Volume 2016 (2016),
Article ID 8091267, 17 pages | 10.1155/2016/8091267 | 8091267 | cs.AI cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A machine learning method needs to adapt to over time changes in the
environment. Such changes are known as concept drift. In this paper, we propose
concept drift tackling method as an enhancement of Online Sequential Extreme
Learning Machine (OS-ELM) and Constructive Enhancement OS-ELM (CEOS-ELM) by
adding adaptive capability for classification and regression problem. The
scheme is named as adaptive OS-ELM (AOS-ELM). It is a single classifier scheme
that works well to handle real drift, virtual drift, and hybrid drift. The
AOS-ELM also works well for sudden drift and recurrent context change type. The
scheme is a simple unified method implemented in simple lines of code. We
evaluated AOS-ELM on regression and classification problem by using concept
drift public data set (SEA and STAGGER) and other public data sets such as
MNIST, USPS, and IDS. Experiments show that our method gives higher kappa value
compared to the multiclassifier ELM ensemble. Even though AOS-ELM in practice
does not need hidden nodes increase, we address some issues related to the
increasing of the hidden nodes such as error condition and rank values. We
propose taking the rank of the pseudoinverse matrix as an indicator parameter
to detect underfitting condition.
| [
{
"created": "Thu, 6 Oct 2016 16:08:52 GMT",
"version": "v1"
}
] | 2016-10-10T00:00:00 | [
[
"Budiman",
"Arif",
""
],
[
"Fanany",
"Mohamad Ivan",
""
],
[
"Basaruddin",
"Chan",
""
]
] | 0no_new_dataset
|
1811.04985 | Aswin Raghavan | Samyak Parajuli, Aswin Raghavan, Sek Chai | Generalized Ternary Connect: End-to-End Learning and Compression of
Multiplication-Free Deep Neural Networks | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of deep neural networks in edge computing devices hinges on the
balance between accuracy and complexity of computations. Ternary Connect (TC)
\cite{lin2015neural} addresses this issue by restricting the parameters to
three levels $-1, 0$, and $+1$, thus eliminating multiplications in the forward
pass of the network during prediction. We propose Generalized Ternary Connect
(GTC), which allows an arbitrary number of levels while at the same time
eliminating multiplications by restricting the parameters to integer powers of
two. The primary contribution is that GTC learns the number of levels and their
values for each layer, jointly with the weights of the network in an end-to-end
fashion. Experiments on MNIST and CIFAR-10 show that GTC naturally converges to
an `almost binary' network for deep classification networks (e.g. VGG-16) and
deep variational auto-encoders, with negligible loss of classification accuracy
and comparable visual quality of generated samples respectively. We demonstrate
superior compression and similar accuracy of GTC in comparison to several
state-of-the-art methods for neural network compression. We conclude with
simulations showing the potential benefits of GTC in hardware.
| [
{
"created": "Mon, 12 Nov 2018 20:08:00 GMT",
"version": "v1"
}
] | 2018-11-14T00:00:00 | [
[
"Parajuli",
"Samyak",
""
],
[
"Raghavan",
"Aswin",
""
],
[
"Chai",
"Sek",
""
]
] | 0no_new_dataset
|
2105.02851 | Colin Shea-Blymyer | Colin Shea-Blymyer and Houssam Abbas | Algorithmic Ethics: Formalization and Verification of Autonomous Vehicle
Obligations | To be published in ACT Transactions on Cyber-Physical Systems Special
Issue on Artificial Intelligence and Cyber-Physical Systems. arXiv admin
note: text overlap with arXiv:2009.00738 | null | 10.1145/3460975 | null | cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | We develop a formal framework for automatic reasoning about the obligations
of autonomous cyber-physical systems, including their social and ethical
obligations. Obligations, permissions and prohibitions are distinct from a
system's mission, and are a necessary part of specifying advanced, adaptive
AI-equipped systems. They need a dedicated deontic logic of obligations to
formalize them. Most existing deontic logics lack corresponding algorithms and
system models that permit automatic verification. We demonstrate how a
particular deontic logic, Dominance Act Utilitarianism (DAU), is a suitable
starting point for formalizing the obligations of autonomous systems like
self-driving cars. We demonstrate its usefulness by formalizing a subset of
Responsibility-Sensitive Safety (RSS) in DAU; RSS is an industrial proposal for
how self-driving cars should and should not behave in traffic. We show that
certain logical consequences of RSS are undesirable, indicating a need to
further refine the proposal. We also demonstrate how obligations can change
over time, which is necessary for long-term autonomy. We then demonstrate a
model-checking algorithm for DAU formulas on weighted transition systems, and
illustrate it by model-checking obligations of a self-driving car controller
from the literature.
| [
{
"created": "Thu, 6 May 2021 17:41:06 GMT",
"version": "v1"
}
] | 2021-05-07T00:00:00 | [
[
"Shea-Blymyer",
"Colin",
""
],
[
"Abbas",
"Houssam",
""
]
] | 0no_new_dataset
|
1610.09795 | Omar Al-Bataineh | Omar Al-Bataineh, Mark Reynolds, and Tim French | Finding Minimum and Maximum Termination Time of Timed Automata Models
with Cyclic Behaviour | null | null | null | null | cs.FL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a novel algorithm for computing best and worst case
execution times (BCET/WCET) of timed automata models with cyclic behaviour. The
algorithms can work on any arbitrary diagonal-free TA and can handle more cases
than previously existing algorithms for BCET/WCET computations, as it can
handle cycles in TA and decide whether they lead to an infinite WCET. We show
soundness of the proposed algorithm and study its complexity. To our knowledge,
this is the first model checking algorithm that addresses comprehensively the
BCET/WCET problem of systems with cyclic behaviour. Behrmann et al. provide an
algorithm for computing the minimum cost/time of reaching a goal state in
priced timed automata (PTA). The algorithm has been implemented in the
well-known model checking tool UPPAAL to compute the minimum time for
termination of an automaton. However, we show that in certain circumstances,
when infinite cycles exist, the algorithm implemented in UPPAAL may not
terminate, and we provide examples which UPPAAL fails to verify.
| [
{
"created": "Mon, 31 Oct 2016 06:09:16 GMT",
"version": "v1"
}
] | 2016-11-01T00:00:00 | [
[
"Al-Bataineh",
"Omar",
""
],
[
"Reynolds",
"Mark",
""
],
[
"French",
"Tim",
""
]
] | 0no_new_dataset
|
2308.03695 | Anuj Dawar | Anuj Dawar and Lauri Hella | Quantifiers closed under partial polymorphisms | Submitted. 17 pages | null | null | null | cs.LO | http://creativecommons.org/licenses/by/4.0/ | We study Lindstrom quantifiers that satisfy certain closure properties which
are motivated by the study of polymorphisms in the context of constraint
satisfaction problems (CSP). When the algebra of polymorphisms of a finite
structure B satisfies certain equations, this gives rise to a natural closure
condition on the class of structures that map homomorphically to B. The
collection of quantifiers that satisfy closure conditions arising from a fixed
set of equations are rather more general than those arising as CSP. For any
such conditions P, we define a pebble game that delimits the distinguishing
power of the infinitary logic with all quantifiers that are P-closed. We use
the pebble game to show that the problem of deciding whether a system of linear
equations is solvable in Z2 is not expressible in the infinitary logic with all
quantifiers closed under a near-unanimity condition.
| [
{
"created": "Mon, 7 Aug 2023 16:12:31 GMT",
"version": "v1"
}
] | 2023-08-08T00:00:00 | [
[
"Dawar",
"Anuj",
""
],
[
"Hella",
"Lauri",
""
]
] | 0no_new_dataset
|
2405.02954 | Wenyu Zhang | Wenyu Zhang and Li Shen and Chuan-Sheng Foo | Source-Free Domain Adaptation Guided by Vision and Vision-Language
Pre-Training | Extension of ICCV paper arXiv:2212.07585, submitted to IJCV | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Source-free domain adaptation (SFDA) aims to adapt a source model trained on
a fully-labeled source domain to a related but unlabeled target domain. While
the source model is a key avenue for acquiring target pseudolabels, the
generated pseudolabels may exhibit source bias. In the conventional SFDA
pipeline, a large data (e.g. ImageNet) pre-trained feature extractor is used to
initialize the source model at the start of source training, and subsequently
discarded. Despite having diverse features important for generalization, the
pre-trained feature extractor can overfit to the source data distribution
during source training and forget relevant target domain knowledge. Rather than
discarding this valuable knowledge, we introduce an integrated framework to
incorporate pre-trained networks into the target adaptation process. The
proposed framework is flexible and allows us to plug modern pre-trained
networks into the adaptation process to leverage their stronger representation
learning capabilities. For adaptation, we propose the Co-learn algorithm to
improve target pseudolabel quality collaboratively through the source model and
a pre-trained feature extractor. Building on the recent success of the
vision-language model CLIP in zero-shot image recognition, we present an
extension Co-learn++ to further incorporate CLIP's zero-shot classification
decisions. We evaluate on 3 benchmark datasets and include more challenging
scenarios such as open-set, partial-set and open-partial SFDA. Experimental
results demonstrate that our proposed strategy improves adaptation performance
and can be successfully integrated with existing SFDA methods.
| [
{
"created": "Sun, 5 May 2024 14:48:13 GMT",
"version": "v1"
}
] | 2024-05-07T00:00:00 | [
[
"Zhang",
"Wenyu",
""
],
[
"Shen",
"Li",
""
],
[
"Foo",
"Chuan-Sheng",
""
]
] | 0no_new_dataset
|
2107.00956 | R\'emy Portelas | Grgur Kova\v{c}, R\'emy Portelas, Katja Hofmann, Pierre-Yves Oudeyer | SocialAI: Benchmarking Socio-Cognitive Abilities in Deep Reinforcement
Learning Agents | under review. This paper extends and generalizes work in
arXiv:2104.13207 | null | null | null | cs.LG cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Building embodied autonomous agents capable of participating in social
interactions with humans is one of the main challenges in AI. Within the Deep
Reinforcement Learning (DRL) field, this objective motivated multiple works on
embodied language use. However, current approaches focus on language as a
communication tool in very simplified and non-diverse social situations: the
"naturalness" of language is reduced to the concept of high vocabulary size and
variability. In this paper, we argue that aiming towards human-level AI
requires a broader set of key social skills: 1) language use in complex and
variable social contexts; 2) beyond language, complex embodied communication in
multimodal settings within constantly evolving social worlds. We explain how
concepts from cognitive sciences could help AI to draw a roadmap towards
human-like intelligence, with a focus on its social dimensions. As a first
step, we propose to expand current research to a broader set of core social
skills. To do this, we present SocialAI, a benchmark to assess the acquisition
of social skills of DRL agents using multiple grid-world environments featuring
other (scripted) social agents. We then study the limits of a recent SOTA DRL
approach when tested on SocialAI and discuss important next steps towards
proficient social agents. Videos and code are available at
https://sites.google.com/view/socialai.
| [
{
"created": "Fri, 2 Jul 2021 10:39:18 GMT",
"version": "v1"
},
{
"created": "Tue, 6 Jul 2021 06:42:34 GMT",
"version": "v2"
},
{
"created": "Wed, 1 Sep 2021 15:51:52 GMT",
"version": "v3"
}
] | 2021-09-02T00:00:00 | [
[
"Kovač",
"Grgur",
""
],
[
"Portelas",
"Rémy",
""
],
[
"Hofmann",
"Katja",
""
],
[
"Oudeyer",
"Pierre-Yves",
""
]
] | 1new_dataset
|
2101.11212 | Muhammad Asif Ali | Muhammad Asif Ali, Yifang Sun, Bing Li, Wei Wang | FGNET-RH: Fine-Grained Named Entity Typing via Refinement in Hyperbolic
Space | Updated the Abstract and title to make it true representative of the
paper | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Fine-Grained Named Entity Typing (FG-NET) aims at classifying the entity
mentions into a wide range of entity types (usually hundreds) depending upon
the context. While distant supervision is the most common way to acquire
supervised training data, it brings in label noise, as it assigns type labels
to the entity mentions irrespective of mentions context. In attempts to deal
with the label noise, leading research on the FG-NET assumes that the
fine-grained entity typing data possesses a euclidean nature, which restraints
the ability of the existing models in combating the label noise. Given the fact
that the fine-grained type hierarchy exhibits a hierarchical structure, it
makes hyperbolic space a natural choice to model the FG-NET data. In this
research, we propose FGNET-RH, a novel framework that benefits from the
hyperbolic geometry in combination with the graph structures to perform entity
typing in a performance-enhanced fashion. FGNET-RH initially uses LSTM networks
to encode the mention in relation with its context, later it forms a graph to
distill/refine the mention encodings in the hyperbolic space. Finally, the
refined mention encoding is used for entity typing. Experimentation using
different benchmark datasets shows that FGNET-RH improves the performance on
FG-NET by up to 3.5-% in terms of strict accuracy.
| [
{
"created": "Wed, 27 Jan 2021 05:39:05 GMT",
"version": "v1"
},
{
"created": "Thu, 20 Jan 2022 16:42:30 GMT",
"version": "v2"
},
{
"created": "Sat, 18 Jun 2022 09:14:04 GMT",
"version": "v3"
}
] | 2022-06-22T00:00:00 | [
[
"Ali",
"Muhammad Asif",
""
],
[
"Sun",
"Yifang",
""
],
[
"Li",
"Bing",
""
],
[
"Wang",
"Wei",
""
]
] | 0no_new_dataset
|
1804.09449 | Vahan Mkrtchyan | Giuseppe Mazzuoccolo, Vahan Mkrtchyan | Normal edge-colorings of cubic graphs | 17 pages, 6 figures | null | 10.1002/jgt.22507 | null | cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A normal $k$-edge-coloring of a cubic graph is an edge-coloring with $k$
colors having the additional property that when looking at the set of colors
assigned to any edge $e$ and the four edges adjacent it, we have either exactly
five distinct colors or exactly three distinct colors. We denote by
$\chi'_{N}(G)$ the smallest $k$, for which $G$ admits a normal
$k$-edge-coloring. Normal $k$-edge-colorings were introduced by Jaeger in order
to study his well-known Petersen Coloring Conjecture. More precisely, it is
known that proving $\chi'_{N}(G)\leq 5$ for every bridgeless cubic graph is
equivalent to proving Petersen Coloring Conjecture and then, among others,
Cycle Double Cover Conjecture and Berge-Fulkerson Conjecture. Considering the
larger class of all simple cubic graphs (not necessarily bridgeless), some
interesting questions naturally arise. For instance, there exist simple cubic
graphs, not bridgeless, with $\chi'_{N}(G)=7$. On the other hand, the known
best general upper bound for $\chi'_{N}(G)$ was $9$. Here, we improve it by
proving that $\chi'_{N}(G)\leq7$ for any simple cubic graph $G$, which is best
possible. We obtain this result by proving the existence of specific no-where
zero $\mathbb{Z}_2^2$-flows in $4$-edge-connected graphs.
| [
{
"created": "Wed, 25 Apr 2018 09:30:19 GMT",
"version": "v1"
},
{
"created": "Wed, 13 Mar 2019 16:14:39 GMT",
"version": "v2"
}
] | 2021-10-05T00:00:00 | [
[
"Mazzuoccolo",
"Giuseppe",
""
],
[
"Mkrtchyan",
"Vahan",
""
]
] | 0no_new_dataset
|
2211.11690 | Joshua Lockhart | Joshua Lockhart, Daniele Magazzeni, Manuela Veloso | Learn to explain yourself, when you can: Equipping Concept Bottleneck
Models with the ability to abstain on their concept predictions | Changed LaTeX template | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Concept Bottleneck Models (CBMs) of Koh et al. [2020] provide a means to
ensure that a neural network based classifier bases its predictions solely on
human understandable concepts. The concept labels, or rationales as we refer to
them, are learned by the concept labeling component of the CBM. Another
component learns to predict the target classification label from these
predicted concept labels. Unfortunately, these models are heavily reliant on
human provided concept labels for each datapoint. To enable CBMs to behave
robustly when these labels are not readily available, we show how to equip them
with the ability to abstain from predicting concepts when the concept labeling
component is uncertain. In other words, our model learns to provide rationales
for its predictions, but only whenever it is sure the rationale is correct.
| [
{
"created": "Mon, 21 Nov 2022 18:07:14 GMT",
"version": "v1"
},
{
"created": "Sun, 18 Dec 2022 22:06:46 GMT",
"version": "v2"
}
] | 2022-12-20T00:00:00 | [
[
"Lockhart",
"Joshua",
""
],
[
"Magazzeni",
"Daniele",
""
],
[
"Veloso",
"Manuela",
""
]
] | 0no_new_dataset
|
2302.06832 | Hyung-Chan An | Yongho Shin, Changyeol Lee, Gukryeol Lee, Hyung-Chan An | Improved Learning-Augmented Algorithms for the Multi-Option Ski Rental
Problem via Best-Possible Competitive Analysis | 23 pages, 1 figure | null | null | null | cs.DS cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this paper, we present improved learning-augmented algorithms for the
multi-option ski rental problem. Learning-augmented algorithms take ML
predictions as an added part of the input and incorporates these predictions in
solving the given problem. Due to their unique strength that combines the power
of ML predictions with rigorous performance guarantees, they have been
extensively studied in the context of online optimization problems. Even though
ski rental problems are one of the canonical problems in the field of online
optimization, only deterministic algorithms were previously known for
multi-option ski rental, with or without learning augmentation. We present the
first randomized learning-augmented algorithm for this problem, surpassing
previous performance guarantees given by deterministic algorithms. Our
learning-augmented algorithm is based on a new, provably best-possible
randomized competitive algorithm for the problem. Our results are further
complemented by lower bounds for deterministic and randomized algorithms, and
computational experiments evaluating our algorithms' performance improvements.
| [
{
"created": "Tue, 14 Feb 2023 05:05:03 GMT",
"version": "v1"
}
] | 2023-02-15T00:00:00 | [
[
"Shin",
"Yongho",
""
],
[
"Lee",
"Changyeol",
""
],
[
"Lee",
"Gukryeol",
""
],
[
"An",
"Hyung-Chan",
""
]
] | 0no_new_dataset
|
1706.06982 | Matthew Tesfaldet | Matthew Tesfaldet, Marcus A. Brubaker, Konstantinos G. Derpanis | Two-Stream Convolutional Networks for Dynamic Texture Synthesis | In proc. CVPR 2018. Full results available at
https://ryersonvisionlab.github.io/two-stream-projpage/ | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a two-stream model for dynamic texture synthesis. Our model is
based on pre-trained convolutional networks (ConvNets) that target two
independent tasks: (i) object recognition, and (ii) optical flow prediction.
Given an input dynamic texture, statistics of filter responses from the object
recognition ConvNet encapsulate the per-frame appearance of the input texture,
while statistics of filter responses from the optical flow ConvNet model its
dynamics. To generate a novel texture, a randomly initialized input sequence is
optimized to match the feature statistics from each stream of an example
texture. Inspired by recent work on image style transfer and enabled by the
two-stream model, we also apply the synthesis approach to combine the texture
appearance from one texture with the dynamics of another to generate entirely
novel dynamic textures. We show that our approach generates novel, high quality
samples that match both the framewise appearance and temporal evolution of
input texture. Finally, we quantitatively evaluate our texture synthesis
approach with a thorough user study.
| [
{
"created": "Wed, 21 Jun 2017 16:09:28 GMT",
"version": "v1"
},
{
"created": "Fri, 24 Nov 2017 18:42:02 GMT",
"version": "v2"
},
{
"created": "Tue, 10 Apr 2018 23:47:29 GMT",
"version": "v3"
},
{
"created": "Thu, 12 Apr 2018 21:39:51 GMT",
"version": "v4"
}
] | 2018-04-16T00:00:00 | [
[
"Tesfaldet",
"Matthew",
""
],
[
"Brubaker",
"Marcus A.",
""
],
[
"Derpanis",
"Konstantinos G.",
""
]
] | 0no_new_dataset
|
2111.05684 | Kateryna Chumachenko | Firas Laakom, Kateryna Chumachenko, Jenni Raitoharju, Alexandros
Iosifidis, and Moncef Gabbouj | Learning to ignore: rethinking attention in CNNs | accepted to BMVC 2021 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, there has been an increasing interest in applying attention
mechanisms in Convolutional Neural Networks (CNNs) to solve computer vision
tasks. Most of these methods learn to explicitly identify and highlight
relevant parts of the scene and pass the attended image to further layers of
the network. In this paper, we argue that such an approach might not be
optimal. Arguably, explicitly learning which parts of the image are relevant is
typically harder than learning which parts of the image are less relevant and,
thus, should be ignored. In fact, in vision domain, there are many
easy-to-identify patterns of irrelevant features. For example, image regions
close to the borders are less likely to contain useful information for a
classification task. Based on this idea, we propose to reformulate the
attention mechanism in CNNs to learn to ignore instead of learning to attend.
Specifically, we propose to explicitly learn irrelevant information in the
scene and suppress it in the produced representation, keeping only important
attributes. This implicit attention scheme can be incorporated into any
existing attention mechanism. In this work, we validate this idea using two
recent attention methods Squeeze and Excitation (SE) block and Convolutional
Block Attention Module (CBAM). Experimental results on different datasets and
model architectures show that learning to ignore, i.e., implicit attention,
yields superior performance compared to the standard approaches.
| [
{
"created": "Wed, 10 Nov 2021 13:47:37 GMT",
"version": "v1"
}
] | 2021-11-11T00:00:00 | [
[
"Laakom",
"Firas",
""
],
[
"Chumachenko",
"Kateryna",
""
],
[
"Raitoharju",
"Jenni",
""
],
[
"Iosifidis",
"Alexandros",
""
],
[
"Gabbouj",
"Moncef",
""
]
] | 0no_new_dataset
|
2307.02018 | Jionghao Lin | Dollaya Hirunyasiri, Danielle R. Thomas, Jionghao Lin, Kenneth R.
Koedinger, Vincent Aleven | Comparative Analysis of GPT-4 and Human Graders in Evaluating Praise
Given to Students in Synthetic Dialogues | 12 pages Workshop paper, The 24th International Conference on
Artificial Intelligence in Education, AIED 2023 Educational Dialogue Act
Classification, Large Language Models, Tutor Training | null | null | null | cs.CL cs.AI cs.HC | http://creativecommons.org/licenses/by/4.0/ | Research suggests that providing specific and timely feedback to human tutors
enhances their performance. However, it presents challenges due to the
time-consuming nature of assessing tutor performance by human evaluators. Large
language models, such as the AI-chatbot ChatGPT, hold potential for offering
constructive feedback to tutors in practical settings. Nevertheless, the
accuracy of AI-generated feedback remains uncertain, with scant research
investigating the ability of models like ChatGPT to deliver effective feedback.
In this work-in-progress, we evaluate 30 dialogues generated by GPT-4 in a
tutor-student setting. We use two different prompting approaches, the zero-shot
chain of thought and the few-shot chain of thought, to identify specific
components of effective praise based on five criteria. These approaches are
then compared to the results of human graders for accuracy. Our goal is to
assess the extent to which GPT-4 can accurately identify each praise criterion.
We found that both zero-shot and few-shot chain of thought approaches yield
comparable results. GPT-4 performs moderately well in identifying instances
when the tutor offers specific and immediate praise. However, GPT-4
underperforms in identifying the tutor's ability to deliver sincere praise,
particularly in the zero-shot prompting scenario where examples of sincere
tutor praise statements were not provided. Future work will focus on enhancing
prompt engineering, developing a more general tutoring rubric, and evaluating
our method using real-life tutoring dialogues.
| [
{
"created": "Wed, 5 Jul 2023 04:14:01 GMT",
"version": "v1"
}
] | 2023-07-06T00:00:00 | [
[
"Hirunyasiri",
"Dollaya",
""
],
[
"Thomas",
"Danielle R.",
""
],
[
"Lin",
"Jionghao",
""
],
[
"Koedinger",
"Kenneth R.",
""
],
[
"Aleven",
"Vincent",
""
]
] | 0no_new_dataset
|
2311.01078 | Samuel A. Prieto | Samuel A. Prieto, Nikolaos Giakoumidis, and Borja Garcia de Soto | Multi-agent robotic systems and exploration algorithms: Applications for
data collection in construction sites | null | null | 10.1002/rob.22316 | null | cs.RO cs.MA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The construction industry has been notoriously slow to adopt new technology
and embrace automation. This has resulted in lower efficiency and productivity
compared to other industries where automation has been widely adopted. However,
recent advancements in robotics and artificial intelligence offer a potential
solution to this problem. In this study, a methodology is proposed to integrate
multi-robotic systems in construction projects with the aim of increasing
efficiency and productivity. The proposed approach involves the use of multiple
robot and human agents working collaboratively to complete a construction task.
The methodology was tested through a case study that involved 3D digitization
of a small, occluded space using two robots and one human agent. The results
show that integrating multi-agent robotic systems in construction can
effectively overcome challenges and complete tasks efficiently. The
implications of this study suggest that multi-agent robotic systems could
revolutionize the industry.
| [
{
"created": "Thu, 2 Nov 2023 08:42:39 GMT",
"version": "v1"
}
] | 2024-04-03T00:00:00 | [
[
"Prieto",
"Samuel A.",
""
],
[
"Giakoumidis",
"Nikolaos",
""
],
[
"de Soto",
"Borja Garcia",
""
]
] | 0no_new_dataset
|
2306.07198 | Jeremy Gwinnup | Jeremy Gwinnup and Kevin Duh | A Survey of Vision-Language Pre-training from the Lens of Multimodal
Machine Translation | 10 pages | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large language models such as BERT and the GPT series started a paradigm
shift that calls for building general-purpose models via pre-training on large
datasets, followed by fine-tuning on task-specific datasets. There is now a
plethora of large pre-trained models for Natural Language Processing and
Computer Vision. Recently, we have seen rapid developments in the joint
Vision-Language space as well, where pre-trained models such as CLIP (Radford
et al., 2021) have demonstrated improvements in downstream tasks like image
captioning and visual question answering. However, surprisingly there is
comparatively little work on exploring these models for the task of multimodal
machine translation, where the goal is to leverage image/video modality in
text-to-text translation. To fill this gap, this paper surveys the landscape of
language-and-vision pre-training from the lens of multimodal machine
translation. We summarize the common architectures, pre-training objectives,
and datasets from literature and conjecture what further is needed to make
progress on multimodal machine translation.
| [
{
"created": "Mon, 12 Jun 2023 15:56:10 GMT",
"version": "v1"
}
] | 2023-06-13T00:00:00 | [
[
"Gwinnup",
"Jeremy",
""
],
[
"Duh",
"Kevin",
""
]
] | 0no_new_dataset
|
2105.02551 | Jary Pomponi | Jary Pomponi, Simone Scardapane, and Aurelio Uncini | Structured Ensembles: an Approach to Reduce the Memory Footprint of
Ensemble Methods | Article accepted at Neural Networks | null | 10.1016/j.neunet.2021.09.007 | null | cs.LG cs.AI stat.ML | http://creativecommons.org/licenses/by/4.0/ | In this paper, we propose a novel ensembling technique for deep neural
networks, which is able to drastically reduce the required memory compared to
alternative approaches. In particular, we propose to extract multiple
sub-networks from a single, untrained neural network by solving an end-to-end
optimization task combining differentiable scaling over the original
architecture, with multiple regularization terms favouring the diversity of the
ensemble. Since our proposal aims to detect and extract sub-structures, we call
it Structured Ensemble. On a large experimental evaluation, we show that our
method can achieve higher or comparable accuracy to competing methods while
requiring significantly less storage. In addition, we evaluate our ensembles in
terms of predictive calibration and uncertainty, showing they compare
favourably with the state-of-the-art. Finally, we draw a link with the
continual learning literature, and we propose a modification of our framework
to handle continuous streams of tasks with a sub-linear memory cost. We compare
with a number of alternative strategies to mitigate catastrophic forgetting,
highlighting advantages in terms of average accuracy and memory.
| [
{
"created": "Thu, 6 May 2021 09:56:01 GMT",
"version": "v1"
},
{
"created": "Fri, 17 Sep 2021 08:51:12 GMT",
"version": "v2"
}
] | 2022-10-07T00:00:00 | [
[
"Pomponi",
"Jary",
""
],
[
"Scardapane",
"Simone",
""
],
[
"Uncini",
"Aurelio",
""
]
] | 0no_new_dataset
|
2310.02206 | Thomas Lee | Thomas L. Lee, Amos Storkey | Chunking: Continual Learning is not just about Distribution Shift | Published at the 3rd Conference on Lifelong Learning Agents (CoLLAs),
2024 | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | Work on continual learning (CL) has thus far largely focused on the problems
arising from shifts in the data distribution. However, CL can be decomposed
into two sub-problems: (a) shifts in the data distribution, and (b) dealing
with the fact that the data is split into chunks and so only a part of the data
is available to be trained on at any point in time. In this work, we look at
the latter sub-problem, the chunking of data. We show that chunking is an
important part of CL, accounting for around half of the performance drop from
offline learning in our experiments. Furthermore, our results reveal that
current CL algorithms do not address the chunking sub-problem, only performing
as well as plain SGD training when there is no shift in the data distribution.
Therefore, we show that chunking is both an important and currently unaddressed
sub-problem and until it is addressed CL methods will be capped in performance.
Additionally, we analyse why performance drops when learning occurs on
identically distributed chunks of data, and find that forgetting, which is
often seen to be a problem due to distribution shift, still arises and is a
significant problem. We also show that performance on the chunking sub-problem
can be increased and that this performance transfers to the full CL setting,
where there is distribution shift. Hence, we argue that work on chunking can
help advance CL in general.
| [
{
"created": "Tue, 3 Oct 2023 17:04:33 GMT",
"version": "v1"
},
{
"created": "Thu, 11 Jul 2024 12:13:38 GMT",
"version": "v2"
}
] | 2024-07-12T00:00:00 | [
[
"Lee",
"Thomas L.",
""
],
[
"Storkey",
"Amos",
""
]
] | 0no_new_dataset
|
2303.04887 | Kai Zhang | Kai Zhang, Yutong Dai, Hongyi Wang, Eric Xing, Xun Chen, Lichao Sun | Memory-adaptive Depth-wise Heterogenous Federated Learning | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Federated learning is a promising paradigm that allows multiple clients to
collaboratively train a model without sharing the local data. However, the
presence of heterogeneous devices in federated learning, such as mobile phones
and IoT devices with varying memory capabilities, would limit the scale and
hence the performance of the model could be trained. The mainstream approaches
to address memory limitations focus on width-slimming techniques, where
different clients train subnetworks with reduced widths locally and then the
server aggregates the subnetworks. The global model produced from these methods
suffers from performance degradation due to the negative impact of the actions
taken to handle the varying subnetwork widths in the aggregation phase. In this
paper, we introduce a memory-adaptive depth-wise learning solution in FL called
FeDepth, which adaptively decomposes the full model into blocks according to
the memory budgets of each client and trains blocks sequentially to obtain a
full inference model. Our method outperforms state-of-the-art approaches,
achieving 5% and more than 10% improvements in top-1 accuracy on CIFAR-10 and
CIFAR-100, respectively. We also demonstrate the effectiveness of depth-wise
fine-tuning on ViT. Our findings highlight the importance of memory-aware
techniques for federated learning with heterogeneous devices and the success of
depth-wise training strategy in improving the global model's performance.
| [
{
"created": "Wed, 8 Mar 2023 20:52:57 GMT",
"version": "v1"
},
{
"created": "Wed, 10 Jan 2024 18:03:01 GMT",
"version": "v2"
}
] | 2024-01-11T00:00:00 | [
[
"Zhang",
"Kai",
""
],
[
"Dai",
"Yutong",
""
],
[
"Wang",
"Hongyi",
""
],
[
"Xing",
"Eric",
""
],
[
"Chen",
"Xun",
""
],
[
"Sun",
"Lichao",
""
]
] | 0no_new_dataset
|
2401.08686 | Andr\'e Luiz Vieira e Silva | Andr\'e Luiz B. Vieira e Silva, Francisco Sim\~oes, Danny Kowerko,
Tobias Schlosser, Felipe Battisti, Veronica Teichrieb | Attention Modules Improve Modern Image-Level Anomaly Detection: A
DifferNet Case Study | Accepted to CVPRW 2023: VISION'23 - 1st workshop on Vision-based
InduStrial InspectiON (Extended Abstract). arXiv admin note: substantial text
overlap with arXiv:2311.02747 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Within (semi-)automated visual inspection, learning-based approaches for
assessing visual defects, including deep neural networks, enable the processing
of otherwise small defect patterns in pixel size on high-resolution imagery.
The emergence of these often rarely occurring defect patterns explains the
general need for labeled data corpora. To not only alleviate this issue but to
furthermore advance the current state of the art in unsupervised visual
inspection, this contribution proposes a DifferNet-based solution enhanced with
attention modules utilizing SENet and CBAM as backbone - AttentDifferNet - to
improve the detection and classification capabilities on three different visual
inspection and anomaly detection datasets: MVTec AD, InsPLAD-fault, and
Semiconductor Wafer. In comparison to the current state of the art, it is shown
that AttentDifferNet achieves improved results, which are, in turn, highlighted
throughout our quantitative as well as qualitative evaluation, indicated by a
general improvement in AUC of 94.34 vs. 92.46, 96.67 vs. 94.69, and 90.20 vs.
88.74%. As our variants to AttentDifferNet show great prospects in the context
of currently investigated approaches, a baseline is formulated, emphasizing the
importance of attention for anomaly detection.
| [
{
"created": "Sat, 13 Jan 2024 03:09:47 GMT",
"version": "v1"
}
] | 2024-01-18T00:00:00 | [
[
"Silva",
"André Luiz B. Vieira e",
""
],
[
"Simões",
"Francisco",
""
],
[
"Kowerko",
"Danny",
""
],
[
"Schlosser",
"Tobias",
""
],
[
"Battisti",
"Felipe",
""
],
[
"Teichrieb",
"Veronica",
""
]
] | 1new_dataset
|
1604.06899 | Philipp Singer | Philipp Singer, Emilio Ferrara, Farshad Kooti, Markus Strohmaier and
Kristina Lerman | Evidence of Online Performance Deterioration in User Sessions on Reddit | Published in PlosOne | PLoS ONE 11(8): e0161636, 2016 | 10.1371/journal.pone.0161636 | null | cs.SI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents evidence of performance deterioration in online user
sessions quantified by studying a massive dataset containing over 55 million
comments posted on Reddit in April 2015. After segmenting the sessions (i.e.,
periods of activity without a prolonged break) depending on their intensity
(i.e., how many posts users produced during sessions), we observe a general
decrease in the quality of comments produced by users over the course of
sessions. We propose mixed-effects models that capture the impact of session
intensity on comments, including their length, quality, and the responses they
generate from the community. Our findings suggest performance deterioration:
Sessions of increasing intensity are associated with the production of shorter,
progressively less complex comments, which receive declining quality scores (as
rated by other users), and are less and less engaging (i.e., they attract fewer
responses). Our contribution evokes a connection between cognitive and
attention dynamics and the usage of online social peer production platforms,
specifically the effects of deterioration of user performance.
| [
{
"created": "Sat, 23 Apr 2016 12:22:24 GMT",
"version": "v1"
},
{
"created": "Fri, 26 Aug 2016 10:30:25 GMT",
"version": "v2"
}
] | 2017-03-07T00:00:00 | [
[
"Singer",
"Philipp",
""
],
[
"Ferrara",
"Emilio",
""
],
[
"Kooti",
"Farshad",
""
],
[
"Strohmaier",
"Markus",
""
],
[
"Lerman",
"Kristina",
""
]
] | 1new_dataset
|
2109.07724 | Aron Laszka | Shanto Roy and Salah Uddin Kadir and Yevgeniy Vorobeychik and Aron
Laszka | Strategic Remote Attestation: Testbed for Internet-of-Things Devices and
Stackelberg Security Game for Optimal Strategies | null | null | null | null | cs.CR cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Internet of Things (IoT) devices and applications can have significant
vulnerabilities, which may be exploited by adversaries to cause considerable
harm. An important approach for mitigating this threat is remote attestation,
which enables the defender to remotely verify the integrity of devices and
their software. There are a number of approaches for remote attestation, and
each has its unique advantages and disadvantages in terms of detection accuracy
and computational cost. Further, an attestation method may be applied in
multiple ways, such as various levels of software coverage. Therefore, to
minimize both security risks and computational overhead, defenders need to
decide strategically which attestation methods to apply and how to apply them,
depending on the characteristic of the devices and the potential losses.
To answer these questions, we first develop a testbed for remote attestation
of IoT devices, which enables us to measure the detection accuracy and
performance overhead of various attestation methods. Our testbed integrates two
example IoT applications, memory-checksum based attestation, and a variety of
software vulnerabilities that allow adversaries to inject arbitrary code into
running applications. Second, we model the problem of finding an optimal
strategy for applying remote attestation as a Stackelberg security game between
a defender and an adversary. We characterize the defender's optimal attestation
strategy in a variety of special cases. Finally, building on experimental
results from our testbed, we evaluate our model and show that optimal strategic
attestation can lead to significantly lower losses than naive baseline
strategies.
| [
{
"created": "Thu, 16 Sep 2021 05:05:18 GMT",
"version": "v1"
},
{
"created": "Sun, 26 Sep 2021 23:12:10 GMT",
"version": "v2"
}
] | 2021-09-28T00:00:00 | [
[
"Roy",
"Shanto",
""
],
[
"Kadir",
"Salah Uddin",
""
],
[
"Vorobeychik",
"Yevgeniy",
""
],
[
"Laszka",
"Aron",
""
]
] | 0no_new_dataset
|
cs/0601061 | Vedran Kordic | I. Topalova | Modular Adaptive System Based on a Multi-Stage Neural Structure for
Recognition of 2D Objects of Discontinuous Production | www.ars-journal.com | International Journal of Advanced Robotics Systems, Vol.2No1.
(2005) | null | null | cs.RO | null | This is a presentation of a new system for invariant recognition of 2D
objects with overlapping classes, that can not be effectively recognized with
the traditional methods. The translation, scale and partial rotation invariant
contour object description is transformed in a DCT spectrum space. The obtained
frequency spectrums are decomposed into frequency bands in order to feed
different BPG neural nets (NNs). The NNs are structured in three stages -
filtering and full rotation invariance; partial recognition; general
classification. The designed multi-stage BPG Neural Structure shows very good
accuracy and flexibility when tested with 2D objects used in the discontinuous
production. The reached speed and the opportunuty for an easy restructuring and
reprogramming of the system makes it suitable for application in different
applied systems for real time work.
| [
{
"created": "Sat, 14 Jan 2006 08:25:25 GMT",
"version": "v1"
}
] | 2007-05-23T00:00:00 | [
[
"Topalova",
"I.",
""
]
] | 0no_new_dataset
|
2403.10330 | Tobias Leemann | Tobias Leemann, Martin Pawelczyk, Bardh Prenkaj, Gjergji Kasneci | Towards Non-Adversarial Algorithmic Recourse | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The streams of research on adversarial examples and counterfactual
explanations have largely been growing independently. This has led to several
recent works trying to elucidate their similarities and differences. Most
prominently, it has been argued that adversarial examples, as opposed to
counterfactual explanations, have a unique characteristic in that they lead to
a misclassification compared to the ground truth. However, the computational
goals and methodologies employed in existing counterfactual explanation and
adversarial example generation methods often lack alignment with this
requirement. Using formal definitions of adversarial examples and
counterfactual explanations, we introduce non-adversarial algorithmic recourse
and outline why in high-stakes situations, it is imperative to obtain
counterfactual explanations that do not exhibit adversarial characteristics. We
subsequently investigate how different components in the objective functions,
e.g., the machine learning model or cost function used to measure distance,
determine whether the outcome can be considered an adversarial example or not.
Our experiments on common datasets highlight that these design choices are
often more critical in deciding whether recourse is non-adversarial than
whether recourse or attack algorithms are used. Furthermore, we show that
choosing a robust and accurate machine learning model results in less
adversarial recourse desired in practice.
| [
{
"created": "Fri, 15 Mar 2024 14:18:21 GMT",
"version": "v1"
}
] | 2024-03-18T00:00:00 | [
[
"Leemann",
"Tobias",
""
],
[
"Pawelczyk",
"Martin",
""
],
[
"Prenkaj",
"Bardh",
""
],
[
"Kasneci",
"Gjergji",
""
]
] | 0no_new_dataset
|
1607.02060 | Huu-Hiep Nguyen | Hiep H. Nguyen, Abdessamad Imine, and Michael Rusinowitch | Detecting Communities under Differential Privacy | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex networks usually expose community structure with groups of nodes
sharing many links with the other nodes in the same group and relatively few
with the nodes of the rest. This feature captures valuable information about
the organization and even the evolution of the network. Over the last decade, a
great number of algorithms for community detection have been proposed to deal
with the increasingly complex networks. However, the problem of doing this in a
private manner is rarely considered. In this paper, we solve this problem under
differential privacy, a prominent privacy concept for releasing private data.
We analyze the major challenges behind the problem and propose several schemes
to tackle them from two perspectives: input perturbation and algorithm
perturbation. We choose Louvain method as the back-end community detection for
input perturbation schemes and propose the method LouvainDP which runs Louvain
algorithm on a noisy super-graph. For algorithm perturbation, we design
ModDivisive using exponential mechanism with the modularity as the score. We
have thoroughly evaluated our techniques on real graphs of different sizes and
verified their outperformance over the state-of-the-art.
| [
{
"created": "Thu, 7 Jul 2016 15:57:49 GMT",
"version": "v1"
}
] | 2016-07-08T00:00:00 | [
[
"Nguyen",
"Hiep H.",
""
],
[
"Imine",
"Abdessamad",
""
],
[
"Rusinowitch",
"Michael",
""
]
] | 0no_new_dataset
|
2202.11202 | Kaiwen Zha | Hao He, Kaiwen Zha, Dina Katabi | Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning | ICLR 2023 Spotlight (notable top 25%). The first two authors
contributed equally to this paper | null | null | null | cs.LG cs.AI cs.CR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Indiscriminate data poisoning attacks are quite effective against supervised
learning. However, not much is known about their impact on unsupervised
contrastive learning (CL). This paper is the first to consider indiscriminate
poisoning attacks of contrastive learning. We propose Contrastive Poisoning
(CP), the first effective such attack on CL. We empirically show that
Contrastive Poisoning, not only drastically reduces the performance of CL
algorithms, but also attacks supervised learning models, making it the most
generalizable indiscriminate poisoning attack. We also show that CL algorithms
with a momentum encoder are more robust to indiscriminate poisoning, and
propose a new countermeasure based on matrix completion. Code is available at:
https://github.com/kaiwenzha/contrastive-poisoning.
| [
{
"created": "Tue, 22 Feb 2022 22:31:57 GMT",
"version": "v1"
},
{
"created": "Tue, 4 Oct 2022 00:46:06 GMT",
"version": "v2"
},
{
"created": "Thu, 9 Mar 2023 05:16:49 GMT",
"version": "v3"
}
] | 2023-03-10T00:00:00 | [
[
"He",
"Hao",
""
],
[
"Zha",
"Kaiwen",
""
],
[
"Katabi",
"Dina",
""
]
] | 0no_new_dataset
|
2102.05096 | Jay Nandy | Jay Nandy and Sudipan Saha and Wynne Hsu and Mong Li Lee and Xiao
Xiang Zhu | Towards Bridging the gap between Empirical and Certified Robustness
against Adversarial Examples | An abridged version of this work has been presented at ICLR 2021
Workshop on Security and Safety in Machine Learning Systems:
https://aisecure-workshop.github.io/aml-iclr2021/papers/2.pdf | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The current state-of-the-art defense methods against adversarial examples
typically focus on improving either empirical or certified robustness. Among
them, adversarially trained (AT) models produce empirical state-of-the-art
defense against adversarial examples without providing any robustness
guarantees for large classifiers or higher-dimensional inputs. In contrast,
existing randomized smoothing based models achieve state-of-the-art certified
robustness while significantly degrading the empirical robustness against
adversarial examples. In this paper, we propose a novel method, called
\emph{Certification through Adaptation}, that transforms an AT model into a
randomized smoothing classifier during inference to provide certified
robustness for $\ell_2$ norm without affecting their empirical robustness
against adversarial attacks. We also propose \emph{Auto-Noise} technique that
efficiently approximates the appropriate noise levels to flexibly certify the
test examples using randomized smoothing technique. Our proposed
\emph{Certification through Adaptation} with \emph{Auto-Noise} technique
achieves an \textit{average certified radius (ACR) scores} up to $1.102$ and
$1.148$ respectively for CIFAR-10 and ImageNet datasets using AT models without
affecting their empirical robustness or benign accuracy. Therefore, our paper
is a step towards bridging the gap between the empirical and certified
robustness against adversarial examples by achieving both using the same
classifier.
| [
{
"created": "Tue, 9 Feb 2021 19:51:56 GMT",
"version": "v1"
},
{
"created": "Sun, 23 May 2021 08:16:34 GMT",
"version": "v2"
},
{
"created": "Sat, 30 Jul 2022 06:41:56 GMT",
"version": "v3"
}
] | 2022-08-02T00:00:00 | [
[
"Nandy",
"Jay",
""
],
[
"Saha",
"Sudipan",
""
],
[
"Hsu",
"Wynne",
""
],
[
"Lee",
"Mong Li",
""
],
[
"Zhu",
"Xiao Xiang",
""
]
] | 0no_new_dataset
|
2310.05494 | Tesshu Hanaka | Tesshu Hanaka and Yasuaki Kobayashi | Finding a Minimum Spanning Tree with a Small Non-Terminal Set | null | null | null | null | cs.DS cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the problem of finding a minimum weight spanning tree
that contains each vertex in a given subset $V_{\rm NT}$ of vertices as an
internal vertex. This problem, called Minimum Weight Non-Terminal Spanning
Tree, includes $s$-$t$ Hamiltonian Path as a special case, and hence it is
NP-hard. In this paper, we first observe that Non-Terminal Spanning Tree, the
unweighted counterpart of Minimum Weight Non-Terminal Spanning Tree, is already
NP-hard on some special graph classes. Moreover, it is W[1]-hard when
parameterized by clique-width. In contrast, we give a $3k$-vertex kernel and
$O^*(2^k)$-time algorithm, where $k$ is the size of non-terminal set $V_{\rm
NT}$. The latter algorithm can be extended to Minimum Weight Non-Terminal
Spanning Tree with the restriction that each edge has a polynomially bounded
integral weight. We also show that Minimum Weight Non-Terminal Spanning Tree is
fixed-parameter tractable parameterized by the number of edges in the subgraph
induced by the non-terminal set $V_{\rm NT}$, extending the fixed-parameter
tractability of Minimum Weight Non-Terminal Spanning Tree to the general case.
Finally, we give several results for structural parameterization.
| [
{
"created": "Mon, 9 Oct 2023 07:56:47 GMT",
"version": "v1"
}
] | 2023-10-10T00:00:00 | [
[
"Hanaka",
"Tesshu",
""
],
[
"Kobayashi",
"Yasuaki",
""
]
] | 0no_new_dataset
|
2305.11862 | Masahiro Kaneko | Masahiro Kaneko, Naoaki Okazaki | Reducing Sequence Length by Predicting Edit Operations with Large
Language Models | EMNLP2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) have demonstrated remarkable performance in
various tasks and gained significant attention. LLMs are also used for local
sequence transduction tasks, including grammatical error correction (GEC) and
formality style transfer, where most tokens in a source text are kept
unchanged. However, the models that generate all target tokens in such tasks
have a tendency to simply copy the input text as is, without making needed
changes, because the difference between input and output texts is minimal in
the training data. This is also inefficient because the computational cost
grows quadratically with the target sequence length with Transformer. This
paper proposes predicting edit spans for the source text for local sequence
transduction tasks. Representing an edit span with a position of the source
text and corrected tokens, we can reduce the length of the target sequence and
the computational cost for inference. We apply instruction tuning for LLMs on
the supervision data of edit spans. Experiments show that the proposed method
achieves comparable performance to the baseline in four tasks, paraphrasing,
formality style transfer, GEC, and text simplification, despite reducing the
length of the target text by as small as 21%. Furthermore, we report that the
task-specific fine-tuning with the proposed method achieved state-of-the-art
performance in the four tasks.
| [
{
"created": "Fri, 19 May 2023 17:51:05 GMT",
"version": "v1"
},
{
"created": "Sat, 21 Oct 2023 00:57:02 GMT",
"version": "v2"
}
] | 2023-10-24T00:00:00 | [
[
"Kaneko",
"Masahiro",
""
],
[
"Okazaki",
"Naoaki",
""
]
] | 0no_new_dataset
|
2111.06827 | Ashkan Ebadi | Ashkan Ebadi and Patrick Paul and Sofia Auer and St\'ephane Tremblay | NRC-GAMMA: Introducing a Novel Large Gas Meter Image Dataset | 12 pages, 7 figures, 1 table | null | null | null | cs.CV cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Automatic meter reading technology is not yet widespread. Gas, electricity,
or water accumulation meters reading is mostly done manually on-site either by
an operator or by the homeowner. In some countries, the operator takes a
picture as reading proof to confirm the reading by checking offline with
another operator and/or using it as evidence in case of conflicts or
complaints. The whole process is time-consuming, expensive, and prone to
errors. Automation can optimize and facilitate such labor-intensive and human
error-prone processes. With the recent advances in the fields of artificial
intelligence and computer vision, automatic meter reading systems are becoming
more viable than ever. Motivated by the recent advances in the field of
artificial intelligence and inspired by open-source open-access initiatives in
the research community, we introduce a novel large benchmark dataset of
real-life gas meter images, named the NRC-GAMMA dataset. The data were
collected from an Itron 400A diaphragm gas meter on January 20, 2020, between
00:05 am and 11:59 pm. We employed a systematic approach to label the images,
validate the labellings, and assure the quality of the annotations. The dataset
contains 28,883 images of the entire gas meter along with 57,766 cropped images
of the left and the right dial displays. We hope the NRC-GAMMA dataset helps
the research community to design and implement accurate, innovative,
intelligent, and reproducible automatic gas meter reading solutions.
| [
{
"created": "Fri, 12 Nov 2021 17:18:38 GMT",
"version": "v1"
}
] | 2021-11-15T00:00:00 | [
[
"Ebadi",
"Ashkan",
""
],
[
"Paul",
"Patrick",
""
],
[
"Auer",
"Sofia",
""
],
[
"Tremblay",
"Stéphane",
""
]
] | 1new_dataset
|
2005.07341 | Jianxiong Guo | Jianxiong Guo, Xingjian Ding, Weili Wu | An Architecture for Distributed Energies Trading in Byzantine-Based
Blockchain | null | IEEE Transactions on Green Communications and Networking, 2022 | 10.1109/TGCN.2022.3142438 | null | cs.NI cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the development of smart cities, not only are all corners of the city
connected to each other, but also connected from city to city. They form a
large distributed network together, which can facilitate the integration of
distributed energy station (DES) and corresponding smart aggregators.
Nevertheless, because of potential security and privacy protection arisen from
trustless energies trading, how to make such energies trading goes smoothly is
a tricky challenge. In this paper, we propose a blockchain-based multiple
energies trading (B-MET) system for secure and efficient energies trading by
executing a smart contract we design. Because energies trading requires the
blockchain in B-MET system to have high throughput and low latency, we design a
new byzantine-based consensus mechanism (BCM) based on node's credit to improve
efficiency for the consortium blockchain under the B-MET system. Then, we take
combined heat and power (CHP) system as a typical example that provides
distributed energies. We quantify their utilities, and model the interactions
between aggregators and DESs in a smart city by a novel multi-leader
multi-follower Stackelberg game. It is analyzed and solved by reaching Nash
equilibrium between aggregators, which reflects the competition between
aggregators to purchase energies from DESs. In the end, we conduct plenty of
numerical simulations to evaluate and verify our proposed model and algorithms,
which demonstrate their correctness and efficiency completely.
| [
{
"created": "Fri, 15 May 2020 03:42:29 GMT",
"version": "v1"
}
] | 2022-06-08T00:00:00 | [
[
"Guo",
"Jianxiong",
""
],
[
"Ding",
"Xingjian",
""
],
[
"Wu",
"Weili",
""
]
] | 0no_new_dataset
|
1705.00850 | Haiping Huang | Haiping Huang, and Alireza Goudarzi | Random active path model of deep neural networks with diluted binary
synapses | 10 pages, 5 figures, with Supplemental Material (upon request) | Phys. Rev. E 98, 042311 (2018) | 10.1103/PhysRevE.98.042311 | null | cs.LG cond-mat.stat-mech stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning has become a powerful and popular tool for a variety of machine
learning tasks. However, it is challenging to understand the mechanism of deep
learning from a theoretical perspective. In this work, we propose a random
active path model to study collective properties of deep neural networks with
binary synapses, under the removal perturbation of connections between layers.
In the model, the path from input to output is randomly activated, and the
corresponding input unit constrains the weights along the path into the form of
a $p$-weight interaction glass model. A critical value of the perturbation is
observed to separate a spin glass regime from a paramagnetic regime, with the
transition being of the first order. The paramagnetic phase is conjectured to
have a poor generalization performance.
| [
{
"created": "Tue, 2 May 2017 08:16:12 GMT",
"version": "v1"
},
{
"created": "Fri, 18 May 2018 00:49:27 GMT",
"version": "v2"
},
{
"created": "Wed, 26 Sep 2018 13:09:33 GMT",
"version": "v3"
}
] | 2018-10-31T00:00:00 | [
[
"Huang",
"Haiping",
""
],
[
"Goudarzi",
"Alireza",
""
]
] | 0no_new_dataset
|
1608.03127 | EPTCS | Sanjiva Prasad (Indian Institute of Technology Delhi), Lenore D. Zuck
(University of Illinois at Chicago) | Self-Similarity Breeds Resilience | In Proceedings EXPRESS/SOS 2016, arXiv:1608.02692 | EPTCS 222, 2016, pp. 30-44 | 10.4204/EPTCS.222.3 | null | cs.PL cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-similarity is the property of a system being similar to a part of
itself. We posit that a special class of behaviourally self-similar systems
exhibits a degree of resilience to adversarial behaviour. We formalise the
notions of system, adversary and resilience in operational terms, based on
transition systems and observations. While the general problem of proving
systems to be behaviourally self-similar is undecidable, we show, by casting
them in the framework of well-structured transition systems, that there is an
interesting class of systems for which the problem is decidable. We illustrate
our prescriptive framework for resilience with some small examples, e.g.,
systems robust to failures in a fail-stop model, and those avoiding
side-channel attacks.
| [
{
"created": "Wed, 10 Aug 2016 11:10:49 GMT",
"version": "v1"
}
] | 2016-08-11T00:00:00 | [
[
"Prasad",
"Sanjiva",
"",
"Indian Institute of Technology Delhi"
],
[
"Zuck",
"Lenore D.",
"",
"University of Illinois at Chicago"
]
] | 0no_new_dataset
|
2401.14421 | Chuhao Deng | Chuhao Deng and Hong-Cheol Choi and Hyunsang Park and Inseok Hwang | Multi-Agent Based Transfer Learning for Data-Driven Air Traffic
Applications | 12 pages, 8 figures, submitted for IEEE Transactions on Intelligent
Transportation System | null | null | null | cs.LG cs.MA cs.SY eess.SY stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Research in developing data-driven models for Air Traffic Management (ATM)
has gained a tremendous interest in recent years. However, data-driven models
are known to have long training time and require large datasets to achieve good
performance. To address the two issues, this paper proposes a Multi-Agent
Bidirectional Encoder Representations from Transformers (MA-BERT) model that
fully considers the multi-agent characteristic of the ATM system and learns air
traffic controllers' decisions, and a pre-training and fine-tuning transfer
learning framework. By pre-training the MA-BERT on a large dataset from a major
airport and then fine-tuning it to other airports and specific air traffic
applications, a large amount of the total training time can be saved. In
addition, for newly adopted procedures and constructed airports where no
historical data is available, this paper shows that the pre-trained MA-BERT can
achieve high performance by updating regularly with little data. The proposed
transfer learning framework and MA-BERT are tested with the automatic dependent
surveillance-broadcast data recorded in 3 airports in South Korea in 2019.
| [
{
"created": "Tue, 23 Jan 2024 22:21:07 GMT",
"version": "v1"
}
] | 2024-01-29T00:00:00 | [
[
"Deng",
"Chuhao",
""
],
[
"Choi",
"Hong-Cheol",
""
],
[
"Park",
"Hyunsang",
""
],
[
"Hwang",
"Inseok",
""
]
] | 1new_dataset
|
2101.12694 | Martin Messmer | Martin Messmer, Benjamin Kiefer, Andreas Zell | Gaining Scale Invariance in UAV Bird's Eye View Object Detection by
Adaptive Resizing | accepted for publication in ICPR 2022 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This work introduces a new preprocessing step for object detection applicable
to UAV bird's eye view imagery, which we call Adaptive Resizing. By design, it
helps alleviate the challenges coming with the vast variances in objects'
scales, naturally inherent to UAV data sets. Furthermore, it improves inference
speed by two to three times on average. We test this extensively on UAVDT,
VisDrone, and on a new data set we captured ourselves and achieve consistent
improvements while being considerably faster. Moreover, we show how to apply
this method to generic UAV object detection tasks. Additionally, we
successfully test our approach on a height transfer task where we train on some
interval of altitudes and test on a different one. Furthermore, we introduce a
small, fast detector meant for deployment to an embedded GPU. Code will be made
publicly available on our website.
| [
{
"created": "Fri, 29 Jan 2021 17:26:38 GMT",
"version": "v1"
},
{
"created": "Fri, 8 Apr 2022 14:22:27 GMT",
"version": "v2"
}
] | 2022-04-11T00:00:00 | [
[
"Messmer",
"Martin",
""
],
[
"Kiefer",
"Benjamin",
""
],
[
"Zell",
"Andreas",
""
]
] | 1new_dataset
|
cs/0701190 | Aaron Harwood | Thomas Jacobs and Aaron Harwood | A Peer-to-Peer Browsable File Index using a Popularity Based Global
Namespace | null | null | null | null | cs.DC cs.NI | null | The distribution of files using decentralized, peer-to-peer (P2P) systems,
has significant advantages over centralized approaches. It is however more
difficult to settle on the best approach for file sharing. Most file sharing
systems are based on query string searches, leading to a relatively simple but
inefficient broadcast or to an efficient but relatively complicated index in a
structured environment. In this paper we use a browsable peer-to-peer file
index consisting of files which serve as directory nodes, interconnecting to
form a directory network. We implemented the system based on BitTorrent and
Kademlia. The directory network inherits all of the advantages of
decentralization and provides browsable, efficient searching. To avoid conflict
between users in the P2P system while also imposing no additional restrictions,
we allow multiple versions of each directory node to simultaneously exist --
using popularity as the basis for default browsing behavior. Users can freely
add files and directory nodes to the network. We show, using a simulation of
user behavior and file quality, that the popularity based system consistently
leads users to a high quality directory network; above the average quality of
user updates. Q
| [
{
"created": "Tue, 30 Jan 2007 04:00:30 GMT",
"version": "v1"
}
] | 2007-05-23T00:00:00 | [
[
"Jacobs",
"Thomas",
""
],
[
"Harwood",
"Aaron",
""
]
] | 0no_new_dataset
|
2309.08166 | Le Xu | Le Xu, Jiangyan Yi, Jianhua Tao, Tao Wang, Yong Ren, Rongxiu Zhong | Controllable Residual Speaker Representation for Voice Conversion | submitted to ICASSP 2024 | null | null | null | cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, there have been significant advancements in voice conversion,
resulting in high-quality performance. However, there are still two critical
challenges in this field. Firstly, current voice conversion methods have
limited robustness when encountering unseen speakers. Secondly, they also have
limited ability to control timbre representation. To address these challenges,
this paper presents a novel approach leverages tokens of multi-layer residual
approximations to enhance robustness when dealing with unseen speakers, called
the residual speaker module. The introduction of multi-layer approximations
facilitates the separation of information from the timbre, enabling effective
control over timbre in voice conversion. The proposed method outperforms
baselines in both subjective and objective evaluations, demonstrating superior
performance and increased robustness. Our demo page is publicly available.
| [
{
"created": "Fri, 15 Sep 2023 05:27:21 GMT",
"version": "v1"
}
] | 2023-09-18T00:00:00 | [
[
"Xu",
"Le",
""
],
[
"Yi",
"Jiangyan",
""
],
[
"Tao",
"Jianhua",
""
],
[
"Wang",
"Tao",
""
],
[
"Ren",
"Yong",
""
],
[
"Zhong",
"Rongxiu",
""
]
] | 0no_new_dataset
|
2304.01393 | Erik Demaine | Erik D. Demaine and Martin L. Demaine | Every Author as First Author | 7 pages, 7 figures. Proceedings of SIGTBD 2023 | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new standard for writing author names on papers and in
bibliographies, which places every author as a first author -- superimposed.
This approach enables authors to write papers as true equals, without any
advantage given to whoever's name happens to come first alphabetically (for
example). We develop the technology for implementing this standard in LaTeX,
BibTeX, and HTML; show several examples; and discuss further advantages.
| [
{
"created": "Mon, 3 Apr 2023 21:58:05 GMT",
"version": "v1"
}
] | 2023-04-05T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
]
] | 0no_new_dataset
|
2405.18920 | Anastasios Papazafeiropoulos | Anastasios Papazafeiropoulos, Pandelis Kourtessis, Symeon Chatzinotas,
Dimitra I. Kaklamani, Iakovos S. Venieris | Achievable Rate Optimization for Large Stacked Intelligent Metasurfaces
Based on Statistical CSI | accepted in IEEE Wireless Communications Letters | null | null | null | cs.IT eess.SP math.IT | http://creativecommons.org/licenses/by/4.0/ | Stacked intelligent metasurface (SIM) is an emerging design that consists of
multiple layers of metasurfaces. A SIM enables holographic multiple-input
multiple-output (HMIMO) precoding in the wave domain, which results in the
reduction of energy consumption and hardware cost. On the ground of multiuser
beamforming, this letter focuses on the downlink achievable rate and its
maximization. Contrary to previous works on multiuser SIM, we consider
statistical channel state information (CSI) as opposed to instantaneous CSI to
overcome challenges such as large overhead. Also, we examine the performance of
large surfaces. We apply an alternating optimization (AO) algorithm regarding
the phases of the SIM and the allocated transmit power. Simulations illustrate
the performance of the considered large SIM-assisted design as well as the
comparison between different CSI considerations.
| [
{
"created": "Wed, 29 May 2024 09:24:19 GMT",
"version": "v1"
}
] | 2024-05-30T00:00:00 | [
[
"Papazafeiropoulos",
"Anastasios",
""
],
[
"Kourtessis",
"Pandelis",
""
],
[
"Chatzinotas",
"Symeon",
""
],
[
"Kaklamani",
"Dimitra I.",
""
],
[
"Venieris",
"Iakovos S.",
""
]
] | 0no_new_dataset
|
2406.18254 | Zhijie Nie | Zhijie Nie, Richong Zhang, Zhangchi Feng, Hailang Huang, Xudong Liu | Improving the Consistency in Cross-Lingual Cross-Modal Retrieval with
1-to-K Contrastive Learning | Accepted by KDD 2024 Research Track | null | 10.1145/3637528.3671787 | null | cs.IR cs.AI cs.MM | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Cross-lingual Cross-modal Retrieval (CCR) is an essential task in web search,
which aims to break the barriers between modality and language simultaneously
and achieves image-text retrieval in the multi-lingual scenario with a single
model. In recent years, excellent progress has been made based on cross-lingual
cross-modal pre-training; particularly, the methods based on contrastive
learning on large-scale data have significantly improved retrieval tasks.
However, these methods directly follow the existing pre-training methods in the
cross-lingual or cross-modal domain, leading to two problems of inconsistency
in CCR: The methods with cross-lingual style suffer from the intra-modal error
propagation, resulting in inconsistent recall performance across languages in
the whole dataset. The methods with cross-modal style suffer from the
inter-modal optimization direction bias, resulting in inconsistent rank across
languages within each instance, which cannot be reflected by Recall@K. To solve
these problems, we propose a simple but effective 1-to-K contrastive learning
method, which treats each language equally and eliminates error propagation and
optimization bias. In addition, we propose a new evaluation metric, Mean Rank
Variance (MRV), to reflect the rank inconsistency across languages within each
instance. Extensive experiments on four CCR datasets show that our method
improves both recall rates and MRV with smaller-scale pre-trained data,
achieving the new state-of-art.
| [
{
"created": "Wed, 26 Jun 2024 11:04:25 GMT",
"version": "v1"
}
] | 2024-06-27T00:00:00 | [
[
"Nie",
"Zhijie",
""
],
[
"Zhang",
"Richong",
""
],
[
"Feng",
"Zhangchi",
""
],
[
"Huang",
"Hailang",
""
],
[
"Liu",
"Xudong",
""
]
] | 0no_new_dataset
|
2311.02219 | Gleb Pogudin | Sergei Abramov and Gleb Pogudin | On the dimension of the solution space of linear difference equations
over the ring of infinite sequences | In memory of Marko Petkov\v{s}ek | null | null | null | cs.SC | http://creativecommons.org/licenses/by/4.0/ | For a linear difference equation with the coefficients being computable
sequences, we establish algorithmic undecidability of the problem of
determining the dimension of the solution space including the case when some
additional prior information on the dimension is available.
| [
{
"created": "Fri, 3 Nov 2023 20:13:55 GMT",
"version": "v1"
}
] | 2023-11-07T00:00:00 | [
[
"Abramov",
"Sergei",
""
],
[
"Pogudin",
"Gleb",
""
]
] | 0no_new_dataset
|
2104.02159 | Vandad Davoodnia | Vandad Davoodnia, Ali Etemad | Identity and Posture Recognition in Smart Beds with Deep Multitask
Learning | \c{opyright} 2019 IEEE. Personal use of this material is permitted.
Permission from IEEE must be obtained for all other uses, in any current or
future media, including reprinting/republishing this material for advertising
or promotional purposes, creating new collective works, for resale or
redistribution to servers or lists, or reuse of any copyrighted component of
this work in other works | 2019 IEEE International Conference on Systems, Man and Cybernetics
(SMC) | 10.1109/SMC.2019.8914459 | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Sleep posture analysis is widely used for clinical patient monitoring and
sleep studies. Earlier research has revealed that sleep posture highly
influences symptoms of diseases such as apnea and pressure ulcers. In this
study, we propose a robust deep learning model capable of accurately detecting
subjects and their sleeping postures using the publicly available data acquired
from a commercial pressure mapping system. A combination of loss functions is
used to discriminate subjects and their sleeping postures simultaneously. The
experimental results show that our proposed method can identify the patients
and their in-bed posture with almost no errors in a 10-fold cross-validation
scheme. Furthermore, we show that our network achieves an average accuracy of
up to 99% when faced with new subjects in a leave-one-subject-out validation
procedure on the three most common sleeping posture categories. We demonstrate
the effects of the combined cost function over its parameter and show that
learning both tasks simultaneously improves performance significantly. Finally,
we evaluate our proposed pipeline by testing it over augmented images of our
dataset. The proposed algorithm can ultimately be used in clinical and smart
home environments as a complementary tool with other available automated
patient monitoring systems.
| [
{
"created": "Mon, 5 Apr 2021 21:21:54 GMT",
"version": "v1"
}
] | 2021-04-07T00:00:00 | [
[
"Davoodnia",
"Vandad",
""
],
[
"Etemad",
"Ali",
""
]
] | 1new_dataset
|
1701.04663 | Varun Raj Kompella | Varun Raj Kompella and Laurenz Wiskott | Intrinsically Motivated Acquisition of Modular Slow Features for
Humanoids in Continuous and Non-Stationary Environments | 8 pages, 5 figures | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A compact information-rich representation of the environment, also called a
feature abstraction, can simplify a robot's task of mapping its raw sensory
inputs to useful action sequences. However, in environments that are
non-stationary and only partially observable, a single abstraction is probably
not sufficient to encode most variations. Therefore, learning multiple sets of
spatially or temporally local, modular abstractions of the inputs would be
beneficial. How can a robot learn these local abstractions without a teacher?
More specifically, how can it decide from where and when to start learning a
new abstraction? A recently proposed algorithm called Curious Dr. MISFA
addresses this problem. The algorithm is based on two underlying learning
principles called artificial curiosity and slowness. The former is used to make
the robot self-motivated to explore by rewarding itself whenever it makes
progress learning an abstraction; the later is used to update the abstraction
by extracting slowly varying components from raw sensory inputs. Curious Dr.
MISFA's application is, however, limited to discrete domains constrained by a
pre-defined state space and has design limitations that make it unstable in
certain situations. This paper presents a significant improvement that is
applicable to continuous environments, is computationally less expensive,
simpler to use with fewer hyper parameters, and stable in certain
non-stationary environments. We demonstrate the efficacy and stability of our
method in a vision-based robot simulator.
| [
{
"created": "Tue, 17 Jan 2017 13:24:37 GMT",
"version": "v1"
}
] | 2017-01-18T00:00:00 | [
[
"Kompella",
"Varun Raj",
""
],
[
"Wiskott",
"Laurenz",
""
]
] | 0no_new_dataset
|
2111.09403 | Rana Hammad Raza | Syeda Aneeba Najeeb, Rana Hammad Raza, Adeel Yusuf, Zamra Sultan | Fine-Grained Vehicle Classification in Urban Traffic Scenes using Deep
Learning | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The increasingly dense traffic is becoming a challenge in our local settings,
urging the need for a better traffic monitoring and management system.
Fine-grained vehicle classification appears to be a challenging task as
compared to vehicle coarse classification. Exploring a robust approach for
vehicle detection and classification into fine-grained categories is therefore
essentially required. Existing Vehicle Make and Model Recognition (VMMR)
systems have been developed on synchronized and controlled traffic conditions.
Need for robust VMMR in complex, urban, heterogeneous, and unsynchronized
traffic conditions still remain an open research area. In this paper, vehicle
detection and fine-grained classification are addressed using deep learning. To
perform fine-grained classification with related complexities, local dataset
THS-10 having high intra-class and low interclass variation is exclusively
prepared. The dataset consists of 4250 vehicle images of 10 vehicle models,
i.e., Honda City, Honda Civic, Suzuki Alto, Suzuki Bolan, Suzuki Cultus, Suzuki
Mehran, Suzuki Ravi, Suzuki Swift, Suzuki Wagon R and Toyota Corolla. This
dataset is available online. Two approaches have been explored and analyzed for
classification of vehicles i.e, fine-tuning, and feature extraction from deep
neural networks. A comparative study is performed, and it is demonstrated that
simpler approaches can produce good results in local environment to deal with
complex issues such as dense occlusion and lane departures. Hence reducing
computational load and time, e.g. fine-tuning Inception-v3 produced highest
accuracy of 97.4% with lowest misclassification rate of 2.08%. Fine-tuning
MobileNet-v2 and ResNet-18 produced 96.8% and 95.7% accuracies, respectively.
Extracting features from fc6 layer of AlexNet produces an accuracy of 93.5%
with a misclassification rate of 6.5%.
| [
{
"created": "Wed, 17 Nov 2021 21:19:03 GMT",
"version": "v1"
}
] | 2021-11-19T00:00:00 | [
[
"Najeeb",
"Syeda Aneeba",
""
],
[
"Raza",
"Rana Hammad",
""
],
[
"Yusuf",
"Adeel",
""
],
[
"Sultan",
"Zamra",
""
]
] | 1new_dataset
|
2404.00906 | Rongjie Li | Rongjie Li, Songyang Zhang, Dahua Lin, Kai Chen, Xuming He | From Pixels to Graphs: Open-Vocabulary Scene Graph Generation with
Vision-Language Models | Accepted by CVPR 2024 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Scene graph generation (SGG) aims to parse a visual scene into an
intermediate graph representation for downstream reasoning tasks. Despite
recent advancements, existing methods struggle to generate scene graphs with
novel visual relation concepts. To address this challenge, we introduce a new
open-vocabulary SGG framework based on sequence generation. Our framework
leverages vision-language pre-trained models (VLM) by incorporating an
image-to-graph generation paradigm. Specifically, we generate scene graph
sequences via image-to-text generation with VLM and then construct scene graphs
from these sequences. By doing so, we harness the strong capabilities of VLM
for open-vocabulary SGG and seamlessly integrate explicit relational modeling
for enhancing the VL tasks. Experimental results demonstrate that our design
not only achieves superior performance with an open vocabulary but also
enhances downstream vision-language task performance through explicit relation
modeling knowledge.
| [
{
"created": "Mon, 1 Apr 2024 04:21:01 GMT",
"version": "v1"
},
{
"created": "Sat, 6 Apr 2024 08:52:55 GMT",
"version": "v2"
},
{
"created": "Wed, 24 Apr 2024 07:15:16 GMT",
"version": "v3"
}
] | 2024-04-25T00:00:00 | [
[
"Li",
"Rongjie",
""
],
[
"Zhang",
"Songyang",
""
],
[
"Lin",
"Dahua",
""
],
[
"Chen",
"Kai",
""
],
[
"He",
"Xuming",
""
]
] | 0no_new_dataset
|
2305.17749 | Yongchao Huang Dr. | Yongchao Huang, Yuhang He, Hong Ge | Bayesian inference and neural estimation of acoustic wave propagation | null | null | null | null | cs.SD cs.AI eess.AS physics.data-an | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this work, we introduce a novel framework which combines physics and
machine learning methods to analyse acoustic signals. Three methods are
developed for this task: a Bayesian inference approach for inferring the
spectral acoustics characteristics, a neural-physical model which equips a
neural network with forward and backward physical losses, and the non-linear
least squares approach which serves as benchmark. The inferred propagation
coefficient leads to the room impulse response (RIR) quantity which can be used
for relocalisation with uncertainty. The simplicity and efficiency of this
framework is empirically validated on simulated data.
| [
{
"created": "Sun, 28 May 2023 15:14:46 GMT",
"version": "v1"
}
] | 2023-05-30T00:00:00 | [
[
"Huang",
"Yongchao",
""
],
[
"He",
"Yuhang",
""
],
[
"Ge",
"Hong",
""
]
] | 0no_new_dataset
|
1004.0944 | Roberto Bagnara | Roberto Bagnara, Fred Mesnard, Andrea Pescetti, Enea Zaffanella | The Automatic Synthesis of Linear Ranking Functions: The Complete
Unabridged Version | 47 pages, 3 tables | null | null | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The classical technique for proving termination of a generic sequential
computer program involves the synthesis of a ranking function for each loop of
the program. Linear ranking functions are particularly interesting because many
terminating loops admit one and algorithms exist to automatically synthesize
it. In this paper we present two such algorithms: one based on work dated 1991
by Sohn and Van Gelder; the other, due to Podelski and Rybalchenko, dated 2004.
Remarkably, while the two algorithms will synthesize a linear ranking function
under exactly the same set of conditions, the former is mostly unknown to the
community of termination analysis and its general applicability has never been
put forward before the present paper. In this paper we thoroughly justify both
algorithms, we prove their correctness, we compare their worst-case complexity
and experimentally evaluate their efficiency, and we present an open-source
implementation of them that will make it very easy to include
termination-analysis capabilities in automatic program verifiers.
| [
{
"created": "Tue, 6 Apr 2010 19:54:20 GMT",
"version": "v1"
},
{
"created": "Sun, 1 Apr 2012 07:14:21 GMT",
"version": "v2"
}
] | 2012-04-03T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Mesnard",
"Fred",
""
],
[
"Pescetti",
"Andrea",
""
],
[
"Zaffanella",
"Enea",
""
]
] | 0no_new_dataset
|
0903.2851 | Kamalika Chaudhuri | Kamalika Chaudhuri, Yoav Freund, Daniel Hsu | A parameter-free hedging algorithm | Updated Version | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of decision-theoretic online learning (DTOL). Motivated
by practical applications, we focus on DTOL when the number of actions is very
large. Previous algorithms for learning in this framework have a tunable
learning rate parameter, and a barrier to using online-learning in practical
applications is that it is not understood how to set this parameter optimally,
particularly when the number of actions is large.
In this paper, we offer a clean solution by proposing a novel and completely
parameter-free algorithm for DTOL. We introduce a new notion of regret, which
is more natural for applications with a large number of actions. We show that
our algorithm achieves good performance with respect to this new notion of
regret; in addition, it also achieves performance close to that of the best
bounds achieved by previous algorithms with optimally-tuned parameters,
according to previous notions of regret.
| [
{
"created": "Mon, 16 Mar 2009 20:48:33 GMT",
"version": "v1"
},
{
"created": "Mon, 18 Jan 2010 23:58:51 GMT",
"version": "v2"
}
] | 2010-01-19T00:00:00 | [
[
"Chaudhuri",
"Kamalika",
""
],
[
"Freund",
"Yoav",
""
],
[
"Hsu",
"Daniel",
""
]
] | 0no_new_dataset
|
1812.02552 | Mojtaba Bemana | Mojtaba Bemana, Joachim Keinert, Karol Myszkowski, Michel B\"atz,
Matthias Ziegler, Hans-Peter Seidel, Tobias Ritschel | Learning to Predict Image-based Rendering Artifacts with Respect to a
Hidden Reference Image | 13 pages, 11 figures | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image metrics predict the perceived per-pixel difference between a reference
image and its degraded (e. g., re-rendered) version. In several important
applications, the reference image is not available and image metrics cannot be
applied. We devise a neural network architecture and training procedure that
allows predicting the MSE, SSIM or VGG16 image difference from the distorted
image alone while the reference is not observed. This is enabled by two
insights: The first is to inject sufficiently many un-distorted natural image
patches, which can be found in arbitrary amounts and are known to have no
perceivable difference to themselves. This avoids false positives. The second
is to balance the learning, where it is carefully made sure that all image
errors are equally likely, avoiding false negatives. Surprisingly, we observe,
that the resulting no-reference metric, subjectively, can even perform better
than the reference-based one, as it had to become robust against
mis-alignments. We evaluate the effectiveness of our approach in an image-based
rendering context, both quantitatively and qualitatively. Finally, we
demonstrate two applications which reduce light field capture time and provide
guidance for interactive depth adjustment.
| [
{
"created": "Thu, 6 Dec 2018 14:35:54 GMT",
"version": "v1"
},
{
"created": "Wed, 21 Aug 2019 13:47:10 GMT",
"version": "v2"
}
] | 2019-08-22T00:00:00 | [
[
"Bemana",
"Mojtaba",
""
],
[
"Keinert",
"Joachim",
""
],
[
"Myszkowski",
"Karol",
""
],
[
"Bätz",
"Michel",
""
],
[
"Ziegler",
"Matthias",
""
],
[
"Seidel",
"Hans-Peter",
""
],
[
"Ritschel",
"Tobias",
""
]
] | 0no_new_dataset
|
2108.08063 | Pourya Shamsolmoali | Pourya Shamsolmoali, Jocelyn Chanussot, Masoumeh Zareapoor, Huiyu
Zhou, and Jie Yang | Multi-patch Feature Pyramid Network for Weakly Supervised Object
Detection in Optical Remote Sensing Images | null | null | 10.1109/TGRS.2021.3106442 | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Object detection is a challenging task in remote sensing because objects only
occupy a few pixels in the images, and the models are required to
simultaneously learn object locations and detection. Even though the
established approaches well perform for the objects of regular sizes, they
achieve weak performance when analyzing small ones or getting stuck in the
local minima (e.g. false object parts). Two possible issues stand in their way.
First, the existing methods struggle to perform stably on the detection of
small objects because of the complicated background. Second, most of the
standard methods used hand-crafted features, and do not work well on the
detection of objects parts of which are missing. We here address the above
issues and propose a new architecture with a multiple patch feature pyramid
network (MPFP-Net). Different from the current models that during training only
pursue the most discriminative patches, in MPFPNet the patches are divided into
class-affiliated subsets, in which the patches are related and based on the
primary loss function, a sequence of smooth loss functions are determined for
the subsets to improve the model for collecting small object parts. To enhance
the feature representation for patch selection, we introduce an effective
method to regularize the residual values and make the fusion transition layers
strictly norm-preserving. The network contains bottom-up and crosswise
connections to fuse the features of different scales to achieve better
accuracy, compared to several state-of-the-art object detection models. Also,
the developed architecture is more efficient than the baselines.
| [
{
"created": "Wed, 18 Aug 2021 09:25:39 GMT",
"version": "v1"
}
] | 2022-02-16T00:00:00 | [
[
"Shamsolmoali",
"Pourya",
""
],
[
"Chanussot",
"Jocelyn",
""
],
[
"Zareapoor",
"Masoumeh",
""
],
[
"Zhou",
"Huiyu",
""
],
[
"Yang",
"Jie",
""
]
] | 0no_new_dataset
|
1605.09346 | Jean-Baptiste Alayrac | Anton Osokin, Jean-Baptiste Alayrac, Isabella Lukasewitz, Puneet K.
Dokania, Simon Lacoste-Julien | Minding the Gaps for Block Frank-Wolfe Optimization of Structured SVMs | Appears in Proceedings of the 33rd International Conference on
Machine Learning (ICML 2016). 31 pages | null | null | null | cs.LG math.OC stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose several improvements on the block-coordinate
Frank-Wolfe (BCFW) algorithm from Lacoste-Julien et al. (2013) recently used to
optimize the structured support vector machine (SSVM) objective in the context
of structured prediction, though it has wider applications. The key intuition
behind our improvements is that the estimates of block gaps maintained by BCFW
reveal the block suboptimality that can be used as an adaptive criterion.
First, we sample objects at each iteration of BCFW in an adaptive non-uniform
way via gapbased sampling. Second, we incorporate pairwise and away-step
variants of Frank-Wolfe into the block-coordinate setting. Third, we cache
oracle calls with a cache-hit criterion based on the block gaps. Fourth, we
provide the first method to compute an approximate regularization path for
SSVM. Finally, we provide an exhaustive empirical evaluation of all our methods
on four structured prediction datasets.
| [
{
"created": "Mon, 30 May 2016 18:15:30 GMT",
"version": "v1"
}
] | 2016-06-01T00:00:00 | [
[
"Osokin",
"Anton",
""
],
[
"Alayrac",
"Jean-Baptiste",
""
],
[
"Lukasewitz",
"Isabella",
""
],
[
"Dokania",
"Puneet K.",
""
],
[
"Lacoste-Julien",
"Simon",
""
]
] | 1new_dataset
|
1306.3084 | Doriane Ibarra | Jorge Hernandez (CMM), Beatriz Marcotegui (CMM) | Segmentation et Interpr\'etation de Nuages de Points pour la
Mod\'elisation d'Environnements Urbains | null | Revue fran\c{c}aise de photogrammetrie et de t\'el\'edection 191
(2008) 28-35 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dans cet article, nous pr\'esentons une m\'ethode pour la d\'etection et la
classification d'artefacts au niveau du sol, comme phase de filtrage
pr\'ealable \`a la mod\'elisation d'environnements urbains. La m\'ethode de
d\'etection est r\'ealis\'ee sur l'image profondeur, une projection de nuage de
points sur un plan image o\`u la valeur du pixel correspond \`a la distance du
point au plan. En faisant l'hypoth\`ese que les artefacts sont situ\'es au sol,
ils sont d\'etect\'es par une transformation de chapeau haut de forme par
remplissage de trous sur l'image de profondeur. Les composantes connexes ainsi
obtenues, sont ensuite caract\'eris\'ees et une analyse des variables est
utilis\'ee pour la s\'election des caract\'eristiques les plus discriminantes.
Les composantes connexes sont donc classifi\'ees en quatre cat\'egories
(lampadaires, pi\'etons, voitures et "Reste") \`a l'aide d'un algorithme
d'apprentissage supervis\'e. La m\'ethode a \'et\'e test\'ee sur des nuages de
points de la ville de Paris, en montrant de bons r\'esultats de d\'etection et
de classification dans l'ensemble de donn\'ees.---In this article, we present a
method for detection and classification of artifacts at the street level, in
order to filter cloud point, facilitating the urban modeling process. Our
approach exploits 3D information by using range image, a projection of 3D
points onto an image plane where the pixel intensity is a function of the
measured distance between 3D points and the plane. By assuming that the
artifacts are on the ground, they are detected using a Top-Hat of the hole
filling algorithm of range images. Then, several features are extracted from
the detected connected components and a stepwise forward variable/model
selection by using the Wilk's Lambda criterion is performed. Afterward, CCs are
classified in four categories (lampposts, pedestrians, cars and others) by
using a supervised machine learning method. The proposed method was tested on
cloud points of Paris, and have shown satisfactory results on the whole
dataset.
| [
{
"created": "Thu, 13 Jun 2013 11:27:58 GMT",
"version": "v1"
}
] | 2013-06-14T00:00:00 | [
[
"Hernandez",
"Jorge",
"",
"CMM"
],
[
"Marcotegui",
"Beatriz",
"",
"CMM"
]
] | 0no_new_dataset
|
2402.17414 | Jiahao Li | Jiahao Li, Bin Li, Yan Lu | Neural Video Compression with Feature Modulation | CVPR 2024. Codes are at https://github.com/microsoft/DCVC | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The emerging conditional coding-based neural video codec (NVC) shows
superiority over commonly-used residual coding-based codec and the latest NVC
already claims to outperform the best traditional codec. However, there still
exist critical problems blocking the practicality of NVC. In this paper, we
propose a powerful conditional coding-based NVC that solves two critical
problems via feature modulation. The first is how to support a wide quality
range in a single model. Previous NVC with this capability only supports about
3.8 dB PSNR range on average. To tackle this limitation, we modulate the latent
feature of the current frame via the learnable quantization scaler. During the
training, we specially design the uniform quantization parameter sampling
mechanism to improve the harmonization of encoding and quantization. This
results in a better learning of the quantization scaler and helps our NVC
support about 11.4 dB PSNR range. The second is how to make NVC still work
under a long prediction chain. We expose that the previous SOTA NVC has an
obvious quality degradation problem when using a large intra-period setting. To
this end, we propose modulating the temporal feature with a periodically
refreshing mechanism to boost the quality. %Besides solving the above two
problems, we also design a single model that can support both RGB and YUV
colorspaces. Notably, under single intra-frame setting, our codec can achieve
29.7\% bitrate saving over previous SOTA NVC with 16\% MACs reduction. Our
codec serves as a notable landmark in the journey of NVC evolution. The codes
are at https://github.com/microsoft/DCVC.
| [
{
"created": "Tue, 27 Feb 2024 11:08:51 GMT",
"version": "v1"
},
{
"created": "Thu, 29 Feb 2024 05:49:21 GMT",
"version": "v2"
}
] | 2024-03-01T00:00:00 | [
[
"Li",
"Jiahao",
""
],
[
"Li",
"Bin",
""
],
[
"Lu",
"Yan",
""
]
] | 0no_new_dataset
|
2104.07824 | Shashank Sonkar | Shashank Sonkar, Arzoo Katiyar and Richard G. Baraniuk | NePTuNe: Neural Powered Tucker Network for Knowledge Graph Completion | null | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | Knowledge graphs link entities through relations to provide a structured
representation of real world facts. However, they are often incomplete, because
they are based on only a small fraction of all plausible facts. The task of
knowledge graph completion via link prediction aims to overcome this challenge
by inferring missing facts represented as links between entities. Current
approaches to link prediction leverage tensor factorization and/or deep
learning. Factorization methods train and deploy rapidly thanks to their small
number of parameters but have limited expressiveness due to their underlying
linear methodology. Deep learning methods are more expressive but also
computationally expensive and prone to overfitting due to their large number of
trainable parameters. We propose Neural Powered Tucker Network (NePTuNe), a new
hybrid link prediction model that couples the expressiveness of deep models
with the speed and size of linear models. We demonstrate that NePTuNe provides
state-of-the-art performance on the FB15K-237 dataset and near state-of-the-art
performance on the WN18RR dataset.
| [
{
"created": "Thu, 15 Apr 2021 23:48:26 GMT",
"version": "v1"
}
] | 2021-04-19T00:00:00 | [
[
"Sonkar",
"Shashank",
""
],
[
"Katiyar",
"Arzoo",
""
],
[
"Baraniuk",
"Richard G.",
""
]
] | 1new_dataset
|
2104.02176 | Yangyang Shi | Yangyang Shi, Varun Nagaraja, Chunyang Wu, Jay Mahadeokar, Duc Le,
Rohit Prabhavalkar, Alex Xiao, Ching-Feng Yeh, Julian Chan, Christian Fuegen,
Ozlem Kalinli, Michael L. Seltzer | Dynamic Encoder Transducer: A Flexible Solution For Trading Off Accuracy
For Latency | 5 pages, 2 figures, submitted Interspeech 2021 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a dynamic encoder transducer (DET) for on-device speech
recognition. One DET model scales to multiple devices with different
computation capacities without retraining or finetuning. To trading off
accuracy and latency, DET assigns different encoders to decode different parts
of an utterance. We apply and compare the layer dropout and the collaborative
learning for DET training. The layer dropout method that randomly drops out
encoder layers in the training phase, can do on-demand layer dropout in
decoding. Collaborative learning jointly trains multiple encoders with
different depths in one single model. Experiment results on Librispeech and
in-house data show that DET provides a flexible accuracy and latency trade-off.
Results on Librispeech show that the full-size encoder in DET relatively
reduces the word error rate of the same size baseline by over 8%. The
lightweight encoder in DET trained with collaborative learning reduces the
model size by 25% but still gets similar WER as the full-size baseline. DET
gets similar accuracy as a baseline model with better latency on a large
in-house data set by assigning a lightweight encoder for the beginning part of
one utterance and a full-size encoder for the rest.
| [
{
"created": "Mon, 5 Apr 2021 22:32:20 GMT",
"version": "v1"
}
] | 2021-04-07T00:00:00 | [
[
"Shi",
"Yangyang",
""
],
[
"Nagaraja",
"Varun",
""
],
[
"Wu",
"Chunyang",
""
],
[
"Mahadeokar",
"Jay",
""
],
[
"Le",
"Duc",
""
],
[
"Prabhavalkar",
"Rohit",
""
],
[
"Xiao",
"Alex",
""
],
[
"Yeh",
"Ching-Feng",
""
],
[
"Chan",
"Julian",
""
],
[
"Fuegen",
"Christian",
""
],
[
"Kalinli",
"Ozlem",
""
],
[
"Seltzer",
"Michael L.",
""
]
] | 0no_new_dataset
|
2106.01890 | Yixin Liu | Yixin Liu, Pengfei Liu | SimCLS: A Simple Framework for Contrastive Learning of Abstractive
Summarization | Published as a short paper at ACL 2021 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a conceptually simple while empirically powerful
framework for abstractive summarization, SimCLS, which can bridge the gap
between the learning objective and evaluation metrics resulting from the
currently dominated sequence-to-sequence learning framework by formulating text
generation as a reference-free evaluation problem (i.e., quality estimation)
assisted by contrastive learning. Experimental results show that, with minor
modification over existing top-scoring systems, SimCLS can improve the
performance of existing top-performing models by a large margin. Particularly,
2.51 absolute improvement against BART and 2.50 over PEGASUS w.r.t ROUGE-1 on
the CNN/DailyMail dataset, driving the state-of-the-art performance to a new
level. We have open-sourced our codes and results:
https://github.com/yixinL7/SimCLS. Results of our proposed models have been
deployed into ExplainaBoard platform, which allows researchers to understand
our systems in a more fine-grained way.
| [
{
"created": "Thu, 3 Jun 2021 14:34:17 GMT",
"version": "v1"
}
] | 2021-06-04T00:00:00 | [
[
"Liu",
"Yixin",
""
],
[
"Liu",
"Pengfei",
""
]
] | 0no_new_dataset
|
1707.06728 | Maria-Irina Nicolae | Valentina Zantedeschi, Maria-Irina Nicolae and Ambrish Rawat | Efficient Defenses Against Adversarial Attacks | 16 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Following the recent adoption of deep neural networks (DNN) accross a wide
range of applications, adversarial attacks against these models have proven to
be an indisputable threat. Adversarial samples are crafted with a deliberate
intention of undermining a system. In the case of DNNs, the lack of better
understanding of their working has prevented the development of efficient
defenses. In this paper, we propose a new defense method based on practical
observations which is easy to integrate into models and performs better than
state-of-the-art defenses. Our proposed solution is meant to reinforce the
structure of a DNN, making its prediction more stable and less likely to be
fooled by adversarial samples. We conduct an extensive experimental study
proving the efficiency of our method against multiple attacks, comparing it to
numerous defenses, both in white-box and black-box setups. Additionally, the
implementation of our method brings almost no overhead to the training
procedure, while maintaining the prediction performance of the original model
on clean samples.
| [
{
"created": "Fri, 21 Jul 2017 00:50:22 GMT",
"version": "v1"
},
{
"created": "Wed, 30 Aug 2017 15:47:50 GMT",
"version": "v2"
}
] | 2017-08-31T00:00:00 | [
[
"Zantedeschi",
"Valentina",
""
],
[
"Nicolae",
"Maria-Irina",
""
],
[
"Rawat",
"Ambrish",
""
]
] | 0no_new_dataset
|
2201.06486 | Khaled Nakhleh | Daojing Guo, Khaled Nakhleh, I-Hong Hou, Sastry Kompella, Clement Kam | A Theory of Second-Order Wireless Network Optimization and Its
Application on AoI | Accepted for publication in INFOCOM 2022 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a new theoretical framework for optimizing second-order
behaviors of wireless networks. Unlike existing techniques for network utility
maximization, which only considers first-order statistics, this framework
models every random process by its mean and temporal variance. The inclusion of
temporal variance makes this framework well-suited for modeling stateful fading
wireless channels and emerging network performance metrics such as
age-of-information (AoI). Using this framework, we sharply characterize the
second-order capacity region of wireless access networks. We also propose a
simple scheduling policy and prove that it can achieve every interior point in
the second-order capacity region. To demonstrate the utility of this framework,
we apply it for an important open problem: the optimization of AoI over
Gilbert-Elliott channels. We show that this framework provides a very accurate
characterization of AoI. Moreover, it leads to a tractable scheduling policy
that outperforms other existing work.
| [
{
"created": "Mon, 17 Jan 2022 15:59:10 GMT",
"version": "v1"
}
] | 2022-01-19T00:00:00 | [
[
"Guo",
"Daojing",
""
],
[
"Nakhleh",
"Khaled",
""
],
[
"Hou",
"I-Hong",
""
],
[
"Kompella",
"Sastry",
""
],
[
"Kam",
"Clement",
""
]
] | 1new_dataset
|
2210.11966 | Shengwei Liu | Hongwei Liu, Shengwei Liu | A class of constacyclic codes are generalized Reed-Solomon codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximum distance separable (MDS) codes are optimal in the sense that the
minimum distance cannot be improved for a given length and code size. The most
prominent MDS codes are generalized Reed-Solomon (GRS) codes. The square
$\mathcal{C}^{2}$ of a linear code $\mathcal{C}$ is the linear code spanned by
the component-wise products of every pair of codewords in $\mathcal{C}$. For an
MDS code $\mathcal{C}$, it is convenient to determine whether $\mathcal{C}$ is
a GRS code by determining the dimension of $\mathcal{C}^{2}$. In this paper, we
investigate under what conditions that MDS constacyclic codes are GRS. For this
purpose, we first study the square of constacyclic codes. Then, we give a
sufficient condition that a constacyclic code is GRS. In particular, We provide
a necessary and sufficient condition that a constacyclic code of a prime length
is GRS.
| [
{
"created": "Fri, 21 Oct 2022 13:46:24 GMT",
"version": "v1"
}
] | 2022-10-24T00:00:00 | [
[
"Liu",
"Hongwei",
""
],
[
"Liu",
"Shengwei",
""
]
] | 0no_new_dataset
|
2207.09833 | Arash Bateni PhD | Arash Bateni, Matthew C. Chan, Ray Eitel-Porter | AI Fairness: from Principles to Practice | 21 pages, 5 figures | null | null | null | cs.CY cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper summarizes and evaluates various approaches, methods, and
techniques for pursuing fairness in artificial intelligence (AI) systems. It
examines the merits and shortcomings of these measures and proposes practical
guidelines for defining, measuring, and preventing bias in AI. In particular,
it cautions against some of the simplistic, yet common, methods for evaluating
bias in AI systems, and offers more sophisticated and effective alternatives.
The paper also addresses widespread controversies and confusions in the field
by providing a common language among different stakeholders of high-impact AI
systems. It describes various trade-offs involving AI fairness, and provides
practical recommendations for balancing them. It offers techniques for
evaluating the costs and benefits of fairness targets, and defines the role of
human judgment in setting these targets. This paper provides discussions and
guidelines for AI practitioners, organization leaders, and policymakers, as
well as various links to additional materials for a more technical audience.
Numerous real-world examples are provided to clarify the concepts, challenges,
and recommendations from a practical perspective.
| [
{
"created": "Wed, 20 Jul 2022 11:37:46 GMT",
"version": "v1"
}
] | 2022-07-21T00:00:00 | [
[
"Bateni",
"Arash",
""
],
[
"Chan",
"Matthew C.",
""
],
[
"Eitel-Porter",
"Ray",
""
]
] | 0no_new_dataset
|
2108.09832 | Minghui Jiang | Rain Jiang, Kai Jiang, Minghui Jiang | On universal covers for carpenter's rule folding | null | null | null | null | cs.CG cs.DM math.CO | http://creativecommons.org/licenses/by/4.0/ | We present improved universal covers for carpenter's rule folding in the
plane.
| [
{
"created": "Sun, 22 Aug 2021 20:39:57 GMT",
"version": "v1"
}
] | 2021-08-24T00:00:00 | [
[
"Jiang",
"Rain",
""
],
[
"Jiang",
"Kai",
""
],
[
"Jiang",
"Minghui",
""
]
] | 0no_new_dataset
|
2403.01296 | Shanuja Sasi | Shanuja Sasi and Onur G\"unl\"u | Rate-limited Shuffling for Distributed Computing | 6 pages and 2 figures | null | null | null | cs.IT cs.DC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the shuffling phase in a distributed computing model with
rate-limited links between nodes. Each node is connected to all other nodes via
a noiseless broadcast link with a finite capacity. For this network, the
shuffling phase is described as a distributed index-coding problem to extend an
outer bound for the latter to the distributed computing problem. An inner bound
on the capacity region is also established by using the distributed
composite-coding scheme introduced for the distributed index-coding problem. We
consider some special cases of the distributed computing problem through two
examples for which we prove that the inner and outer bounds agree, thereby
establishing the capacity regions. We, then, generalize the special cases to
any number of nodes and computation loads under certain constraints.
| [
{
"created": "Sat, 2 Mar 2024 19:28:13 GMT",
"version": "v1"
},
{
"created": "Mon, 6 May 2024 07:51:58 GMT",
"version": "v2"
}
] | 2024-05-07T00:00:00 | [
[
"Sasi",
"Shanuja",
""
],
[
"Günlü",
"Onur",
""
]
] | 0no_new_dataset
|
1811.02178 | Feifan Xu | Feifan Xu, Fei He, Enze Xie, Liang Li | Fast OBDD Reordering using Neural Message Passing on Hypergraph | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ordered binary decision diagrams (OBDDs) are an efficient data structure for
representing and manipulating Boolean formulas. With respect to different
variable orders, the OBDDs' sizes may vary from linear to exponential in the
number of the Boolean variables. Finding the optimal variable order has been
proved a NP-complete problem. Many heuristics have been proposed to find a
near-optimal solution of this problem. In this paper, we propose a neural
network-based method to predict near-optimal variable orders for unknown
formulas. Viewing these formulas as hypergraphs, and lifting the message
passing neural network into 3-hypergraph (MPNN3), we are able to learn the
patterns of Boolean formula. Compared to the traditional methods, our method
can find a near-the-best solution with an extremely shorter time, even for some
hard examples.To the best of our knowledge, this is the first work on applying
neural network to OBDD reordering.
| [
{
"created": "Tue, 6 Nov 2018 06:07:09 GMT",
"version": "v1"
}
] | 2018-11-07T00:00:00 | [
[
"Xu",
"Feifan",
""
],
[
"He",
"Fei",
""
],
[
"Xie",
"Enze",
""
],
[
"Li",
"Liang",
""
]
] | 0no_new_dataset
|
1912.03717 | Vasanthan Raghavan | Vasanthan Raghavan, Sonsay Noimanivone, Sung Kil Rho, Bernie Farin,
Patrick Connor, Ricardo A. Motos, Yu-Chin Ou, Kobi Ravid, M. Ali Tassoudji,
Ozge H. Koymen, and Junyi Li | Hand and Body Blockage Measurements with Form-Factor User Equipment at
28 GHz | 15 pages, 9 figures, 6 tables | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Blockage by the human hand/body is an important impairment in realizing
practical millimeter wave wireless systems. Prior works on blockage modeling
are either based on theoretical studies of double knife edge diffraction or its
modifications, high-frequency simulations of electromagnetic effects, or
measurements with experimental millimeter wave prototypes. While such studies
are useful, they do not capture the form-factor constraints of user equipments
(UEs). In this work, we study the impact of hand/body blockage with a UE at
$28$ GHz built on Qualcomm's millimeter wave modem, antenna modules and
beamforming solutions. We report five exhaustive and controlled studies with
different types of hand holdings/grips, antenna types, and with
directional/narrow beams. For both hard as well as loose hand grips, we report
considerably lower blockage loss estimates than prior works. Critical in
estimating the loss is the definition of a "region of interest" (RoI) around
the UE where the impact of the hand/body is seen. Towards this goal, we define
a RoI that includes the spatial area where significant energy is seen in either
the no blockage or blockage modes. Our studies show that significant spatial
area coverage improvement can be seen with loose hand grip due to hand
reflections.
| [
{
"created": "Sun, 8 Dec 2019 17:15:22 GMT",
"version": "v1"
}
] | 2019-12-10T00:00:00 | [
[
"Raghavan",
"Vasanthan",
""
],
[
"Noimanivone",
"Sonsay",
""
],
[
"Rho",
"Sung Kil",
""
],
[
"Farin",
"Bernie",
""
],
[
"Connor",
"Patrick",
""
],
[
"Motos",
"Ricardo A.",
""
],
[
"Ou",
"Yu-Chin",
""
],
[
"Ravid",
"Kobi",
""
],
[
"Tassoudji",
"M. Ali",
""
],
[
"Koymen",
"Ozge H.",
""
],
[
"Li",
"Junyi",
""
]
] | 0no_new_dataset
|
1406.5569 | Ashkan Rahimian | Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi | On the Reverse Engineering of the Citadel Botnet | 10 pages, 17 figures. This is an updated / edited version of a paper
appeared in FPS 2013 | LNCS 8352, 2014, pp 408-425 | 10.1007/978-3-319-05302-8_25 | null | cs.CR cs.NI cs.OS cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Citadel is an advanced information-stealing malware which targets financial
information. This malware poses a real threat against the confidentiality and
integrity of personal and business data. A joint operation was recently
conducted by the FBI and the Microsoft Digital Crimes Unit in order to take
down Citadel command-and-control servers. The operation caused some disruption
in the botnet but has not stopped it completely. Due to the complex structure
and advanced anti-reverse engineering techniques, the Citadel malware analysis
process is both challenging and time-consuming. This allows cyber criminals to
carry on with their attacks while the analysis is still in progress. In this
paper, we present the results of the Citadel reverse engineering and provide
additional insight into the functionality, inner workings, and open source
components of the malware. In order to accelerate the reverse engineering
process, we propose a clone-based analysis methodology. Citadel is an offspring
of a previously analyzed malware called Zeus; thus, using the former as a
reference, we can measure and quantify the similarities and differences of the
new variant. Two types of code analysis techniques are provided in the
methodology, namely assembly to source code matching and binary clone
detection. The methodology can help reduce the number of functions requiring
manual analysis. The analysis results prove that the approach is promising in
Citadel malware analysis. Furthermore, the same approach is applicable to
similar malware analysis scenarios.
| [
{
"created": "Sat, 21 Jun 2014 02:04:56 GMT",
"version": "v1"
}
] | 2014-06-24T00:00:00 | [
[
"Rahimian",
"Ashkan",
""
],
[
"Ziarati",
"Raha",
""
],
[
"Preda",
"Stere",
""
],
[
"Debbabi",
"Mourad",
""
]
] | 0no_new_dataset
|
0910.2317 | Andreas Spillner | A. Dress, K. T. Huber, J. Koolen, V. Moulton, A. Spillner | An algorithm for computing cutpoints in finite metric spaces | 17 pages, 1 eps-figure | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The theory of the tight span, a cell complex that can be associated to every
metric $D$, offers a unifying view on existing approaches for analyzing
distance data, in particular for decomposing a metric $D$ into a sum of simpler
metrics as well as for representing it by certain specific edge-weighted
graphs, often referred to as realizations of $D$. Many of these approaches
involve the explicit or implicit computation of the so-called cutpoints of (the
tight span of) $D$, such as the algorithm for computing the "building blocks"
of optimal realizations of $D$ recently presented by A. Hertz and S. Varone.
The main result of this paper is an algorithm for computing the set of these
cutpoints for a metric $D$ on a finite set with $n$ elements in $O(n^3)$ time.
As a direct consequence, this improves the run time of the aforementioned
$O(n^6)$-algorithm by Hertz and Varone by ``three orders of magnitude''.
| [
{
"created": "Tue, 13 Oct 2009 07:09:03 GMT",
"version": "v1"
}
] | 2009-10-14T00:00:00 | [
[
"Dress",
"A.",
""
],
[
"Huber",
"K. T.",
""
],
[
"Koolen",
"J.",
""
],
[
"Moulton",
"V.",
""
],
[
"Spillner",
"A.",
""
]
] | 0no_new_dataset
|
1912.04352 | Mengchen Wang | Mengchen Wang, Nicolas Ferey, Patrick Bourdot, Frederic Magoules | Using asynchronous simulation approach for interactive simulation | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper discusses about the advantage of using asynchronous simulation in
the case of interactive simulation in which user can steer and control
parameters during a simulation in progress. synchronous models allow to compute
each iteration faster to address the issues of performance needed in an highly
interactive context, and our hypothesis is that get partial results faster is
better than getting synchronized and final results to take a decision, in a
interactive simulation context.
| [
{
"created": "Mon, 9 Dec 2019 20:07:36 GMT",
"version": "v1"
}
] | 2019-12-11T00:00:00 | [
[
"Wang",
"Mengchen",
""
],
[
"Ferey",
"Nicolas",
""
],
[
"Bourdot",
"Patrick",
""
],
[
"Magoules",
"Frederic",
""
]
] | 0no_new_dataset
|
2307.02842 | Yu Chen | Yu Chen, Yihan Du, Pihe Hu, Siwei Wang, Desheng Wu, Longbo Huang | Provably Efficient Iterated CVaR Reinforcement Learning with Function
Approximation and Human Feedback | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Risk-sensitive reinforcement learning (RL) aims to optimize policies that
balance the expected reward and risk. In this paper, we present a novel
risk-sensitive RL framework that employs an Iterated Conditional Value-at-Risk
(CVaR) objective under both linear and general function approximations,
enriched by human feedback. These new formulations provide a principled way to
guarantee safety in each decision making step throughout the control process.
Moreover, integrating human feedback into risk-sensitive RL framework bridges
the gap between algorithmic decision-making and human participation, allowing
us to also guarantee safety for human-in-the-loop systems. We propose provably
sample-efficient algorithms for this Iterated CVaR RL and provide rigorous
theoretical analysis. Furthermore, we establish a matching lower bound to
corroborate the optimality of our algorithms in a linear context.
| [
{
"created": "Thu, 6 Jul 2023 08:14:54 GMT",
"version": "v1"
},
{
"created": "Sat, 18 Nov 2023 01:59:35 GMT",
"version": "v2"
},
{
"created": "Mon, 4 Dec 2023 10:37:00 GMT",
"version": "v3"
}
] | 2023-12-05T00:00:00 | [
[
"Chen",
"Yu",
""
],
[
"Du",
"Yihan",
""
],
[
"Hu",
"Pihe",
""
],
[
"Wang",
"Siwei",
""
],
[
"Wu",
"Desheng",
""
],
[
"Huang",
"Longbo",
""
]
] | 0no_new_dataset
|
2105.00735 | Valentina Castiglioni | Luca Aceto and Elli Anastasiadi and Valentina Castiglioni and Anna
Ingolfsdottir and Bas Luttik | In search of lost time: Axiomatising parallel composition in process
algebras | arXiv admin note: text overlap with arXiv:2010.01943,
arXiv:2102.11166 | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This survey reviews some of the most recent achievements in the saga of the
axiomatisation of parallel composition, along with some classic results. We
focus on the recursion, relabelling and restriction free fragment of CCS and we
discuss the solutions to three problems that were open for many years. The
first problem concerns the status of Bergstra and Klop's auxiliary operators
left merge and communication merge in the finite axiomatisation of parallel
composition modulo bisimiliarity: We argue that, under some natural
assumptions, the addition of a single auxiliary binary operator to CCS does not
yield a finite axiomatisation of bisimilarity. Then we delineate the boundary
between finite and non-finite axiomatisability of the congruences in van
Glabbeek's linear time-branching time spectrum over CCS. Finally, we present a
novel result to the effect that rooted weak bisimilarity has no finite complete
axiomatisation over CCS.
| [
{
"created": "Mon, 3 May 2021 10:25:51 GMT",
"version": "v1"
}
] | 2021-05-04T00:00:00 | [
[
"Aceto",
"Luca",
""
],
[
"Anastasiadi",
"Elli",
""
],
[
"Castiglioni",
"Valentina",
""
],
[
"Ingolfsdottir",
"Anna",
""
],
[
"Luttik",
"Bas",
""
]
] | 0no_new_dataset
|
2307.04498 | Evgenii Vinogradov A | Javad Ebrahimizadeh and Evgenii Vinogradov and Guy A.E. Vandenbosch | RCS-based Quasi-Deterministic Ray Tracing for Statistical Channel
Modeling | null | null | null | null | cs.NI cs.SY eess.SY | http://creativecommons.org/licenses/by-sa/4.0/ | This paper presents a quasi-deterministic ray tracing (QD-RT) method for
analyzing the propagation of electromagnetic waves in street canyons. The
method uses a statistical bistatic distribution to model the Radar Cross
Section (RCS) of various irregular objects such as cars and pedestrians,
instead of relying on exact values as in a deterministic propagation model. The
performance of the QD-RT method is evaluated by comparing its generated path
loss distributions to those of the deterministic ray tracing (D-RT) model using
the Two-sample Cramer-von Mises test. The results indicate that the QD-RT
method generates the same path loss distributions as the D-RT model while
offering lower complexity. This study suggests that the QD-RT method has the
potential to be used for analyzing complicated scenarios such as street canyon
scenarios in mmWave wireless communication systems.
| [
{
"created": "Mon, 10 Jul 2023 11:39:18 GMT",
"version": "v1"
}
] | 2023-07-11T00:00:00 | [
[
"Ebrahimizadeh",
"Javad",
""
],
[
"Vinogradov",
"Evgenii",
""
],
[
"Vandenbosch",
"Guy A. E.",
""
]
] | 0no_new_dataset
|
1605.04013 | EPTCS | Stefano Gogioso (University of Oxford) | A Corpus-based Toy Model for DisCoCat | In Proceedings SLPCS 2016, arXiv:1608.01018 | EPTCS 221, 2016, pp. 20-28 | 10.4204/EPTCS.221.3 | null | cs.CL cs.LO math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The categorical compositional distributional (DisCoCat) model of meaning
rigorously connects distributional semantics and pregroup grammars, and has
found a variety of applications in computational linguistics. From a more
abstract standpoint, the DisCoCat paradigm predicates the construction of a
mapping from syntax to categorical semantics. In this work we present a
concrete construction of one such mapping, from a toy model of syntax for
corpora annotated with constituent structure trees, to categorical semantics
taking place in a category of free R-semimodules over an involutive commutative
semiring R.
| [
{
"created": "Fri, 13 May 2016 00:32:01 GMT",
"version": "v1"
},
{
"created": "Thu, 4 Aug 2016 00:40:51 GMT",
"version": "v2"
}
] | 2016-08-05T00:00:00 | [
[
"Gogioso",
"Stefano",
"",
"University of Oxford"
]
] | 0no_new_dataset
|
1506.02812 | Xuechong Guan | Xuechong Guan | A study on central soft sets: Definitions and basic operations | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a new kind of soft sets related with some common decision
making problems in real life called central soft sets is introduced. Properties
of some basic operations on central soft sets are shown. It is investigated
that some classic operations between soft sets can be obtained by central soft
sets with selecting different central sets. We initiate the concepts of an
evaluation system for a parameters set and its optional solutions. An algorithm
is presented to solve such decision making problems.
| [
{
"created": "Tue, 9 Jun 2015 07:54:03 GMT",
"version": "v1"
}
] | 2015-06-10T00:00:00 | [
[
"Guan",
"Xuechong",
""
]
] | 1new_dataset
|
2009.09781 | Ziming Li | Ziming Li and Julia Kiseleva and Maarten de Rijke | Rethinking Supervised Learning and Reinforcement Learning in
Task-Oriented Dialogue Systems | 10 pages | Findings of EMNLP 2020 | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dialogue policy learning for task-oriented dialogue systems has enjoyed great
progress recently mostly through employing reinforcement learning methods.
However, these approaches have become very sophisticated. It is time to
re-evaluate it. Are we really making progress developing dialogue agents only
based on reinforcement learning? We demonstrate how (1)~traditional supervised
learning together with (2)~a simulator-free adversarial learning method can be
used to achieve performance comparable to state-of-the-art RL-based methods.
First, we introduce a simple dialogue action decoder to predict the appropriate
actions. Then, the traditional multi-label classification solution for dialogue
policy learning is extended by adding dense layers to improve the dialogue
agent performance. Finally, we employ the Gumbel-Softmax estimator to
alternatively train the dialogue agent and the dialogue reward model without
using reinforcement learning. Based on our extensive experimentation, we can
conclude the proposed methods can achieve more stable and higher performance
with fewer efforts, such as the domain knowledge required to design a user
simulator and the intractable parameter tuning in reinforcement learning. Our
main goal is not to beat reinforcement learning with supervised learning, but
to demonstrate the value of rethinking the role of reinforcement learning and
supervised learning in optimizing task-oriented dialogue systems.
| [
{
"created": "Mon, 21 Sep 2020 12:04:18 GMT",
"version": "v1"
}
] | 2020-09-22T00:00:00 | [
[
"Li",
"Ziming",
""
],
[
"Kiseleva",
"Julia",
""
],
[
"de Rijke",
"Maarten",
""
]
] | 0no_new_dataset
|
2205.00819 | Jesse Hoey | Jesse Hoey and Gabrielle Chan | A Novel Approach to Fairness in Automated Decision-Making using
Affective Normalization | null | null | null | null | cs.CY cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Any decision, such as one about who to hire, involves two components. First,
a rational component, i.e., they have a good education, they speak clearly.
Second, an affective component, based on observables such as visual features of
race and gender, and possibly biased by stereotypes. Here we propose a method
for measuring the affective, socially biased, component, thus enabling its
removal. That is, given a decision-making process, these affective measurements
remove the affective bias in the decision, rendering it fair across a set of
categories defined by the method itself. We thus propose that this may solve
three key problems in intersectional fairness: (1) the definition of categories
over which fairness is a consideration; (2) an infinite regress into smaller
and smaller groups; and (3) ensuring a fair distribution based on basic human
rights or other prior information. The primary idea in this paper is that
fairness biases can be measured using affective coherence, and that this can be
used to normalize outcome mappings. We aim for this conceptual work to expose a
novel method for handling fairness problems that uses emotional coherence as an
independent measure of bias that goes beyond statistical parity.
| [
{
"created": "Mon, 2 May 2022 11:48:53 GMT",
"version": "v1"
}
] | 2022-05-03T00:00:00 | [
[
"Hoey",
"Jesse",
""
],
[
"Chan",
"Gabrielle",
""
]
] | 1new_dataset
|
2205.14550 | Swapnil Sayan Saha | Swapnil Sayan Saha, Sandeep Singh Sandha, Mani Srivastava | Machine Learning for Microcontroller-Class Hardware: A Review | Published in IEEE Sensors Journal. Cite this as: S. S. Saha, S. S.
Sandha and M. Srivastava, "Machine Learning for Microcontroller-Class
Hardware: A Review," in IEEE Sensors Journal, vol. 22, no. 22, pp.
21362-21390, 15 Nov., 2022 | IEEE Sensors Journal, vol. 22, no. 22, pp. 21362-21390, 15 Nov.,
2022 | 10.1109/JSEN.2022.3210773 | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | The advancements in machine learning opened a new opportunity to bring
intelligence to the low-end Internet-of-Things nodes such as microcontrollers.
Conventional machine learning deployment has high memory and compute footprint
hindering their direct deployment on ultra resource-constrained
microcontrollers. This paper highlights the unique requirements of enabling
onboard machine learning for microcontroller class devices. Researchers use a
specialized model development workflow for resource-limited applications to
ensure the compute and latency budget is within the device limits while still
maintaining the desired performance. We characterize a closed-loop widely
applicable workflow of machine learning model development for microcontroller
class devices and show that several classes of applications adopt a specific
instance of it. We present both qualitative and numerical insights into
different stages of model development by showcasing several use cases. Finally,
we identify the open research challenges and unsolved questions demanding
careful considerations moving forward.
| [
{
"created": "Sun, 29 May 2022 00:59:38 GMT",
"version": "v1"
},
{
"created": "Mon, 6 Jun 2022 15:50:30 GMT",
"version": "v2"
},
{
"created": "Mon, 18 Jul 2022 04:52:56 GMT",
"version": "v3"
},
{
"created": "Wed, 16 Nov 2022 19:03:29 GMT",
"version": "v4"
},
{
"created": "Tue, 20 Dec 2022 20:52:55 GMT",
"version": "v5"
}
] | 2022-12-22T00:00:00 | [
[
"Saha",
"Swapnil Sayan",
""
],
[
"Sandha",
"Sandeep Singh",
""
],
[
"Srivastava",
"Mani",
""
]
] | 0no_new_dataset
|
1501.01825 | Tamir Bendory | Tamir Bendory and Shai Dekel and Arie Feuer | Unified Convex Optimization Approach to Super-Resolution Based on
Localized Kernels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of resolving the fine details of a signal from its coarse scale
measurements or, as it is commonly referred to in the literature, the
super-resolution problem arises naturally in engineering and physics in a
variety of settings. We suggest a unified convex optimization approach for
super-resolution. The key is the construction of an interpolating polynomial
based on localized kernels. We also show that the localized kernels act as the
connecting thread to another wide-spread problem of stream of pulses.
| [
{
"created": "Thu, 8 Jan 2015 13:09:49 GMT",
"version": "v1"
},
{
"created": "Sat, 28 Mar 2015 19:24:42 GMT",
"version": "v2"
},
{
"created": "Sun, 12 Apr 2015 06:33:08 GMT",
"version": "v3"
}
] | 2015-04-14T00:00:00 | [
[
"Bendory",
"Tamir",
""
],
[
"Dekel",
"Shai",
""
],
[
"Feuer",
"Arie",
""
]
] | 0no_new_dataset
|
1604.02364 | Piotr Faliszewski | Piotr Faliszewski and Jean-Francois Laslier and Robert Schaefer and
Piotr Skowron and Arkadii Slinko and Nimrod Talmon | Modeling Representation of Minorities Under Multiwinner Voting Rules | 14 pages, 6 figures | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is twofold. First and foremost, we aim to
experimentally and quantitatively show that the choice of a multiwinner voting
rule can play a crucial role on the way minorities are represented. We also
test the possibility for some of these rules to achieve proportional
representation.
| [
{
"created": "Fri, 8 Apr 2016 14:51:12 GMT",
"version": "v1"
}
] | 2016-04-11T00:00:00 | [
[
"Faliszewski",
"Piotr",
""
],
[
"Laslier",
"Jean-Francois",
""
],
[
"Schaefer",
"Robert",
""
],
[
"Skowron",
"Piotr",
""
],
[
"Slinko",
"Arkadii",
""
],
[
"Talmon",
"Nimrod",
""
]
] | 0no_new_dataset
|
1002.1407 | Yao Li | Yao Li, Emina Soljanin, and Predrag Spasojevic | Collecting Coded Coupons over Overlapping Generations | Accepted by NetCod 2010 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coding over subsets (known as generations) rather than over all content
blocks in P2P distribution networks and other applications is necessary for a
number of practical reasons such as computational complexity. A penalty for
coding only within generations is an overall throughput reduction. It has been
previously shown that allowing contiguous generations to overlap in a
head-to-toe manner improves the throughput. We here propose and study a scheme,
referred to as the {\it random annex code}, that creates shared packets between
any two generations at random rather than only the neighboring ones. By
optimizing very few design parameters, we obtain a simple scheme that
outperforms both the non-overlapping and the head-to-toe overlapping schemes of
comparable computational complexity, both in the expected throughput and in the
rate of convergence of the probability of decoding failure to zero. We provide
a practical algorithm for accurate analysis of the expected throughput of the
random annex code for finite-length information. This algorithm enables us to
quantify the throughput vs.computational complexity tradeoff, which is
necessary for optimal selection of the scheme parameters.
| [
{
"created": "Sat, 6 Feb 2010 18:47:39 GMT",
"version": "v1"
},
{
"created": "Sat, 1 May 2010 04:15:49 GMT",
"version": "v2"
}
] | 2010-05-04T00:00:00 | [
[
"Li",
"Yao",
""
],
[
"Soljanin",
"Emina",
""
],
[
"Spasojevic",
"Predrag",
""
]
] | 0no_new_dataset
|
1704.04302 | Nhien-An Le-Khac | Nhien-An Le-Khac, M-Tahar Kechadi | On a Distributed Approach for Density-based Clustering | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient extraction of useful knowledge from these data is still a
challenge, mainly when the data is distributed, heterogeneous and of different
quality depending on its corresponding local infrastructure. To reduce the
overhead cost, most of the existing distributed clustering approaches generate
global models by aggregating local results obtained on each individual node.
The complexity and quality of solutions depend highly on the quality of the
aggregation. In this respect, we proposed for distributed density-based
clustering that both reduces the communication overheads due to the data
exchange and improves the quality of the global models by considering the
shapes of local clusters. From preliminary results we show that this algorithm
is very promising.
| [
{
"created": "Thu, 13 Apr 2017 23:34:43 GMT",
"version": "v1"
}
] | 2017-04-17T00:00:00 | [
[
"Le-Khac",
"Nhien-An",
""
],
[
"Kechadi",
"M-Tahar",
""
]
] | 0no_new_dataset
|