id
stringlengths 9
10
| submitter
stringlengths 5
46
⌀ | authors
stringlengths 5
1.31k
| title
stringlengths 8
223
| comments
stringlengths 2
574
⌀ | journal-ref
stringclasses 587
values | doi
stringclasses 784
values | report-no
stringclasses 75
values | categories
stringlengths 5
72
| license
stringclasses 9
values | abstract
stringlengths 82
3.31k
| versions
listlengths 1
15
| update_date
unknown | authors_parsed
sequencelengths 1
76
| label
class label 2
classes |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2008.05865 | Ming Tao | Ming Tao, Hao Tang, Fei Wu, Xiao-Yuan Jing, Bing-Kun Bao, Changsheng
Xu | DF-GAN: A Simple and Effective Baseline for Text-to-Image Synthesis | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Synthesizing high-quality realistic images from text descriptions is a
challenging task. Existing text-to-image Generative Adversarial Networks
generally employ a stacked architecture as the backbone yet still remain three
flaws. First, the stacked architecture introduces the entanglements between
generators of different image scales. Second, existing studies prefer to apply
and fix extra networks in adversarial learning for text-image semantic
consistency, which limits the supervision capability of these networks. Third,
the cross-modal attention-based text-image fusion that widely adopted by
previous works is limited on several special image scales because of the
computational cost. To these ends, we propose a simpler but more effective Deep
Fusion Generative Adversarial Networks (DF-GAN). To be specific, we propose:
(i) a novel one-stage text-to-image backbone that directly synthesizes
high-resolution images without entanglements between different generators, (ii)
a novel Target-Aware Discriminator composed of Matching-Aware Gradient Penalty
and One-Way Output, which enhances the text-image semantic consistency without
introducing extra networks, (iii) a novel deep text-image fusion block, which
deepens the fusion process to make a full fusion between text and visual
features. Compared with current state-of-the-art methods, our proposed DF-GAN
is simpler but more efficient to synthesize realistic and text-matching images
and achieves better performance on widely used datasets.
| [
{
"created": "Thu, 13 Aug 2020 12:51:17 GMT",
"version": "v1"
},
{
"created": "Wed, 24 Mar 2021 12:10:58 GMT",
"version": "v2"
},
{
"created": "Tue, 29 Mar 2022 07:56:53 GMT",
"version": "v3"
},
{
"created": "Sat, 15 Oct 2022 03:51:50 GMT",
"version": "v4"
}
] | "2022-10-18T00:00:00" | [
[
"Tao",
"Ming",
""
],
[
"Tang",
"Hao",
""
],
[
"Wu",
"Fei",
""
],
[
"Jing",
"Xiao-Yuan",
""
],
[
"Bao",
"Bing-Kun",
""
],
[
"Xu",
"Changsheng",
""
]
] | 0no_new_dataset
|
1701.03004 | Massimo Cafaro | Massimo Cafaro, Marco Pulimeno and Italo Epicoco | Parallel mining of time-faded heavy hitters | arXiv admin note: text overlap with arXiv:1601.03892 | null | null | null | cs.DS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present PFDCMSS, a novel message-passing based parallel algorithm for
mining time-faded heavy hitters. The algorithm is a parallel version of the
recently published FDCMSS sequential algorithm. We formally prove its
correctness by showing that the underlying data structure, a sketch augmented
with a Space Saving stream summary holding exactly two counters, is mergeable.
Whilst mergeability of traditional sketches derives immediately from theory, we
show that merging our augmented sketch is non trivial. Nonetheless, the
resulting parallel algorithm is fast and simple to implement. To the best of
our knowledge, PFDCMSS is the first parallel algorithm solving the problem of
mining time-faded heavy hitters on message-passing parallel architectures.
Extensive experimental results confirm that PFDCMSS retains the extreme
accuracy and error bound provided by FDCMSS whilst providing excellent parallel
scalability.
| [
{
"created": "Wed, 11 Jan 2017 15:07:38 GMT",
"version": "v1"
}
] | "2017-01-12T00:00:00" | [
[
"Cafaro",
"Massimo",
""
],
[
"Pulimeno",
"Marco",
""
],
[
"Epicoco",
"Italo",
""
]
] | 0no_new_dataset
|
1404.1736 | Alexios Balatsoukas-Stimming | Alexios Balatsoukas-Stimming and Andreas Burg | Faulty Successive Cancellation Decoding of Polar Codes for the Binary
Erasure Channel | As presented at ISITA 2014 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study faulty successive cancellation decoding of polar codes for the
binary erasure channel. To this end, we introduce a simple erasure-based fault
model and we show that, under this model, polarization does not happen, meaning
that fully reliable communication is not possible at any rate. Moreover, we
provide numerical results for the frame erasure rate and bit erasure rate and
we study an unequal error protection scheme that can significantly improve the
performance of the faulty successive cancellation decoder with negligible
overhead.
| [
{
"created": "Mon, 7 Apr 2014 10:45:28 GMT",
"version": "v1"
},
{
"created": "Mon, 9 Feb 2015 10:35:04 GMT",
"version": "v2"
}
] | "2015-02-10T00:00:00" | [
[
"Balatsoukas-Stimming",
"Alexios",
""
],
[
"Burg",
"Andreas",
""
]
] | 0no_new_dataset
|
1603.06060 | Abhijit Guha Roy | Abhijit Guha Roy and Debdoot Sheet | DASA: Domain Adaptation in Stacked Autoencoders using Systematic Dropout | Accepted at Asian Conference on Pattern Recognition 2015 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Domain adaptation deals with adapting behaviour of machine learning based
systems trained using samples in source domain to their deployment in target
domain where the statistics of samples in both domains are dissimilar. The task
of directly training or adapting a learner in the target domain is challenged
by lack of abundant labeled samples. In this paper we propose a technique for
domain adaptation in stacked autoencoder (SAE) based deep neural networks (DNN)
performed in two stages: (i) unsupervised weight adaptation using systematic
dropouts in mini-batch training, (ii) supervised fine-tuning with limited
number of labeled samples in target domain. We experimentally evaluate
performance in the problem of retinal vessel segmentation where the SAE-DNN is
trained using large number of labeled samples in the source domain (DRIVE
dataset) and adapted using less number of labeled samples in target domain
(STARE dataset). The performance of SAE-DNN measured using $logloss$ in source
domain is $0.19$, without and with adaptation are $0.40$ and $0.18$, and $0.39$
when trained exclusively with limited samples in target domain. The area under
ROC curve is observed respectively as $0.90$, $0.86$, $0.92$ and $0.87$. The
high efficiency of vessel segmentation with DASA strongly substantiates our
claim.
| [
{
"created": "Sat, 19 Mar 2016 07:27:56 GMT",
"version": "v1"
}
] | "2016-03-22T00:00:00" | [
[
"Roy",
"Abhijit Guha",
""
],
[
"Sheet",
"Debdoot",
""
]
] | 0no_new_dataset
|
1706.07342 | Rahul Deo | Jeffrey Zhang, Sravani Gajjala, Pulkit Agrawal, Geoffrey H. Tison,
Laura A. Hallock, Lauren Beussink-Nelson, Eugene Fan, Mandar A. Aras,
ChaRandle Jordan, Kirsten E. Fleischmann, Michelle Melisko, Atif Qasim,
Alexei Efros, Sanjiv J. Shah, Ruzena Bajcsy, Rahul C. Deo | A Computer Vision Pipeline for Automated Determination of Cardiac
Structure and Function and Detection of Disease by Two-Dimensional
Echocardiography | 9 figures, 2 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automated cardiac image interpretation has the potential to transform
clinical practice in multiple ways including enabling low-cost serial
assessment of cardiac function in the primary care and rural setting. We
hypothesized that advances in computer vision could enable building a fully
automated, scalable analysis pipeline for echocardiogram (echo) interpretation.
Our approach entailed: 1) preprocessing; 2) convolutional neural networks (CNN)
for view identification, image segmentation, and phasing of the cardiac cycle;
3) quantification of chamber volumes and left ventricular mass; 4) particle
tracking to compute longitudinal strain; and 5) targeted disease detection.
CNNs accurately identified views (e.g. 99% for apical 4-chamber) and segmented
individual cardiac chambers. Cardiac structure measurements agreed with study
report values (e.g. mean absolute deviations (MAD) of 7.7 mL/kg/m2 for left
ventricular diastolic volume index, 2918 studies). We computed automated
ejection fraction and longitudinal strain measurements (within 2 cohorts),
which agreed with commercial software-derived values [for ejection fraction,
MAD=5.3%, N=3101 studies; for strain, MAD=1.5% (n=197) and 1.6% (n=110)], and
demonstrated applicability to serial monitoring of breast cancer patients for
trastuzumab cardiotoxicity. Overall, we found that, compared to manual
measurements, automated measurements had superior performance across seven
internal consistency metrics with an average increase in the Spearman
correlation coefficient of 0.05 (p=0.02). Finally, we developed disease
detection algorithms for hypertrophic cardiomyopathy and cardiac amyloidosis,
with C-statistics of 0.93 and 0.84, respectively. Our pipeline lays the
groundwork for using automated interpretation to support point-of-care handheld
cardiac ultrasound and large-scale analysis of the millions of echos archived
within healthcare systems.
| [
{
"created": "Thu, 22 Jun 2017 14:39:49 GMT",
"version": "v1"
},
{
"created": "Thu, 29 Jun 2017 13:21:48 GMT",
"version": "v2"
},
{
"created": "Sat, 1 Jul 2017 00:22:08 GMT",
"version": "v3"
},
{
"created": "Fri, 7 Jul 2017 19:56:01 GMT",
"version": "v4"
},
{
"created": "Tue, 31 Oct 2017 04:50:32 GMT",
"version": "v5"
},
{
"created": "Mon, 13 Nov 2017 00:36:10 GMT",
"version": "v6"
},
{
"created": "Fri, 12 Jan 2018 17:09:23 GMT",
"version": "v7"
}
] | "2018-01-15T00:00:00" | [
[
"Zhang",
"Jeffrey",
""
],
[
"Gajjala",
"Sravani",
""
],
[
"Agrawal",
"Pulkit",
""
],
[
"Tison",
"Geoffrey H.",
""
],
[
"Hallock",
"Laura A.",
""
],
[
"Beussink-Nelson",
"Lauren",
""
],
[
"Fan",
"Eugene",
""
],
[
"Aras",
"Mandar A.",
""
],
[
"Jordan",
"ChaRandle",
""
],
[
"Fleischmann",
"Kirsten E.",
""
],
[
"Melisko",
"Michelle",
""
],
[
"Qasim",
"Atif",
""
],
[
"Efros",
"Alexei",
""
],
[
"Shah",
"Sanjiv J.",
""
],
[
"Bajcsy",
"Ruzena",
""
],
[
"Deo",
"Rahul C.",
""
]
] | 1new_dataset
|
2108.10367 | Raffaele Galliera | Tobias Jacob, Raffaele Galliera, Muddasar Ali, Sikha Bagui | Marine vessel tracking using a monocular camera | 12 pages, 9 figures, the paper is based on the submission for the AI
Tracks at Sea challenge made by the same team taking to a 3rd place in the
competition, included in DeLTA 2021 conference proceedings, published on
SCITEPRESS Digital Library and available at
https://www.scitepress.org/PublicationsDetail.aspx?ID=yzZS+b/VkZ4=&t=1 | null | 10.5220/0010516000170028 | null | cs.CV cs.AI cs.LG cs.RO | http://creativecommons.org/licenses/by-sa/4.0/ | In this paper, a new technique for camera calibration using only GPS data is
presented. A new way of tracking objects that move on a plane in a video is
achieved by using the location and size of the bounding box to estimate the
distance, achieving an average prediction error of 5.55m per 100m distance from
the camera. This solution can be run in real-time at the edge, achieving
efficient inference in a low-powered IoT environment while also being able to
track multiple different vessels.
| [
{
"created": "Mon, 23 Aug 2021 19:08:20 GMT",
"version": "v1"
}
] | "2021-08-25T00:00:00" | [
[
"Jacob",
"Tobias",
""
],
[
"Galliera",
"Raffaele",
""
],
[
"Ali",
"Muddasar",
""
],
[
"Bagui",
"Sikha",
""
]
] | 0no_new_dataset
|
2309.05490 | Carlos Hinojosa | Santiago Rivier, Carlos Hinojosa, Silvio Giancola, Bernard Ghanem | Learning Semantic Segmentation with Query Points Supervision on Aerial
Images | Paper presented at the LXCV workshop at ICCV 2023 | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semantic segmentation is crucial in remote sensing, where high-resolution
satellite images are segmented into meaningful regions. Recent advancements in
deep learning have significantly improved satellite image segmentation.
However, most of these methods are typically trained in fully supervised
settings that require high-quality pixel-level annotations, which are expensive
and time-consuming to obtain. In this work, we present a weakly supervised
learning algorithm to train semantic segmentation algorithms that only rely on
query point annotations instead of full mask labels. Our proposed approach
performs accurate semantic segmentation and improves efficiency by
significantly reducing the cost and time required for manual annotation.
Specifically, we generate superpixels and extend the query point labels into
those superpixels that group similar meaningful semantics. Then, we train
semantic segmentation models, supervised with images partially labeled with the
superpixels pseudo-labels. We benchmark our weakly supervised training approach
on an aerial image dataset and different semantic segmentation architectures,
showing that we can reach competitive performance compared to fully supervised
training while reducing the annotation effort.
| [
{
"created": "Mon, 11 Sep 2023 14:32:04 GMT",
"version": "v1"
}
] | "2023-09-12T00:00:00" | [
[
"Rivier",
"Santiago",
""
],
[
"Hinojosa",
"Carlos",
""
],
[
"Giancola",
"Silvio",
""
],
[
"Ghanem",
"Bernard",
""
]
] | 1new_dataset
|
2104.13224 | Safa Otoum | Safa Otoum, Ismaeel Al Ridhawi, Hussein T. Mouftah | Preventing and Controlling Epidemics through Blockchain-Assisted
AI-Enabled Networks | Accepted in IEEE Network Magazine | null | null | null | cs.CR | http://creativecommons.org/publicdomain/zero/1.0/ | The COVID-19 pandemic, which spread rapidly in late 2019, has revealed that
the use of computing and communication technologies provides significant aid in
preventing, controlling, and combating infectious diseases. With the ongoing
research in next-generation networking (NGN), the use of secure and reliable
communication and networking is of utmost importance when dealing with users'
health records and other sensitive information. Through the adaptation of
Artificial Intelligence (AI)-enabled NGN, the shape of healthcare systems can
be altered to achieve smart and secure healthcare capable of coping with
epidemics that may emerge at any given moment. In this article, we envision a
cooperative and distributed healthcare framework that relies on
state-of-the-art computing, communication, and intelligence capabilities,
namely, Federated Learning (FL), mobile edge computing (MEC), and Blockchain,
to enable epidemic (or suspicious infectious disease) discovery, remote
monitoring, and fast health-authority response. The introduced framework can
also enable secure medical data exchange at the edge and between different
health entities. Such a technique, coupled with the low latency and high
bandwidth functionality of 5G and beyond networks, would enable mass
surveillance, monitoring and analysis to occur at the edge. Challenges, issues,
and design guidelines are also discussed in this article with highlights on
some trending solutions.
| [
{
"created": "Sun, 25 Apr 2021 20:07:08 GMT",
"version": "v1"
}
] | "2021-04-28T00:00:00" | [
[
"Otoum",
"Safa",
""
],
[
"Ridhawi",
"Ismaeel Al",
""
],
[
"Mouftah",
"Hussein T.",
""
]
] | 0no_new_dataset
|
2106.14150 | Mojtaba Mahdavi | Samira Hosseini, Mojtaba Mahdavi | Image content dependent semi-fragile watermarking with localized tamper
detection | 32 pages, 11 figures, 5 tables | null | null | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Content-independent watermarks and block-wise independency can be considered
as vulnerabilities in semi-fragile watermarking methods. In this paper to
achieve the objectives of semi-fragile watermarking techniques, a method is
proposed to not have the mentioned shortcomings. In the proposed method, the
watermark is generated by relying on image content and a key. Furthermore, the
embedding scheme causes the watermarked blocks to become dependent on each
other, using a key. In the embedding phase, the image is partitioned into
non-overlapping blocks. In order to detect and separate the different types of
attacks more precisely, the proposed method embeds three copies of each
watermark bit into LWT coefficients of each 4x4 block. In the authentication
phase, by voting between the extracted bits the error maps are created; these
maps indicate image authenticity and reveal the modified regions. Also, in
order to automate the authentication, the images are classified into four
categories using seven features. Classification accuracy in the experiments is
97.97 percent. It is noted that our experiments demonstrate that the proposed
method is robust against JPEG compression and is competitive with a
state-of-the-art semi-fragile watermarking method, in terms of robustness and
semi-fragility.
| [
{
"created": "Sun, 27 Jun 2021 05:40:56 GMT",
"version": "v1"
}
] | "2021-06-29T00:00:00" | [
[
"Hosseini",
"Samira",
""
],
[
"Mahdavi",
"Mojtaba",
""
]
] | 0no_new_dataset
|
2004.14360 | Peter Maynard PhD | Peter Maynard and Kieran McLaughlin | Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas
Fisher and the 'Hacktivist' Threat to Critical Infrastructure | null | null | null | null | cs.CR | http://creativecommons.org/publicdomain/zero/1.0/ | The hacktivist threat actor is listed in many risk decision documents. Yet
their tactics and techniques often remain a mystery. We create a MITRE ATT&CK
(ATT&CK) model of a well known hacktivist who goes under the pseudonym of
Phineas Fisher, and map that threat to critical infrastructure. The analysis is
derived from hacker manifestos, journalist reporting, and official government
documentation. This analysis fills a gap in current threat models, to better
define what skills and methods a determined hacker might employ. This paper
also identifies seven essential mitigations which can be deployed by critical
infrastructure operations and asset owners, to prevent such intrusions by
hacktivists. We are in the process of contributing this threat actor into the
ATT&CK knowledge base.
| [
{
"created": "Wed, 29 Apr 2020 17:39:15 GMT",
"version": "v1"
}
] | "2020-04-30T00:00:00" | [
[
"Maynard",
"Peter",
""
],
[
"McLaughlin",
"Kieran",
""
]
] | 0no_new_dataset
|
2210.16285 | Muhammad Irfan Yousuf Dr. | Muhammad Irfan Yousuf, Izza Anwer, Tanzeela Shakir, Minahil Siddiqui,
Maysoon Shahid | Multi-feature Dataset for Windows PE Malware Classification | 9 Pages, 1 Figure, 5 Tables | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | This paper describes a multi-feature dataset for training machine learning
classifiers for detecting malicious Windows Portable Executable (PE) files. The
dataset includes four feature sets from 18,551 binary samples belonging to five
malware families including Spyware, Ransomware, Downloader, Backdoor and
Generic Malware. The feature sets include the list of DLLs and their functions,
values of different fields of PE Header and Sections. First, we explain the
data collection and creation phase and then we explain how did we label the
samples in it using VirusTotal's services. Finally, we explore the dataset to
describe how this dataset can benefit the researchers for static malware
analysis. The dataset is made public in the hope that it will help inspire
machine learning research for malware detection.
| [
{
"created": "Fri, 28 Oct 2022 17:23:21 GMT",
"version": "v1"
}
] | "2022-10-31T00:00:00" | [
[
"Yousuf",
"Muhammad Irfan",
""
],
[
"Anwer",
"Izza",
""
],
[
"Shakir",
"Tanzeela",
""
],
[
"Siddiqui",
"Minahil",
""
],
[
"Shahid",
"Maysoon",
""
]
] | 1new_dataset
|
2309.06982 | Chih Wei Ling | Ali Moradi Shahmiri, Chih Wei Ling, Cheuk Ting Li | Communication-Efficient Laplace Mechanism for Differential Privacy via
Random Quantization | 11 pages, 3 figures, short version to be submitted at 2024 IEEE
International Conference on Acoustics, Speech and Signal Processing | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose the first method that realizes the Laplace mechanism exactly
(i.e., a Laplace noise is added to the data) that requires only a finite amount
of communication (whereas the original Laplace mechanism requires the
transmission of a real number) while guaranteeing privacy against the server
and database. Our mechanism can serve as a drop-in replacement for local or
centralized differential privacy applications where the Laplace mechanism is
used. Our mechanism is constructed using a random quantization technique.
Unlike the simple and prevalent Laplace-mechanism-then-quantize approach, the
quantization in our mechanism does not result in any distortion or degradation
of utility. Unlike existing dithered quantization and channel simulation
schemes for simulating additive Laplacian noise, our mechanism guarantees
privacy not only against the database and downstream, but also against the
honest but curious server which attempts to decode the data using the dither
signals.
| [
{
"created": "Wed, 13 Sep 2023 14:17:54 GMT",
"version": "v1"
}
] | "2023-09-14T00:00:00" | [
[
"Shahmiri",
"Ali Moradi",
""
],
[
"Ling",
"Chih Wei",
""
],
[
"Li",
"Cheuk Ting",
""
]
] | 0no_new_dataset
|
2009.10036 | Erico Lopes | Erico S. P. Lopes and Lukas T. N. Landau | Iterative Detection and Decoding for Multiuser MIMO Systems with Low
Resolution Precoding and PSK Modulation | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low-resolution precoding techniques have gained considerable attention in the
wireless communications area recently. Vital but hardly discussed in
literature, discrete precoding in conjunction with channel coding is the
subject of this study. Unlike prior studies, we propose three different soft
detection methods and an iterative detection and decoding scheme that allow the
utilization of channel coding in conjunction with low-resolution precoding.
Besides an exact approach for computing the extrinsic information, we propose
two approximations with reduced computational complexity. Numerical results
based on PSK modulation and an LDPC block code indicate a superior performance
as compared to the system design based on the common AWGN channel model in
terms of bit-error-rate.
| [
{
"created": "Mon, 21 Sep 2020 17:16:34 GMT",
"version": "v1"
},
{
"created": "Tue, 24 Nov 2020 14:26:11 GMT",
"version": "v2"
},
{
"created": "Tue, 29 Dec 2020 21:16:23 GMT",
"version": "v3"
},
{
"created": "Fri, 15 Jan 2021 18:43:36 GMT",
"version": "v4"
},
{
"created": "Wed, 19 May 2021 23:12:02 GMT",
"version": "v5"
}
] | "2021-05-21T00:00:00" | [
[
"Lopes",
"Erico S. P.",
""
],
[
"Landau",
"Lukas T. N.",
""
]
] | 0no_new_dataset
|
1711.01287 | Niek Tax | Niek Tax, Natalia Sidorova, Wil M. P. van der Aalst | Discovering More Precise Process Models from Event Logs by Filtering Out
Chaotic Activities | null | Journal of Intelligent Information Systems, (2018), 1-33 | 10.1007/s10844-018-0507-6 | null | cs.DB cs.AI cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Process Discovery is concerned with the automatic generation of a process
model that describes a business process from execution data of that business
process. Real life event logs can contain chaotic activities. These activities
are independent of the state of the process and can, therefore, happen at
rather arbitrary points in time. We show that the presence of such chaotic
activities in an event log heavily impacts the quality of the process models
that can be discovered with process discovery techniques. The current modus
operandi for filtering activities from event logs is to simply filter out
infrequent activities. We show that frequency-based filtering of activities
does not solve the problems that are caused by chaotic activities. Moreover, we
propose a novel technique to filter out chaotic activities from event logs. We
evaluate this technique on a collection of seventeen real-life event logs that
originate from both the business process management domain and the smart home
environment domain. As demonstrated, the developed activity filtering methods
enable the discovery of process models that are more behaviorally specific
compared to process models that are discovered using standard frequency-based
filtering.
| [
{
"created": "Fri, 3 Nov 2017 18:13:36 GMT",
"version": "v1"
}
] | "2018-05-07T00:00:00" | [
[
"Tax",
"Niek",
""
],
[
"Sidorova",
"Natalia",
""
],
[
"van der Aalst",
"Wil M. P.",
""
]
] | 0no_new_dataset
|
1504.07518 | Mona Rahn | Mona Rahn, Guido Sch\"afer | Efficient Equilibria in Polymatrix Coordination Games | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider polymatrix coordination games with individual preferences where
every player corresponds to a node in a graph who plays with each neighbor a
separate bimatrix game with non-negative symmetric payoffs. In this paper, we
study $\alpha$-approximate $k$-equilibria of these games, i.e., outcomes where
no group of at most $k$ players can deviate such that each member increases his
payoff by at least a factor $\alpha$. We prove that for $\alpha \ge 2$ these
games have the finite coalitional improvement property (and thus
$\alpha$-approximate $k$-equilibria exist), while for $\alpha < 2$ this
property does not hold. Further, we derive an almost tight bound of
$2\alpha(n-1)/(k-1)$ on the price of anarchy, where $n$ is the number of
players; in particular, it scales from unbounded for pure Nash equilibria ($k =
1)$ to $2\alpha$ for strong equilibria ($k = n$). We also settle the complexity
of several problems related to the verification and existence of these
equilibria. Finally, we investigate natural means to reduce the inefficiency of
Nash equilibria. Most promisingly, we show that by fixing the strategies of $k$
players the price of anarchy can be reduced to $n/k$ (and this bound is tight).
| [
{
"created": "Tue, 28 Apr 2015 15:03:30 GMT",
"version": "v1"
}
] | "2015-04-29T00:00:00" | [
[
"Rahn",
"Mona",
""
],
[
"Schäfer",
"Guido",
""
]
] | 0no_new_dataset
|
2205.15592 | Yurui Ming | Yurui Ming, Cuihuan Du, and Chin-Teng Lin | Semantic Autoencoder and Its Potential Usage for Adversarial Attack | null | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Autoencoder can give rise to an appropriate latent representation of the
input data, however, the representation which is solely based on the intrinsic
property of the input data, is usually inferior to express some semantic
information. A typical case is the potential incapability of forming a clear
boundary upon clustering of these representations. By encoding the latent
representation that not only depends on the content of the input data, but also
the semantic of the input data, such as label information, we propose an
enhanced autoencoder architecture named semantic autoencoder. Experiments of
representation distribution via t-SNE shows a clear distinction between these
two types of encoders and confirm the supremacy of the semantic one, whilst the
decoded samples of these two types of autoencoders exhibit faint dissimilarity
either objectively or subjectively. Based on this observation, we consider
adversarial attacks to learning algorithms that rely on the latent
representation obtained via autoencoders. It turns out that latent contents of
adversarial samples constructed from semantic encoder with deliberate wrong
label information exhibit different distribution compared with that of the
original input data, while both of these samples manifest very marginal
difference. This new way of attack set up by our work is worthy of attention
due to the necessity to secure the widespread deep learning applications.
| [
{
"created": "Tue, 31 May 2022 08:10:07 GMT",
"version": "v1"
}
] | "2022-06-01T00:00:00" | [
[
"Ming",
"Yurui",
""
],
[
"Du",
"Cuihuan",
""
],
[
"Lin",
"Chin-Teng",
""
]
] | 0no_new_dataset
|
2112.05997 | Souvik Sur | Souvik Sur | Two Sequential Squaring Verifiable Delay Function | The proofs are insufficient | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Verifiable Delay Function (VDF) is a function that takes a specified
sequential time to be evaluated, but can be efficiently verified. VDFs are
useful in several applications ranging from randomness beacons to sustainable
blockchains but are really rare in practice. Most of the VDFs are based on
algebraic assumptions like time-lock puzzle in unknown group orders [6, 8] and
isogenies over pairing groups [4]. The number of modulo squaring required for
verification in the time-lock puzzle based VDFs are proportional to their
security parameter. This paper proposes a verifiable delay function that
requires only 2- modulo squaring for verification. So the sequential effort
required for verification is independent of the security parameter.
| [
{
"created": "Sat, 11 Dec 2021 14:40:19 GMT",
"version": "v1"
},
{
"created": "Sat, 5 Feb 2022 12:10:42 GMT",
"version": "v2"
},
{
"created": "Mon, 21 Feb 2022 14:38:16 GMT",
"version": "v3"
},
{
"created": "Sat, 9 Dec 2023 14:46:24 GMT",
"version": "v4"
},
{
"created": "Tue, 19 Dec 2023 15:41:44 GMT",
"version": "v5"
},
{
"created": "Sun, 24 Dec 2023 15:15:14 GMT",
"version": "v6"
}
] | "2023-12-27T00:00:00" | [
[
"Sur",
"Souvik",
""
]
] | 0no_new_dataset
|
2406.12284 | Brett Daley | Brett Daley, Marlos C. Machado, Martha White | Demystifying the Recency Heuristic in Temporal-Difference Learning | RLC 2024. 18 pages, 8 figures, 1 table | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | The recency heuristic in reinforcement learning is the assumption that
stimuli that occurred closer in time to an acquired reward should be more
heavily reinforced. The recency heuristic is one of the key assumptions made by
TD($\lambda$), which reinforces recent experiences according to an
exponentially decaying weighting. In fact, all other widely used return
estimators for TD learning, such as $n$-step returns, satisfy a weaker (i.e.,
non-monotonic) recency heuristic. Why is the recency heuristic effective for
temporal credit assignment? What happens when credit is assigned in a way that
violates this heuristic? In this paper, we analyze the specific mathematical
implications of adopting the recency heuristic in TD learning. We prove that
any return estimator satisfying this heuristic: 1) is guaranteed to converge to
the correct value function, 2) has a relatively fast contraction rate, and 3)
has a long window of effective credit assignment, yet bounded worst-case
variance. We also give a counterexample where on-policy, tabular TD methods
violating the recency heuristic diverge. Our results offer some of the first
theoretical evidence that credit assignment based on the recency heuristic
facilitates learning.
| [
{
"created": "Tue, 18 Jun 2024 05:23:29 GMT",
"version": "v1"
}
] | "2024-06-19T00:00:00" | [
[
"Daley",
"Brett",
""
],
[
"Machado",
"Marlos C.",
""
],
[
"White",
"Martha",
""
]
] | 0no_new_dataset
|
1906.05912 | Steven Squires | Steven Squires, Adam Pr\"ugel Bennett, Mahesan Niranjan | A Variational Autoencoder for Probabilistic Non-Negative Matrix
Factorisation | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce and demonstrate the variational autoencoder (VAE) for
probabilistic non-negative matrix factorisation (PAE-NMF). We design a network
which can perform non-negative matrix factorisation (NMF) and add in aspects of
a VAE to make the coefficients of the latent space probabilistic. By
restricting the weights in the final layer of the network to be non-negative
and using the non-negative Weibull distribution we produce a probabilistic form
of NMF which allows us to generate new data and find a probability distribution
that effectively links the latent and input variables. We demonstrate the
effectiveness of PAE-NMF on three heterogeneous datasets: images, financial
time series and genomic.
| [
{
"created": "Thu, 13 Jun 2019 20:05:15 GMT",
"version": "v1"
}
] | "2019-06-17T00:00:00" | [
[
"Squires",
"Steven",
""
],
[
"Bennett",
"Adam Prügel",
""
],
[
"Niranjan",
"Mahesan",
""
]
] | 0no_new_dataset
|
1308.3320 | V. B. Singh Dr. | Sujata Khatri, R.S. Chhillar, V.B.Singh | Improving the Testability of Object-oriented Software during Testing and
Debugging Processes | 12; 2011 | null | null | null | cs.SE | http://creativecommons.org/licenses/publicdomain/ | Testability is the probability whether tests will detect a fault, given that
a fault in the program exists. How efficiently the faults will be uncovered
depends upon the testability of the software. Various researchers have proposed
qualitative and quantitative techniques to improve and measure the testability
of software. In literature, a plethora of reliability growth models have been
used to assess and measure the quantitative quality assessment of software
during testing and operational phase. The knowledge about failure distribution
and their complexity can improve the testability of software. Testing effort
allocation can be made easy by knowing the failure distribution and complexity
of faults, and this will ease the process of revealing faults from the
software. As a result, the testability of the software will be improved. The
parameters of the model along with the proportion of faults of different
complexity to be removed from the software have been presented in the paper .We
have used failure data of two object oriented software developed under open
source environment namely MySQL for python and Squirrel SQL Client for
estimation purpose
| [
{
"created": "Thu, 15 Aug 2013 06:56:26 GMT",
"version": "v1"
}
] | "2013-08-16T00:00:00" | [
[
"Khatri",
"Sujata",
""
],
[
"Chhillar",
"R. S.",
""
],
[
"Singh",
"V. B.",
""
]
] | 1new_dataset
|
2102.09398 | Anqing Jiang | Anqing Jiang, Liangyao Chen, Osamu Yoshie | A Reinforcement learning method for Optical Thin-Film Design | null | null | null | null | cs.LG eess.IV physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine learning, especially deep learning, is dramatically changing the
methods associated with optical thin-film inverse design. The vast majority of
this research has focused on the parameter optimization (layer thickness, and
structure size) of optical thin-films. A challenging problem that arises is an
automated material search. In this work, we propose a new end-to-end algorithm
for optical thin-film inverse design. This method combines the ability of
unsupervised learning, reinforcement learning(RL) and includes a genetic
algorithm to design an optical thin-film without any human intervention.
Furthermore, with several concrete examples, we have shown how one can use this
technique to optimize the spectra of a multi-layer solar absorber device.
| [
{
"created": "Sat, 13 Feb 2021 07:42:15 GMT",
"version": "v1"
}
] | "2021-02-19T00:00:00" | [
[
"Jiang",
"Anqing",
""
],
[
"Chen",
"Liangyao",
""
],
[
"Yoshie",
"Osamu",
""
]
] | 0no_new_dataset
|
2210.07011 | Jianpeng Chen | Jianpeng Chen, Yawen Ling, Jie Xu, Yazhou Ren, Shudong Huang, Xiaorong
Pu, Zhifeng Hao, Philip S. Yu, Lifang He | Variational Graph Generator for Multi-View Graph Clustering | submitted to TNNLS | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Multi-view graph clustering (MGC) methods are increasingly being studied due
to the explosion of multi-view data with graph structural information. The
critical point of MGC is to better utilize the view-specific and view-common
information in features and graphs of multiple views. However, existing works
have an inherent limitation that they are unable to concurrently utilize the
consensus graph information across multiple graphs and the view-specific
feature information. To address this issue, we propose Variational Graph
Generator for Multi-View Graph Clustering (VGMGC). Specifically, a novel
variational graph generator is proposed to extract common information among
multiple graphs. This generator infers a reliable variational consensus graph
based on a priori assumption over multiple graphs. Then a simple yet effective
graph encoder in conjunction with the multi-view clustering objective is
presented to learn the desired graph embeddings for clustering, which embeds
the inferred view-common graph and view-specific graphs together with features.
Finally, theoretical results illustrate the rationality of VGMGC by analyzing
the uncertainty of the inferred consensus graph with information bottleneck
principle. Extensive experiments demonstrate the superior performance of our
VGMGC over SOTAs.
| [
{
"created": "Thu, 13 Oct 2022 13:19:51 GMT",
"version": "v1"
},
{
"created": "Fri, 16 Dec 2022 14:59:17 GMT",
"version": "v2"
}
] | "2022-12-19T00:00:00" | [
[
"Chen",
"Jianpeng",
""
],
[
"Ling",
"Yawen",
""
],
[
"Xu",
"Jie",
""
],
[
"Ren",
"Yazhou",
""
],
[
"Huang",
"Shudong",
""
],
[
"Pu",
"Xiaorong",
""
],
[
"Hao",
"Zhifeng",
""
],
[
"Yu",
"Philip S.",
""
],
[
"He",
"Lifang",
""
]
] | 0no_new_dataset
|
1107.2059 | Gloria Serrano Sotelo | J.A. Dom\'inguez P\'erez, J.M. Mu\~noz Porras and G. Serrano Sotelo | One dimensional Convolutional Goppa Codes over the projective line | null | null | null | null | cs.IT math.AG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a general method to construct MDS one-dimensional convolutional
codes. Our method generalizes previous constructions of H. Gluesing-Luerssen
and B. Langfeld. Moreover we give a classification of one-dimensional
Convolutional Goppa Codes and propose a characterization of MDS codes of this
type.
| [
{
"created": "Mon, 11 Jul 2011 15:36:34 GMT",
"version": "v1"
}
] | "2011-07-12T00:00:00" | [
[
"Pérez",
"J. A. Domínguez",
""
],
[
"Porras",
"J. M. Muñoz",
""
],
[
"Sotelo",
"G. Serrano",
""
]
] | 0no_new_dataset
|
2111.00063 | Zheng Chen | Zheng Chen, Zhengming Ding, David Crandall, Lantao Liu | Polyline Generative Navigable Space Segmentation for Autonomous Visual
Navigation | null | null | null | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting navigable space is a fundamental capability for mobile robots
navigating in unknown or unmapped environments. In this work, we treat visual
navigable space segmentation as a scene decomposition problem and propose
Polyline Segmentation Variational autoencoder Network (PSV-Net), a
representation learning-based framework for learning the navigable space
segmentation in a self-supervised manner. Current segmentation techniques
heavily rely on fully-supervised learning strategies which demand a large
amount of pixel-level annotated images. In this work, we propose a framework
leveraging a Variational AutoEncoder (VAE) and an AutoEncoder (AE) to learn a
polyline representation that compactly outlines the desired navigable space
boundary. Through extensive experiments, we validate that the proposed PSV-Net
can learn the visual navigable space with no or few labels, producing an
accuracy comparable to fully-supervised state-of-the-art methods that use all
available labels. In addition, we show that integrating the proposed navigable
space segmentation model with a visual planner can achieve efficient mapless
navigation in real environments.
| [
{
"created": "Fri, 29 Oct 2021 19:50:48 GMT",
"version": "v1"
},
{
"created": "Sun, 5 Mar 2023 18:08:42 GMT",
"version": "v2"
}
] | "2023-03-07T00:00:00" | [
[
"Chen",
"Zheng",
""
],
[
"Ding",
"Zhengming",
""
],
[
"Crandall",
"David",
""
],
[
"Liu",
"Lantao",
""
]
] | 0no_new_dataset
|
2011.10475 | Jong Chul Ye | Eunju Cha, Chanseok Lee, Mooseok Jang, and Jong Chul Ye | DeepPhaseCut: Deep Relaxation in Phase for Unsupervised Fourier Phase
Retrieval | null | null | null | null | cs.CV cs.LG eess.IV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fourier phase retrieval is a classical problem of restoring a signal only
from the measured magnitude of its Fourier transform. Although Fienup-type
algorithms, which use prior knowledge in both spatial and Fourier domains, have
been widely used in practice, they can often stall in local minima. Modern
methods such as PhaseLift and PhaseCut may offer performance guarantees with
the help of convex relaxation. However, these algorithms are usually
computationally intensive for practical use. To address this problem, we
propose a novel, unsupervised, feed-forward neural network for Fourier phase
retrieval which enables immediate high quality reconstruction. Unlike the
existing deep learning approaches that use a neural network as a regularization
term or an end-to-end blackbox model for supervised training, our algorithm is
a feed-forward neural network implementation of PhaseCut algorithm in an
unsupervised learning framework. Specifically, our network is composed of two
generators: one for the phase estimation using PhaseCut loss, followed by
another generator for image reconstruction, all of which are trained
simultaneously using a cycleGAN framework without matched data. The link to the
classical Fienup-type algorithms and the recent symmetry-breaking learning
approach is also revealed. Extensive experiments demonstrate that the proposed
method outperforms all existing approaches in Fourier phase retrieval problems.
| [
{
"created": "Fri, 20 Nov 2020 16:10:08 GMT",
"version": "v1"
}
] | "2020-11-23T00:00:00" | [
[
"Cha",
"Eunju",
""
],
[
"Lee",
"Chanseok",
""
],
[
"Jang",
"Mooseok",
""
],
[
"Ye",
"Jong Chul",
""
]
] | 0no_new_dataset
|
1308.6401 | Karim Hammoudi KH | Karim Hammoudi, Fadi Dornaika, Bahman Soheilian, Bruno Vallet, John
McDonald, Nicolas Paparoditis | A Synergistic Approach for Recovering Occlusion-Free Textured 3D Maps of
Urban Facades from Heterogeneous Cartographic Data | null | International Journal of Advanced Robotic Systems, vol. 10, 10p.,
2013 | 10.5772/56570 | null | cs.CV | http://creativecommons.org/licenses/by/3.0/ | In this paper we present a practical approach for generating an
occlusion-free textured 3D map of urban facades by the synergistic use of
terrestrial images, 3D point clouds and area-based information. Particularly in
dense urban environments, the high presence of urban objects in front of the
facades causes significant difficulties for several stages in computational
building modeling. Major challenges lie on the one hand in extracting complete
3D facade quadrilateral delimitations and on the other hand in generating
occlusion-free facade textures. For these reasons, we describe a
straightforward approach for completing and recovering facade geometry and
textures by exploiting the data complementarity of terrestrial multi-source
imagery and area-based information.
| [
{
"created": "Thu, 29 Aug 2013 08:47:09 GMT",
"version": "v1"
}
] | "2013-08-30T00:00:00" | [
[
"Hammoudi",
"Karim",
""
],
[
"Dornaika",
"Fadi",
""
],
[
"Soheilian",
"Bahman",
""
],
[
"Vallet",
"Bruno",
""
],
[
"McDonald",
"John",
""
],
[
"Paparoditis",
"Nicolas",
""
]
] | 0no_new_dataset
|
1405.4013 | Anurag Bhardwaj | Anurag Bhardwaj, Vignesh Jagadeesh, Wei Di, Robinson Piramuthu,
Elizabeth Churchill | Enhancing Visual Fashion Recommendations with Users in the Loop | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a completely automated large scale visual recommendation system
for fashion. Existing approaches have primarily relied on purely computational
models to solving this problem that ignore the role of users in the system. In
this paper, we propose to overcome this limitation by incorporating a
user-centric design of visual fashion recommendations. Specifically, we propose
a technique that augments 'user preferences' in models by exploiting elasticity
in fashion choices. We further design a user study on these choices and gather
results from the 'wisdom of crowd' for deeper analysis. Our key insights learnt
through these results suggest that fashion preferences when constrained to a
particular class, contain important behavioral signals that are often ignored
in recommendation design. Further, presence of such classes also reflect strong
correlations to visual perception which can be utilized to provide
aesthetically pleasing user experiences. Finally, we illustrate that user
approval of visual fashion recommendations can be substantially improved by
carefully incorporating these user-centric feedback into the system framework.
| [
{
"created": "Thu, 15 May 2014 20:58:17 GMT",
"version": "v1"
}
] | "2014-05-19T00:00:00" | [
[
"Bhardwaj",
"Anurag",
""
],
[
"Jagadeesh",
"Vignesh",
""
],
[
"Di",
"Wei",
""
],
[
"Piramuthu",
"Robinson",
""
],
[
"Churchill",
"Elizabeth",
""
]
] | 0no_new_dataset
|
2012.09650 | St\'ephane Clinchant | Thibault Formal, Benjamin Piwowarski and St\'ephane Clinchant | A White Box Analysis of ColBERT | to appear in ECIR'21 | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transformer-based models are nowadays state-of-the-art in ad-hoc Information
Retrieval, but their behavior is far from being understood. Recent work has
claimed that BERT does not satisfy the classical IR axioms. However, we propose
to dissect the matching process of ColBERT, through the analysis of term
importance and exact/soft matching patterns. Even if the traditional axioms are
not formally verified, our analysis reveals that ColBERT: (i) is able to
capture a notion of term importance; (ii) relies on exact matches for important
terms.
| [
{
"created": "Thu, 17 Dec 2020 14:59:01 GMT",
"version": "v1"
}
] | "2020-12-18T00:00:00" | [
[
"Formal",
"Thibault",
""
],
[
"Piwowarski",
"Benjamin",
""
],
[
"Clinchant",
"Stéphane",
""
]
] | 0no_new_dataset
|
2312.02514 | Ke Lin | Ke Lin | Skipping Scheme for Gate-hiding Garbled Circuits | 20 pages, 8 figures | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | In classic settings of garbled circuits, each gate type is leaked to improve
both space and speed optimization. Zahur et al. have shown in EUROCRYPT 2015
that a typical linear garbling scheme requires at least two $\lambda$-bit
elements per gate with a security parameter of $\lambda$, which limits their
efficiency. In contrast to typical garbled circuits, gate-hiding garbled
circuits have the potential to drastically reduce time costs, although they
have been underappreciated.
We propose the first skipping scheme for gate-hiding garbled circuits to
enhance the efficiency of evaluation by observing prime implicants. Our scheme
introduces skip gates to eliminate the need to calculate the entire circuit,
enabling unnecessary execution paths to be avoided. We also introduce two
variants of our scheme that balance security with parallelism. A proof of
hybrid security that combines simulation-based and symmetry-based security in
semi-honest scenarios is presented to demonstrate its security under
gate-hiding conditions. Our scheme will inspire new directions to improve the
general garbling scheme and lead to more practical ones.
| [
{
"created": "Tue, 5 Dec 2023 05:38:09 GMT",
"version": "v1"
}
] | "2023-12-06T00:00:00" | [
[
"Lin",
"Ke",
""
]
] | 0no_new_dataset
|
1705.05902 | Benjamin Kunsberg | Daniel Niels Holtmann-Rice, Benjamin S. Kunsberg, Steven W. Zucker | Tensors, Differential Geometry and Statistical Shading Analysis | arXiv admin note: substantial text overlap with arXiv:1705.05885 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a linear algebraic framework for the shape-from-shading problem,
because tensors arise when scalar (e.g. image) and vector (e.g. surface normal)
fields are differentiated multiple times. Using this framework, we first
investigate when image derivatives exhibit invariance to changing illumination
by calculating the statistics of image derivatives under general distributions
on the light source. Second, we apply that framework to develop Taylor-like
expansions, and build a boot-strapping algorithm to find the polynomial surface
solutions (under any light source) consistent with a given patch to arbitrary
order. A generic constraint on the light source restricts these solutions to a
2-D subspace, plus an unknown rotation matrix. It is this unknown matrix that
encapsulates the ambiguity in the problem. Finally, we use the framework to
computationally validate the hypothesis that image orientations (derivatives)
provide increased invariance to illumination by showing (for a Lambertian
model) that a shape-from-shading algorithm matching gradients instead of
intensities provides more accurate reconstructions when illumination is
incorrectly estimated under a flatness prior.
| [
{
"created": "Tue, 16 May 2017 20:25:21 GMT",
"version": "v1"
},
{
"created": "Fri, 27 Jul 2018 15:23:02 GMT",
"version": "v2"
}
] | "2018-08-07T00:00:00" | [
[
"Holtmann-Rice",
"Daniel Niels",
""
],
[
"Kunsberg",
"Benjamin S.",
""
],
[
"Zucker",
"Steven W.",
""
]
] | 0no_new_dataset
|
1204.2358 | Meng Yang | Lei Zhang, Meng Yang, Xiangchu Feng, Yi Ma, and David Zhang | Collaborative Representation based Classification for Face Recognition | It is a substantial revision of a previous conference paper (L.
Zhang, M. Yang, et al. "Sparse Representation or Collaborative
Representation: Which Helps Face Recognition?" in ICCV 2011) | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | By coding a query sample as a sparse linear combination of all training
samples and then classifying it by evaluating which class leads to the minimal
coding residual, sparse representation based classification (SRC) leads to
interesting results for robust face recognition. It is widely believed that the
l1- norm sparsity constraint on coding coefficients plays a key role in the
success of SRC, while its use of all training samples to collaboratively
represent the query sample is rather ignored. In this paper we discuss how SRC
works, and show that the collaborative representation mechanism used in SRC is
much more crucial to its success of face classification. The SRC is a special
case of collaborative representation based classification (CRC), which has
various instantiations by applying different norms to the coding residual and
coding coefficient. More specifically, the l1 or l2 norm characterization of
coding residual is related to the robustness of CRC to outlier facial pixels,
while the l1 or l2 norm characterization of coding coefficient is related to
the degree of discrimination of facial features. Extensive experiments were
conducted to verify the face recognition accuracy and efficiency of CRC with
different instantiations.
| [
{
"created": "Wed, 11 Apr 2012 07:13:20 GMT",
"version": "v1"
},
{
"created": "Mon, 10 Mar 2014 09:42:43 GMT",
"version": "v2"
}
] | "2014-03-11T00:00:00" | [
[
"Zhang",
"Lei",
""
],
[
"Yang",
"Meng",
""
],
[
"Feng",
"Xiangchu",
""
],
[
"Ma",
"Yi",
""
],
[
"Zhang",
"David",
""
]
] | 0no_new_dataset
|
1803.07204 | Felix Stahlberg | Felix Stahlberg, Danielle Saunders, Gonzalo Iglesias, Bill Byrne | Why not be Versatile? Applications of the SGNMT Decoder for Machine
Translation | Presented at AMTA 2018 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | SGNMT is a decoding platform for machine translation which allows paring
various modern neural models of translation with different kinds of constraints
and symbolic models. In this paper, we describe three use cases in which SGNMT
is currently playing an active role: (1) teaching as SGNMT is being used for
course work and student theses in the MPhil in Machine Learning, Speech and
Language Technology at the University of Cambridge, (2) research as most of the
research work of the Cambridge MT group is based on SGNMT, and (3) technology
transfer as we show how SGNMT is helping to transfer research findings from the
laboratory to the industry, eg. into a product of SDL plc.
| [
{
"created": "Tue, 20 Mar 2018 00:44:18 GMT",
"version": "v1"
}
] | "2018-03-21T00:00:00" | [
[
"Stahlberg",
"Felix",
""
],
[
"Saunders",
"Danielle",
""
],
[
"Iglesias",
"Gonzalo",
""
],
[
"Byrne",
"Bill",
""
]
] | 0no_new_dataset
|
2305.08518 | Derguene Mbaye | Derguene Mbaye, Moussa Diallo | Beqi: Revitalize the Senegalese Wolof Language with a Robust Spelling
Corrector | 17 pages, 7 figures, 5 tables | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The progress of Natural Language Processing (NLP), although fast in recent
years, is not at the same pace for all languages. African languages in
particular are still behind and lack automatic processing tools. Some of these
tools are very important for the development of these languages but also have
an important role in many NLP applications. This is particularly the case for
automatic spell checkers. Several approaches have been studied to address this
task and the one modeling spelling correction as a translation task from
misspelled (noisy) text to well-spelled (correct) text shows promising results.
However, this approach requires a parallel corpus of noisy data on the one hand
and correct data on the other hand, whereas Wolof is a low-resource language
and does not have such a corpus. In this paper, we present a way to address the
constraint related to the lack of data by generating synthetic data and we
present sequence-to-sequence models using Deep Learning for spelling correction
in Wolof. We evaluated these models in three different scenarios depending on
the subwording method applied to the data and showed that the latter had a
significant impact on the performance of the models, which opens the way for
future research in Wolof spelling correction.
| [
{
"created": "Mon, 15 May 2023 10:28:36 GMT",
"version": "v1"
}
] | "2023-05-16T00:00:00" | [
[
"Mbaye",
"Derguene",
""
],
[
"Diallo",
"Moussa",
""
]
] | 0no_new_dataset
|
2401.17268 | Wangchunshu Zhou | Tiannan Wang, Jiamin Chen, Qingrui Jia, Shuai Wang, Ruoyu Fang, Huilin
Wang, Zhaowei Gao, Chunzhao Xie, Chuou Xu, Jihong Dai, Yibin Liu, Jialong Wu,
Shengwei Ding, Long Li, Zhiwei Huang, Xinle Deng, Teng Yu, Gangan Ma, Han
Xiao, Zixin Chen, Danjun Xiang, Yunxia Wang, Yuanyuan Zhu, Yi Xiao, Jing
Wang, Yiru Wang, Siran Ding, Jiayang Huang, Jiayi Xu, Yilihamu Tayier, Zhenyu
Hu, Yuan Gao, Chengfeng Zheng, Yueshu Ye, Yihang Li, Lei Wan, Xinyue Jiang,
Yujie Wang, Siyu Cheng, Zhule Song, Xiangru Tang, Xiaohua Xu, Ningyu Zhang,
Huajun Chen, Yuchen Eleanor Jiang, and Wangchunshu Zhou | Weaver: Foundation Models for Creative Writing | null | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | This work introduces Weaver, our first family of large language models (LLMs)
dedicated to content creation. Weaver is pre-trained on a carefully selected
corpus that focuses on improving the writing capabilities of large language
models. We then fine-tune Weaver for creative and professional writing purposes
and align it to the preference of professional writers using a suit of novel
methods for instruction data synthesis and LLM alignment, making it able to
produce more human-like texts and follow more diverse instructions for content
creation. The Weaver family consists of models of Weaver Mini (1.8B), Weaver
Base (6B), Weaver Pro (14B), and Weaver Ultra (34B) sizes, suitable for
different applications and can be dynamically dispatched by a routing agent
according to query complexity to balance response quality and computation cost.
Evaluation on a carefully curated benchmark for assessing the writing
capabilities of LLMs shows Weaver models of all sizes outperform generalist
LLMs several times larger than them. Notably, our most-capable Weaver Ultra
model surpasses GPT-4, a state-of-the-art generalist LLM, on various writing
scenarios, demonstrating the advantage of training specialized LLMs for writing
purposes. Moreover, Weaver natively supports retrieval-augmented generation
(RAG) and function calling (tool usage). We present various use cases of these
abilities for improving AI-assisted writing systems, including integration of
external knowledge bases, tools, or APIs, and providing personalized writing
assistance. Furthermore, we discuss and summarize a guideline and best
practices for pre-training and fine-tuning domain-specific LLMs.
| [
{
"created": "Tue, 30 Jan 2024 18:58:43 GMT",
"version": "v1"
}
] | "2024-01-31T00:00:00" | [
[
"Wang",
"Tiannan",
""
],
[
"Chen",
"Jiamin",
""
],
[
"Jia",
"Qingrui",
""
],
[
"Wang",
"Shuai",
""
],
[
"Fang",
"Ruoyu",
""
],
[
"Wang",
"Huilin",
""
],
[
"Gao",
"Zhaowei",
""
],
[
"Xie",
"Chunzhao",
""
],
[
"Xu",
"Chuou",
""
],
[
"Dai",
"Jihong",
""
],
[
"Liu",
"Yibin",
""
],
[
"Wu",
"Jialong",
""
],
[
"Ding",
"Shengwei",
""
],
[
"Li",
"Long",
""
],
[
"Huang",
"Zhiwei",
""
],
[
"Deng",
"Xinle",
""
],
[
"Yu",
"Teng",
""
],
[
"Ma",
"Gangan",
""
],
[
"Xiao",
"Han",
""
],
[
"Chen",
"Zixin",
""
],
[
"Xiang",
"Danjun",
""
],
[
"Wang",
"Yunxia",
""
],
[
"Zhu",
"Yuanyuan",
""
],
[
"Xiao",
"Yi",
""
],
[
"Wang",
"Jing",
""
],
[
"Wang",
"Yiru",
""
],
[
"Ding",
"Siran",
""
],
[
"Huang",
"Jiayang",
""
],
[
"Xu",
"Jiayi",
""
],
[
"Tayier",
"Yilihamu",
""
],
[
"Hu",
"Zhenyu",
""
],
[
"Gao",
"Yuan",
""
],
[
"Zheng",
"Chengfeng",
""
],
[
"Ye",
"Yueshu",
""
],
[
"Li",
"Yihang",
""
],
[
"Wan",
"Lei",
""
],
[
"Jiang",
"Xinyue",
""
],
[
"Wang",
"Yujie",
""
],
[
"Cheng",
"Siyu",
""
],
[
"Song",
"Zhule",
""
],
[
"Tang",
"Xiangru",
""
],
[
"Xu",
"Xiaohua",
""
],
[
"Zhang",
"Ningyu",
""
],
[
"Chen",
"Huajun",
""
],
[
"Jiang",
"Yuchen Eleanor",
""
],
[
"Zhou",
"Wangchunshu",
""
]
] | 1new_dataset
|
1306.6054 | Vijay Ganesh | Vijay Ganesh, Mia Minnes, Armando Solar-Lezama, Martin Rinard | (Un)Decidability Results for Word Equations with Length and Regular
Expression Constraints | Invited Paper at ADDCT Workshop 2013 (co-located with CADE 2013) | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove several decidability and undecidability results for the
satisfiability and validity problems for languages that can express solutions
to word equations with length constraints. The atomic formulas over this
language are equality over string terms (word equations), linear inequality
over the length function (length constraints), and membership in regular sets.
These questions are important in logic, program analysis, and formal
verification. Variants of these questions have been studied for many decades by
mathematicians. More recently, practical satisfiability procedures (aka SMT
solvers) for these formulas have become increasingly important in the context
of security analysis for string-manipulating programs such as web applications.
We prove three main theorems. First, we give a new proof of undecidability
for the validity problem for the set of sentences written as a forall-exists
quantifier alternation applied to positive word equations. A corollary of this
undecidability result is that this set is undecidable even with sentences with
at most two occurrences of a string variable. Second, we consider Boolean
combinations of quantifier-free formulas constructed out of word equations and
length constraints. We show that if word equations can be converted to a solved
form, a form relevant in practice, then the satisfiability problem for Boolean
combinations of word equations and length constraints is decidable. Third, we
show that the satisfiability problem for quantifier-free formulas over word
equations in regular solved form, length constraints, and the membership
predicate over regular expressions is also decidable.
| [
{
"created": "Tue, 25 Jun 2013 18:25:28 GMT",
"version": "v1"
}
] | "2013-06-26T00:00:00" | [
[
"Ganesh",
"Vijay",
""
],
[
"Minnes",
"Mia",
""
],
[
"Solar-Lezama",
"Armando",
""
],
[
"Rinard",
"Martin",
""
]
] | 0no_new_dataset
|
1601.01348 | Akshay Kumar | Akshay Kumar, Ahmed Abdelhadi, Charles Clancy | An Online Delay Efficient Packet Scheduler for M2M Traffic in Industrial
Automation | 6 pages, 7 figures, Accepted for publication in IEEE Systems
Conference 2016 | null | 10.1109/SYSCON.2016.7490665 | null | cs.NI cs.IT cs.PF math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Some Machine-to-Machine (M2M) communication links particularly those in a
industrial automation plant have stringent latency requirements. In this paper,
we study the delay-performance for the M2M uplink from the sensors to a
Programmable Logic Controller (PLC) in a industrial automation scenario. The
uplink traffic can be broadly classified as either Periodic Update (PU) and
Event Driven (ED). The PU arrivals from different sensors are periodic,
synchronized by the PLC and need to be processed by a prespecified firm latency
deadline. On the other hand, the ED arrivals are random, have low-arrival rate,
but may need to be processed quickly depending upon the criticality of the
application. To accommodate these contrasting Quality-of-Service (QoS)
requirements, we model the utility of PU and ED packets using step function and
sigmoidal functions of latency respectively. Our goal is to maximize the
overall system utility while being proportionally fair to both PU and ED data.
To this end, we propose a novel online QoS-aware packet scheduler that gives
priority to ED data as long as that results the latency deadline is met for PU
data. However as the size of networks increases, we drop the PU packets that
fail to meet latency deadline which reduces congestion and improves overall
system utility. Using extensive simulations, we compare the performance of our
scheme with various scheduling policies such as First-Come-First-Serve (FCFS),
Earliest-Due-Date (EDD) and (preemptive) priority. We show that our scheme
outperforms the existing schemes for various simulation scenarios.
| [
{
"created": "Wed, 6 Jan 2016 22:51:05 GMT",
"version": "v1"
}
] | "2016-11-15T00:00:00" | [
[
"Kumar",
"Akshay",
""
],
[
"Abdelhadi",
"Ahmed",
""
],
[
"Clancy",
"Charles",
""
]
] | 0no_new_dataset
|
2306.11346 | Yu Zheng | Guangming Wang, Yu Zheng, Yanfeng Guo, Zhe Liu, Yixiang Zhu, Wolfram
Burgard, and Hesheng Wang | End-to-end 2D-3D Registration between Image and LiDAR Point Cloud for
Vehicle Localization | 18 pages, 14 figures, under review | null | null | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Robot localization using a previously built map is essential for a variety of
tasks including highly accurate navigation and mobile manipulation. A popular
approach to robot localization is based on image-to-point cloud registration,
which combines illumination-invariant LiDAR-based mapping with economical
image-based localization. However, the recent works for image-to-point cloud
registration either divide the registration into separate modules or project
the point cloud to the depth image to register the RGB and depth images. In
this paper, we present I2PNet, a novel end-to-end 2D-3D registration network.
I2PNet directly registers the raw 3D point cloud with the 2D RGB image using
differential modules with a unique target. The 2D-3D cost volume module for
differential 2D-3D association is proposed to bridge feature extraction and
pose regression. 2D-3D cost volume module implicitly constructs the soft
point-to-pixel correspondence on the intrinsic-independent normalized plane of
the pinhole camera model. Moreover, we introduce an outlier mask prediction
module to filter the outliers in the 2D-3D association before pose regression.
Furthermore, we propose the coarse-to-fine 2D-3D registration architecture to
increase localization accuracy. We conduct extensive localization experiments
on the KITTI Odometry and nuScenes datasets. The results demonstrate that
I2PNet outperforms the state-of-the-art by a large margin. In addition, I2PNet
has a higher efficiency than the previous works and can perform the
localization in real-time. Moreover, we extend the application of I2PNet to the
camera-LiDAR online calibration and demonstrate that I2PNet outperforms recent
approaches on the online calibration task.
| [
{
"created": "Tue, 20 Jun 2023 07:28:40 GMT",
"version": "v1"
}
] | "2023-06-21T00:00:00" | [
[
"Wang",
"Guangming",
""
],
[
"Zheng",
"Yu",
""
],
[
"Guo",
"Yanfeng",
""
],
[
"Liu",
"Zhe",
""
],
[
"Zhu",
"Yixiang",
""
],
[
"Burgard",
"Wolfram",
""
],
[
"Wang",
"Hesheng",
""
]
] | 0no_new_dataset
|
1801.09036 | Wlodek Zadrozny | Wlodek Zadrozny and Luciana Garbayo | A Sheaf Model of Contradictions and Disagreements. Preliminary Report
and Discussion | This paper was presented at ISAIM 2018, International Symposium on
Artificial Intelligence and Mathematics. Fort Lauderdale, FL. January 3 5,
2018. Minor typographical errors have been corrected | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new formal model -- based on the mathematical construct of
sheaves -- for representing contradictory information in textual sources. This
model has the advantage of letting us (a) identify the causes of the
inconsistency; (b) measure how strong it is; (c) and do something about it,
e.g. suggest ways to reconcile inconsistent advice. This model naturally
represents the distinction between contradictions and disagreements. It is
based on the idea of representing natural language sentences as formulas with
parameters sitting on lattices, creating partial orders based on predicates
shared by theories, and building sheaves on these partial orders with products
of lattices as stalks. Degrees of disagreement are measured by the existence of
global and local sections.
Limitations of the sheaf approach and connections to recent work in natural
language processing, as well as the topics of contextuality in physics, data
fusion, topological data analysis and epistemology are also discussed.
| [
{
"created": "Sat, 27 Jan 2018 05:13:55 GMT",
"version": "v1"
}
] | "2018-01-30T00:00:00" | [
[
"Zadrozny",
"Wlodek",
""
],
[
"Garbayo",
"Luciana",
""
]
] | 1new_dataset
|
2110.08306 | Qinfeng Xiao | Qinfeng Xiao, Shikuan Shao, Jing Wang | Memory-augmented Adversarial Autoencoders for Multivariate Time-series
Anomaly Detection with Deep Reconstruction and Prediction | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Detecting anomalies for multivariate time-series without manual supervision
continues a challenging problem due to the increased scale of dimensions and
complexity of today's IT monitoring systems. Recent progress of unsupervised
time-series anomaly detection mainly use deep autoencoders to solve this
problem, i.e. training on normal samples and producing significant
reconstruction error on abnormal inputs. However, in practice, autoencoders can
reconstruct anomalies so well, due to powerful capabilites of neural networks.
Besides, these approaches can be ineffective for identifying non-point
anomalies, e.g. contextual anomalies and collective anomalies, since they
solely utilze a point-wise reconstruction objective. To tackle the above
issues, we propose MemAAE (\textit{Memory-augmented Adversarial Autoencoders
with Deep Reconstruction and Prediction}), a novel unsupervised anomaly
detection method for time-series. By jointly training two complementary proxy
tasks, reconstruction and prediction, with a shared network architecture, we
show that detecting anomalies via multiple tasks obtains superior performance
rather than single-task training. Additionally, a compressive memory module is
introduced to preserve normal patterns, avoiding unexpected generalization on
abnormal inputs. Through extensive experiments, MemAAE achieves an overall F1
score of 0.90 on four public datasets, significantly outperforming the best
baseline by 0.02.
| [
{
"created": "Fri, 15 Oct 2021 18:29:05 GMT",
"version": "v1"
}
] | "2021-10-19T00:00:00" | [
[
"Xiao",
"Qinfeng",
""
],
[
"Shao",
"Shikuan",
""
],
[
"Wang",
"Jing",
""
]
] | 1new_dataset
|
2308.11487 | Jilong Wang | Jilong Wang, Saihui Hou, Yan Huang, Chunshui Cao, Xu Liu, Yongzhen
Huang, Tianzhu Zhang, Liang Wang | Free Lunch for Gait Recognition: A Novel Relation Descriptor | Add new figures and fix some typos | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Gait recognition is to seek correct matches for query individuals by their
unique walking patterns. However, current methods focus solely on extracting
individual-specific features, overlooking ``interpersonal" relationships. In
this paper, we propose a novel $\textbf{Relation Descriptor}$ that captures not
only individual features but also relations between test gaits and pre-selected
gait anchors. Specifically, we reinterpret classifier weights as gait anchors
and compute similarity scores between test features and these anchors, which
re-expresses individual gait features into a similarity relation distribution.
In essence, the relation descriptor offers a holistic perspective that
leverages the collective knowledge stored within the classifier's weights,
emphasizing meaningful patterns and enhancing robustness. Despite its
potential, relation descriptor poses dimensionality challenges since its
dimension depends on the training set's identity count. To address this, we
propose Farthest gait-Anchor Selection to identify the most discriminative gait
anchors and an Orthogonal Regularization Loss to increase diversity within gait
anchors. Compared to individual-specific features extracted from the backbone,
our relation descriptor can boost the performance nearly without any extra
costs. We evaluate the effectiveness of our method on the popular GREW, Gait3D,
OU-MVLP, CASIA-B, and CCPG, showing that our method consistently outperforms
the baselines and achieves state-of-the-art performance.
| [
{
"created": "Tue, 22 Aug 2023 15:06:14 GMT",
"version": "v1"
},
{
"created": "Mon, 28 Aug 2023 17:42:45 GMT",
"version": "v2"
},
{
"created": "Tue, 5 Dec 2023 03:37:33 GMT",
"version": "v3"
}
] | "2023-12-06T00:00:00" | [
[
"Wang",
"Jilong",
""
],
[
"Hou",
"Saihui",
""
],
[
"Huang",
"Yan",
""
],
[
"Cao",
"Chunshui",
""
],
[
"Liu",
"Xu",
""
],
[
"Huang",
"Yongzhen",
""
],
[
"Zhang",
"Tianzhu",
""
],
[
"Wang",
"Liang",
""
]
] | 0no_new_dataset
|
0707.0459 | Petar Popovski | Petar Popovski and Hiroyuki Yomo | Physical Network Coding in Two-Way Wireless Relay Channels | null | Proc. of IEEE International Conference on Communications (ICC),
Glasgow, Scotland, 2007 | null | null | cs.IT cs.NI math.IT | null | It has recently been recognized that the wireless networks represent a
fertile ground for devising communication modes based on network coding. A
particularly suitable application of the network coding arises for the two--way
relay channels, where two nodes communicate with each other assisted by using a
third, relay node. Such a scenario enables application of \emph{physical
network coding}, where the network coding is either done (a) jointly with the
channel coding or (b) through physical combining of the communication flows
over the multiple access channel. In this paper we first group the existing
schemes for physical network coding into two generic schemes, termed 3--step
and 2--step scheme, respectively. We investigate the conditions for
maximization of the two--way rate for each individual scheme: (1) the
Decode--and--Forward (DF) 3--step schemes (2) three different schemes with two
steps: Amplify--and--Forward (AF), JDF and Denoise--and--Forward (DNF). While
the DNF scheme has a potential to offer the best two--way rate, the most
interesting result of the paper is that, for some SNR configurations of the
source--relay links, JDF yields identical maximal two--way rate as the upper
bound on the rate for DNF.
| [
{
"created": "Tue, 3 Jul 2007 16:40:41 GMT",
"version": "v1"
}
] | "2007-07-13T00:00:00" | [
[
"Popovski",
"Petar",
""
],
[
"Yomo",
"Hiroyuki",
""
]
] | 0no_new_dataset
|
2306.04434 | Marianne Gunderson | Marianne Gunderson | Visions of augmented reality in popular culture: Power and (un)readable
identities when the world becomes a screen | null | Tidsskrift for Kjoennsforskning volume 45 2021 pages 89-104 | 10.18261/issn.1891-1781-2021-02-03-03 | null | cs.CY cs.SI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Augmented reality, where digital objects are overlaid and combined with the
ordinary visual surface, is a technology under rapid development, which has
long been a part of visions of the digital future. In this article, I examine
how gaze and power are coded into three pop-cultural visions of augmented
reality. By analyzing representations of augmented reality in science fiction
through the lens of feminist theory on performativity and intelligibility,
visibility and race, gendered gaze, and algorithmic normativity, this paper
provides a critical understanding of augmented reality as a visual technology,
and how it might change or reinforce possible norms and power relations. In
these futures where the screen no longer has any boundaries, both cooperative
and reluctant bodies are inscribed with gendered and racialized digital
markers. Reading visions of augmented reality through feminist theory, I argue
that augmented reality technologies enter into assemblages of people,
discourses, and technologies, where none of the actors necessarily has an
overview. In these assemblages, augmented reality takes on a performative and
norm-bearing role, by forming a grid of intelligibility that codifies
identities, structures hierarchical relationships, and scripts social
interactions.
| [
{
"created": "Wed, 7 Jun 2023 13:49:49 GMT",
"version": "v1"
},
{
"created": "Sun, 5 May 2024 08:36:05 GMT",
"version": "v2"
}
] | "2024-05-07T00:00:00" | [
[
"Gunderson",
"Marianne",
""
]
] | 0no_new_dataset
|
2009.12606 | Chaozheng Wu | Chaozheng Wu, Jian Chen, Qiaoyu Cao, Jianchi Zhang, Yunxin Tai, Lin
Sun, Kui Jia | Grasp Proposal Networks: An End-to-End Solution for Visual Learning of
Robotic Grasps | Accepted to NeurIPS 2020 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Learning robotic grasps from visual observations is a promising yet
challenging task. Recent research shows its great potential by preparing and
learning from large-scale synthetic datasets. For the popular, 6
degree-of-freedom (6-DOF) grasp setting of parallel-jaw gripper, most of
existing methods take the strategy of heuristically sampling grasp candidates
and then evaluating them using learned scoring functions. This strategy is
limited in terms of the conflict between sampling efficiency and coverage of
optimal grasps. To this end, we propose in this work a novel, end-to-end
\emph{Grasp Proposal Network (GPNet)}, to predict a diverse set of 6-DOF grasps
for an unseen object observed from a single and unknown camera view. GPNet
builds on a key design of grasp proposal module that defines \emph{anchors of
grasp centers} at discrete but regular 3D grid corners, which is flexible to
support either more precise or more diverse grasp predictions. To test GPNet,
we contribute a synthetic dataset of 6-DOF object grasps; evaluation is
conducted using rule-based criteria, simulation test, and real test.
Comparative results show the advantage of our methods over existing ones.
Notably, GPNet gains better simulation results via the specified coverage,
which helps achieve a ready translation in real test. We will make our dataset
publicly available.
| [
{
"created": "Sat, 26 Sep 2020 14:14:52 GMT",
"version": "v1"
}
] | "2020-09-29T00:00:00" | [
[
"Wu",
"Chaozheng",
""
],
[
"Chen",
"Jian",
""
],
[
"Cao",
"Qiaoyu",
""
],
[
"Zhang",
"Jianchi",
""
],
[
"Tai",
"Yunxin",
""
],
[
"Sun",
"Lin",
""
],
[
"Jia",
"Kui",
""
]
] | 1new_dataset
|
1502.03167 | Sergey Ioffe | Sergey Ioffe, Christian Szegedy | Batch Normalization: Accelerating Deep Network Training by Reducing
Internal Covariate Shift | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Training Deep Neural Networks is complicated by the fact that the
distribution of each layer's inputs changes during training, as the parameters
of the previous layers change. This slows down the training by requiring lower
learning rates and careful parameter initialization, and makes it notoriously
hard to train models with saturating nonlinearities. We refer to this
phenomenon as internal covariate shift, and address the problem by normalizing
layer inputs. Our method draws its strength from making normalization a part of
the model architecture and performing the normalization for each training
mini-batch. Batch Normalization allows us to use much higher learning rates and
be less careful about initialization. It also acts as a regularizer, in some
cases eliminating the need for Dropout. Applied to a state-of-the-art image
classification model, Batch Normalization achieves the same accuracy with 14
times fewer training steps, and beats the original model by a significant
margin. Using an ensemble of batch-normalized networks, we improve upon the
best published result on ImageNet classification: reaching 4.9% top-5
validation error (and 4.8% test error), exceeding the accuracy of human raters.
| [
{
"created": "Wed, 11 Feb 2015 01:44:18 GMT",
"version": "v1"
},
{
"created": "Fri, 13 Feb 2015 17:31:36 GMT",
"version": "v2"
},
{
"created": "Mon, 2 Mar 2015 20:44:12 GMT",
"version": "v3"
}
] | "2015-03-03T00:00:00" | [
[
"Ioffe",
"Sergey",
""
],
[
"Szegedy",
"Christian",
""
]
] | 0no_new_dataset
|
2110.11519 | Konstantin Shtoyk | Kostya Serebryany, Maxim Lifantsev, Konstantin Shtoyk, Doug Kwan,
Peter Hochschild | SiliFuzz: Fuzzing CPUs by proxy | null | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | CPUs are becoming more complex with every generation, at both the logical and
the physical levels. This potentially leads to more logic bugs and electrical
defects in CPUs being overlooked during testing, which causes data corruption
or other undesirable effects when these CPUs are used in production. These
ever-present problems may also have simply become more evident as more CPUs are
operated and monitored by large cloud providers.
If the RTL ("source code") of a CPU were available, we could apply greybox
fuzzing to the CPU model almost as we do to any other software
[arXiv:2102.02308]. However our targets are general purpose x86_64 CPUs
produced by third parties, where we do not have the RTL design, so in our case
CPU implementations are opaque. Moreover, we are more interested in electrical
defects as opposed to logic bugs.
We present SiliFuzz, a work-in-progress system that finds CPU defects by
fuzzing software proxies, like CPU simulators or disassemblers, and then
executing the accumulated test inputs (known as the corpus) on actual CPUs on a
large scale. The major difference between this work and traditional software
fuzzing is that a software bug fixed once will be fixed for all installations
of the software, while for CPU defects we have to test every individual core
repeatedly over its lifetime due to wear and tear. In this paper we also
analyze four groups of CPU defects that SiliFuzz has uncovered and describe
patterns shared by other SiliFuzz findings.
| [
{
"created": "Tue, 5 Oct 2021 03:41:53 GMT",
"version": "v1"
}
] | "2021-10-25T00:00:00" | [
[
"Serebryany",
"Kostya",
""
],
[
"Lifantsev",
"Maxim",
""
],
[
"Shtoyk",
"Konstantin",
""
],
[
"Kwan",
"Doug",
""
],
[
"Hochschild",
"Peter",
""
]
] | 0no_new_dataset
|
1109.0181 | J\"urgen Umbrich | J\"urgen Umbrich, Aidan Hogan and Axel Polleres | Improving the recall of decentralised linked data querying through
implicit knowledge | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aside from crawling, indexing, and querying RDF data centrally, Linked Data
principles allow for processing SPARQL queries on-the-fly by dereferencing
URIs. Proposed link-traversal query approaches for Linked Data have the
benefits of up-to-date results and decentralised (i.e., client-side) execution,
but operate on incomplete knowledge available in dereferenced documents, thus
affecting recall. In this paper, we investigate how implicit knowledge -
specifically that found through owl:sameAs and RDFS reasoning - can improve the
recall in this setting. We start with an empirical analysis of a large crawl
featuring 4 m Linked Data sources and 1.1 g quadruples: we (1) measure expected
recall by only considering dereferenceable information, (2) measure the
improvement in recall given by considering rdfs:seeAlso links as previous
proposals did. We further propose and measure the impact of additionally
considering (3) owl:sameAs links, and (4) applying lightweight RDFS reasoning
(specifically {\rho}DF) for finding more results, relying on static schema
information. We evaluate our methods for live queries over our crawl.
| [
{
"created": "Thu, 1 Sep 2011 13:14:13 GMT",
"version": "v1"
}
] | "2015-03-19T00:00:00" | [
[
"Umbrich",
"Jürgen",
""
],
[
"Hogan",
"Aidan",
""
],
[
"Polleres",
"Axel",
""
]
] | 0no_new_dataset
|
2310.00944 | Aldi Piroli | Aldi Piroli, Vinzenz Dallabetta, Johannes Kopp, Marc Walessa, Daniel
Meissner, Klaus Dietmayer | Towards Robust 3D Object Detection In Rainy Conditions | Published at IEEE International Conference on Intelligent
Transportation Systems ITSC 2023 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LiDAR sensors are used in autonomous driving applications to accurately
perceive the environment. However, they are affected by adverse weather
conditions such as snow, fog, and rain. These everyday phenomena introduce
unwanted noise into the measurements, severely degrading the performance of
LiDAR-based perception systems. In this work, we propose a framework for
improving the robustness of LiDAR-based 3D object detectors against road spray.
Our approach uses a state-of-the-art adverse weather detection network to
filter out spray from the LiDAR point cloud, which is then used as input for
the object detector. In this way, the detected objects are less affected by the
adverse weather in the scene, resulting in a more accurate perception of the
environment. In addition to adverse weather filtering, we explore the use of
radar targets to further filter false positive detections. Tests on real-world
data show that our approach improves the robustness to road spray of several
popular 3D object detectors.
| [
{
"created": "Mon, 2 Oct 2023 07:34:15 GMT",
"version": "v1"
},
{
"created": "Thu, 5 Oct 2023 06:37:23 GMT",
"version": "v2"
}
] | "2023-10-06T00:00:00" | [
[
"Piroli",
"Aldi",
""
],
[
"Dallabetta",
"Vinzenz",
""
],
[
"Kopp",
"Johannes",
""
],
[
"Walessa",
"Marc",
""
],
[
"Meissner",
"Daniel",
""
],
[
"Dietmayer",
"Klaus",
""
]
] | 0no_new_dataset
|
2405.05941 | Xuanlin Li | Xuanlin Li, Kyle Hsu, Jiayuan Gu, Karl Pertsch, Oier Mees, Homer Rich
Walke, Chuyuan Fu, Ishikaa Lunawat, Isabel Sieh, Sean Kirmani, Sergey Levine,
Jiajun Wu, Chelsea Finn, Hao Su, Quan Vuong, Ted Xiao | Evaluating Real-World Robot Manipulation Policies in Simulation | null | null | null | null | cs.RO cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | The field of robotics has made significant advances towards generalist robot
manipulation policies. However, real-world evaluation of such policies is not
scalable and faces reproducibility challenges, which are likely to worsen as
policies broaden the spectrum of tasks they can perform. We identify control
and visual disparities between real and simulated environments as key
challenges for reliable simulated evaluation and propose approaches for
mitigating these gaps without needing to craft full-fidelity digital twins of
real-world environments. We then employ these approaches to create SIMPLER, a
collection of simulated environments for manipulation policy evaluation on
common real robot setups. Through paired sim-and-real evaluations of
manipulation policies, we demonstrate strong correlation between policy
performance in SIMPLER environments and in the real world. Additionally, we
find that SIMPLER evaluations accurately reflect real-world policy behavior
modes such as sensitivity to various distribution shifts. We open-source all
SIMPLER environments along with our workflow for creating new environments at
https://simpler-env.github.io to facilitate research on general-purpose
manipulation policies and simulated evaluation frameworks.
| [
{
"created": "Thu, 9 May 2024 17:30:16 GMT",
"version": "v1"
}
] | "2024-05-10T00:00:00" | [
[
"Li",
"Xuanlin",
""
],
[
"Hsu",
"Kyle",
""
],
[
"Gu",
"Jiayuan",
""
],
[
"Pertsch",
"Karl",
""
],
[
"Mees",
"Oier",
""
],
[
"Walke",
"Homer Rich",
""
],
[
"Fu",
"Chuyuan",
""
],
[
"Lunawat",
"Ishikaa",
""
],
[
"Sieh",
"Isabel",
""
],
[
"Kirmani",
"Sean",
""
],
[
"Levine",
"Sergey",
""
],
[
"Wu",
"Jiajun",
""
],
[
"Finn",
"Chelsea",
""
],
[
"Su",
"Hao",
""
],
[
"Vuong",
"Quan",
""
],
[
"Xiao",
"Ted",
""
]
] | 1new_dataset
|
1809.02792 | Nicola Prezza | Travis Gagie, Gonzalo Navarro, and Nicola Prezza | Fully-Functional Suffix Trees and Optimal Text Searching in BWT-runs
Bounded Space | submitted version; optimal count and locate in smaller space: O(r log
log_w(n/r + sigma)) | null | 10.1145/3375890 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Indexing highly repetitive texts - such as genomic databases, software
repositories and versioned text collections - has become an important problem
since the turn of the millennium. A relevant compressibility measure for
repetitive texts is r, the number of runs in their Burrows-Wheeler Transforms
(BWTs). One of the earliest indexes for repetitive collections, the Run-Length
FM-index, used O(r) space and was able to efficiently count the number of
occurrences of a pattern of length m in the text (in loglogarithmic time per
pattern symbol, with current techniques). However, it was unable to locate the
positions of those occurrences efficiently within a space bounded in terms of
r. In this paper we close this long-standing problem, showing how to extend the
Run-Length FM-index so that it can locate the occ occurrences efficiently
within O(r) space (in loglogarithmic time each), and reaching optimal time, O(m
+ occ), within O(r log log w ({\sigma} + n/r)) space, for a text of length n
over an alphabet of size {\sigma} on a RAM machine with words of w =
{\Omega}(log n) bits. Within that space, our index can also count in optimal
time, O(m). Multiplying the space by O(w/ log {\sigma}), we support count and
locate in O(dm log({\sigma})/we) and O(dm log({\sigma})/we + occ) time, which
is optimal in the packed setting and had not been obtained before in compressed
space. We also describe a structure using O(r log(n/r)) space that replaces the
text and extracts any text substring of length ` in almost-optimal time
O(log(n/r) + ` log({\sigma})/w). Within that space, we similarly provide direct
access to suffix array, inverse suffix array, and longest common prefix array
cells, and extend these capabilities to full suffix tree functionality,
typically in O(log(n/r)) time per operation.
| [
{
"created": "Sat, 8 Sep 2018 12:15:58 GMT",
"version": "v1"
},
{
"created": "Thu, 4 Jul 2019 15:31:22 GMT",
"version": "v2"
}
] | "2020-12-17T00:00:00" | [
[
"Gagie",
"Travis",
""
],
[
"Navarro",
"Gonzalo",
""
],
[
"Prezza",
"Nicola",
""
]
] | 0no_new_dataset
|
2311.13549 | Weixin Mao | Fan Jia, Weixin Mao, Yingfei Liu, Yucheng Zhao, Yuqing Wen, Chi Zhang,
Xiangyu Zhang, Tiancai Wang | ADriver-I: A General World Model for Autonomous Driving | Tech Report | null | null | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Typically, autonomous driving adopts a modular design, which divides the full
stack into perception, prediction, planning and control parts. Though
interpretable, such modular design tends to introduce a substantial amount of
redundancy. Recently, multimodal large language models (MLLM) and diffusion
techniques have demonstrated their superior performance on comprehension and
generation ability. In this paper, we first introduce the concept of
interleaved vision-action pair, which unifies the format of visual features and
control signals. Based on the vision-action pairs, we construct a general world
model based on MLLM and diffusion model for autonomous driving, termed
ADriver-I. It takes the vision-action pairs as inputs and autoregressively
predicts the control signal of the current frame. The generated control signals
together with the historical vision-action pairs are further conditioned to
predict the future frames. With the predicted next frame, ADriver-I performs
further control signal prediction. Such a process can be repeated infinite
times, ADriver-I achieves autonomous driving in the world created by itself.
Extensive experiments are conducted on nuScenes and our large-scale private
datasets. ADriver-I shows impressive performance compared to several
constructed baselines. We hope our ADriver-I can provide some new insights for
future autonomous driving and embodied intelligence.
| [
{
"created": "Wed, 22 Nov 2023 17:44:29 GMT",
"version": "v1"
}
] | "2023-11-23T00:00:00" | [
[
"Jia",
"Fan",
""
],
[
"Mao",
"Weixin",
""
],
[
"Liu",
"Yingfei",
""
],
[
"Zhao",
"Yucheng",
""
],
[
"Wen",
"Yuqing",
""
],
[
"Zhang",
"Chi",
""
],
[
"Zhang",
"Xiangyu",
""
],
[
"Wang",
"Tiancai",
""
]
] | 1new_dataset
|
2207.04813 | Fernando Alonso-Fernandez | Javier Galbally, Julian Fierrez-Aguilar, Joaquin Rodriguez-Gonzalez,
Fernando Alonso-Fernandez, Javier Ortega-Garcia, Marino Tapiador | On the vulnerability of fingerprint verification systems to fake
fingerprint attacks | Published at IEEE International Carnahan Conference on Security
Technology (ICCST) | null | null | null | cs.CV cs.CR eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new method to generate gummy fingers is presented. A medium-size fake
fingerprint database is described and two different fingerprint verification
systems are evaluated on it. Three different scenarios are considered in the
experiments, namely: enrollment and test with real fingerprints, enrollment and
test with fake fingerprints, and enrollment with real fingerprints and test
with fake fingerprints. Results for an optical and a thermal sweeping sensors
are given. Both systems are shown to be vulnerable to direct attacks.
| [
{
"created": "Mon, 11 Jul 2022 12:22:52 GMT",
"version": "v1"
}
] | "2022-07-12T00:00:00" | [
[
"Galbally",
"Javier",
""
],
[
"Fierrez-Aguilar",
"Julian",
""
],
[
"Rodriguez-Gonzalez",
"Joaquin",
""
],
[
"Alonso-Fernandez",
"Fernando",
""
],
[
"Ortega-Garcia",
"Javier",
""
],
[
"Tapiador",
"Marino",
""
]
] | 1new_dataset
|
1206.6431 | Robert Peharz | Robert Peharz (Graz University of Technology), Franz Pernkopf (Graz
University of Technology) | Exact Maximum Margin Structure Learning of Bayesian Networks | ICML | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, there has been much interest in finding globally optimal Bayesian
network structures. These techniques were developed for generative scores and
can not be directly extended to discriminative scores, as desired for
classification. In this paper, we propose an exact method for finding network
structures maximizing the probabilistic soft margin, a successfully applied
discriminative score. Our method is based on branch-and-bound techniques within
a linear programming framework and maintains an any-time solution, together
with worst-case sub-optimality bounds. We apply a set of order constraints for
enforcing the network structure to be acyclic, which allows a compact problem
representation and the use of general-purpose optimization techniques. In
classification experiments, our methods clearly outperform generatively trained
network structures and compete with support vector machines.
| [
{
"created": "Wed, 27 Jun 2012 19:59:59 GMT",
"version": "v1"
}
] | "2012-07-03T00:00:00" | [
[
"Peharz",
"Robert",
"",
"Graz University of Technology"
],
[
"Pernkopf",
"Franz",
"",
"Graz\n University of Technology"
]
] | 0no_new_dataset
|
2402.05328 | Samuel Epstein | Samuel Epstein | Two Simple Proofs of M\"uller's Theorem | null | null | null | null | cs.CC quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to M\"{u}ller's theorem, the Kolmogorov complexity of a string was shown
to be equal to its quantum Kolmogorov complexity. Thus there are no benefits to
using quantum mechanics to compress classical information. The quantitative
amount of information in classical sources is invariant to the physical model
used. These consequences make this theorem arguably the most important result
in the intersection of algorithmic information theory and physics. The original
proof is quite extensive. This paper contains two simple proofs of this
theorem. This paper also contains new bounds for quantum Kolmogorov complexity
with error.
| [
{
"created": "Thu, 8 Feb 2024 00:07:15 GMT",
"version": "v1"
},
{
"created": "Fri, 23 Feb 2024 15:36:23 GMT",
"version": "v2"
},
{
"created": "Tue, 25 Jun 2024 15:05:14 GMT",
"version": "v3"
},
{
"created": "Tue, 2 Jul 2024 21:40:31 GMT",
"version": "v4"
}
] | "2024-07-04T00:00:00" | [
[
"Epstein",
"Samuel",
""
]
] | 0no_new_dataset
|
2104.04726 | Mansi Sharma | Mansi Sharma, Aditya Wadaskar | A Novel Unified Model for Multi-exposure Stereo Coding Based on Low Rank
Tucker-ALS and 3D-HEVC | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Display technology must offer high dynamic range (HDR) contrast-based depth
induction and 3D personalization simultaneously. Efficient algorithms to
compress HDR stereo data is critical. Direct capturing of HDR content is
complicated due to the high expense and scarcity of HDR cameras. The HDR 3D
images could be generated in low-cost by fusing low-dynamic-range (LDR) images
acquired using a stereo camera with various exposure settings. In this paper,
an efficient scheme for coding multi-exposure stereo images is proposed based
on a tensor low-rank approximation scheme. The multi-exposure fusion can be
realized to generate HDR stereo output at the decoder for increased realism and
exaggerated binocular 3D depth cues.
For exploiting spatial redundancy in LDR stereo images, the stack of
multi-exposure stereo images is decomposed into a set of projection matrices
and a core tensor following an alternating least squares Tucker decomposition
model. The compact, low-rank representation of the scene, thus, generated is
further processed by 3D extension of High Efficiency Video Coding standard. The
encoding with 3D-HEVC enhance the proposed scheme efficiency by exploiting
intra-frame, inter-view and the inter-component redundancies in low-rank
approximated representation. We consider constant luminance property of IPT and
Y'CbCr color space to precisely approximate intensity prediction and
perceptually minimize the encoding distortion. Besides, the proposed scheme
gives flexibility to adjust the bitrate of tensor latent components by changing
the rank of core tensor and its quantization. Extensive experiments on natural
scenes demonstrate that the proposed scheme outperforms state-of-the-art
JPEG-XT and 3D-HEVC range coding standards.
| [
{
"created": "Sat, 10 Apr 2021 10:10:14 GMT",
"version": "v1"
}
] | "2021-04-13T00:00:00" | [
[
"Sharma",
"Mansi",
""
],
[
"Wadaskar",
"Aditya",
""
]
] | 0no_new_dataset
|
1907.02298 | Zi Lin | Junjie Cao, Zi Lin, Weiwei Sun, Xiaojun Wan | A Comparative Analysis of Knowledge-Intensive and Data-Intensive
Semantic Parsers | submitted to the journal Computational Linguistics | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | We present a phenomenon-oriented comparative analysis of the two dominant
approaches in task-independent semantic parsing: classic, knowledge-intensive
and neural, data-intensive models. To reflect state-of-the-art neural NLP
technologies, we introduce a new target structure-centric parser that can
produce semantic graphs much more accurately than previous data-driven parsers.
We then show that, in spite of comparable performance overall, knowledge- and
data-intensive models produce different types of errors, in a way that can be
explained by their theoretical properties. This analysis leads to new
directions for parser development.
| [
{
"created": "Thu, 4 Jul 2019 09:40:27 GMT",
"version": "v1"
},
{
"created": "Thu, 15 Aug 2019 10:36:59 GMT",
"version": "v2"
},
{
"created": "Wed, 28 Oct 2020 08:39:30 GMT",
"version": "v3"
}
] | "2020-10-29T00:00:00" | [
[
"Cao",
"Junjie",
""
],
[
"Lin",
"Zi",
""
],
[
"Sun",
"Weiwei",
""
],
[
"Wan",
"Xiaojun",
""
]
] | 1new_dataset
|
2306.11556 | Chenbin Li | Chenbin Li, Yu Xin, Gaoyi Liu, Xiang Zeng, Ligang Liu | NeRF synthesis with shading guidance | 16 pages, 16 figures, accepted by CAD/Graphics 2023(poster) | null | null | null | cs.CV cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The emerging Neural Radiance Field (NeRF) shows great potential in
representing 3D scenes, which can render photo-realistic images from novel view
with only sparse views given. However, utilizing NeRF to reconstruct real-world
scenes requires images from different viewpoints, which limits its practical
application. This problem can be even more pronounced for large scenes. In this
paper, we introduce a new task called NeRF synthesis that utilizes the
structural content of a NeRF patch exemplar to construct a new radiance field
of large size. We propose a two-phase method for synthesizing new scenes that
are continuous in geometry and appearance. We also propose a boundary
constraint method to synthesize scenes of arbitrary size without artifacts.
Specifically, we control the lighting effects of synthesized scenes using
shading guidance instead of decoupling the scene. We have demonstrated that our
method can generate high-quality results with consistent geometry and
appearance, even for scenes with complex lighting. We can also synthesize new
scenes on curved surface with arbitrary lighting effects, which enhances the
practicality of our proposed NeRF synthesis approach.
| [
{
"created": "Tue, 20 Jun 2023 14:18:20 GMT",
"version": "v1"
}
] | "2023-06-21T00:00:00" | [
[
"Li",
"Chenbin",
""
],
[
"Xin",
"Yu",
""
],
[
"Liu",
"Gaoyi",
""
],
[
"Zeng",
"Xiang",
""
],
[
"Liu",
"Ligang",
""
]
] | 1new_dataset
|
1806.02070 | Christian Payer | Christian Payer, Darko \v{S}tern, Thomas Neff, Horst Bischof, Martin
Urschler | Instance Segmentation and Tracking with Cosine Embeddings and Recurrent
Hourglass Networks | Accepted for ORAL presentation at MICCAI 2018 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Different to semantic segmentation, instance segmentation assigns unique
labels to each individual instance of the same class. In this work, we propose
a novel recurrent fully convolutional network architecture for tracking such
instance segmentations over time. The network architecture incorporates
convolutional gated recurrent units (ConvGRU) into a stacked hourglass network
to utilize temporal video information. Furthermore, we train the network with a
novel embedding loss based on cosine similarities, such that the network
predicts unique embeddings for every instance throughout videos. Afterwards,
these embeddings are clustered among subsequent video frames to create the
final tracked instance segmentations. We evaluate the recurrent hourglass
network by segmenting left ventricles in MR videos of the heart, where it
outperforms a network that does not incorporate video information. Furthermore,
we show applicability of the cosine embedding loss for segmenting leaf
instances on still images of plants. Finally, we evaluate the framework for
instance segmentation and tracking on six datasets of the ISBI celltracking
challenge, where it shows state-of-the-art performance.
| [
{
"created": "Wed, 6 Jun 2018 08:57:15 GMT",
"version": "v1"
},
{
"created": "Thu, 7 Jun 2018 07:11:38 GMT",
"version": "v2"
},
{
"created": "Mon, 30 Jul 2018 09:32:56 GMT",
"version": "v3"
}
] | "2018-07-31T00:00:00" | [
[
"Payer",
"Christian",
""
],
[
"Štern",
"Darko",
""
],
[
"Neff",
"Thomas",
""
],
[
"Bischof",
"Horst",
""
],
[
"Urschler",
"Martin",
""
]
] | 1new_dataset
|
2112.15483 | Rutvik Chauhan | Rutvik Chauhan, Antarpuneet Singh, Sujoy Saha | Cloud Removal from Satellite Images | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | In this report, we have analyzed available cloud detection technique using
sentinel hub. We have also implemented spatial attention generative adversarial
network and improved quality of generated image compared to previous solution
[7].
| [
{
"created": "Thu, 23 Dec 2021 07:25:19 GMT",
"version": "v1"
}
] | "2022-01-03T00:00:00" | [
[
"Chauhan",
"Rutvik",
""
],
[
"Singh",
"Antarpuneet",
""
],
[
"Saha",
"Sujoy",
""
]
] | 0no_new_dataset
|
2402.09473 | Jasone Ram\'irez-Ayerbe | Andrea Lodi and Jasone Ram\'irez-Ayerbe | One-for-many Counterfactual Explanations by Column Generation | null | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this paper, we consider the problem of generating a set of counterfactual
explanations for a group of instances, with the one-for-many allocation rule,
where one explanation is allocated to a subgroup of the instances. For the
first time, we solve the problem of minimizing the number of explanations
needed to explain all the instances, while considering sparsity by limiting the
number of features allowed to be changed collectively in each explanation. A
novel column generation framework is developed to efficiently search for the
explanations. Our framework can be applied to any black-box classifier, like
neural networks. Compared with a simple adaptation of a mixed-integer
programming formulation from the literature, the column generation framework
dominates in terms of scalability, computational performance and quality of the
solutions.
| [
{
"created": "Mon, 12 Feb 2024 10:03:31 GMT",
"version": "v1"
}
] | "2024-02-16T00:00:00" | [
[
"Lodi",
"Andrea",
""
],
[
"Ramírez-Ayerbe",
"Jasone",
""
]
] | 0no_new_dataset
|
1705.09185 | Timur Pekhovsky | Timur Pekhovsky, Maxim Korenevsky | Investigation of Using VAE for i-Vector Speaker Verification | null | null | null | null | cs.SD cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | New system for i-vector speaker recognition based on variational autoencoder
(VAE) is investigated. VAE is a promising approach for developing accurate deep
nonlinear generative models of complex data. Experiments show that VAE provides
speaker embedding and can be effectively trained in an unsupervised manner. LLR
estimate for VAE is developed. Experiments on NIST SRE 2010 data demonstrate
its correctness. Additionally, we show that the performance of VAE-based system
in the i-vectors space is close to that of the diagonal PLDA. Several
interesting results are also observed in the experiments with $\beta$-VAE. In
particular, we found that for $\beta\ll 1$, VAE can be trained to capture the
features of complex input data distributions in an effective way, which is hard
to obtain in the standard VAE ($\beta=1$).
| [
{
"created": "Thu, 25 May 2017 13:59:18 GMT",
"version": "v1"
}
] | "2017-05-26T00:00:00" | [
[
"Pekhovsky",
"Timur",
""
],
[
"Korenevsky",
"Maxim",
""
]
] | 1new_dataset
|
1911.07528 | Mo Zhou | Mo Zhou, Zhenxing Niu, Le Wang, Zhanning Gao, Qilin Zhang, Gang Hua | Ladder Loss for Coherent Visual-Semantic Embedding | Accepted to AAAI-2020 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For visual-semantic embedding, the existing methods normally treat the
relevance between queries and candidates in a bipolar way -- relevant or
irrelevant, and all "irrelevant" candidates are uniformly pushed away from the
query by an equal margin in the embedding space, regardless of their various
proximity to the query. This practice disregards relatively discriminative
information and could lead to suboptimal ranking in the retrieval results and
poorer user experience, especially in the long-tail query scenario where a
matching candidate may not necessarily exist. In this paper, we introduce a
continuous variable to model the relevance degree between queries and multiple
candidates, and propose to learn a coherent embedding space, where candidates
with higher relevance degrees are mapped closer to the query than those with
lower relevance degrees. In particular, the new ladder loss is proposed by
extending the triplet loss inequality to a more general inequality chain, which
implements variable push-away margins according to respective relevance
degrees. In addition, a proper Coherent Score metric is proposed to better
measure the ranking results including those "irrelevant" candidates. Extensive
experiments on multiple datasets validate the efficacy of our proposed method,
which achieves significant improvement over existing state-of-the-art methods.
| [
{
"created": "Mon, 18 Nov 2019 10:31:17 GMT",
"version": "v1"
}
] | "2019-11-19T00:00:00" | [
[
"Zhou",
"Mo",
""
],
[
"Niu",
"Zhenxing",
""
],
[
"Wang",
"Le",
""
],
[
"Gao",
"Zhanning",
""
],
[
"Zhang",
"Qilin",
""
],
[
"Hua",
"Gang",
""
]
] | 0no_new_dataset
|
2403.01300 | Taeheon Kim | Taeheon Kim, Sebin Shin, Youngjoon Yu, Hak Gu Kim, and Yong Man Ro | Causal Mode Multiplexer: A Novel Framework for Unbiased Multispectral
Pedestrian Detection | CVPR2024 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | RGBT multispectral pedestrian detection has emerged as a promising solution
for safety-critical applications that require day/night operations. However,
the modality bias problem remains unsolved as multispectral pedestrian
detectors learn the statistical bias in datasets. Specifically, datasets in
multispectral pedestrian detection mainly distribute between ROTO (day) and
RXTO (night) data; the majority of the pedestrian labels statistically co-occur
with their thermal features. As a result, multispectral pedestrian detectors
show poor generalization ability on examples beyond this statistical
correlation, such as ROTX data. To address this problem, we propose a novel
Causal Mode Multiplexer (CMM) framework that effectively learns the causalities
between multispectral inputs and predictions. Moreover, we construct a new
dataset (ROTX-MP) to evaluate modality bias in multispectral pedestrian
detection. ROTX-MP mainly includes ROTX examples not presented in previous
datasets. Extensive experiments demonstrate that our proposed CMM framework
generalizes well on existing datasets (KAIST, CVC-14, FLIR) and the new
ROTX-MP. We will release our new dataset to the public for future research.
| [
{
"created": "Sat, 2 Mar 2024 19:54:53 GMT",
"version": "v1"
},
{
"created": "Fri, 5 Apr 2024 08:42:02 GMT",
"version": "v2"
}
] | "2024-04-08T00:00:00" | [
[
"Kim",
"Taeheon",
""
],
[
"Shin",
"Sebin",
""
],
[
"Yu",
"Youngjoon",
""
],
[
"Kim",
"Hak Gu",
""
],
[
"Ro",
"Yong Man",
""
]
] | 1new_dataset
|
2405.18525 | Haonan Han | Haonan Han, Rui Yang, Huan Liao, Jiankai Xing, Zunnan Xu, Xiaoming Yu,
Junwei Zha, Xiu Li, Wanhua Li | REPARO: Compositional 3D Assets Generation with Differentiable 3D Layout
Alignment | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Traditional image-to-3D models often struggle with scenes containing multiple
objects due to biases and occlusion complexities. To address this challenge, we
present REPARO, a novel approach for compositional 3D asset generation from
single images. REPARO employs a two-step process: first, it extracts individual
objects from the scene and reconstructs their 3D meshes using off-the-shelf
image-to-3D models; then, it optimizes the layout of these meshes through
differentiable rendering techniques, ensuring coherent scene composition. By
integrating optimal transport-based long-range appearance loss term and
high-level semantic loss term in the differentiable rendering, REPARO can
effectively recover the layout of 3D assets. The proposed method can
significantly enhance object independence, detail accuracy, and overall scene
coherence. Extensive evaluation of multi-object scenes demonstrates that our
REPARO offers a comprehensive approach to address the complexities of
multi-object 3D scene generation from single images.
| [
{
"created": "Tue, 28 May 2024 18:45:10 GMT",
"version": "v1"
}
] | "2024-05-30T00:00:00" | [
[
"Han",
"Haonan",
""
],
[
"Yang",
"Rui",
""
],
[
"Liao",
"Huan",
""
],
[
"Xing",
"Jiankai",
""
],
[
"Xu",
"Zunnan",
""
],
[
"Yu",
"Xiaoming",
""
],
[
"Zha",
"Junwei",
""
],
[
"Li",
"Xiu",
""
],
[
"Li",
"Wanhua",
""
]
] | 0no_new_dataset
|
2009.08576 | Jonathan Frankle | Jonathan Frankle, Gintare Karolina Dziugaite, Daniel M. Roy, Michael
Carbin | Pruning Neural Networks at Initialization: Why are We Missing the Mark? | Published in ICLR 2021 | null | null | null | cs.LG cs.CV cs.NE stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent work has explored the possibility of pruning neural networks at
initialization. We assess proposals for doing so: SNIP (Lee et al., 2019),
GraSP (Wang et al., 2020), SynFlow (Tanaka et al., 2020), and magnitude
pruning. Although these methods surpass the trivial baseline of random pruning,
they remain below the accuracy of magnitude pruning after training, and we
endeavor to understand why. We show that, unlike pruning after training,
randomly shuffling the weights these methods prune within each layer or
sampling new initial values preserves or improves accuracy. As such, the
per-weight pruning decisions made by these methods can be replaced by a
per-layer choice of the fraction of weights to prune. This property suggests
broader challenges with the underlying pruning heuristics, the desire to prune
at initialization, or both.
| [
{
"created": "Fri, 18 Sep 2020 01:13:38 GMT",
"version": "v1"
},
{
"created": "Sun, 21 Mar 2021 21:38:32 GMT",
"version": "v2"
}
] | "2021-03-23T00:00:00" | [
[
"Frankle",
"Jonathan",
""
],
[
"Dziugaite",
"Gintare Karolina",
""
],
[
"Roy",
"Daniel M.",
""
],
[
"Carbin",
"Michael",
""
]
] | 0no_new_dataset
|
2211.16752 | Qiaodan Luo | Qiaodan Luo, Leonardo Christino, Fernando V Paulovich and Evangelos
Milios | DimenFix: A novel meta-dimensionality reduction method for feature
preservation | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dimensionality reduction has become an important research topic as demand for
interpreting high-dimensional datasets has been increasing rapidly in recent
years. There have been many dimensionality reduction methods with good
performance in preserving the overall relationship among data points when
mapping them to a lower-dimensional space. However, these existing methods fail
to incorporate the difference in importance among features.
To address this problem, we propose a novel meta-method, DimenFix, which can
be operated upon any base dimensionality reduction method that involves a
gradient-descent-like process. By allowing users to define the importance of
different features, which is considered in dimensionality reduction, DimenFix
creates new possibilities to visualize and understand a given dataset.
Meanwhile, DimenFix does not increase the time cost or reduce the quality of
dimensionality reduction with respect to the base dimensionality reduction
used.
| [
{
"created": "Wed, 30 Nov 2022 05:35:22 GMT",
"version": "v1"
}
] | "2022-12-01T00:00:00" | [
[
"Luo",
"Qiaodan",
""
],
[
"Christino",
"Leonardo",
""
],
[
"Paulovich",
"Fernando V",
""
],
[
"Milios",
"Evangelos",
""
]
] | 0no_new_dataset
|
2209.09203 | David Bertoin | David Bertoin, Adil Zouitine, Mehdi Zouitine, Emmanuel Rachelson | Look where you look! Saliency-guided Q-networks for generalization in
visual Reinforcement Learning | Thirty-sixth Conference on Neural Information Processing Systems
(NeurIPS 2022), Nov 2022, New Orleans, United States | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep reinforcement learning policies, despite their outstanding efficiency in
simulated visual control tasks, have shown disappointing ability to generalize
across disturbances in the input training images. Changes in image statistics
or distracting background elements are pitfalls that prevent generalization and
real-world applicability of such control policies. We elaborate on the
intuition that a good visual policy should be able to identify which pixels are
important for its decision, and preserve this identification of important
sources of information across images. This implies that training of a policy
with small generalization gap should focus on such important pixels and ignore
the others. This leads to the introduction of saliency-guided Q-networks
(SGQN), a generic method for visual reinforcement learning, that is compatible
with any value function learning method. SGQN vastly improves the
generalization capability of Soft Actor-Critic agents and outperforms existing
stateof-the-art methods on the Deepmind Control Generalization benchmark,
setting a new reference in terms of training efficiency, generalization gap,
and policy interpretability.
| [
{
"created": "Fri, 16 Sep 2022 08:28:38 GMT",
"version": "v1"
},
{
"created": "Thu, 29 Sep 2022 08:11:30 GMT",
"version": "v2"
},
{
"created": "Wed, 8 Feb 2023 14:50:16 GMT",
"version": "v3"
}
] | "2023-02-09T00:00:00" | [
[
"Bertoin",
"David",
""
],
[
"Zouitine",
"Adil",
""
],
[
"Zouitine",
"Mehdi",
""
],
[
"Rachelson",
"Emmanuel",
""
]
] | 0no_new_dataset
|
1308.6118 | Sorin Alupoaie | Sorin Alupoaie, P\'adraig Cunningham | Using tf-idf as an edge weighting scheme in user-object bipartite
networks | null | null | null | null | cs.SI cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bipartite user-object networks are becoming increasingly popular in
representing user interaction data in a web or e-commerce environment. They
have certain characteristics and challenges that differentiates them from other
bipartite networks. This paper analyzes the properties of five real world
user-object networks. In all cases we found a heavy tail object degree
distribution with popular objects connecting together a large part of the users
causing significant edge inflation in the projected users network. We propose a
novel edge weighting strategy based on tf-idf and show that the new scheme
improves both the density and the quality of the community structure in the
projections. The improvement is also noticed when comparing to partially random
networks.
| [
{
"created": "Wed, 28 Aug 2013 10:25:02 GMT",
"version": "v1"
}
] | "2013-08-29T00:00:00" | [
[
"Alupoaie",
"Sorin",
""
],
[
"Cunningham",
"Pádraig",
""
]
] | 0no_new_dataset
|
1006.4396 | Warren Schudy | Marek Karpinski and Warren Schudy | Faster Algorithms for Feedback Arc Set Tournament, Kemeny Rank
Aggregation and Betweenness Tournament | 14 pages. Version 1 of arXiv:0911.2214 includes a preliminary version
of this work; version 2 does not | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study fixed parameter algorithms for three problems: Kemeny rank
aggregation, feedback arc set tournament, and betweenness tournament. For
Kemeny rank aggregation we give an algorithm with runtime O*(2^O(sqrt{OPT})),
where n is the number of candidates, OPT is the cost of the optimal ranking,
and O* hides polynomial factors. This is a dramatic improvement on the
previously best known runtime of O*(2^O(OPT)). For feedback arc set tournament
we give an algorithm with runtime O*(2^O(sqrt{OPT})), an improvement on the
previously best known O*(OPT^O(sqrt{OPT})) (Alon, Lokshtanov and Saurabh 2009).
For betweenness tournament we give an algorithm with runtime
O*(2^O(sqrt{OPT/n})), where n is the number of vertices and OPT is the optimal
cost. This improves on the previously known O*(OPT^O(OPT^{1/3}))$ (Saurabh
2009), especially when OPT is small. Unusually we can solve instances with OPT
as large as n (log n)^2 in polynomial time!
| [
{
"created": "Wed, 23 Jun 2010 00:06:59 GMT",
"version": "v1"
}
] | "2010-06-24T00:00:00" | [
[
"Karpinski",
"Marek",
""
],
[
"Schudy",
"Warren",
""
]
] | 0no_new_dataset
|
1903.08199 | Kasra Yazdani | Kasra Yazdani and Matthew Hale | Error Bounds and Guidelines for Privacy Calibration in Differentially
Private Kalman Filtering | 17 pages, 2 figures | null | null | null | cs.SY math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Differential privacy has emerged as a formal framework for protecting
sensitive information in control systems. One key feature is that it is immune
to post-processing, which means that arbitrary post-hoc computations can be
performed on privatized data without weakening differential privacy. It is
therefore common to filter private data streams. To characterize this setup, in
this paper we present error and entropy bounds for Kalman filtering
differentially private state trajectories. We consider systems in which an
output trajectory is privatized in order to protect the state trajectory that
produced it. We provide bounds on a priori and a posteriori error and
differential entropy of a Kalman filter which is processing the privatized
output trajectories. Using the error bounds we develop, we then provide
guidelines to calibrate privacy levels in order to keep filter error within
pre-specified bounds. Simulation results are presented to demonstrate these
developments.
| [
{
"created": "Tue, 19 Mar 2019 18:17:32 GMT",
"version": "v1"
},
{
"created": "Mon, 23 Sep 2019 16:15:58 GMT",
"version": "v2"
}
] | "2019-09-24T00:00:00" | [
[
"Yazdani",
"Kasra",
""
],
[
"Hale",
"Matthew",
""
]
] | 0no_new_dataset
|
1905.09904 | Zheng Shou | Jiawei Ma, Zheng Shou, Alireza Zareian, Hassan Mansour, Anthony Vetro,
Shih-Fu Chang | CDSA: Cross-Dimensional Self-Attention for Multivariate, Geo-tagged Time
Series Imputation | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many real-world applications involve multivariate, geo-tagged time series
data: at each location, multiple sensors record corresponding measurements. For
example, air quality monitoring system records PM2.5, CO, etc. The resulting
time-series data often has missing values due to device outages or
communication errors. In order to impute the missing values, state-of-the-art
methods are built on Recurrent Neural Networks (RNN), which process each time
stamp sequentially, prohibiting the direct modeling of the relationship between
distant time stamps. Recently, the self-attention mechanism has been proposed
for sequence modeling tasks such as machine translation, significantly
outperforming RNN because the relationship between each two time stamps can be
modeled explicitly. In this paper, we are the first to adapt the self-attention
mechanism for multivariate, geo-tagged time series data. In order to jointly
capture the self-attention across multiple dimensions, including time, location
and the sensor measurements, while maintain low computational complexity, we
propose a novel approach called Cross-Dimensional Self-Attention (CDSA) to
process each dimension sequentially, yet in an order-independent manner. Our
extensive experiments on four real-world datasets, including three standard
benchmarks and our newly collected NYC-traffic dataset, demonstrate that our
approach outperforms the state-of-the-art imputation and forecasting methods. A
detailed systematic analysis confirms the effectiveness of our design choices.
| [
{
"created": "Thu, 23 May 2019 20:13:12 GMT",
"version": "v1"
},
{
"created": "Mon, 5 Aug 2019 06:15:44 GMT",
"version": "v2"
}
] | "2019-08-06T00:00:00" | [
[
"Ma",
"Jiawei",
""
],
[
"Shou",
"Zheng",
""
],
[
"Zareian",
"Alireza",
""
],
[
"Mansour",
"Hassan",
""
],
[
"Vetro",
"Anthony",
""
],
[
"Chang",
"Shih-Fu",
""
]
] | 1new_dataset
|
1404.4666 | Edward Givelberg | Edward Givelberg | Object-Oriented Parallel Programming | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an object-oriented framework for parallel programming, which is
based on the observation that programming objects can be naturally interpreted
as processes. A parallel program consists of a collection of persistent
processes that communicate by executing remote methods. We discuss code
parallelization and process persistence, and explain the main ideas in the
context of computations with very large data objects.
| [
{
"created": "Thu, 17 Apr 2014 22:36:44 GMT",
"version": "v1"
}
] | "2014-04-21T00:00:00" | [
[
"Givelberg",
"Edward",
""
]
] | 0no_new_dataset
|
1002.3222 | Michel Reniers | Jeroen Keiren, Michel A. Reniers, and Tim A.C. Willemse | Structural Analysis of Boolean Equation Systems | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyse the problem of solving Boolean equation systems through the use of
structure graphs. The latter are obtained through an elegant set of
Plotkin-style deduction rules. Our main contribution is that we show that
equation systems with bisimilar structure graphs have the same solution. We
show that our work conservatively extends earlier work, conducted by Keiren and
Willemse, in which dependency graphs were used to analyse a subclass of Boolean
equation systems, viz., equation systems in standard recursive form. We
illustrate our approach by a small example, demonstrating the effect of
simplifying an equation system through minimisation of its structure graph.
| [
{
"created": "Wed, 17 Feb 2010 08:15:12 GMT",
"version": "v1"
}
] | "2010-02-18T00:00:00" | [
[
"Keiren",
"Jeroen",
""
],
[
"Reniers",
"Michel A.",
""
],
[
"Willemse",
"Tim A. C.",
""
]
] | 0no_new_dataset
|
1604.01980 | Emanuel Laude | Emanuel Laude, Thomas M\"ollenhoff, Michael Moeller, Jan Lellmann,
Daniel Cremers | Sublabel-Accurate Convex Relaxation of Vectorial Multilabel Energies | null | null | null | null | cs.CV math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convex relaxations of nonconvex multilabel problems have been demonstrated to
produce superior (provably optimal or near-optimal) solutions to a variety of
classical computer vision problems. Yet, they are of limited practical use as
they require a fine discretization of the label space, entailing a huge demand
in memory and runtime. In this work, we propose the first sublabel accurate
convex relaxation for vectorial multilabel problems. The key idea is that we
approximate the dataterm of the vectorial labeling problem in a piecewise
convex (rather than piecewise linear) manner. As a result we have a more
faithful approximation of the original cost function that provides a meaningful
interpretation for the fractional solutions of the relaxed convex problem. In
numerous experiments on large-displacement optical flow estimation and on color
image denoising we demonstrate that the computed solutions have superior
quality while requiring much lower memory and runtime.
| [
{
"created": "Thu, 7 Apr 2016 12:43:07 GMT",
"version": "v1"
},
{
"created": "Mon, 10 Oct 2016 16:42:55 GMT",
"version": "v2"
}
] | "2016-10-11T00:00:00" | [
[
"Laude",
"Emanuel",
""
],
[
"Möllenhoff",
"Thomas",
""
],
[
"Moeller",
"Michael",
""
],
[
"Lellmann",
"Jan",
""
],
[
"Cremers",
"Daniel",
""
]
] | 0no_new_dataset
|
2212.00629 | Lennart K\"ull | Lennart K\"ull | Analyzing the State of Computer Science Research with the DBLP Discovery
Dataset | Master's Thesis, University of Wuppertal | null | null | null | cs.DL cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | The number of scientific publications continues to rise exponentially,
especially in Computer Science (CS). However, current solutions to analyze
those publications restrict access behind a paywall, offer no features for
visual analysis, limit access to their data, only focus on niches or
sub-fields, and/or are not flexible and modular enough to be transferred to
other datasets. In this thesis, we conduct a scientometric analysis to uncover
the implicit patterns hidden in CS metadata and to determine the state of CS
research. Specifically, we investigate trends of the quantity, impact, and
topics for authors, venues, document types (conferences vs. journals), and
fields of study (compared to, e.g., medicine). To achieve this we introduce the
CS-Insights system, an interactive web application to analyze CS publications
with various dashboards, filters, and visualizations. The data underlying this
system is the DBLP Discovery Dataset (D3), which contains metadata from 5
million CS publications. Both D3 and CS-Insights are open-access, and
CS-Insights can be easily adapted to other datasets in the future. The most
interesting findings of our scientometric analysis include that i) there has
been a stark increase in publications, authors, and venues in the last two
decades, ii) many authors only recently joined the field, iii) the most cited
authors and venues focus on computer vision and pattern recognition, while the
most productive prefer engineering-related topics, iv) the preference of
researchers to publish in conferences over journals dwindles, v) on average,
journal articles receive twice as many citations compared to conference papers,
but the contrast is much smaller for the most cited conferences and journals,
and vi) journals also get more citations in all other investigated fields of
study, while only CS and engineering publish more in conferences than journals.
| [
{
"created": "Thu, 1 Dec 2022 16:27:42 GMT",
"version": "v1"
}
] | "2022-12-02T00:00:00" | [
[
"Küll",
"Lennart",
""
]
] | 1new_dataset
|
2003.04079 | Pedro Casas Dr. | Gonzalo Mar\'in, Pedro Casas, Germ\'an Capdehourat | DeepMAL -- Deep Learning Models for Malware Traffic Detection and
Classification | 3rd International Data Science Conference (IDSC 2020) | null | null | null | cs.CR cs.LG cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Robust network security systems are essential to prevent and mitigate the
harming effects of the ever-growing occurrence of network attacks. In recent
years, machine learning-based systems have gain popularity for network security
applications, usually considering the application of shallow models, which rely
on the careful engineering of expert, handcrafted input features. The main
limitation of this approach is that handcrafted features can fail to perform
well under different scenarios and types of attacks. Deep Learning (DL) models
can solve this limitation using their ability to learn feature representations
from raw, non-processed data. In this paper we explore the power of DL models
on the specific problem of detection and classification of malware network
traffic. As a major advantage with respect to the state of the art, we consider
raw measurements coming directly from the stream of monitored bytes as input to
the proposed models, and evaluate different raw-traffic feature
representations, including packet and flow-level ones. We introduce DeepMAL, a
DL model which is able to capture the underlying statistics of malicious
traffic, without any sort of expert handcrafted features. Using publicly
available traffic traces containing different families of malware traffic, we
show that DeepMAL can detect and classify malware flows with high accuracy,
outperforming traditional, shallow-like models.
| [
{
"created": "Tue, 3 Mar 2020 16:54:26 GMT",
"version": "v1"
},
{
"created": "Tue, 10 Mar 2020 16:56:46 GMT",
"version": "v2"
}
] | "2020-03-26T00:00:00" | [
[
"Marín",
"Gonzalo",
""
],
[
"Casas",
"Pedro",
""
],
[
"Capdehourat",
"Germán",
""
]
] | 0no_new_dataset
|
2104.08799 | Yige Xu | Yichao Luo, Yige Xu, Jiacheng Ye, Xipeng Qiu, Qi Zhang | Keyphrase Generation with Fine-Grained Evaluation-Guided Reinforcement
Learning | 11 pages, Findings of EMNLP 2021 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aiming to generate a set of keyphrases, Keyphrase Generation (KG) is a
classical task for capturing the central idea from a given document. Based on
Seq2Seq models, the previous reinforcement learning framework on KG tasks
utilizes the evaluation metrics to further improve the well-trained neural
models. However, these KG evaluation metrics such as $F_1@5$ and $F_1@M$ are
only aware of the exact correctness of predictions on phrase-level and ignore
the semantic similarities between similar predictions and targets, which
inhibits the model from learning deep linguistic patterns. In response to this
problem, we propose a new fine-grained evaluation metric to improve the RL
framework, which considers different granularities: token-level $F_1$ score,
edit distance, duplication, and prediction quantities. On the whole, the new
framework includes two reward functions: the fine-grained evaluation score and
the vanilla $F_1$ score. This framework helps the model identifying some
partial match phrases which can be further optimized as the exact match ones.
Experiments on KG benchmarks show that our proposed training framework
outperforms the previous RL training frameworks among all evaluation scores. In
addition, our method can effectively ease the synonym problem and generate a
higher quality prediction. The source code is available at
\url{https://github.com/xuyige/FGRL4KG}.
| [
{
"created": "Sun, 18 Apr 2021 10:13:46 GMT",
"version": "v1"
},
{
"created": "Fri, 10 Sep 2021 13:22:05 GMT",
"version": "v2"
}
] | "2021-09-13T00:00:00" | [
[
"Luo",
"Yichao",
""
],
[
"Xu",
"Yige",
""
],
[
"Ye",
"Jiacheng",
""
],
[
"Qiu",
"Xipeng",
""
],
[
"Zhang",
"Qi",
""
]
] | 0no_new_dataset
|
2305.03935 | Kaiwen Zheng | Kaiwen Zheng, Cheng Lu, Jianfei Chen, Jun Zhu | Improved Techniques for Maximum Likelihood Estimation for Diffusion ODEs | Accepted in ICML2023 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion models have exhibited excellent performance in various domains. The
probability flow ordinary differential equation (ODE) of diffusion models
(i.e., diffusion ODEs) is a particular case of continuous normalizing flows
(CNFs), which enables deterministic inference and exact likelihood evaluation.
However, the likelihood estimation results by diffusion ODEs are still far from
those of the state-of-the-art likelihood-based generative models. In this work,
we propose several improved techniques for maximum likelihood estimation for
diffusion ODEs, including both training and evaluation perspectives. For
training, we propose velocity parameterization and explore variance reduction
techniques for faster convergence. We also derive an error-bounded high-order
flow matching objective for finetuning, which improves the ODE likelihood and
smooths its trajectory. For evaluation, we propose a novel training-free
truncated-normal dequantization to fill the training-evaluation gap commonly
existing in diffusion ODEs. Building upon these techniques, we achieve
state-of-the-art likelihood estimation results on image datasets (2.56 on
CIFAR-10, 3.43/3.69 on ImageNet-32) without variational dequantization or data
augmentation, and 2.42 on CIFAR-10 with data augmentation. Code is available at
\url{https://github.com/thu-ml/i-DODE}.
| [
{
"created": "Sat, 6 May 2023 05:21:24 GMT",
"version": "v1"
},
{
"created": "Wed, 31 May 2023 18:05:40 GMT",
"version": "v2"
},
{
"created": "Mon, 25 Sep 2023 13:38:46 GMT",
"version": "v3"
},
{
"created": "Sat, 6 Apr 2024 07:01:53 GMT",
"version": "v4"
}
] | "2024-04-09T00:00:00" | [
[
"Zheng",
"Kaiwen",
""
],
[
"Lu",
"Cheng",
""
],
[
"Chen",
"Jianfei",
""
],
[
"Zhu",
"Jun",
""
]
] | 0no_new_dataset
|
2010.14263 | Huiyue Yi | Huiyue Yi | Source Enumeration via RMT Estimator Based on Linear Shrinkage
Estimation of Noise Eigenvalues Using Relatively Few Samples | 15 pages, 7 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Estimating the number of signals embedded in noise is a fundamental problem
in array signal processing. The classic RMT estimator based on random matrix
theory (RMT) tends to under-estimate the number of signals as it does not
consider the non-negligible bias term among eigenvalues for finite sample size.
Moreover, the RMT estimator suffers from uncertainty in noise variance
estimation problem. In order to overcome these problems, we firstly derive a
more accurate expression for the distribution of the sample eigenvalues and the
bias term among eigenvalues by utilizing the linear shrinkage (LS) estimate of
noise sample eigenvalues. Then, we analyze the effect of the bias term among
eigenvalues on the estimation performance of the RMT estimator, and derive the
increased under-estimation probability of the RMT estimator incurred by this
bias term. Based on these results, we propose a novel RMT estimator based on LS
estimate of noise eigenvalues (termed as LS-RMT estimator) by incorporating the
bias term into the decision criterion of the RMT estimator. As the LS-RMT
estimator incorporates this bias term among eigenvalues into the decision
criterion of the RMT estimator, it can detect signal eigenvalues immersed in
this bias term. Therefore, the LS-RMT estimator can overcome the higher
under-estimation probability of the RMT estimator incurred by the bias term
among eigenvalues, and also avoids the uncertainty in the noise variance
estimation suffered by the RMT estimator as the noise variance is estimated
under the assumption that the eigenvalue being tested is arising from noise.
Finally, extensive simulation results are presented to show that the proposed
LS-RMT estimator outperforms the existing estimators.
| [
{
"created": "Tue, 27 Oct 2020 13:02:18 GMT",
"version": "v1"
}
] | "2020-10-28T00:00:00" | [
[
"Yi",
"Huiyue",
""
]
] | 0no_new_dataset
|
0906.3930 | EPTCS | Dessislava Petrova-Antonova, Sylvia Ilieva | Towards a Unifying View of QoS-Enhanced Web Service Description and
Discovery Approaches | null | EPTCS 2, 2009, pp. 99-113 | 10.4204/EPTCS.2.8 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The number of web services increased vastly in the last years. Various
providers offer web services with the same functionality, so for web service
consumers it is getting more complicated to select the web service, which best
fits their requirements. That is why a lot of the research efforts point to
discover semantic means for describing web services taking into account not
only functional characteristics of services, but also the quality of service
(QoS) properties such as availability, reliability, response time, trust, etc.
This motivated us to research current approaches presenting complete solutions
for QoS enabled web service description, publication and discovery. In this
paper we present comparative analysis of these approaches according to their
common principals. Based on such analysis we extract the essential aspects from
them and propose a pattern for the development of QoS-aware service-oriented
architectures.
| [
{
"created": "Mon, 22 Jun 2009 06:56:40 GMT",
"version": "v1"
}
] | "2009-06-23T00:00:00" | [
[
"Petrova-Antonova",
"Dessislava",
""
],
[
"Ilieva",
"Sylvia",
""
]
] | 0no_new_dataset
|
2308.01300 | Yan Ma | Yan Ma, Weicong Liang, Bohan Chen, Yiduo Hao, Bojian Hou, Xiangyu Yue,
Chao Zhang, Yuhui Yuan | Revisiting DETR Pre-training for Object Detection | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Motivated by the remarkable achievements of DETR-based approaches on COCO
object detection and segmentation benchmarks, recent endeavors have been
directed towards elevating their performance through self-supervised
pre-training of Transformers while preserving a frozen backbone. Noteworthy
advancements in accuracy have been documented in certain studies. Our
investigation delved deeply into a representative approach, DETReg, and its
performance assessment in the context of emerging models like
$\mathcal{H}$-Deformable-DETR. Regrettably, DETReg proves inadequate in
enhancing the performance of robust DETR-based models under full data
conditions. To dissect the underlying causes, we conduct extensive experiments
on COCO and PASCAL VOC probing elements such as the selection of pre-training
datasets and strategies for pre-training target generation. By contrast, we
employ an optimized approach named Simple Self-training which leads to marked
enhancements through the combination of an improved box predictor and the
Objects$365$ benchmark. The culmination of these endeavors results in a
remarkable AP score of $59.3\%$ on the COCO val set, outperforming
$\mathcal{H}$-Deformable-DETR + Swin-L without pre-training by $1.4\%$.
Moreover, a series of synthetic pre-training datasets, generated by merging
contemporary image-to-text(LLaVA) and text-to-image (SDXL) models,
significantly amplifies object detection capabilities.
| [
{
"created": "Wed, 2 Aug 2023 17:39:30 GMT",
"version": "v1"
},
{
"created": "Fri, 1 Dec 2023 18:25:19 GMT",
"version": "v2"
}
] | "2023-12-04T00:00:00" | [
[
"Ma",
"Yan",
""
],
[
"Liang",
"Weicong",
""
],
[
"Chen",
"Bohan",
""
],
[
"Hao",
"Yiduo",
""
],
[
"Hou",
"Bojian",
""
],
[
"Yue",
"Xiangyu",
""
],
[
"Zhang",
"Chao",
""
],
[
"Yuan",
"Yuhui",
""
]
] | 0no_new_dataset
|
2402.14563 | Stephan Schl\"ogl PhD | Stephan Schl\"ogl, Gavin Doherty, Saturnino Luz | Wizard of Oz Experimentation for Language Technology Applications:
Challenges and Tools | 28 pages | Schlogl, S., Doherty, G., & Luz, S. (2015). Wizard of Oz
Experimentation for Language Technology Applications: Challenges and Tools.
Interacting with Computers 27(6), pp. 592-615 | 10.1093/iwc/iwu016 | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wizard of OZ (WOZ) is a well-established method for simulating the
functionality and user experience of future systems. Using a human wizard to
mimic certain operations of a potential system is particularly useful in
situations where extensive engineering effort would otherwise be needed to
explore the design possibilities offered by such operations. The WOZ method has
been widely used in connection with speech and language technologies, but
advances in sensor technology and pattern recognition as well as new
application areas such as human-robot interaction have made it increasingly
relevant to the design of a wider range of interactive systems. In such cases
achieving acceptable performance at the user interface level often hinges on
resource intensive improvements such as domain tuning, which are better done
once the overall design is relatively stable. While WOZ is recognised as a
valuable prototyping technique, surprisingly little effort has been put into
exploring it from a methodological point of view. Starting from a survey of the
literature, this paper presents a systematic investigation and analysis of the
design space for WOZ for language technology applications, and proposes a
generic architecture for tool support that supports the integration of
components for speech recognition and synthesis as well as for machine
translation. This architecture is instantiated in WebWOZ - a new web-based
open-source WOZ prototyping platform. The viability of generic support is
explored empirically through a series of evaluations. Researchers from a
variety of backgrounds were able to create experiments, independent of their
previous experience with WOZ. The approach was further validated through a
number of real experiments, which also helped to identify a number of
possibilities for additional support, and flagged potential issues relating to
consistency in Wizard performance.
| [
{
"created": "Thu, 22 Feb 2024 13:59:47 GMT",
"version": "v1"
}
] | "2024-02-23T00:00:00" | [
[
"Schlögl",
"Stephan",
""
],
[
"Doherty",
"Gavin",
""
],
[
"Luz",
"Saturnino",
""
]
] | 0no_new_dataset
|
2306.02842 | Xiaolei Wang | Xiaolei Wang, Kun Zhou, Xinyu Tang, Wayne Xin Zhao, Fan Pan, Zhao Cao,
Ji-Rong Wen | Improving Conversational Recommendation Systems via Counterfactual Data
Simulation | Accepted by KDD 2023. Code: https://github.com/RUCAIBox/CFCRS | null | 10.1145/3580305.3599387 | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conversational recommender systems (CRSs) aim to provide recommendation
services via natural language conversations. Although a number of approaches
have been proposed for developing capable CRSs, they typically rely on
sufficient training data for training. Since it is difficult to annotate
recommendation-oriented dialogue datasets, existing CRS approaches often suffer
from the issue of insufficient training due to the scarcity of training data.
To address this issue, in this paper, we propose a CounterFactual data
simulation approach for CRS, named CFCRS, to alleviate the issue of data
scarcity in CRSs. Our approach is developed based on the framework of
counterfactual data augmentation, which gradually incorporates the rewriting to
the user preference from a real dialogue without interfering with the entire
conversation flow. To develop our approach, we characterize user preference and
organize the conversation flow by the entities involved in the dialogue, and
design a multi-stage recommendation dialogue simulator based on a conversation
flow language model. Under the guidance of the learned user preference and
dialogue schema, the flow language model can produce reasonable, coherent
conversation flows, which can be further realized into complete dialogues.
Based on the simulator, we perform the intervention at the representations of
the interacted entities of target users, and design an adversarial training
method with a curriculum schedule that can gradually optimize the data
augmentation strategy. Extensive experiments show that our approach can
consistently boost the performance of several competitive CRSs, and outperform
other data augmentation methods, especially when the training data is limited.
Our code is publicly available at https://github.com/RUCAIBox/CFCRS.
| [
{
"created": "Mon, 5 Jun 2023 12:48:56 GMT",
"version": "v1"
}
] | "2024-06-21T00:00:00" | [
[
"Wang",
"Xiaolei",
""
],
[
"Zhou",
"Kun",
""
],
[
"Tang",
"Xinyu",
""
],
[
"Zhao",
"Wayne Xin",
""
],
[
"Pan",
"Fan",
""
],
[
"Cao",
"Zhao",
""
],
[
"Wen",
"Ji-Rong",
""
]
] | 1new_dataset
|
2404.12935 | Sheeba Samuel | Sheeba Samuel and Daniel Mietchen | FAIR Jupyter: a knowledge graph approach to semantic sharing and
granular exploration of a computational notebook reproducibility dataset | null | null | null | null | cs.CE | http://creativecommons.org/licenses/by/4.0/ | The way in which data are shared can affect their utility and reusability.
Here, we demonstrate how data that we had previously shared in bulk can be
mobilized further through a knowledge graph that allows for much more granular
exploration and interrogation. The original dataset is about the computational
reproducibility of GitHub-hosted Jupyter notebooks associated with biomedical
publications. It contains rich metadata about the publications, associated
GitHub repositories and Jupyter notebooks, and the notebooks' reproducibility.
We took this dataset, converted it into semantic triples and loaded these into
a triple store to create a knowledge graph, FAIR Jupyter, that we made
accessible via a web service. This enables granular data exploration and
analysis through queries that can be tailored to specific use cases. Such
queries may provide details about any of the variables from the original
dataset, highlight relationships between them or combine some of the graph's
content with materials from corresponding external resources. We provide a
collection of example queries addressing a range of use cases in research and
education. We also outline how sets of such queries can be used to profile
specific content types, either individually or by class. We conclude by
discussing how such a semantically enhanced sharing of complex datasets can
both enhance their FAIRness, i.e., their findability, accessibility,
interoperability, and reusability, and help identify and communicate best
practices, particularly with regards to data quality, standardization,
automation and reproducibility.
| [
{
"created": "Fri, 19 Apr 2024 15:07:23 GMT",
"version": "v1"
}
] | "2024-04-22T00:00:00" | [
[
"Samuel",
"Sheeba",
""
],
[
"Mietchen",
"Daniel",
""
]
] | 1new_dataset
|
2210.14979 | Pirashanth Ratnamogan | Mathieu Grosso, Pirashanth Ratnamogan, Alexis Mathey, William
Vanhuffel, Michael Fotso Fotso | Robust Domain Adaptation for Pre-trained Multilingual Neural Machine
Translation Models | Accepted by EMNLP 2022 MMNLU Workshop | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | Recent literature has demonstrated the potential of multilingual Neural
Machine Translation (mNMT) models. However, the most efficient models are not
well suited to specialized industries. In these cases, internal data is scarce
and expensive to find in all language pairs. Therefore, fine-tuning a mNMT
model on a specialized domain is hard. In this context, we decided to focus on
a new task: Domain Adaptation of a pre-trained mNMT model on a single pair of
language while trying to maintain model quality on generic domain data for all
language pairs. The risk of loss on generic domain and on other pairs is high.
This task is key for mNMT model adoption in the industry and is at the border
of many others. We propose a fine-tuning procedure for the generic mNMT that
combines embeddings freezing and adversarial loss. Our experiments demonstrated
that the procedure improves performances on specialized data with a minimal
loss in initial performances on generic domain for all languages pairs,
compared to a naive standard approach (+10.0 BLEU score on specialized data,
-0.01 to -0.5 BLEU on WMT and Tatoeba datasets on the other pairs with M2M100).
| [
{
"created": "Wed, 26 Oct 2022 18:47:45 GMT",
"version": "v1"
}
] | "2022-10-28T00:00:00" | [
[
"Grosso",
"Mathieu",
""
],
[
"Ratnamogan",
"Pirashanth",
""
],
[
"Mathey",
"Alexis",
""
],
[
"Vanhuffel",
"William",
""
],
[
"Fotso",
"Michael Fotso",
""
]
] | 0no_new_dataset
|
1605.04447 | Sayyed Ali Mirsoleimani | S. Ali Mirsoleimani, Aske Plaat, Jaap van den Herik and Jos Vermaseren | A New Method for Parallel Monte Carlo Tree Search | 5 pages, 6 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years there has been much interest in the Monte Carlo tree search
algorithm, a new, adaptive, randomized optimization algorithm. In fields as
diverse as Artificial Intelligence, Operations Research, and High Energy
Physics, research has established that Monte Carlo tree search can find good
solutions without domain dependent heuristics. However, practice shows that
reaching high performance on large parallel machines is not so successful as
expected. This paper proposes a new method for parallel Monte Carlo tree search
based on the pipeline computation pattern.
| [
{
"created": "Sat, 14 May 2016 18:28:08 GMT",
"version": "v1"
}
] | "2016-05-17T00:00:00" | [
[
"Mirsoleimani",
"S. Ali",
""
],
[
"Plaat",
"Aske",
""
],
[
"Herik",
"Jaap van den",
""
],
[
"Vermaseren",
"Jos",
""
]
] | 0no_new_dataset
|
1801.04069 | Huoran Li | Huoran Li, Xuanzhe Liu, Qiaozhu Mei | Predicting Smartphone Battery Life based on Comprehensive and Real-time
Usage Data | null | null | null | null | cs.HC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Smartphones and smartphone apps have undergone an explosive growth in the
past decade. However, smartphone battery technology hasn't been able to keep
pace with the rapid growth of the capacity and the functionality of smartphones
and apps. As a result, battery has always been a bottleneck of a user's daily
experience of smartphones. An accurate estimation of the remaining battery life
could tremendously help the user to schedule their activities and use their
smartphones more efficiently. Existing studies on battery life prediction have
been primitive due to the lack of real-world smartphone usage data at scale.
This paper presents a novel method that uses the state-of-the-art machine
learning models for battery life prediction, based on comprehensive and
real-time usage traces collected from smartphones. The proposed method is the
first that identifies and addresses the severe data missing problem in this
context, using a principled statistical metric called the concordance index.
The method is evaluated using a dataset collected from 51 users for 21 months,
which covers comprehensive and fine-grained smartphone usage traces including
system status, sensor indicators, system events, and app status. We find that
the remaining battery life of a smartphone can be accurately predicted based on
how the user uses the device at the real-time, in the current session, and in
history. The machine learning models successfully identify predictive features
for battery life and their applicable scenarios.
| [
{
"created": "Fri, 12 Jan 2018 06:35:00 GMT",
"version": "v1"
}
] | "2018-01-15T00:00:00" | [
[
"Li",
"Huoran",
""
],
[
"Liu",
"Xuanzhe",
""
],
[
"Mei",
"Qiaozhu",
""
]
] | 1new_dataset
|
2304.07142 | William Ravenscroft | William Ravenscroft and Stefan Goetze and Thomas Hain | On Data Sampling Strategies for Training Neural Network Speech
Separation Models | Accepted for EUSIPCO 2023 | null | null | null | cs.SD cs.AI cs.LG cs.NE eess.AS | http://creativecommons.org/licenses/by/4.0/ | Speech separation remains an important area of multi-speaker signal
processing. Deep neural network (DNN) models have attained the best performance
on many speech separation benchmarks. Some of these models can take significant
time to train and have high memory requirements. Previous work has proposed
shortening training examples to address these issues but the impact of this on
model performance is not yet well understood. In this work, the impact of
applying these training signal length (TSL) limits is analysed for two speech
separation models: SepFormer, a transformer model, and Conv-TasNet, a
convolutional model. The WJS0-2Mix, WHAMR and Libri2Mix datasets are analysed
in terms of signal length distribution and its impact on training efficiency.
It is demonstrated that, for specific distributions, applying specific TSL
limits results in better performance. This is shown to be mainly due to
randomly sampling the start index of the waveforms resulting in more unique
examples for training. A SepFormer model trained using a TSL limit of 4.42s and
dynamic mixing (DM) is shown to match the best-performing SepFormer model
trained with DM and unlimited signal lengths. Furthermore, the 4.42s TSL limit
results in a 44% reduction in training time with WHAMR.
| [
{
"created": "Fri, 14 Apr 2023 14:05:52 GMT",
"version": "v1"
},
{
"created": "Fri, 16 Jun 2023 13:42:10 GMT",
"version": "v2"
}
] | "2023-06-19T00:00:00" | [
[
"Ravenscroft",
"William",
""
],
[
"Goetze",
"Stefan",
""
],
[
"Hain",
"Thomas",
""
]
] | 1new_dataset
|
1912.01365 | Andr\'e Gaul | Andr\'e Gaul, Ismail Khoffi, J\"org Liesen, Torsten St\"uber | Mathematical Analysis and Algorithms for Federated Byzantine Agreement
Systems | null | null | null | null | cs.DC | http://creativecommons.org/licenses/by/4.0/ | We give an introduction to federated Byzantine agreement systems (FBAS) with
many examples ranging from small "academic" cases to the current Stellar
network. We then analyze the main concepts from a mathematical and an
algorithmic point of view. Based on work of Lachowski we derive algorithms for
quorum enumeration, checking quorum intersection, and computing the intact
nodes with respect to a given set of ill-behaved (Byzantine) nodes. We also
show that from the viewpoint of the intactness probability of nodes, which we
introduce in this paper, a hierarchical setup of nodes is inferior to an
arrangement that we call a symmetric simple FBAS. All algorithms described in
this paper are implemented in the Python package Stellar Observatory, which is
also used in some of the computed examples.
| [
{
"created": "Tue, 3 Dec 2019 13:53:29 GMT",
"version": "v1"
}
] | "2019-12-04T00:00:00" | [
[
"Gaul",
"André",
""
],
[
"Khoffi",
"Ismail",
""
],
[
"Liesen",
"Jörg",
""
],
[
"Stüber",
"Torsten",
""
]
] | 0no_new_dataset
|
1607.06797 | Fariborz Taherkhani | Fariborz Taherkhani | A probabilistic patch based image representation using Conditional
Random Field model for image classification | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In this paper we proposed an ordered patch based method using Conditional
Random Field (CRF) in order to encode local properties and their spatial
relationship in images to address texture classification, face recognition, and
scene classification problems. Typical image classification approaches work
without considering spatial causality among distinctive properties of an image
for image representation in feature space. In this method first, each image is
encoded as a sequence of ordered patches, including local properties. Second,
the sequence of these ordered patches is modeled as a probabilistic feature
vector by CRF to model spatial relationship of these local properties. And
finally, image classification is performed on such probabilistic image
representation. Experimental results on several standard image datasets
indicate that proposed method outperforms some of existing image classification
methods.
| [
{
"created": "Fri, 22 Jul 2016 19:19:47 GMT",
"version": "v1"
},
{
"created": "Wed, 5 Oct 2016 06:24:06 GMT",
"version": "v2"
}
] | "2016-10-06T00:00:00" | [
[
"Taherkhani",
"Fariborz",
""
]
] | 0no_new_dataset
|
2109.04440 | Noel Alben | Noel Alben, Ranjani H.G | '1e0a': A Computational Approach to Rhythm Training | null | null | null | null | cs.MM | http://creativecommons.org/licenses/by/4.0/ | We present a computational assessment system that promotes the learning of
basic rhythmic patterns. The system is capable of generating multiple rhythmic
patterns with increasing complexity within various cycle lengths. For a
generated rhythm pattern the performance assessment of the learner is carried
out through the statistical deviations calculated from the onset detection and
temporal assessment of a learner's performance. This is compared with the
generated pattern, and their performance accuracy forms the feedback to the
learner. The system proceeds to generate a new pattern of increased complexity
when performance assessment results are within certain error bounds. The system
thus mimics a learner-teacher relationship as the learner progresses in their
feedback-based learning. The choice of progression within a cycle for each
pattern is determined by a predefined complexity metric. This metric is based
on a coded element model for the perceptual processing of sequential stimuli.
The model earlier proposed for a sequence of tones and non-tones, is now used
for onsets and silences. This system is developed into a web-based application
and provides accessibility for learning purposes. Analysis of the performance
assessments shows that the complexity metric is indicative of the perceptual
processing of rhythm patterns and can be used for rhythm learning.
| [
{
"created": "Thu, 9 Sep 2021 17:38:42 GMT",
"version": "v1"
}
] | "2021-09-10T00:00:00" | [
[
"Alben",
"Noel",
""
],
[
"G",
"Ranjani H.",
""
]
] | 0no_new_dataset
|
2402.00450 | Qilong Yan | Qilong Yan, Yufeng Zhang, Jinghao Zhang, Jingpu Duan, Jian Yin | CPT: Competence-progressive Training Strategy for Few-shot Node
Classification | arXiv admin note: substantial text overlap with arXiv:2206.11972 by
other authors | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Graph Neural Networks (GNNs) have made significant advancements in node
classification, but their success relies on sufficient labeled nodes per class
in the training data. Real-world graph data often exhibits a long-tail
distribution with sparse labels, emphasizing the importance of GNNs' ability in
few-shot node classification, which entails categorizing nodes with limited
data. Traditional episodic meta-learning approaches have shown promise in this
domain, but they face an inherent limitation: it might lead the model to
converge to suboptimal solutions because of random and uniform task assignment,
ignoring task difficulty levels. This could lead the meta-learner to face
complex tasks too soon, hindering proper learning. Ideally, the meta-learner
should start with simple concepts and advance to more complex ones, like human
learning. So, we introduce CPT, a novel two-stage curriculum learning method
that aligns task difficulty with the meta-learner's progressive competence,
enhancing overall performance. Specifically, in CPT's initial stage, the focus
is on simpler tasks, fostering foundational skills for engaging with complex
tasks later. Importantly, the second stage dynamically adjusts task difficulty
based on the meta-learner's growing competence, aiming for optimal knowledge
acquisition. Extensive experiments on popular node classification datasets
demonstrate significant improvements of our strategy over existing methods.
| [
{
"created": "Thu, 1 Feb 2024 09:36:56 GMT",
"version": "v1"
},
{
"created": "Fri, 23 Feb 2024 08:52:09 GMT",
"version": "v2"
}
] | "2024-02-26T00:00:00" | [
[
"Yan",
"Qilong",
""
],
[
"Zhang",
"Yufeng",
""
],
[
"Zhang",
"Jinghao",
""
],
[
"Duan",
"Jingpu",
""
],
[
"Yin",
"Jian",
""
]
] | 0no_new_dataset
|
2103.09113 | Mariano Ceccato | Filippo Contro, Marco Crosara, Mariano Ceccato, Mila Dalla Preda | EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum
Bytecode | null | null | null | null | cs.SE cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by the immutable nature of Ethereum smart contracts and of their
transactions, quite many approaches have been proposed to detect defects and
security problems before smart contracts become persistent in the blockchain
and they are granted control on substantial financial value.
Because smart contracts source code might not be available, static analysis
approaches mostly face the challenge of analysing compiled Ethereum bytecode,
that is available directly from the official blockchain. However, due to the
intrinsic complexity of Ethereum bytecode (especially in jump resolution),
static analysis encounters significant obstacles that reduce the accuracy of
exiting automated tools.
This paper presents a novel static analysis algorithm based on the symbolic
execution of the Ethereum operand stack that allows us to resolve jumps in
Ethereum bytecode and to construct an accurate control-flow graph (CFG) of the
compiled smart contracts. EtherSolve is a prototype implementation of our
approach. Experimental results on a significant set of real world Ethereum
smart contracts show that EtherSolve improves the accuracy of the execrated
CFGs with respect to the state of the art available approaches.
Many static analysis techniques are based on the CFG representation of the
code and would therefore benefit from the accurate extraction of the CFG. For
example, we implemented a simple extension of EtherSolve that allows to detect
instances of the re-entrancy vulnerability.
| [
{
"created": "Tue, 16 Mar 2021 14:51:53 GMT",
"version": "v1"
}
] | "2021-03-17T00:00:00" | [
[
"Contro",
"Filippo",
""
],
[
"Crosara",
"Marco",
""
],
[
"Ceccato",
"Mariano",
""
],
[
"Preda",
"Mila Dalla",
""
]
] | 1new_dataset
|
1906.00238 | Alon Rozental | Alon Rozental | Adversarial Generation and Encoding of Nested Texts | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a new language model called AGENT, which stands for
Adversarial Generation and Encoding of Nested Texts. AGENT is designed for
encoding, generating and refining documents that consist of a long and coherent
text, such as an entire book, provided they are hierarchically annotated
(nested). i.e. divided into sentences, paragraphs and chapters. The core idea
of our system is learning vector representations for each level of the text
hierarchy (sentences, paragraphs, etc...), and train each such representation
to perform 3 tasks: The task of reconstructing the sequence of vectors from a
lower level that was used to create the representation, and generalized
versions of the Masked Language Modeling (MLM) and "Next Sentence Prediction"
tasks from BERT Devlin et al. [2018]. Additionally we present a new adversarial
model for long text generation and suggest a way to improve the coherence of
the generated text by traversing its vector representation tree.
| [
{
"created": "Sat, 1 Jun 2019 15:01:16 GMT",
"version": "v1"
}
] | "2019-06-04T00:00:00" | [
[
"Rozental",
"Alon",
""
]
] | 1new_dataset
|
2211.08217 | Alan Lukezic | Nikola Djukic, Alan Lukezic, Vitjan Zavrtanik, Matej Kristan | A Low-Shot Object Counting Network With Iterative Prototype Adaptation | Accepted to ICCV2023, code: https://github.com/djukicn/loca | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | We consider low-shot counting of arbitrary semantic categories in the image
using only few annotated exemplars (few-shot) or no exemplars (no-shot). The
standard few-shot pipeline follows extraction of appearance queries from
exemplars and matching them with image features to infer the object counts.
Existing methods extract queries by feature pooling which neglects the shape
information (e.g., size and aspect) and leads to a reduced object localization
accuracy and count estimates. We propose a Low-shot Object Counting network
with iterative prototype Adaptation (LOCA). Our main contribution is the new
object prototype extraction module, which iteratively fuses the exemplar shape
and appearance information with image features. The module is easily adapted to
zero-shot scenarios, enabling LOCA to cover the entire spectrum of low-shot
counting problems. LOCA outperforms all recent state-of-the-art methods on
FSC147 benchmark by 20-30% in RMSE on one-shot and few-shot and achieves
state-of-the-art on zero-shot scenarios, while demonstrating better
generalization capabilities.
| [
{
"created": "Tue, 15 Nov 2022 15:39:23 GMT",
"version": "v1"
},
{
"created": "Thu, 28 Sep 2023 13:20:18 GMT",
"version": "v2"
}
] | "2023-09-29T00:00:00" | [
[
"Djukic",
"Nikola",
""
],
[
"Lukezic",
"Alan",
""
],
[
"Zavrtanik",
"Vitjan",
""
],
[
"Kristan",
"Matej",
""
]
] | 0no_new_dataset
|
2012.15342 | Thorsten Berger | Patrick Franz and Thorsten Berger and Ibrahim Fayaz and Sarah Nadi and
Evgeny Groshev | ConfigFix: Interactive Configuration Conflict Resolution for the Linux
Kernel | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Highly configurable systems are highly complex systems, with the Linux kernel
arguably being one of the most well-known ones. Since 2007, it has been a
frequent target of the research community, conducting empirical studies and
building dedicated methods and tools for analyzing, configuring, testing,
optimizing, and maintaining the kernel in the light of its vast configuration
space. However, despite a large body of work, mainly bug fixes that were the
result of such research made it back into the kernel's source tree.
Unfortunately, Linux users still struggle with kernel configuration and
resolving configuration conflicts, since the kernel largely lacks automated
support. Additionally, there are technical and community requirements for
supporting automated conflict resolution in the kernel, such as, for example,
using a pure C-based solution that uses only compatible third-party libraries
(if any). With the aim of contributing back to the Linux community, we present
CONFIGFIX, a tooling that we integrated with the kernel configurator, that is
purely implemented in C, and that is finally a working solution able to produce
fixes for configuration conflicts. In this experience report, we describe our
experiences ranging over a decade of building upon the large body of work from
research on the Linux kernel configuration mechanisms as well as how we
designed and realized CONFIGFIX while adhering to the Linux kernel's community
requirements and standards. While CONFIGFIX helps Linux kernel users obtaining
their desired configuration, the sound semantic abstraction we implement
provides the basis for many of the above techniques supporting kernel
configuration, helping researchers and kernel developers.
| [
{
"created": "Wed, 30 Dec 2020 22:17:15 GMT",
"version": "v1"
}
] | "2021-01-01T00:00:00" | [
[
"Franz",
"Patrick",
""
],
[
"Berger",
"Thorsten",
""
],
[
"Fayaz",
"Ibrahim",
""
],
[
"Nadi",
"Sarah",
""
],
[
"Groshev",
"Evgeny",
""
]
] | 0no_new_dataset
|
2404.05490 | Baiyi Li | Baiyi Li, Edmond S.L. Ho, Hubert P.H. Shum and He Wang | Two-Person Interaction Augmentation with Skeleton Priors | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Close and continuous interaction with rich contacts is a crucial aspect of
human activities (e.g. hugging, dancing) and of interest in many domains like
activity recognition, motion prediction, character animation, etc. However,
acquiring such skeletal motion is challenging. While direct motion capture is
expensive and slow, motion editing/generation is also non-trivial, as complex
contact patterns with topological and geometric constraints have to be
retained. To this end, we propose a new deep learning method for two-body
skeletal interaction motion augmentation, which can generate variations of
contact-rich interactions with varying body sizes and proportions while
retaining the key geometric/topological relations between two bodies. Our
system can learn effectively from a relatively small amount of data and
generalize to drastically different skeleton sizes. Through exhaustive
evaluation and comparison, we show it can generate high-quality motions, has
strong generalizability and outperforms traditional optimization-based methods
and alternative deep learning solutions.
| [
{
"created": "Mon, 8 Apr 2024 13:11:57 GMT",
"version": "v1"
},
{
"created": "Tue, 9 Apr 2024 18:55:43 GMT",
"version": "v2"
}
] | "2024-04-11T00:00:00" | [
[
"Li",
"Baiyi",
""
],
[
"Ho",
"Edmond S. L.",
""
],
[
"Shum",
"Hubert P. H.",
""
],
[
"Wang",
"He",
""
]
] | 1new_dataset
|
2403.08920 | Carlos Olarte | Carlos Olarte and Peter Csaba \"Olveczky | Timed Strategies for Real-Time Rewrite Theories | null | null | null | null | cs.LO | http://creativecommons.org/licenses/by/4.0/ | In this paper we propose a language for conveniently defining a wide range of
execution strategies for real-time rewrite theories, and provide
Maude-strategy-implemented versions of most Real-Time Maude analysis methods,
albeit with user-defined discrete and timed strategies. We also identify a new
time sampling strategy that should provide both efficient and exhaustive
analysis for many distributed real-time systems. We exemplify the use of our
language and its analyses on a simple round trip time protocol, and compare the
performance of standard Maude search with our strategy-implemented reachability
analyses on the CASH scheduling algorithm benchmark.
| [
{
"created": "Wed, 13 Mar 2024 19:21:23 GMT",
"version": "v1"
}
] | "2024-03-15T00:00:00" | [
[
"Olarte",
"Carlos",
""
],
[
"Ölveczky",
"Peter Csaba",
""
]
] | 0no_new_dataset
|
2310.20024 | Matin Macktoobian | Matin Macktoobian and Zhan Shu and Qing Zhao | Topology Recoverability Prediction for Ad-Hoc Robot Networks: A
Data-Driven Fault-Tolerant Approach | null | IEEE Transactions on Signal and Information Processing over
Networks, 2023 | 10.1109/TSIPN.2023.3328275 | null | cs.RO cs.AI cs.LG cs.MA | http://creativecommons.org/licenses/by/4.0/ | Faults occurring in ad-hoc robot networks may fatally perturb their
topologies leading to disconnection of subsets of those networks. Optimal
topology synthesis is generally resource-intensive and time-consuming to be
done in real time for large ad-hoc robot networks. One should only perform
topology re-computations if the probability of topology recoverability after
the occurrence of any fault surpasses that of its irrecoverability. We
formulate this problem as a binary classification problem. Then, we develop a
two-pathway data-driven model based on Bayesian Gaussian mixture models that
predicts the solution to a typical problem by two different pre-fault and
post-fault prediction pathways. The results, obtained by the integration of the
predictions of those pathways, clearly indicate the success of our model in
solving the topology (ir)recoverability prediction problem compared to the best
of current strategies found in the literature.
| [
{
"created": "Mon, 30 Oct 2023 21:16:46 GMT",
"version": "v1"
}
] | "2023-11-01T00:00:00" | [
[
"Macktoobian",
"Matin",
""
],
[
"Shu",
"Zhan",
""
],
[
"Zhao",
"Qing",
""
]
] | 0no_new_dataset
|
2309.05941 | Cliff Zou | Mnassar Alyami, Abdulmajeed Alghamdi, Mohammed Alkhowaiter, Cliff Zou,
Yan Solihin | Random Segmentation: New Traffic Obfuscation against Packet-Size-Based
Side-Channel Attacks | 15 pages, 4 figures, to appear in Sensors 2023 | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Despite encryption, the packet size is still visible, enabling observers to
infer private information in the Internet of Things (IoT) environment (e.g.,
IoT device identification). Packet padding obfuscates packet-length
characteristics with a high data overhead because it relies on adding noise to
the data. This paper proposes a more data-efficient approach that randomizes
packet sizes without adding noise. We achieve this by splitting large TCP
segments into random-sized chunks; hence, the packet length distribution is
obfuscated without adding noise data. Our client-server implementation using
TCP sockets demonstrates the feasibility of our approach at the application
level. We realize our packet size control by adjusting two local
socket-programming parameters. First, we enable the TCP_NODELAY option to send
out each packet with our specified length. Second, we downsize the sending
buffer to prevent the sender from pushing out more data than can be received,
which could disable our control of the packet sizes. We simulate our defense on
a network trace of four IoT devices and show a reduction in device
classification accuracy from 98% to 63%, close to random guessing. Meanwhile,
the real-world data transmission experiments show that the added latency is
reasonable, less than 21%, while the added packet header overhead is only about
5%.
| [
{
"created": "Tue, 12 Sep 2023 03:33:36 GMT",
"version": "v1"
}
] | "2023-09-13T00:00:00" | [
[
"Alyami",
"Mnassar",
""
],
[
"Alghamdi",
"Abdulmajeed",
""
],
[
"Alkhowaiter",
"Mohammed",
""
],
[
"Zou",
"Cliff",
""
],
[
"Solihin",
"Yan",
""
]
] | 1new_dataset
|
2405.03808 | Priyadarshini Pennathur | Priyadarshini R. Pennathur, Valerie Boksa, Arunkumar Pennathur, Andrew
Kusiak, Beth Livingston | The Future of Office and Administrative Support Occupations in the Era
of Artificial Intelligence: A Bibliometric Analysis | This work is being submitted to the IEEE for possible publication | null | null | null | cs.CY | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The U.S. Bureau of Labor Statistics projects that by the year 2029, the
United States will lose a million jobs in the office and administrative support
occupations because technology, automation, and artificial intelligence (AI)
have the potential to substitute or replace the office and administrative
functions performed by office workers. Despite the potential impact AI will
have on office work and the important role office workers play in the American
economy, we have limited knowledge of the state of the art research in office
work at the intersection of emerging artificial intelligence technologies. In
this study, we conducted a bibliometric analysis of the scholarly literature at
the intersection of office work and artificial intelligence. We extracted
literature sources from Compendex and Scopus databases and used VOSviewer for
visualizing and quantifying our bibliometric analyses. Our findings from
keywords analysis indicate that office automation, humans, human-computer
interaction, and artificial intelligence occurred more frequently in the
scholarly literature and had high link strengths. Keyword clusters from
co-occurrence analysis indicate that intelligent buildings, robotics, and the
internet of things are emerging topics in the office work domain. The two
clusters related to ergonomics, worker characteristics, human performance, and
safety indicate the types of human factors concerns that are more widely
studied in office work settings. In summary, our findings on the
state-of-the-art research in office work indicate that more studies have been
conducted on smart buildings, robotics, and technology development for office
work, compared to studies on office workers and their professional development.
| [
{
"created": "Mon, 6 May 2024 19:33:32 GMT",
"version": "v1"
}
] | "2024-05-08T00:00:00" | [
[
"Pennathur",
"Priyadarshini R.",
""
],
[
"Boksa",
"Valerie",
""
],
[
"Pennathur",
"Arunkumar",
""
],
[
"Kusiak",
"Andrew",
""
],
[
"Livingston",
"Beth",
""
]
] | 0no_new_dataset
|