id
stringlengths
9
10
submitter
stringlengths
5
46
authors
stringlengths
5
1.31k
title
stringlengths
8
223
comments
stringlengths
2
574
journal-ref
stringclasses
587 values
doi
stringclasses
784 values
report-no
stringclasses
75 values
categories
stringlengths
5
72
license
stringclasses
9 values
abstract
stringlengths
82
3.31k
versions
listlengths
1
15
update_date
unknown
authors_parsed
sequencelengths
1
76
label
class label
2 classes
2008.05865
Ming Tao
Ming Tao, Hao Tang, Fei Wu, Xiao-Yuan Jing, Bing-Kun Bao, Changsheng Xu
DF-GAN: A Simple and Effective Baseline for Text-to-Image Synthesis
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synthesizing high-quality realistic images from text descriptions is a challenging task. Existing text-to-image Generative Adversarial Networks generally employ a stacked architecture as the backbone yet still remain three flaws. First, the stacked architecture introduces the entanglements between generators of different image scales. Second, existing studies prefer to apply and fix extra networks in adversarial learning for text-image semantic consistency, which limits the supervision capability of these networks. Third, the cross-modal attention-based text-image fusion that widely adopted by previous works is limited on several special image scales because of the computational cost. To these ends, we propose a simpler but more effective Deep Fusion Generative Adversarial Networks (DF-GAN). To be specific, we propose: (i) a novel one-stage text-to-image backbone that directly synthesizes high-resolution images without entanglements between different generators, (ii) a novel Target-Aware Discriminator composed of Matching-Aware Gradient Penalty and One-Way Output, which enhances the text-image semantic consistency without introducing extra networks, (iii) a novel deep text-image fusion block, which deepens the fusion process to make a full fusion between text and visual features. Compared with current state-of-the-art methods, our proposed DF-GAN is simpler but more efficient to synthesize realistic and text-matching images and achieves better performance on widely used datasets.
[ { "created": "Thu, 13 Aug 2020 12:51:17 GMT", "version": "v1" }, { "created": "Wed, 24 Mar 2021 12:10:58 GMT", "version": "v2" }, { "created": "Tue, 29 Mar 2022 07:56:53 GMT", "version": "v3" }, { "created": "Sat, 15 Oct 2022 03:51:50 GMT", "version": "v4" } ]
"2022-10-18T00:00:00"
[ [ "Tao", "Ming", "" ], [ "Tang", "Hao", "" ], [ "Wu", "Fei", "" ], [ "Jing", "Xiao-Yuan", "" ], [ "Bao", "Bing-Kun", "" ], [ "Xu", "Changsheng", "" ] ]
0no_new_dataset
1701.03004
Massimo Cafaro
Massimo Cafaro, Marco Pulimeno and Italo Epicoco
Parallel mining of time-faded heavy hitters
arXiv admin note: text overlap with arXiv:1601.03892
null
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present PFDCMSS, a novel message-passing based parallel algorithm for mining time-faded heavy hitters. The algorithm is a parallel version of the recently published FDCMSS sequential algorithm. We formally prove its correctness by showing that the underlying data structure, a sketch augmented with a Space Saving stream summary holding exactly two counters, is mergeable. Whilst mergeability of traditional sketches derives immediately from theory, we show that merging our augmented sketch is non trivial. Nonetheless, the resulting parallel algorithm is fast and simple to implement. To the best of our knowledge, PFDCMSS is the first parallel algorithm solving the problem of mining time-faded heavy hitters on message-passing parallel architectures. Extensive experimental results confirm that PFDCMSS retains the extreme accuracy and error bound provided by FDCMSS whilst providing excellent parallel scalability.
[ { "created": "Wed, 11 Jan 2017 15:07:38 GMT", "version": "v1" } ]
"2017-01-12T00:00:00"
[ [ "Cafaro", "Massimo", "" ], [ "Pulimeno", "Marco", "" ], [ "Epicoco", "Italo", "" ] ]
0no_new_dataset
1404.1736
Alexios Balatsoukas-Stimming
Alexios Balatsoukas-Stimming and Andreas Burg
Faulty Successive Cancellation Decoding of Polar Codes for the Binary Erasure Channel
As presented at ISITA 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study faulty successive cancellation decoding of polar codes for the binary erasure channel. To this end, we introduce a simple erasure-based fault model and we show that, under this model, polarization does not happen, meaning that fully reliable communication is not possible at any rate. Moreover, we provide numerical results for the frame erasure rate and bit erasure rate and we study an unequal error protection scheme that can significantly improve the performance of the faulty successive cancellation decoder with negligible overhead.
[ { "created": "Mon, 7 Apr 2014 10:45:28 GMT", "version": "v1" }, { "created": "Mon, 9 Feb 2015 10:35:04 GMT", "version": "v2" } ]
"2015-02-10T00:00:00"
[ [ "Balatsoukas-Stimming", "Alexios", "" ], [ "Burg", "Andreas", "" ] ]
0no_new_dataset
1603.06060
Abhijit Guha Roy
Abhijit Guha Roy and Debdoot Sheet
DASA: Domain Adaptation in Stacked Autoencoders using Systematic Dropout
Accepted at Asian Conference on Pattern Recognition 2015
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Domain adaptation deals with adapting behaviour of machine learning based systems trained using samples in source domain to their deployment in target domain where the statistics of samples in both domains are dissimilar. The task of directly training or adapting a learner in the target domain is challenged by lack of abundant labeled samples. In this paper we propose a technique for domain adaptation in stacked autoencoder (SAE) based deep neural networks (DNN) performed in two stages: (i) unsupervised weight adaptation using systematic dropouts in mini-batch training, (ii) supervised fine-tuning with limited number of labeled samples in target domain. We experimentally evaluate performance in the problem of retinal vessel segmentation where the SAE-DNN is trained using large number of labeled samples in the source domain (DRIVE dataset) and adapted using less number of labeled samples in target domain (STARE dataset). The performance of SAE-DNN measured using $logloss$ in source domain is $0.19$, without and with adaptation are $0.40$ and $0.18$, and $0.39$ when trained exclusively with limited samples in target domain. The area under ROC curve is observed respectively as $0.90$, $0.86$, $0.92$ and $0.87$. The high efficiency of vessel segmentation with DASA strongly substantiates our claim.
[ { "created": "Sat, 19 Mar 2016 07:27:56 GMT", "version": "v1" } ]
"2016-03-22T00:00:00"
[ [ "Roy", "Abhijit Guha", "" ], [ "Sheet", "Debdoot", "" ] ]
0no_new_dataset
1706.07342
Rahul Deo
Jeffrey Zhang, Sravani Gajjala, Pulkit Agrawal, Geoffrey H. Tison, Laura A. Hallock, Lauren Beussink-Nelson, Eugene Fan, Mandar A. Aras, ChaRandle Jordan, Kirsten E. Fleischmann, Michelle Melisko, Atif Qasim, Alexei Efros, Sanjiv J. Shah, Ruzena Bajcsy, Rahul C. Deo
A Computer Vision Pipeline for Automated Determination of Cardiac Structure and Function and Detection of Disease by Two-Dimensional Echocardiography
9 figures, 2 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated cardiac image interpretation has the potential to transform clinical practice in multiple ways including enabling low-cost serial assessment of cardiac function in the primary care and rural setting. We hypothesized that advances in computer vision could enable building a fully automated, scalable analysis pipeline for echocardiogram (echo) interpretation. Our approach entailed: 1) preprocessing; 2) convolutional neural networks (CNN) for view identification, image segmentation, and phasing of the cardiac cycle; 3) quantification of chamber volumes and left ventricular mass; 4) particle tracking to compute longitudinal strain; and 5) targeted disease detection. CNNs accurately identified views (e.g. 99% for apical 4-chamber) and segmented individual cardiac chambers. Cardiac structure measurements agreed with study report values (e.g. mean absolute deviations (MAD) of 7.7 mL/kg/m2 for left ventricular diastolic volume index, 2918 studies). We computed automated ejection fraction and longitudinal strain measurements (within 2 cohorts), which agreed with commercial software-derived values [for ejection fraction, MAD=5.3%, N=3101 studies; for strain, MAD=1.5% (n=197) and 1.6% (n=110)], and demonstrated applicability to serial monitoring of breast cancer patients for trastuzumab cardiotoxicity. Overall, we found that, compared to manual measurements, automated measurements had superior performance across seven internal consistency metrics with an average increase in the Spearman correlation coefficient of 0.05 (p=0.02). Finally, we developed disease detection algorithms for hypertrophic cardiomyopathy and cardiac amyloidosis, with C-statistics of 0.93 and 0.84, respectively. Our pipeline lays the groundwork for using automated interpretation to support point-of-care handheld cardiac ultrasound and large-scale analysis of the millions of echos archived within healthcare systems.
[ { "created": "Thu, 22 Jun 2017 14:39:49 GMT", "version": "v1" }, { "created": "Thu, 29 Jun 2017 13:21:48 GMT", "version": "v2" }, { "created": "Sat, 1 Jul 2017 00:22:08 GMT", "version": "v3" }, { "created": "Fri, 7 Jul 2017 19:56:01 GMT", "version": "v4" }, { "created": "Tue, 31 Oct 2017 04:50:32 GMT", "version": "v5" }, { "created": "Mon, 13 Nov 2017 00:36:10 GMT", "version": "v6" }, { "created": "Fri, 12 Jan 2018 17:09:23 GMT", "version": "v7" } ]
"2018-01-15T00:00:00"
[ [ "Zhang", "Jeffrey", "" ], [ "Gajjala", "Sravani", "" ], [ "Agrawal", "Pulkit", "" ], [ "Tison", "Geoffrey H.", "" ], [ "Hallock", "Laura A.", "" ], [ "Beussink-Nelson", "Lauren", "" ], [ "Fan", "Eugene", "" ], [ "Aras", "Mandar A.", "" ], [ "Jordan", "ChaRandle", "" ], [ "Fleischmann", "Kirsten E.", "" ], [ "Melisko", "Michelle", "" ], [ "Qasim", "Atif", "" ], [ "Efros", "Alexei", "" ], [ "Shah", "Sanjiv J.", "" ], [ "Bajcsy", "Ruzena", "" ], [ "Deo", "Rahul C.", "" ] ]
1new_dataset
2108.10367
Raffaele Galliera
Tobias Jacob, Raffaele Galliera, Muddasar Ali, Sikha Bagui
Marine vessel tracking using a monocular camera
12 pages, 9 figures, the paper is based on the submission for the AI Tracks at Sea challenge made by the same team taking to a 3rd place in the competition, included in DeLTA 2021 conference proceedings, published on SCITEPRESS Digital Library and available at https://www.scitepress.org/PublicationsDetail.aspx?ID=yzZS+b/VkZ4=&t=1
null
10.5220/0010516000170028
null
cs.CV cs.AI cs.LG cs.RO
http://creativecommons.org/licenses/by-sa/4.0/
In this paper, a new technique for camera calibration using only GPS data is presented. A new way of tracking objects that move on a plane in a video is achieved by using the location and size of the bounding box to estimate the distance, achieving an average prediction error of 5.55m per 100m distance from the camera. This solution can be run in real-time at the edge, achieving efficient inference in a low-powered IoT environment while also being able to track multiple different vessels.
[ { "created": "Mon, 23 Aug 2021 19:08:20 GMT", "version": "v1" } ]
"2021-08-25T00:00:00"
[ [ "Jacob", "Tobias", "" ], [ "Galliera", "Raffaele", "" ], [ "Ali", "Muddasar", "" ], [ "Bagui", "Sikha", "" ] ]
0no_new_dataset
2309.05490
Carlos Hinojosa
Santiago Rivier, Carlos Hinojosa, Silvio Giancola, Bernard Ghanem
Learning Semantic Segmentation with Query Points Supervision on Aerial Images
Paper presented at the LXCV workshop at ICCV 2023
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Semantic segmentation is crucial in remote sensing, where high-resolution satellite images are segmented into meaningful regions. Recent advancements in deep learning have significantly improved satellite image segmentation. However, most of these methods are typically trained in fully supervised settings that require high-quality pixel-level annotations, which are expensive and time-consuming to obtain. In this work, we present a weakly supervised learning algorithm to train semantic segmentation algorithms that only rely on query point annotations instead of full mask labels. Our proposed approach performs accurate semantic segmentation and improves efficiency by significantly reducing the cost and time required for manual annotation. Specifically, we generate superpixels and extend the query point labels into those superpixels that group similar meaningful semantics. Then, we train semantic segmentation models, supervised with images partially labeled with the superpixels pseudo-labels. We benchmark our weakly supervised training approach on an aerial image dataset and different semantic segmentation architectures, showing that we can reach competitive performance compared to fully supervised training while reducing the annotation effort.
[ { "created": "Mon, 11 Sep 2023 14:32:04 GMT", "version": "v1" } ]
"2023-09-12T00:00:00"
[ [ "Rivier", "Santiago", "" ], [ "Hinojosa", "Carlos", "" ], [ "Giancola", "Silvio", "" ], [ "Ghanem", "Bernard", "" ] ]
1new_dataset
2104.13224
Safa Otoum
Safa Otoum, Ismaeel Al Ridhawi, Hussein T. Mouftah
Preventing and Controlling Epidemics through Blockchain-Assisted AI-Enabled Networks
Accepted in IEEE Network Magazine
null
null
null
cs.CR
http://creativecommons.org/publicdomain/zero/1.0/
The COVID-19 pandemic, which spread rapidly in late 2019, has revealed that the use of computing and communication technologies provides significant aid in preventing, controlling, and combating infectious diseases. With the ongoing research in next-generation networking (NGN), the use of secure and reliable communication and networking is of utmost importance when dealing with users' health records and other sensitive information. Through the adaptation of Artificial Intelligence (AI)-enabled NGN, the shape of healthcare systems can be altered to achieve smart and secure healthcare capable of coping with epidemics that may emerge at any given moment. In this article, we envision a cooperative and distributed healthcare framework that relies on state-of-the-art computing, communication, and intelligence capabilities, namely, Federated Learning (FL), mobile edge computing (MEC), and Blockchain, to enable epidemic (or suspicious infectious disease) discovery, remote monitoring, and fast health-authority response. The introduced framework can also enable secure medical data exchange at the edge and between different health entities. Such a technique, coupled with the low latency and high bandwidth functionality of 5G and beyond networks, would enable mass surveillance, monitoring and analysis to occur at the edge. Challenges, issues, and design guidelines are also discussed in this article with highlights on some trending solutions.
[ { "created": "Sun, 25 Apr 2021 20:07:08 GMT", "version": "v1" } ]
"2021-04-28T00:00:00"
[ [ "Otoum", "Safa", "" ], [ "Ridhawi", "Ismaeel Al", "" ], [ "Mouftah", "Hussein T.", "" ] ]
0no_new_dataset
2106.14150
Mojtaba Mahdavi
Samira Hosseini, Mojtaba Mahdavi
Image content dependent semi-fragile watermarking with localized tamper detection
32 pages, 11 figures, 5 tables
null
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content-independent watermarks and block-wise independency can be considered as vulnerabilities in semi-fragile watermarking methods. In this paper to achieve the objectives of semi-fragile watermarking techniques, a method is proposed to not have the mentioned shortcomings. In the proposed method, the watermark is generated by relying on image content and a key. Furthermore, the embedding scheme causes the watermarked blocks to become dependent on each other, using a key. In the embedding phase, the image is partitioned into non-overlapping blocks. In order to detect and separate the different types of attacks more precisely, the proposed method embeds three copies of each watermark bit into LWT coefficients of each 4x4 block. In the authentication phase, by voting between the extracted bits the error maps are created; these maps indicate image authenticity and reveal the modified regions. Also, in order to automate the authentication, the images are classified into four categories using seven features. Classification accuracy in the experiments is 97.97 percent. It is noted that our experiments demonstrate that the proposed method is robust against JPEG compression and is competitive with a state-of-the-art semi-fragile watermarking method, in terms of robustness and semi-fragility.
[ { "created": "Sun, 27 Jun 2021 05:40:56 GMT", "version": "v1" } ]
"2021-06-29T00:00:00"
[ [ "Hosseini", "Samira", "" ], [ "Mahdavi", "Mojtaba", "" ] ]
0no_new_dataset
2004.14360
Peter Maynard PhD
Peter Maynard and Kieran McLaughlin
Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure
null
null
null
null
cs.CR
http://creativecommons.org/publicdomain/zero/1.0/
The hacktivist threat actor is listed in many risk decision documents. Yet their tactics and techniques often remain a mystery. We create a MITRE ATT&CK (ATT&CK) model of a well known hacktivist who goes under the pseudonym of Phineas Fisher, and map that threat to critical infrastructure. The analysis is derived from hacker manifestos, journalist reporting, and official government documentation. This analysis fills a gap in current threat models, to better define what skills and methods a determined hacker might employ. This paper also identifies seven essential mitigations which can be deployed by critical infrastructure operations and asset owners, to prevent such intrusions by hacktivists. We are in the process of contributing this threat actor into the ATT&CK knowledge base.
[ { "created": "Wed, 29 Apr 2020 17:39:15 GMT", "version": "v1" } ]
"2020-04-30T00:00:00"
[ [ "Maynard", "Peter", "" ], [ "McLaughlin", "Kieran", "" ] ]
0no_new_dataset
2210.16285
Muhammad Irfan Yousuf Dr.
Muhammad Irfan Yousuf, Izza Anwer, Tanzeela Shakir, Minahil Siddiqui, Maysoon Shahid
Multi-feature Dataset for Windows PE Malware Classification
9 Pages, 1 Figure, 5 Tables
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
This paper describes a multi-feature dataset for training machine learning classifiers for detecting malicious Windows Portable Executable (PE) files. The dataset includes four feature sets from 18,551 binary samples belonging to five malware families including Spyware, Ransomware, Downloader, Backdoor and Generic Malware. The feature sets include the list of DLLs and their functions, values of different fields of PE Header and Sections. First, we explain the data collection and creation phase and then we explain how did we label the samples in it using VirusTotal's services. Finally, we explore the dataset to describe how this dataset can benefit the researchers for static malware analysis. The dataset is made public in the hope that it will help inspire machine learning research for malware detection.
[ { "created": "Fri, 28 Oct 2022 17:23:21 GMT", "version": "v1" } ]
"2022-10-31T00:00:00"
[ [ "Yousuf", "Muhammad Irfan", "" ], [ "Anwer", "Izza", "" ], [ "Shakir", "Tanzeela", "" ], [ "Siddiqui", "Minahil", "" ], [ "Shahid", "Maysoon", "" ] ]
1new_dataset
2309.06982
Chih Wei Ling
Ali Moradi Shahmiri, Chih Wei Ling, Cheuk Ting Li
Communication-Efficient Laplace Mechanism for Differential Privacy via Random Quantization
11 pages, 3 figures, short version to be submitted at 2024 IEEE International Conference on Acoustics, Speech and Signal Processing
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose the first method that realizes the Laplace mechanism exactly (i.e., a Laplace noise is added to the data) that requires only a finite amount of communication (whereas the original Laplace mechanism requires the transmission of a real number) while guaranteeing privacy against the server and database. Our mechanism can serve as a drop-in replacement for local or centralized differential privacy applications where the Laplace mechanism is used. Our mechanism is constructed using a random quantization technique. Unlike the simple and prevalent Laplace-mechanism-then-quantize approach, the quantization in our mechanism does not result in any distortion or degradation of utility. Unlike existing dithered quantization and channel simulation schemes for simulating additive Laplacian noise, our mechanism guarantees privacy not only against the database and downstream, but also against the honest but curious server which attempts to decode the data using the dither signals.
[ { "created": "Wed, 13 Sep 2023 14:17:54 GMT", "version": "v1" } ]
"2023-09-14T00:00:00"
[ [ "Shahmiri", "Ali Moradi", "" ], [ "Ling", "Chih Wei", "" ], [ "Li", "Cheuk Ting", "" ] ]
0no_new_dataset
2009.10036
Erico Lopes
Erico S. P. Lopes and Lukas T. N. Landau
Iterative Detection and Decoding for Multiuser MIMO Systems with Low Resolution Precoding and PSK Modulation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-resolution precoding techniques have gained considerable attention in the wireless communications area recently. Vital but hardly discussed in literature, discrete precoding in conjunction with channel coding is the subject of this study. Unlike prior studies, we propose three different soft detection methods and an iterative detection and decoding scheme that allow the utilization of channel coding in conjunction with low-resolution precoding. Besides an exact approach for computing the extrinsic information, we propose two approximations with reduced computational complexity. Numerical results based on PSK modulation and an LDPC block code indicate a superior performance as compared to the system design based on the common AWGN channel model in terms of bit-error-rate.
[ { "created": "Mon, 21 Sep 2020 17:16:34 GMT", "version": "v1" }, { "created": "Tue, 24 Nov 2020 14:26:11 GMT", "version": "v2" }, { "created": "Tue, 29 Dec 2020 21:16:23 GMT", "version": "v3" }, { "created": "Fri, 15 Jan 2021 18:43:36 GMT", "version": "v4" }, { "created": "Wed, 19 May 2021 23:12:02 GMT", "version": "v5" } ]
"2021-05-21T00:00:00"
[ [ "Lopes", "Erico S. P.", "" ], [ "Landau", "Lukas T. N.", "" ] ]
0no_new_dataset
1711.01287
Niek Tax
Niek Tax, Natalia Sidorova, Wil M. P. van der Aalst
Discovering More Precise Process Models from Event Logs by Filtering Out Chaotic Activities
null
Journal of Intelligent Information Systems, (2018), 1-33
10.1007/s10844-018-0507-6
null
cs.DB cs.AI cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Process Discovery is concerned with the automatic generation of a process model that describes a business process from execution data of that business process. Real life event logs can contain chaotic activities. These activities are independent of the state of the process and can, therefore, happen at rather arbitrary points in time. We show that the presence of such chaotic activities in an event log heavily impacts the quality of the process models that can be discovered with process discovery techniques. The current modus operandi for filtering activities from event logs is to simply filter out infrequent activities. We show that frequency-based filtering of activities does not solve the problems that are caused by chaotic activities. Moreover, we propose a novel technique to filter out chaotic activities from event logs. We evaluate this technique on a collection of seventeen real-life event logs that originate from both the business process management domain and the smart home environment domain. As demonstrated, the developed activity filtering methods enable the discovery of process models that are more behaviorally specific compared to process models that are discovered using standard frequency-based filtering.
[ { "created": "Fri, 3 Nov 2017 18:13:36 GMT", "version": "v1" } ]
"2018-05-07T00:00:00"
[ [ "Tax", "Niek", "" ], [ "Sidorova", "Natalia", "" ], [ "van der Aalst", "Wil M. P.", "" ] ]
0no_new_dataset
1504.07518
Mona Rahn
Mona Rahn, Guido Sch\"afer
Efficient Equilibria in Polymatrix Coordination Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider polymatrix coordination games with individual preferences where every player corresponds to a node in a graph who plays with each neighbor a separate bimatrix game with non-negative symmetric payoffs. In this paper, we study $\alpha$-approximate $k$-equilibria of these games, i.e., outcomes where no group of at most $k$ players can deviate such that each member increases his payoff by at least a factor $\alpha$. We prove that for $\alpha \ge 2$ these games have the finite coalitional improvement property (and thus $\alpha$-approximate $k$-equilibria exist), while for $\alpha < 2$ this property does not hold. Further, we derive an almost tight bound of $2\alpha(n-1)/(k-1)$ on the price of anarchy, where $n$ is the number of players; in particular, it scales from unbounded for pure Nash equilibria ($k = 1)$ to $2\alpha$ for strong equilibria ($k = n$). We also settle the complexity of several problems related to the verification and existence of these equilibria. Finally, we investigate natural means to reduce the inefficiency of Nash equilibria. Most promisingly, we show that by fixing the strategies of $k$ players the price of anarchy can be reduced to $n/k$ (and this bound is tight).
[ { "created": "Tue, 28 Apr 2015 15:03:30 GMT", "version": "v1" } ]
"2015-04-29T00:00:00"
[ [ "Rahn", "Mona", "" ], [ "Schäfer", "Guido", "" ] ]
0no_new_dataset
2205.15592
Yurui Ming
Yurui Ming, Cuihuan Du, and Chin-Teng Lin
Semantic Autoencoder and Its Potential Usage for Adversarial Attack
null
null
null
null
cs.LG cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Autoencoder can give rise to an appropriate latent representation of the input data, however, the representation which is solely based on the intrinsic property of the input data, is usually inferior to express some semantic information. A typical case is the potential incapability of forming a clear boundary upon clustering of these representations. By encoding the latent representation that not only depends on the content of the input data, but also the semantic of the input data, such as label information, we propose an enhanced autoencoder architecture named semantic autoencoder. Experiments of representation distribution via t-SNE shows a clear distinction between these two types of encoders and confirm the supremacy of the semantic one, whilst the decoded samples of these two types of autoencoders exhibit faint dissimilarity either objectively or subjectively. Based on this observation, we consider adversarial attacks to learning algorithms that rely on the latent representation obtained via autoencoders. It turns out that latent contents of adversarial samples constructed from semantic encoder with deliberate wrong label information exhibit different distribution compared with that of the original input data, while both of these samples manifest very marginal difference. This new way of attack set up by our work is worthy of attention due to the necessity to secure the widespread deep learning applications.
[ { "created": "Tue, 31 May 2022 08:10:07 GMT", "version": "v1" } ]
"2022-06-01T00:00:00"
[ [ "Ming", "Yurui", "" ], [ "Du", "Cuihuan", "" ], [ "Lin", "Chin-Teng", "" ] ]
0no_new_dataset
2112.05997
Souvik Sur
Souvik Sur
Two Sequential Squaring Verifiable Delay Function
The proofs are insufficient
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Verifiable Delay Function (VDF) is a function that takes a specified sequential time to be evaluated, but can be efficiently verified. VDFs are useful in several applications ranging from randomness beacons to sustainable blockchains but are really rare in practice. Most of the VDFs are based on algebraic assumptions like time-lock puzzle in unknown group orders [6, 8] and isogenies over pairing groups [4]. The number of modulo squaring required for verification in the time-lock puzzle based VDFs are proportional to their security parameter. This paper proposes a verifiable delay function that requires only 2- modulo squaring for verification. So the sequential effort required for verification is independent of the security parameter.
[ { "created": "Sat, 11 Dec 2021 14:40:19 GMT", "version": "v1" }, { "created": "Sat, 5 Feb 2022 12:10:42 GMT", "version": "v2" }, { "created": "Mon, 21 Feb 2022 14:38:16 GMT", "version": "v3" }, { "created": "Sat, 9 Dec 2023 14:46:24 GMT", "version": "v4" }, { "created": "Tue, 19 Dec 2023 15:41:44 GMT", "version": "v5" }, { "created": "Sun, 24 Dec 2023 15:15:14 GMT", "version": "v6" } ]
"2023-12-27T00:00:00"
[ [ "Sur", "Souvik", "" ] ]
0no_new_dataset
2406.12284
Brett Daley
Brett Daley, Marlos C. Machado, Martha White
Demystifying the Recency Heuristic in Temporal-Difference Learning
RLC 2024. 18 pages, 8 figures, 1 table
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
The recency heuristic in reinforcement learning is the assumption that stimuli that occurred closer in time to an acquired reward should be more heavily reinforced. The recency heuristic is one of the key assumptions made by TD($\lambda$), which reinforces recent experiences according to an exponentially decaying weighting. In fact, all other widely used return estimators for TD learning, such as $n$-step returns, satisfy a weaker (i.e., non-monotonic) recency heuristic. Why is the recency heuristic effective for temporal credit assignment? What happens when credit is assigned in a way that violates this heuristic? In this paper, we analyze the specific mathematical implications of adopting the recency heuristic in TD learning. We prove that any return estimator satisfying this heuristic: 1) is guaranteed to converge to the correct value function, 2) has a relatively fast contraction rate, and 3) has a long window of effective credit assignment, yet bounded worst-case variance. We also give a counterexample where on-policy, tabular TD methods violating the recency heuristic diverge. Our results offer some of the first theoretical evidence that credit assignment based on the recency heuristic facilitates learning.
[ { "created": "Tue, 18 Jun 2024 05:23:29 GMT", "version": "v1" } ]
"2024-06-19T00:00:00"
[ [ "Daley", "Brett", "" ], [ "Machado", "Marlos C.", "" ], [ "White", "Martha", "" ] ]
0no_new_dataset
1906.05912
Steven Squires
Steven Squires, Adam Pr\"ugel Bennett, Mahesan Niranjan
A Variational Autoencoder for Probabilistic Non-Negative Matrix Factorisation
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce and demonstrate the variational autoencoder (VAE) for probabilistic non-negative matrix factorisation (PAE-NMF). We design a network which can perform non-negative matrix factorisation (NMF) and add in aspects of a VAE to make the coefficients of the latent space probabilistic. By restricting the weights in the final layer of the network to be non-negative and using the non-negative Weibull distribution we produce a probabilistic form of NMF which allows us to generate new data and find a probability distribution that effectively links the latent and input variables. We demonstrate the effectiveness of PAE-NMF on three heterogeneous datasets: images, financial time series and genomic.
[ { "created": "Thu, 13 Jun 2019 20:05:15 GMT", "version": "v1" } ]
"2019-06-17T00:00:00"
[ [ "Squires", "Steven", "" ], [ "Bennett", "Adam Prügel", "" ], [ "Niranjan", "Mahesan", "" ] ]
0no_new_dataset
1308.3320
V. B. Singh Dr.
Sujata Khatri, R.S. Chhillar, V.B.Singh
Improving the Testability of Object-oriented Software during Testing and Debugging Processes
12; 2011
null
null
null
cs.SE
http://creativecommons.org/licenses/publicdomain/
Testability is the probability whether tests will detect a fault, given that a fault in the program exists. How efficiently the faults will be uncovered depends upon the testability of the software. Various researchers have proposed qualitative and quantitative techniques to improve and measure the testability of software. In literature, a plethora of reliability growth models have been used to assess and measure the quantitative quality assessment of software during testing and operational phase. The knowledge about failure distribution and their complexity can improve the testability of software. Testing effort allocation can be made easy by knowing the failure distribution and complexity of faults, and this will ease the process of revealing faults from the software. As a result, the testability of the software will be improved. The parameters of the model along with the proportion of faults of different complexity to be removed from the software have been presented in the paper .We have used failure data of two object oriented software developed under open source environment namely MySQL for python and Squirrel SQL Client for estimation purpose
[ { "created": "Thu, 15 Aug 2013 06:56:26 GMT", "version": "v1" } ]
"2013-08-16T00:00:00"
[ [ "Khatri", "Sujata", "" ], [ "Chhillar", "R. S.", "" ], [ "Singh", "V. B.", "" ] ]
1new_dataset
2102.09398
Anqing Jiang
Anqing Jiang, Liangyao Chen, Osamu Yoshie
A Reinforcement learning method for Optical Thin-Film Design
null
null
null
null
cs.LG eess.IV physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine learning, especially deep learning, is dramatically changing the methods associated with optical thin-film inverse design. The vast majority of this research has focused on the parameter optimization (layer thickness, and structure size) of optical thin-films. A challenging problem that arises is an automated material search. In this work, we propose a new end-to-end algorithm for optical thin-film inverse design. This method combines the ability of unsupervised learning, reinforcement learning(RL) and includes a genetic algorithm to design an optical thin-film without any human intervention. Furthermore, with several concrete examples, we have shown how one can use this technique to optimize the spectra of a multi-layer solar absorber device.
[ { "created": "Sat, 13 Feb 2021 07:42:15 GMT", "version": "v1" } ]
"2021-02-19T00:00:00"
[ [ "Jiang", "Anqing", "" ], [ "Chen", "Liangyao", "" ], [ "Yoshie", "Osamu", "" ] ]
0no_new_dataset
2210.07011
Jianpeng Chen
Jianpeng Chen, Yawen Ling, Jie Xu, Yazhou Ren, Shudong Huang, Xiaorong Pu, Zhifeng Hao, Philip S. Yu, Lifang He
Variational Graph Generator for Multi-View Graph Clustering
submitted to TNNLS
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Multi-view graph clustering (MGC) methods are increasingly being studied due to the explosion of multi-view data with graph structural information. The critical point of MGC is to better utilize the view-specific and view-common information in features and graphs of multiple views. However, existing works have an inherent limitation that they are unable to concurrently utilize the consensus graph information across multiple graphs and the view-specific feature information. To address this issue, we propose Variational Graph Generator for Multi-View Graph Clustering (VGMGC). Specifically, a novel variational graph generator is proposed to extract common information among multiple graphs. This generator infers a reliable variational consensus graph based on a priori assumption over multiple graphs. Then a simple yet effective graph encoder in conjunction with the multi-view clustering objective is presented to learn the desired graph embeddings for clustering, which embeds the inferred view-common graph and view-specific graphs together with features. Finally, theoretical results illustrate the rationality of VGMGC by analyzing the uncertainty of the inferred consensus graph with information bottleneck principle. Extensive experiments demonstrate the superior performance of our VGMGC over SOTAs.
[ { "created": "Thu, 13 Oct 2022 13:19:51 GMT", "version": "v1" }, { "created": "Fri, 16 Dec 2022 14:59:17 GMT", "version": "v2" } ]
"2022-12-19T00:00:00"
[ [ "Chen", "Jianpeng", "" ], [ "Ling", "Yawen", "" ], [ "Xu", "Jie", "" ], [ "Ren", "Yazhou", "" ], [ "Huang", "Shudong", "" ], [ "Pu", "Xiaorong", "" ], [ "Hao", "Zhifeng", "" ], [ "Yu", "Philip S.", "" ], [ "He", "Lifang", "" ] ]
0no_new_dataset
1107.2059
Gloria Serrano Sotelo
J.A. Dom\'inguez P\'erez, J.M. Mu\~noz Porras and G. Serrano Sotelo
One dimensional Convolutional Goppa Codes over the projective line
null
null
null
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a general method to construct MDS one-dimensional convolutional codes. Our method generalizes previous constructions of H. Gluesing-Luerssen and B. Langfeld. Moreover we give a classification of one-dimensional Convolutional Goppa Codes and propose a characterization of MDS codes of this type.
[ { "created": "Mon, 11 Jul 2011 15:36:34 GMT", "version": "v1" } ]
"2011-07-12T00:00:00"
[ [ "Pérez", "J. A. Domínguez", "" ], [ "Porras", "J. M. Muñoz", "" ], [ "Sotelo", "G. Serrano", "" ] ]
0no_new_dataset
2111.00063
Zheng Chen
Zheng Chen, Zhengming Ding, David Crandall, Lantao Liu
Polyline Generative Navigable Space Segmentation for Autonomous Visual Navigation
null
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting navigable space is a fundamental capability for mobile robots navigating in unknown or unmapped environments. In this work, we treat visual navigable space segmentation as a scene decomposition problem and propose Polyline Segmentation Variational autoencoder Network (PSV-Net), a representation learning-based framework for learning the navigable space segmentation in a self-supervised manner. Current segmentation techniques heavily rely on fully-supervised learning strategies which demand a large amount of pixel-level annotated images. In this work, we propose a framework leveraging a Variational AutoEncoder (VAE) and an AutoEncoder (AE) to learn a polyline representation that compactly outlines the desired navigable space boundary. Through extensive experiments, we validate that the proposed PSV-Net can learn the visual navigable space with no or few labels, producing an accuracy comparable to fully-supervised state-of-the-art methods that use all available labels. In addition, we show that integrating the proposed navigable space segmentation model with a visual planner can achieve efficient mapless navigation in real environments.
[ { "created": "Fri, 29 Oct 2021 19:50:48 GMT", "version": "v1" }, { "created": "Sun, 5 Mar 2023 18:08:42 GMT", "version": "v2" } ]
"2023-03-07T00:00:00"
[ [ "Chen", "Zheng", "" ], [ "Ding", "Zhengming", "" ], [ "Crandall", "David", "" ], [ "Liu", "Lantao", "" ] ]
0no_new_dataset
2011.10475
Jong Chul Ye
Eunju Cha, Chanseok Lee, Mooseok Jang, and Jong Chul Ye
DeepPhaseCut: Deep Relaxation in Phase for Unsupervised Fourier Phase Retrieval
null
null
null
null
cs.CV cs.LG eess.IV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fourier phase retrieval is a classical problem of restoring a signal only from the measured magnitude of its Fourier transform. Although Fienup-type algorithms, which use prior knowledge in both spatial and Fourier domains, have been widely used in practice, they can often stall in local minima. Modern methods such as PhaseLift and PhaseCut may offer performance guarantees with the help of convex relaxation. However, these algorithms are usually computationally intensive for practical use. To address this problem, we propose a novel, unsupervised, feed-forward neural network for Fourier phase retrieval which enables immediate high quality reconstruction. Unlike the existing deep learning approaches that use a neural network as a regularization term or an end-to-end blackbox model for supervised training, our algorithm is a feed-forward neural network implementation of PhaseCut algorithm in an unsupervised learning framework. Specifically, our network is composed of two generators: one for the phase estimation using PhaseCut loss, followed by another generator for image reconstruction, all of which are trained simultaneously using a cycleGAN framework without matched data. The link to the classical Fienup-type algorithms and the recent symmetry-breaking learning approach is also revealed. Extensive experiments demonstrate that the proposed method outperforms all existing approaches in Fourier phase retrieval problems.
[ { "created": "Fri, 20 Nov 2020 16:10:08 GMT", "version": "v1" } ]
"2020-11-23T00:00:00"
[ [ "Cha", "Eunju", "" ], [ "Lee", "Chanseok", "" ], [ "Jang", "Mooseok", "" ], [ "Ye", "Jong Chul", "" ] ]
0no_new_dataset
1308.6401
Karim Hammoudi KH
Karim Hammoudi, Fadi Dornaika, Bahman Soheilian, Bruno Vallet, John McDonald, Nicolas Paparoditis
A Synergistic Approach for Recovering Occlusion-Free Textured 3D Maps of Urban Facades from Heterogeneous Cartographic Data
null
International Journal of Advanced Robotic Systems, vol. 10, 10p., 2013
10.5772/56570
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
In this paper we present a practical approach for generating an occlusion-free textured 3D map of urban facades by the synergistic use of terrestrial images, 3D point clouds and area-based information. Particularly in dense urban environments, the high presence of urban objects in front of the facades causes significant difficulties for several stages in computational building modeling. Major challenges lie on the one hand in extracting complete 3D facade quadrilateral delimitations and on the other hand in generating occlusion-free facade textures. For these reasons, we describe a straightforward approach for completing and recovering facade geometry and textures by exploiting the data complementarity of terrestrial multi-source imagery and area-based information.
[ { "created": "Thu, 29 Aug 2013 08:47:09 GMT", "version": "v1" } ]
"2013-08-30T00:00:00"
[ [ "Hammoudi", "Karim", "" ], [ "Dornaika", "Fadi", "" ], [ "Soheilian", "Bahman", "" ], [ "Vallet", "Bruno", "" ], [ "McDonald", "John", "" ], [ "Paparoditis", "Nicolas", "" ] ]
0no_new_dataset
1405.4013
Anurag Bhardwaj
Anurag Bhardwaj, Vignesh Jagadeesh, Wei Di, Robinson Piramuthu, Elizabeth Churchill
Enhancing Visual Fashion Recommendations with Users in the Loop
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a completely automated large scale visual recommendation system for fashion. Existing approaches have primarily relied on purely computational models to solving this problem that ignore the role of users in the system. In this paper, we propose to overcome this limitation by incorporating a user-centric design of visual fashion recommendations. Specifically, we propose a technique that augments 'user preferences' in models by exploiting elasticity in fashion choices. We further design a user study on these choices and gather results from the 'wisdom of crowd' for deeper analysis. Our key insights learnt through these results suggest that fashion preferences when constrained to a particular class, contain important behavioral signals that are often ignored in recommendation design. Further, presence of such classes also reflect strong correlations to visual perception which can be utilized to provide aesthetically pleasing user experiences. Finally, we illustrate that user approval of visual fashion recommendations can be substantially improved by carefully incorporating these user-centric feedback into the system framework.
[ { "created": "Thu, 15 May 2014 20:58:17 GMT", "version": "v1" } ]
"2014-05-19T00:00:00"
[ [ "Bhardwaj", "Anurag", "" ], [ "Jagadeesh", "Vignesh", "" ], [ "Di", "Wei", "" ], [ "Piramuthu", "Robinson", "" ], [ "Churchill", "Elizabeth", "" ] ]
0no_new_dataset
2012.09650
St\'ephane Clinchant
Thibault Formal, Benjamin Piwowarski and St\'ephane Clinchant
A White Box Analysis of ColBERT
to appear in ECIR'21
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transformer-based models are nowadays state-of-the-art in ad-hoc Information Retrieval, but their behavior is far from being understood. Recent work has claimed that BERT does not satisfy the classical IR axioms. However, we propose to dissect the matching process of ColBERT, through the analysis of term importance and exact/soft matching patterns. Even if the traditional axioms are not formally verified, our analysis reveals that ColBERT: (i) is able to capture a notion of term importance; (ii) relies on exact matches for important terms.
[ { "created": "Thu, 17 Dec 2020 14:59:01 GMT", "version": "v1" } ]
"2020-12-18T00:00:00"
[ [ "Formal", "Thibault", "" ], [ "Piwowarski", "Benjamin", "" ], [ "Clinchant", "Stéphane", "" ] ]
0no_new_dataset
2312.02514
Ke Lin
Ke Lin
Skipping Scheme for Gate-hiding Garbled Circuits
20 pages, 8 figures
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
In classic settings of garbled circuits, each gate type is leaked to improve both space and speed optimization. Zahur et al. have shown in EUROCRYPT 2015 that a typical linear garbling scheme requires at least two $\lambda$-bit elements per gate with a security parameter of $\lambda$, which limits their efficiency. In contrast to typical garbled circuits, gate-hiding garbled circuits have the potential to drastically reduce time costs, although they have been underappreciated. We propose the first skipping scheme for gate-hiding garbled circuits to enhance the efficiency of evaluation by observing prime implicants. Our scheme introduces skip gates to eliminate the need to calculate the entire circuit, enabling unnecessary execution paths to be avoided. We also introduce two variants of our scheme that balance security with parallelism. A proof of hybrid security that combines simulation-based and symmetry-based security in semi-honest scenarios is presented to demonstrate its security under gate-hiding conditions. Our scheme will inspire new directions to improve the general garbling scheme and lead to more practical ones.
[ { "created": "Tue, 5 Dec 2023 05:38:09 GMT", "version": "v1" } ]
"2023-12-06T00:00:00"
[ [ "Lin", "Ke", "" ] ]
0no_new_dataset
1705.05902
Benjamin Kunsberg
Daniel Niels Holtmann-Rice, Benjamin S. Kunsberg, Steven W. Zucker
Tensors, Differential Geometry and Statistical Shading Analysis
arXiv admin note: substantial text overlap with arXiv:1705.05885
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a linear algebraic framework for the shape-from-shading problem, because tensors arise when scalar (e.g. image) and vector (e.g. surface normal) fields are differentiated multiple times. Using this framework, we first investigate when image derivatives exhibit invariance to changing illumination by calculating the statistics of image derivatives under general distributions on the light source. Second, we apply that framework to develop Taylor-like expansions, and build a boot-strapping algorithm to find the polynomial surface solutions (under any light source) consistent with a given patch to arbitrary order. A generic constraint on the light source restricts these solutions to a 2-D subspace, plus an unknown rotation matrix. It is this unknown matrix that encapsulates the ambiguity in the problem. Finally, we use the framework to computationally validate the hypothesis that image orientations (derivatives) provide increased invariance to illumination by showing (for a Lambertian model) that a shape-from-shading algorithm matching gradients instead of intensities provides more accurate reconstructions when illumination is incorrectly estimated under a flatness prior.
[ { "created": "Tue, 16 May 2017 20:25:21 GMT", "version": "v1" }, { "created": "Fri, 27 Jul 2018 15:23:02 GMT", "version": "v2" } ]
"2018-08-07T00:00:00"
[ [ "Holtmann-Rice", "Daniel Niels", "" ], [ "Kunsberg", "Benjamin S.", "" ], [ "Zucker", "Steven W.", "" ] ]
0no_new_dataset
1204.2358
Meng Yang
Lei Zhang, Meng Yang, Xiangchu Feng, Yi Ma, and David Zhang
Collaborative Representation based Classification for Face Recognition
It is a substantial revision of a previous conference paper (L. Zhang, M. Yang, et al. "Sparse Representation or Collaborative Representation: Which Helps Face Recognition?" in ICCV 2011)
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
By coding a query sample as a sparse linear combination of all training samples and then classifying it by evaluating which class leads to the minimal coding residual, sparse representation based classification (SRC) leads to interesting results for robust face recognition. It is widely believed that the l1- norm sparsity constraint on coding coefficients plays a key role in the success of SRC, while its use of all training samples to collaboratively represent the query sample is rather ignored. In this paper we discuss how SRC works, and show that the collaborative representation mechanism used in SRC is much more crucial to its success of face classification. The SRC is a special case of collaborative representation based classification (CRC), which has various instantiations by applying different norms to the coding residual and coding coefficient. More specifically, the l1 or l2 norm characterization of coding residual is related to the robustness of CRC to outlier facial pixels, while the l1 or l2 norm characterization of coding coefficient is related to the degree of discrimination of facial features. Extensive experiments were conducted to verify the face recognition accuracy and efficiency of CRC with different instantiations.
[ { "created": "Wed, 11 Apr 2012 07:13:20 GMT", "version": "v1" }, { "created": "Mon, 10 Mar 2014 09:42:43 GMT", "version": "v2" } ]
"2014-03-11T00:00:00"
[ [ "Zhang", "Lei", "" ], [ "Yang", "Meng", "" ], [ "Feng", "Xiangchu", "" ], [ "Ma", "Yi", "" ], [ "Zhang", "David", "" ] ]
0no_new_dataset
1803.07204
Felix Stahlberg
Felix Stahlberg, Danielle Saunders, Gonzalo Iglesias, Bill Byrne
Why not be Versatile? Applications of the SGNMT Decoder for Machine Translation
Presented at AMTA 2018
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SGNMT is a decoding platform for machine translation which allows paring various modern neural models of translation with different kinds of constraints and symbolic models. In this paper, we describe three use cases in which SGNMT is currently playing an active role: (1) teaching as SGNMT is being used for course work and student theses in the MPhil in Machine Learning, Speech and Language Technology at the University of Cambridge, (2) research as most of the research work of the Cambridge MT group is based on SGNMT, and (3) technology transfer as we show how SGNMT is helping to transfer research findings from the laboratory to the industry, eg. into a product of SDL plc.
[ { "created": "Tue, 20 Mar 2018 00:44:18 GMT", "version": "v1" } ]
"2018-03-21T00:00:00"
[ [ "Stahlberg", "Felix", "" ], [ "Saunders", "Danielle", "" ], [ "Iglesias", "Gonzalo", "" ], [ "Byrne", "Bill", "" ] ]
0no_new_dataset
2305.08518
Derguene Mbaye
Derguene Mbaye, Moussa Diallo
Beqi: Revitalize the Senegalese Wolof Language with a Robust Spelling Corrector
17 pages, 7 figures, 5 tables
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The progress of Natural Language Processing (NLP), although fast in recent years, is not at the same pace for all languages. African languages in particular are still behind and lack automatic processing tools. Some of these tools are very important for the development of these languages but also have an important role in many NLP applications. This is particularly the case for automatic spell checkers. Several approaches have been studied to address this task and the one modeling spelling correction as a translation task from misspelled (noisy) text to well-spelled (correct) text shows promising results. However, this approach requires a parallel corpus of noisy data on the one hand and correct data on the other hand, whereas Wolof is a low-resource language and does not have such a corpus. In this paper, we present a way to address the constraint related to the lack of data by generating synthetic data and we present sequence-to-sequence models using Deep Learning for spelling correction in Wolof. We evaluated these models in three different scenarios depending on the subwording method applied to the data and showed that the latter had a significant impact on the performance of the models, which opens the way for future research in Wolof spelling correction.
[ { "created": "Mon, 15 May 2023 10:28:36 GMT", "version": "v1" } ]
"2023-05-16T00:00:00"
[ [ "Mbaye", "Derguene", "" ], [ "Diallo", "Moussa", "" ] ]
0no_new_dataset
2401.17268
Wangchunshu Zhou
Tiannan Wang, Jiamin Chen, Qingrui Jia, Shuai Wang, Ruoyu Fang, Huilin Wang, Zhaowei Gao, Chunzhao Xie, Chuou Xu, Jihong Dai, Yibin Liu, Jialong Wu, Shengwei Ding, Long Li, Zhiwei Huang, Xinle Deng, Teng Yu, Gangan Ma, Han Xiao, Zixin Chen, Danjun Xiang, Yunxia Wang, Yuanyuan Zhu, Yi Xiao, Jing Wang, Yiru Wang, Siran Ding, Jiayang Huang, Jiayi Xu, Yilihamu Tayier, Zhenyu Hu, Yuan Gao, Chengfeng Zheng, Yueshu Ye, Yihang Li, Lei Wan, Xinyue Jiang, Yujie Wang, Siyu Cheng, Zhule Song, Xiangru Tang, Xiaohua Xu, Ningyu Zhang, Huajun Chen, Yuchen Eleanor Jiang, and Wangchunshu Zhou
Weaver: Foundation Models for Creative Writing
null
null
null
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
This work introduces Weaver, our first family of large language models (LLMs) dedicated to content creation. Weaver is pre-trained on a carefully selected corpus that focuses on improving the writing capabilities of large language models. We then fine-tune Weaver for creative and professional writing purposes and align it to the preference of professional writers using a suit of novel methods for instruction data synthesis and LLM alignment, making it able to produce more human-like texts and follow more diverse instructions for content creation. The Weaver family consists of models of Weaver Mini (1.8B), Weaver Base (6B), Weaver Pro (14B), and Weaver Ultra (34B) sizes, suitable for different applications and can be dynamically dispatched by a routing agent according to query complexity to balance response quality and computation cost. Evaluation on a carefully curated benchmark for assessing the writing capabilities of LLMs shows Weaver models of all sizes outperform generalist LLMs several times larger than them. Notably, our most-capable Weaver Ultra model surpasses GPT-4, a state-of-the-art generalist LLM, on various writing scenarios, demonstrating the advantage of training specialized LLMs for writing purposes. Moreover, Weaver natively supports retrieval-augmented generation (RAG) and function calling (tool usage). We present various use cases of these abilities for improving AI-assisted writing systems, including integration of external knowledge bases, tools, or APIs, and providing personalized writing assistance. Furthermore, we discuss and summarize a guideline and best practices for pre-training and fine-tuning domain-specific LLMs.
[ { "created": "Tue, 30 Jan 2024 18:58:43 GMT", "version": "v1" } ]
"2024-01-31T00:00:00"
[ [ "Wang", "Tiannan", "" ], [ "Chen", "Jiamin", "" ], [ "Jia", "Qingrui", "" ], [ "Wang", "Shuai", "" ], [ "Fang", "Ruoyu", "" ], [ "Wang", "Huilin", "" ], [ "Gao", "Zhaowei", "" ], [ "Xie", "Chunzhao", "" ], [ "Xu", "Chuou", "" ], [ "Dai", "Jihong", "" ], [ "Liu", "Yibin", "" ], [ "Wu", "Jialong", "" ], [ "Ding", "Shengwei", "" ], [ "Li", "Long", "" ], [ "Huang", "Zhiwei", "" ], [ "Deng", "Xinle", "" ], [ "Yu", "Teng", "" ], [ "Ma", "Gangan", "" ], [ "Xiao", "Han", "" ], [ "Chen", "Zixin", "" ], [ "Xiang", "Danjun", "" ], [ "Wang", "Yunxia", "" ], [ "Zhu", "Yuanyuan", "" ], [ "Xiao", "Yi", "" ], [ "Wang", "Jing", "" ], [ "Wang", "Yiru", "" ], [ "Ding", "Siran", "" ], [ "Huang", "Jiayang", "" ], [ "Xu", "Jiayi", "" ], [ "Tayier", "Yilihamu", "" ], [ "Hu", "Zhenyu", "" ], [ "Gao", "Yuan", "" ], [ "Zheng", "Chengfeng", "" ], [ "Ye", "Yueshu", "" ], [ "Li", "Yihang", "" ], [ "Wan", "Lei", "" ], [ "Jiang", "Xinyue", "" ], [ "Wang", "Yujie", "" ], [ "Cheng", "Siyu", "" ], [ "Song", "Zhule", "" ], [ "Tang", "Xiangru", "" ], [ "Xu", "Xiaohua", "" ], [ "Zhang", "Ningyu", "" ], [ "Chen", "Huajun", "" ], [ "Jiang", "Yuchen Eleanor", "" ], [ "Zhou", "Wangchunshu", "" ] ]
1new_dataset
1306.6054
Vijay Ganesh
Vijay Ganesh, Mia Minnes, Armando Solar-Lezama, Martin Rinard
(Un)Decidability Results for Word Equations with Length and Regular Expression Constraints
Invited Paper at ADDCT Workshop 2013 (co-located with CADE 2013)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove several decidability and undecidability results for the satisfiability and validity problems for languages that can express solutions to word equations with length constraints. The atomic formulas over this language are equality over string terms (word equations), linear inequality over the length function (length constraints), and membership in regular sets. These questions are important in logic, program analysis, and formal verification. Variants of these questions have been studied for many decades by mathematicians. More recently, practical satisfiability procedures (aka SMT solvers) for these formulas have become increasingly important in the context of security analysis for string-manipulating programs such as web applications. We prove three main theorems. First, we give a new proof of undecidability for the validity problem for the set of sentences written as a forall-exists quantifier alternation applied to positive word equations. A corollary of this undecidability result is that this set is undecidable even with sentences with at most two occurrences of a string variable. Second, we consider Boolean combinations of quantifier-free formulas constructed out of word equations and length constraints. We show that if word equations can be converted to a solved form, a form relevant in practice, then the satisfiability problem for Boolean combinations of word equations and length constraints is decidable. Third, we show that the satisfiability problem for quantifier-free formulas over word equations in regular solved form, length constraints, and the membership predicate over regular expressions is also decidable.
[ { "created": "Tue, 25 Jun 2013 18:25:28 GMT", "version": "v1" } ]
"2013-06-26T00:00:00"
[ [ "Ganesh", "Vijay", "" ], [ "Minnes", "Mia", "" ], [ "Solar-Lezama", "Armando", "" ], [ "Rinard", "Martin", "" ] ]
0no_new_dataset
1601.01348
Akshay Kumar
Akshay Kumar, Ahmed Abdelhadi, Charles Clancy
An Online Delay Efficient Packet Scheduler for M2M Traffic in Industrial Automation
6 pages, 7 figures, Accepted for publication in IEEE Systems Conference 2016
null
10.1109/SYSCON.2016.7490665
null
cs.NI cs.IT cs.PF math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some Machine-to-Machine (M2M) communication links particularly those in a industrial automation plant have stringent latency requirements. In this paper, we study the delay-performance for the M2M uplink from the sensors to a Programmable Logic Controller (PLC) in a industrial automation scenario. The uplink traffic can be broadly classified as either Periodic Update (PU) and Event Driven (ED). The PU arrivals from different sensors are periodic, synchronized by the PLC and need to be processed by a prespecified firm latency deadline. On the other hand, the ED arrivals are random, have low-arrival rate, but may need to be processed quickly depending upon the criticality of the application. To accommodate these contrasting Quality-of-Service (QoS) requirements, we model the utility of PU and ED packets using step function and sigmoidal functions of latency respectively. Our goal is to maximize the overall system utility while being proportionally fair to both PU and ED data. To this end, we propose a novel online QoS-aware packet scheduler that gives priority to ED data as long as that results the latency deadline is met for PU data. However as the size of networks increases, we drop the PU packets that fail to meet latency deadline which reduces congestion and improves overall system utility. Using extensive simulations, we compare the performance of our scheme with various scheduling policies such as First-Come-First-Serve (FCFS), Earliest-Due-Date (EDD) and (preemptive) priority. We show that our scheme outperforms the existing schemes for various simulation scenarios.
[ { "created": "Wed, 6 Jan 2016 22:51:05 GMT", "version": "v1" } ]
"2016-11-15T00:00:00"
[ [ "Kumar", "Akshay", "" ], [ "Abdelhadi", "Ahmed", "" ], [ "Clancy", "Charles", "" ] ]
0no_new_dataset
2306.11346
Yu Zheng
Guangming Wang, Yu Zheng, Yanfeng Guo, Zhe Liu, Yixiang Zhu, Wolfram Burgard, and Hesheng Wang
End-to-end 2D-3D Registration between Image and LiDAR Point Cloud for Vehicle Localization
18 pages, 14 figures, under review
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robot localization using a previously built map is essential for a variety of tasks including highly accurate navigation and mobile manipulation. A popular approach to robot localization is based on image-to-point cloud registration, which combines illumination-invariant LiDAR-based mapping with economical image-based localization. However, the recent works for image-to-point cloud registration either divide the registration into separate modules or project the point cloud to the depth image to register the RGB and depth images. In this paper, we present I2PNet, a novel end-to-end 2D-3D registration network. I2PNet directly registers the raw 3D point cloud with the 2D RGB image using differential modules with a unique target. The 2D-3D cost volume module for differential 2D-3D association is proposed to bridge feature extraction and pose regression. 2D-3D cost volume module implicitly constructs the soft point-to-pixel correspondence on the intrinsic-independent normalized plane of the pinhole camera model. Moreover, we introduce an outlier mask prediction module to filter the outliers in the 2D-3D association before pose regression. Furthermore, we propose the coarse-to-fine 2D-3D registration architecture to increase localization accuracy. We conduct extensive localization experiments on the KITTI Odometry and nuScenes datasets. The results demonstrate that I2PNet outperforms the state-of-the-art by a large margin. In addition, I2PNet has a higher efficiency than the previous works and can perform the localization in real-time. Moreover, we extend the application of I2PNet to the camera-LiDAR online calibration and demonstrate that I2PNet outperforms recent approaches on the online calibration task.
[ { "created": "Tue, 20 Jun 2023 07:28:40 GMT", "version": "v1" } ]
"2023-06-21T00:00:00"
[ [ "Wang", "Guangming", "" ], [ "Zheng", "Yu", "" ], [ "Guo", "Yanfeng", "" ], [ "Liu", "Zhe", "" ], [ "Zhu", "Yixiang", "" ], [ "Burgard", "Wolfram", "" ], [ "Wang", "Hesheng", "" ] ]
0no_new_dataset
1801.09036
Wlodek Zadrozny
Wlodek Zadrozny and Luciana Garbayo
A Sheaf Model of Contradictions and Disagreements. Preliminary Report and Discussion
This paper was presented at ISAIM 2018, International Symposium on Artificial Intelligence and Mathematics. Fort Lauderdale, FL. January 3 5, 2018. Minor typographical errors have been corrected
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new formal model -- based on the mathematical construct of sheaves -- for representing contradictory information in textual sources. This model has the advantage of letting us (a) identify the causes of the inconsistency; (b) measure how strong it is; (c) and do something about it, e.g. suggest ways to reconcile inconsistent advice. This model naturally represents the distinction between contradictions and disagreements. It is based on the idea of representing natural language sentences as formulas with parameters sitting on lattices, creating partial orders based on predicates shared by theories, and building sheaves on these partial orders with products of lattices as stalks. Degrees of disagreement are measured by the existence of global and local sections. Limitations of the sheaf approach and connections to recent work in natural language processing, as well as the topics of contextuality in physics, data fusion, topological data analysis and epistemology are also discussed.
[ { "created": "Sat, 27 Jan 2018 05:13:55 GMT", "version": "v1" } ]
"2018-01-30T00:00:00"
[ [ "Zadrozny", "Wlodek", "" ], [ "Garbayo", "Luciana", "" ] ]
1new_dataset
2110.08306
Qinfeng Xiao
Qinfeng Xiao, Shikuan Shao, Jing Wang
Memory-augmented Adversarial Autoencoders for Multivariate Time-series Anomaly Detection with Deep Reconstruction and Prediction
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Detecting anomalies for multivariate time-series without manual supervision continues a challenging problem due to the increased scale of dimensions and complexity of today's IT monitoring systems. Recent progress of unsupervised time-series anomaly detection mainly use deep autoencoders to solve this problem, i.e. training on normal samples and producing significant reconstruction error on abnormal inputs. However, in practice, autoencoders can reconstruct anomalies so well, due to powerful capabilites of neural networks. Besides, these approaches can be ineffective for identifying non-point anomalies, e.g. contextual anomalies and collective anomalies, since they solely utilze a point-wise reconstruction objective. To tackle the above issues, we propose MemAAE (\textit{Memory-augmented Adversarial Autoencoders with Deep Reconstruction and Prediction}), a novel unsupervised anomaly detection method for time-series. By jointly training two complementary proxy tasks, reconstruction and prediction, with a shared network architecture, we show that detecting anomalies via multiple tasks obtains superior performance rather than single-task training. Additionally, a compressive memory module is introduced to preserve normal patterns, avoiding unexpected generalization on abnormal inputs. Through extensive experiments, MemAAE achieves an overall F1 score of 0.90 on four public datasets, significantly outperforming the best baseline by 0.02.
[ { "created": "Fri, 15 Oct 2021 18:29:05 GMT", "version": "v1" } ]
"2021-10-19T00:00:00"
[ [ "Xiao", "Qinfeng", "" ], [ "Shao", "Shikuan", "" ], [ "Wang", "Jing", "" ] ]
1new_dataset
2308.11487
Jilong Wang
Jilong Wang, Saihui Hou, Yan Huang, Chunshui Cao, Xu Liu, Yongzhen Huang, Tianzhu Zhang, Liang Wang
Free Lunch for Gait Recognition: A Novel Relation Descriptor
Add new figures and fix some typos
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Gait recognition is to seek correct matches for query individuals by their unique walking patterns. However, current methods focus solely on extracting individual-specific features, overlooking ``interpersonal" relationships. In this paper, we propose a novel $\textbf{Relation Descriptor}$ that captures not only individual features but also relations between test gaits and pre-selected gait anchors. Specifically, we reinterpret classifier weights as gait anchors and compute similarity scores between test features and these anchors, which re-expresses individual gait features into a similarity relation distribution. In essence, the relation descriptor offers a holistic perspective that leverages the collective knowledge stored within the classifier's weights, emphasizing meaningful patterns and enhancing robustness. Despite its potential, relation descriptor poses dimensionality challenges since its dimension depends on the training set's identity count. To address this, we propose Farthest gait-Anchor Selection to identify the most discriminative gait anchors and an Orthogonal Regularization Loss to increase diversity within gait anchors. Compared to individual-specific features extracted from the backbone, our relation descriptor can boost the performance nearly without any extra costs. We evaluate the effectiveness of our method on the popular GREW, Gait3D, OU-MVLP, CASIA-B, and CCPG, showing that our method consistently outperforms the baselines and achieves state-of-the-art performance.
[ { "created": "Tue, 22 Aug 2023 15:06:14 GMT", "version": "v1" }, { "created": "Mon, 28 Aug 2023 17:42:45 GMT", "version": "v2" }, { "created": "Tue, 5 Dec 2023 03:37:33 GMT", "version": "v3" } ]
"2023-12-06T00:00:00"
[ [ "Wang", "Jilong", "" ], [ "Hou", "Saihui", "" ], [ "Huang", "Yan", "" ], [ "Cao", "Chunshui", "" ], [ "Liu", "Xu", "" ], [ "Huang", "Yongzhen", "" ], [ "Zhang", "Tianzhu", "" ], [ "Wang", "Liang", "" ] ]
0no_new_dataset
0707.0459
Petar Popovski
Petar Popovski and Hiroyuki Yomo
Physical Network Coding in Two-Way Wireless Relay Channels
null
Proc. of IEEE International Conference on Communications (ICC), Glasgow, Scotland, 2007
null
null
cs.IT cs.NI math.IT
null
It has recently been recognized that the wireless networks represent a fertile ground for devising communication modes based on network coding. A particularly suitable application of the network coding arises for the two--way relay channels, where two nodes communicate with each other assisted by using a third, relay node. Such a scenario enables application of \emph{physical network coding}, where the network coding is either done (a) jointly with the channel coding or (b) through physical combining of the communication flows over the multiple access channel. In this paper we first group the existing schemes for physical network coding into two generic schemes, termed 3--step and 2--step scheme, respectively. We investigate the conditions for maximization of the two--way rate for each individual scheme: (1) the Decode--and--Forward (DF) 3--step schemes (2) three different schemes with two steps: Amplify--and--Forward (AF), JDF and Denoise--and--Forward (DNF). While the DNF scheme has a potential to offer the best two--way rate, the most interesting result of the paper is that, for some SNR configurations of the source--relay links, JDF yields identical maximal two--way rate as the upper bound on the rate for DNF.
[ { "created": "Tue, 3 Jul 2007 16:40:41 GMT", "version": "v1" } ]
"2007-07-13T00:00:00"
[ [ "Popovski", "Petar", "" ], [ "Yomo", "Hiroyuki", "" ] ]
0no_new_dataset
2306.04434
Marianne Gunderson
Marianne Gunderson
Visions of augmented reality in popular culture: Power and (un)readable identities when the world becomes a screen
null
Tidsskrift for Kjoennsforskning volume 45 2021 pages 89-104
10.18261/issn.1891-1781-2021-02-03-03
null
cs.CY cs.SI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Augmented reality, where digital objects are overlaid and combined with the ordinary visual surface, is a technology under rapid development, which has long been a part of visions of the digital future. In this article, I examine how gaze and power are coded into three pop-cultural visions of augmented reality. By analyzing representations of augmented reality in science fiction through the lens of feminist theory on performativity and intelligibility, visibility and race, gendered gaze, and algorithmic normativity, this paper provides a critical understanding of augmented reality as a visual technology, and how it might change or reinforce possible norms and power relations. In these futures where the screen no longer has any boundaries, both cooperative and reluctant bodies are inscribed with gendered and racialized digital markers. Reading visions of augmented reality through feminist theory, I argue that augmented reality technologies enter into assemblages of people, discourses, and technologies, where none of the actors necessarily has an overview. In these assemblages, augmented reality takes on a performative and norm-bearing role, by forming a grid of intelligibility that codifies identities, structures hierarchical relationships, and scripts social interactions.
[ { "created": "Wed, 7 Jun 2023 13:49:49 GMT", "version": "v1" }, { "created": "Sun, 5 May 2024 08:36:05 GMT", "version": "v2" } ]
"2024-05-07T00:00:00"
[ [ "Gunderson", "Marianne", "" ] ]
0no_new_dataset
2009.12606
Chaozheng Wu
Chaozheng Wu, Jian Chen, Qiaoyu Cao, Jianchi Zhang, Yunxin Tai, Lin Sun, Kui Jia
Grasp Proposal Networks: An End-to-End Solution for Visual Learning of Robotic Grasps
Accepted to NeurIPS 2020
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning robotic grasps from visual observations is a promising yet challenging task. Recent research shows its great potential by preparing and learning from large-scale synthetic datasets. For the popular, 6 degree-of-freedom (6-DOF) grasp setting of parallel-jaw gripper, most of existing methods take the strategy of heuristically sampling grasp candidates and then evaluating them using learned scoring functions. This strategy is limited in terms of the conflict between sampling efficiency and coverage of optimal grasps. To this end, we propose in this work a novel, end-to-end \emph{Grasp Proposal Network (GPNet)}, to predict a diverse set of 6-DOF grasps for an unseen object observed from a single and unknown camera view. GPNet builds on a key design of grasp proposal module that defines \emph{anchors of grasp centers} at discrete but regular 3D grid corners, which is flexible to support either more precise or more diverse grasp predictions. To test GPNet, we contribute a synthetic dataset of 6-DOF object grasps; evaluation is conducted using rule-based criteria, simulation test, and real test. Comparative results show the advantage of our methods over existing ones. Notably, GPNet gains better simulation results via the specified coverage, which helps achieve a ready translation in real test. We will make our dataset publicly available.
[ { "created": "Sat, 26 Sep 2020 14:14:52 GMT", "version": "v1" } ]
"2020-09-29T00:00:00"
[ [ "Wu", "Chaozheng", "" ], [ "Chen", "Jian", "" ], [ "Cao", "Qiaoyu", "" ], [ "Zhang", "Jianchi", "" ], [ "Tai", "Yunxin", "" ], [ "Sun", "Lin", "" ], [ "Jia", "Kui", "" ] ]
1new_dataset
1502.03167
Sergey Ioffe
Sergey Ioffe, Christian Szegedy
Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Training Deep Neural Networks is complicated by the fact that the distribution of each layer's inputs changes during training, as the parameters of the previous layers change. This slows down the training by requiring lower learning rates and careful parameter initialization, and makes it notoriously hard to train models with saturating nonlinearities. We refer to this phenomenon as internal covariate shift, and address the problem by normalizing layer inputs. Our method draws its strength from making normalization a part of the model architecture and performing the normalization for each training mini-batch. Batch Normalization allows us to use much higher learning rates and be less careful about initialization. It also acts as a regularizer, in some cases eliminating the need for Dropout. Applied to a state-of-the-art image classification model, Batch Normalization achieves the same accuracy with 14 times fewer training steps, and beats the original model by a significant margin. Using an ensemble of batch-normalized networks, we improve upon the best published result on ImageNet classification: reaching 4.9% top-5 validation error (and 4.8% test error), exceeding the accuracy of human raters.
[ { "created": "Wed, 11 Feb 2015 01:44:18 GMT", "version": "v1" }, { "created": "Fri, 13 Feb 2015 17:31:36 GMT", "version": "v2" }, { "created": "Mon, 2 Mar 2015 20:44:12 GMT", "version": "v3" } ]
"2015-03-03T00:00:00"
[ [ "Ioffe", "Sergey", "" ], [ "Szegedy", "Christian", "" ] ]
0no_new_dataset
2110.11519
Konstantin Shtoyk
Kostya Serebryany, Maxim Lifantsev, Konstantin Shtoyk, Doug Kwan, Peter Hochschild
SiliFuzz: Fuzzing CPUs by proxy
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
CPUs are becoming more complex with every generation, at both the logical and the physical levels. This potentially leads to more logic bugs and electrical defects in CPUs being overlooked during testing, which causes data corruption or other undesirable effects when these CPUs are used in production. These ever-present problems may also have simply become more evident as more CPUs are operated and monitored by large cloud providers. If the RTL ("source code") of a CPU were available, we could apply greybox fuzzing to the CPU model almost as we do to any other software [arXiv:2102.02308]. However our targets are general purpose x86_64 CPUs produced by third parties, where we do not have the RTL design, so in our case CPU implementations are opaque. Moreover, we are more interested in electrical defects as opposed to logic bugs. We present SiliFuzz, a work-in-progress system that finds CPU defects by fuzzing software proxies, like CPU simulators or disassemblers, and then executing the accumulated test inputs (known as the corpus) on actual CPUs on a large scale. The major difference between this work and traditional software fuzzing is that a software bug fixed once will be fixed for all installations of the software, while for CPU defects we have to test every individual core repeatedly over its lifetime due to wear and tear. In this paper we also analyze four groups of CPU defects that SiliFuzz has uncovered and describe patterns shared by other SiliFuzz findings.
[ { "created": "Tue, 5 Oct 2021 03:41:53 GMT", "version": "v1" } ]
"2021-10-25T00:00:00"
[ [ "Serebryany", "Kostya", "" ], [ "Lifantsev", "Maxim", "" ], [ "Shtoyk", "Konstantin", "" ], [ "Kwan", "Doug", "" ], [ "Hochschild", "Peter", "" ] ]
0no_new_dataset
1109.0181
J\"urgen Umbrich
J\"urgen Umbrich, Aidan Hogan and Axel Polleres
Improving the recall of decentralised linked data querying through implicit knowledge
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aside from crawling, indexing, and querying RDF data centrally, Linked Data principles allow for processing SPARQL queries on-the-fly by dereferencing URIs. Proposed link-traversal query approaches for Linked Data have the benefits of up-to-date results and decentralised (i.e., client-side) execution, but operate on incomplete knowledge available in dereferenced documents, thus affecting recall. In this paper, we investigate how implicit knowledge - specifically that found through owl:sameAs and RDFS reasoning - can improve the recall in this setting. We start with an empirical analysis of a large crawl featuring 4 m Linked Data sources and 1.1 g quadruples: we (1) measure expected recall by only considering dereferenceable information, (2) measure the improvement in recall given by considering rdfs:seeAlso links as previous proposals did. We further propose and measure the impact of additionally considering (3) owl:sameAs links, and (4) applying lightweight RDFS reasoning (specifically {\rho}DF) for finding more results, relying on static schema information. We evaluate our methods for live queries over our crawl.
[ { "created": "Thu, 1 Sep 2011 13:14:13 GMT", "version": "v1" } ]
"2015-03-19T00:00:00"
[ [ "Umbrich", "Jürgen", "" ], [ "Hogan", "Aidan", "" ], [ "Polleres", "Axel", "" ] ]
0no_new_dataset
2310.00944
Aldi Piroli
Aldi Piroli, Vinzenz Dallabetta, Johannes Kopp, Marc Walessa, Daniel Meissner, Klaus Dietmayer
Towards Robust 3D Object Detection In Rainy Conditions
Published at IEEE International Conference on Intelligent Transportation Systems ITSC 2023
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LiDAR sensors are used in autonomous driving applications to accurately perceive the environment. However, they are affected by adverse weather conditions such as snow, fog, and rain. These everyday phenomena introduce unwanted noise into the measurements, severely degrading the performance of LiDAR-based perception systems. In this work, we propose a framework for improving the robustness of LiDAR-based 3D object detectors against road spray. Our approach uses a state-of-the-art adverse weather detection network to filter out spray from the LiDAR point cloud, which is then used as input for the object detector. In this way, the detected objects are less affected by the adverse weather in the scene, resulting in a more accurate perception of the environment. In addition to adverse weather filtering, we explore the use of radar targets to further filter false positive detections. Tests on real-world data show that our approach improves the robustness to road spray of several popular 3D object detectors.
[ { "created": "Mon, 2 Oct 2023 07:34:15 GMT", "version": "v1" }, { "created": "Thu, 5 Oct 2023 06:37:23 GMT", "version": "v2" } ]
"2023-10-06T00:00:00"
[ [ "Piroli", "Aldi", "" ], [ "Dallabetta", "Vinzenz", "" ], [ "Kopp", "Johannes", "" ], [ "Walessa", "Marc", "" ], [ "Meissner", "Daniel", "" ], [ "Dietmayer", "Klaus", "" ] ]
0no_new_dataset
2405.05941
Xuanlin Li
Xuanlin Li, Kyle Hsu, Jiayuan Gu, Karl Pertsch, Oier Mees, Homer Rich Walke, Chuyuan Fu, Ishikaa Lunawat, Isabel Sieh, Sean Kirmani, Sergey Levine, Jiajun Wu, Chelsea Finn, Hao Su, Quan Vuong, Ted Xiao
Evaluating Real-World Robot Manipulation Policies in Simulation
null
null
null
null
cs.RO cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
The field of robotics has made significant advances towards generalist robot manipulation policies. However, real-world evaluation of such policies is not scalable and faces reproducibility challenges, which are likely to worsen as policies broaden the spectrum of tasks they can perform. We identify control and visual disparities between real and simulated environments as key challenges for reliable simulated evaluation and propose approaches for mitigating these gaps without needing to craft full-fidelity digital twins of real-world environments. We then employ these approaches to create SIMPLER, a collection of simulated environments for manipulation policy evaluation on common real robot setups. Through paired sim-and-real evaluations of manipulation policies, we demonstrate strong correlation between policy performance in SIMPLER environments and in the real world. Additionally, we find that SIMPLER evaluations accurately reflect real-world policy behavior modes such as sensitivity to various distribution shifts. We open-source all SIMPLER environments along with our workflow for creating new environments at https://simpler-env.github.io to facilitate research on general-purpose manipulation policies and simulated evaluation frameworks.
[ { "created": "Thu, 9 May 2024 17:30:16 GMT", "version": "v1" } ]
"2024-05-10T00:00:00"
[ [ "Li", "Xuanlin", "" ], [ "Hsu", "Kyle", "" ], [ "Gu", "Jiayuan", "" ], [ "Pertsch", "Karl", "" ], [ "Mees", "Oier", "" ], [ "Walke", "Homer Rich", "" ], [ "Fu", "Chuyuan", "" ], [ "Lunawat", "Ishikaa", "" ], [ "Sieh", "Isabel", "" ], [ "Kirmani", "Sean", "" ], [ "Levine", "Sergey", "" ], [ "Wu", "Jiajun", "" ], [ "Finn", "Chelsea", "" ], [ "Su", "Hao", "" ], [ "Vuong", "Quan", "" ], [ "Xiao", "Ted", "" ] ]
1new_dataset
1809.02792
Nicola Prezza
Travis Gagie, Gonzalo Navarro, and Nicola Prezza
Fully-Functional Suffix Trees and Optimal Text Searching in BWT-runs Bounded Space
submitted version; optimal count and locate in smaller space: O(r log log_w(n/r + sigma))
null
10.1145/3375890
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indexing highly repetitive texts - such as genomic databases, software repositories and versioned text collections - has become an important problem since the turn of the millennium. A relevant compressibility measure for repetitive texts is r, the number of runs in their Burrows-Wheeler Transforms (BWTs). One of the earliest indexes for repetitive collections, the Run-Length FM-index, used O(r) space and was able to efficiently count the number of occurrences of a pattern of length m in the text (in loglogarithmic time per pattern symbol, with current techniques). However, it was unable to locate the positions of those occurrences efficiently within a space bounded in terms of r. In this paper we close this long-standing problem, showing how to extend the Run-Length FM-index so that it can locate the occ occurrences efficiently within O(r) space (in loglogarithmic time each), and reaching optimal time, O(m + occ), within O(r log log w ({\sigma} + n/r)) space, for a text of length n over an alphabet of size {\sigma} on a RAM machine with words of w = {\Omega}(log n) bits. Within that space, our index can also count in optimal time, O(m). Multiplying the space by O(w/ log {\sigma}), we support count and locate in O(dm log({\sigma})/we) and O(dm log({\sigma})/we + occ) time, which is optimal in the packed setting and had not been obtained before in compressed space. We also describe a structure using O(r log(n/r)) space that replaces the text and extracts any text substring of length ` in almost-optimal time O(log(n/r) + ` log({\sigma})/w). Within that space, we similarly provide direct access to suffix array, inverse suffix array, and longest common prefix array cells, and extend these capabilities to full suffix tree functionality, typically in O(log(n/r)) time per operation.
[ { "created": "Sat, 8 Sep 2018 12:15:58 GMT", "version": "v1" }, { "created": "Thu, 4 Jul 2019 15:31:22 GMT", "version": "v2" } ]
"2020-12-17T00:00:00"
[ [ "Gagie", "Travis", "" ], [ "Navarro", "Gonzalo", "" ], [ "Prezza", "Nicola", "" ] ]
0no_new_dataset
2311.13549
Weixin Mao
Fan Jia, Weixin Mao, Yingfei Liu, Yucheng Zhao, Yuqing Wen, Chi Zhang, Xiangyu Zhang, Tiancai Wang
ADriver-I: A General World Model for Autonomous Driving
Tech Report
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Typically, autonomous driving adopts a modular design, which divides the full stack into perception, prediction, planning and control parts. Though interpretable, such modular design tends to introduce a substantial amount of redundancy. Recently, multimodal large language models (MLLM) and diffusion techniques have demonstrated their superior performance on comprehension and generation ability. In this paper, we first introduce the concept of interleaved vision-action pair, which unifies the format of visual features and control signals. Based on the vision-action pairs, we construct a general world model based on MLLM and diffusion model for autonomous driving, termed ADriver-I. It takes the vision-action pairs as inputs and autoregressively predicts the control signal of the current frame. The generated control signals together with the historical vision-action pairs are further conditioned to predict the future frames. With the predicted next frame, ADriver-I performs further control signal prediction. Such a process can be repeated infinite times, ADriver-I achieves autonomous driving in the world created by itself. Extensive experiments are conducted on nuScenes and our large-scale private datasets. ADriver-I shows impressive performance compared to several constructed baselines. We hope our ADriver-I can provide some new insights for future autonomous driving and embodied intelligence.
[ { "created": "Wed, 22 Nov 2023 17:44:29 GMT", "version": "v1" } ]
"2023-11-23T00:00:00"
[ [ "Jia", "Fan", "" ], [ "Mao", "Weixin", "" ], [ "Liu", "Yingfei", "" ], [ "Zhao", "Yucheng", "" ], [ "Wen", "Yuqing", "" ], [ "Zhang", "Chi", "" ], [ "Zhang", "Xiangyu", "" ], [ "Wang", "Tiancai", "" ] ]
1new_dataset
2207.04813
Fernando Alonso-Fernandez
Javier Galbally, Julian Fierrez-Aguilar, Joaquin Rodriguez-Gonzalez, Fernando Alonso-Fernandez, Javier Ortega-Garcia, Marino Tapiador
On the vulnerability of fingerprint verification systems to fake fingerprint attacks
Published at IEEE International Carnahan Conference on Security Technology (ICCST)
null
null
null
cs.CV cs.CR eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it. Three different scenarios are considered in the experiments, namely: enrollment and test with real fingerprints, enrollment and test with fake fingerprints, and enrollment with real fingerprints and test with fake fingerprints. Results for an optical and a thermal sweeping sensors are given. Both systems are shown to be vulnerable to direct attacks.
[ { "created": "Mon, 11 Jul 2022 12:22:52 GMT", "version": "v1" } ]
"2022-07-12T00:00:00"
[ [ "Galbally", "Javier", "" ], [ "Fierrez-Aguilar", "Julian", "" ], [ "Rodriguez-Gonzalez", "Joaquin", "" ], [ "Alonso-Fernandez", "Fernando", "" ], [ "Ortega-Garcia", "Javier", "" ], [ "Tapiador", "Marino", "" ] ]
1new_dataset
1206.6431
Robert Peharz
Robert Peharz (Graz University of Technology), Franz Pernkopf (Graz University of Technology)
Exact Maximum Margin Structure Learning of Bayesian Networks
ICML
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, there has been much interest in finding globally optimal Bayesian network structures. These techniques were developed for generative scores and can not be directly extended to discriminative scores, as desired for classification. In this paper, we propose an exact method for finding network structures maximizing the probabilistic soft margin, a successfully applied discriminative score. Our method is based on branch-and-bound techniques within a linear programming framework and maintains an any-time solution, together with worst-case sub-optimality bounds. We apply a set of order constraints for enforcing the network structure to be acyclic, which allows a compact problem representation and the use of general-purpose optimization techniques. In classification experiments, our methods clearly outperform generatively trained network structures and compete with support vector machines.
[ { "created": "Wed, 27 Jun 2012 19:59:59 GMT", "version": "v1" } ]
"2012-07-03T00:00:00"
[ [ "Peharz", "Robert", "", "Graz University of Technology" ], [ "Pernkopf", "Franz", "", "Graz\n University of Technology" ] ]
0no_new_dataset
2402.05328
Samuel Epstein
Samuel Epstein
Two Simple Proofs of M\"uller's Theorem
null
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to M\"{u}ller's theorem, the Kolmogorov complexity of a string was shown to be equal to its quantum Kolmogorov complexity. Thus there are no benefits to using quantum mechanics to compress classical information. The quantitative amount of information in classical sources is invariant to the physical model used. These consequences make this theorem arguably the most important result in the intersection of algorithmic information theory and physics. The original proof is quite extensive. This paper contains two simple proofs of this theorem. This paper also contains new bounds for quantum Kolmogorov complexity with error.
[ { "created": "Thu, 8 Feb 2024 00:07:15 GMT", "version": "v1" }, { "created": "Fri, 23 Feb 2024 15:36:23 GMT", "version": "v2" }, { "created": "Tue, 25 Jun 2024 15:05:14 GMT", "version": "v3" }, { "created": "Tue, 2 Jul 2024 21:40:31 GMT", "version": "v4" } ]
"2024-07-04T00:00:00"
[ [ "Epstein", "Samuel", "" ] ]
0no_new_dataset
2104.04726
Mansi Sharma
Mansi Sharma, Aditya Wadaskar
A Novel Unified Model for Multi-exposure Stereo Coding Based on Low Rank Tucker-ALS and 3D-HEVC
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Display technology must offer high dynamic range (HDR) contrast-based depth induction and 3D personalization simultaneously. Efficient algorithms to compress HDR stereo data is critical. Direct capturing of HDR content is complicated due to the high expense and scarcity of HDR cameras. The HDR 3D images could be generated in low-cost by fusing low-dynamic-range (LDR) images acquired using a stereo camera with various exposure settings. In this paper, an efficient scheme for coding multi-exposure stereo images is proposed based on a tensor low-rank approximation scheme. The multi-exposure fusion can be realized to generate HDR stereo output at the decoder for increased realism and exaggerated binocular 3D depth cues. For exploiting spatial redundancy in LDR stereo images, the stack of multi-exposure stereo images is decomposed into a set of projection matrices and a core tensor following an alternating least squares Tucker decomposition model. The compact, low-rank representation of the scene, thus, generated is further processed by 3D extension of High Efficiency Video Coding standard. The encoding with 3D-HEVC enhance the proposed scheme efficiency by exploiting intra-frame, inter-view and the inter-component redundancies in low-rank approximated representation. We consider constant luminance property of IPT and Y'CbCr color space to precisely approximate intensity prediction and perceptually minimize the encoding distortion. Besides, the proposed scheme gives flexibility to adjust the bitrate of tensor latent components by changing the rank of core tensor and its quantization. Extensive experiments on natural scenes demonstrate that the proposed scheme outperforms state-of-the-art JPEG-XT and 3D-HEVC range coding standards.
[ { "created": "Sat, 10 Apr 2021 10:10:14 GMT", "version": "v1" } ]
"2021-04-13T00:00:00"
[ [ "Sharma", "Mansi", "" ], [ "Wadaskar", "Aditya", "" ] ]
0no_new_dataset
1907.02298
Zi Lin
Junjie Cao, Zi Lin, Weiwei Sun, Xiaojun Wan
A Comparative Analysis of Knowledge-Intensive and Data-Intensive Semantic Parsers
submitted to the journal Computational Linguistics
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
We present a phenomenon-oriented comparative analysis of the two dominant approaches in task-independent semantic parsing: classic, knowledge-intensive and neural, data-intensive models. To reflect state-of-the-art neural NLP technologies, we introduce a new target structure-centric parser that can produce semantic graphs much more accurately than previous data-driven parsers. We then show that, in spite of comparable performance overall, knowledge- and data-intensive models produce different types of errors, in a way that can be explained by their theoretical properties. This analysis leads to new directions for parser development.
[ { "created": "Thu, 4 Jul 2019 09:40:27 GMT", "version": "v1" }, { "created": "Thu, 15 Aug 2019 10:36:59 GMT", "version": "v2" }, { "created": "Wed, 28 Oct 2020 08:39:30 GMT", "version": "v3" } ]
"2020-10-29T00:00:00"
[ [ "Cao", "Junjie", "" ], [ "Lin", "Zi", "" ], [ "Sun", "Weiwei", "" ], [ "Wan", "Xiaojun", "" ] ]
1new_dataset
2306.11556
Chenbin Li
Chenbin Li, Yu Xin, Gaoyi Liu, Xiang Zeng, Ligang Liu
NeRF synthesis with shading guidance
16 pages, 16 figures, accepted by CAD/Graphics 2023(poster)
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emerging Neural Radiance Field (NeRF) shows great potential in representing 3D scenes, which can render photo-realistic images from novel view with only sparse views given. However, utilizing NeRF to reconstruct real-world scenes requires images from different viewpoints, which limits its practical application. This problem can be even more pronounced for large scenes. In this paper, we introduce a new task called NeRF synthesis that utilizes the structural content of a NeRF patch exemplar to construct a new radiance field of large size. We propose a two-phase method for synthesizing new scenes that are continuous in geometry and appearance. We also propose a boundary constraint method to synthesize scenes of arbitrary size without artifacts. Specifically, we control the lighting effects of synthesized scenes using shading guidance instead of decoupling the scene. We have demonstrated that our method can generate high-quality results with consistent geometry and appearance, even for scenes with complex lighting. We can also synthesize new scenes on curved surface with arbitrary lighting effects, which enhances the practicality of our proposed NeRF synthesis approach.
[ { "created": "Tue, 20 Jun 2023 14:18:20 GMT", "version": "v1" } ]
"2023-06-21T00:00:00"
[ [ "Li", "Chenbin", "" ], [ "Xin", "Yu", "" ], [ "Liu", "Gaoyi", "" ], [ "Zeng", "Xiang", "" ], [ "Liu", "Ligang", "" ] ]
1new_dataset
1806.02070
Christian Payer
Christian Payer, Darko \v{S}tern, Thomas Neff, Horst Bischof, Martin Urschler
Instance Segmentation and Tracking with Cosine Embeddings and Recurrent Hourglass Networks
Accepted for ORAL presentation at MICCAI 2018
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different to semantic segmentation, instance segmentation assigns unique labels to each individual instance of the same class. In this work, we propose a novel recurrent fully convolutional network architecture for tracking such instance segmentations over time. The network architecture incorporates convolutional gated recurrent units (ConvGRU) into a stacked hourglass network to utilize temporal video information. Furthermore, we train the network with a novel embedding loss based on cosine similarities, such that the network predicts unique embeddings for every instance throughout videos. Afterwards, these embeddings are clustered among subsequent video frames to create the final tracked instance segmentations. We evaluate the recurrent hourglass network by segmenting left ventricles in MR videos of the heart, where it outperforms a network that does not incorporate video information. Furthermore, we show applicability of the cosine embedding loss for segmenting leaf instances on still images of plants. Finally, we evaluate the framework for instance segmentation and tracking on six datasets of the ISBI celltracking challenge, where it shows state-of-the-art performance.
[ { "created": "Wed, 6 Jun 2018 08:57:15 GMT", "version": "v1" }, { "created": "Thu, 7 Jun 2018 07:11:38 GMT", "version": "v2" }, { "created": "Mon, 30 Jul 2018 09:32:56 GMT", "version": "v3" } ]
"2018-07-31T00:00:00"
[ [ "Payer", "Christian", "" ], [ "Štern", "Darko", "" ], [ "Neff", "Thomas", "" ], [ "Bischof", "Horst", "" ], [ "Urschler", "Martin", "" ] ]
1new_dataset
2112.15483
Rutvik Chauhan
Rutvik Chauhan, Antarpuneet Singh, Sujoy Saha
Cloud Removal from Satellite Images
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
In this report, we have analyzed available cloud detection technique using sentinel hub. We have also implemented spatial attention generative adversarial network and improved quality of generated image compared to previous solution [7].
[ { "created": "Thu, 23 Dec 2021 07:25:19 GMT", "version": "v1" } ]
"2022-01-03T00:00:00"
[ [ "Chauhan", "Rutvik", "" ], [ "Singh", "Antarpuneet", "" ], [ "Saha", "Sujoy", "" ] ]
0no_new_dataset
2402.09473
Jasone Ram\'irez-Ayerbe
Andrea Lodi and Jasone Ram\'irez-Ayerbe
One-for-many Counterfactual Explanations by Column Generation
null
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by-nc-nd/4.0/
In this paper, we consider the problem of generating a set of counterfactual explanations for a group of instances, with the one-for-many allocation rule, where one explanation is allocated to a subgroup of the instances. For the first time, we solve the problem of minimizing the number of explanations needed to explain all the instances, while considering sparsity by limiting the number of features allowed to be changed collectively in each explanation. A novel column generation framework is developed to efficiently search for the explanations. Our framework can be applied to any black-box classifier, like neural networks. Compared with a simple adaptation of a mixed-integer programming formulation from the literature, the column generation framework dominates in terms of scalability, computational performance and quality of the solutions.
[ { "created": "Mon, 12 Feb 2024 10:03:31 GMT", "version": "v1" } ]
"2024-02-16T00:00:00"
[ [ "Lodi", "Andrea", "" ], [ "Ramírez-Ayerbe", "Jasone", "" ] ]
0no_new_dataset
1705.09185
Timur Pekhovsky
Timur Pekhovsky, Maxim Korenevsky
Investigation of Using VAE for i-Vector Speaker Verification
null
null
null
null
cs.SD cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New system for i-vector speaker recognition based on variational autoencoder (VAE) is investigated. VAE is a promising approach for developing accurate deep nonlinear generative models of complex data. Experiments show that VAE provides speaker embedding and can be effectively trained in an unsupervised manner. LLR estimate for VAE is developed. Experiments on NIST SRE 2010 data demonstrate its correctness. Additionally, we show that the performance of VAE-based system in the i-vectors space is close to that of the diagonal PLDA. Several interesting results are also observed in the experiments with $\beta$-VAE. In particular, we found that for $\beta\ll 1$, VAE can be trained to capture the features of complex input data distributions in an effective way, which is hard to obtain in the standard VAE ($\beta=1$).
[ { "created": "Thu, 25 May 2017 13:59:18 GMT", "version": "v1" } ]
"2017-05-26T00:00:00"
[ [ "Pekhovsky", "Timur", "" ], [ "Korenevsky", "Maxim", "" ] ]
1new_dataset
1911.07528
Mo Zhou
Mo Zhou, Zhenxing Niu, Le Wang, Zhanning Gao, Qilin Zhang, Gang Hua
Ladder Loss for Coherent Visual-Semantic Embedding
Accepted to AAAI-2020
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For visual-semantic embedding, the existing methods normally treat the relevance between queries and candidates in a bipolar way -- relevant or irrelevant, and all "irrelevant" candidates are uniformly pushed away from the query by an equal margin in the embedding space, regardless of their various proximity to the query. This practice disregards relatively discriminative information and could lead to suboptimal ranking in the retrieval results and poorer user experience, especially in the long-tail query scenario where a matching candidate may not necessarily exist. In this paper, we introduce a continuous variable to model the relevance degree between queries and multiple candidates, and propose to learn a coherent embedding space, where candidates with higher relevance degrees are mapped closer to the query than those with lower relevance degrees. In particular, the new ladder loss is proposed by extending the triplet loss inequality to a more general inequality chain, which implements variable push-away margins according to respective relevance degrees. In addition, a proper Coherent Score metric is proposed to better measure the ranking results including those "irrelevant" candidates. Extensive experiments on multiple datasets validate the efficacy of our proposed method, which achieves significant improvement over existing state-of-the-art methods.
[ { "created": "Mon, 18 Nov 2019 10:31:17 GMT", "version": "v1" } ]
"2019-11-19T00:00:00"
[ [ "Zhou", "Mo", "" ], [ "Niu", "Zhenxing", "" ], [ "Wang", "Le", "" ], [ "Gao", "Zhanning", "" ], [ "Zhang", "Qilin", "" ], [ "Hua", "Gang", "" ] ]
0no_new_dataset
2403.01300
Taeheon Kim
Taeheon Kim, Sebin Shin, Youngjoon Yu, Hak Gu Kim, and Yong Man Ro
Causal Mode Multiplexer: A Novel Framework for Unbiased Multispectral Pedestrian Detection
CVPR2024
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RGBT multispectral pedestrian detection has emerged as a promising solution for safety-critical applications that require day/night operations. However, the modality bias problem remains unsolved as multispectral pedestrian detectors learn the statistical bias in datasets. Specifically, datasets in multispectral pedestrian detection mainly distribute between ROTO (day) and RXTO (night) data; the majority of the pedestrian labels statistically co-occur with their thermal features. As a result, multispectral pedestrian detectors show poor generalization ability on examples beyond this statistical correlation, such as ROTX data. To address this problem, we propose a novel Causal Mode Multiplexer (CMM) framework that effectively learns the causalities between multispectral inputs and predictions. Moreover, we construct a new dataset (ROTX-MP) to evaluate modality bias in multispectral pedestrian detection. ROTX-MP mainly includes ROTX examples not presented in previous datasets. Extensive experiments demonstrate that our proposed CMM framework generalizes well on existing datasets (KAIST, CVC-14, FLIR) and the new ROTX-MP. We will release our new dataset to the public for future research.
[ { "created": "Sat, 2 Mar 2024 19:54:53 GMT", "version": "v1" }, { "created": "Fri, 5 Apr 2024 08:42:02 GMT", "version": "v2" } ]
"2024-04-08T00:00:00"
[ [ "Kim", "Taeheon", "" ], [ "Shin", "Sebin", "" ], [ "Yu", "Youngjoon", "" ], [ "Kim", "Hak Gu", "" ], [ "Ro", "Yong Man", "" ] ]
1new_dataset
2405.18525
Haonan Han
Haonan Han, Rui Yang, Huan Liao, Jiankai Xing, Zunnan Xu, Xiaoming Yu, Junwei Zha, Xiu Li, Wanhua Li
REPARO: Compositional 3D Assets Generation with Differentiable 3D Layout Alignment
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Traditional image-to-3D models often struggle with scenes containing multiple objects due to biases and occlusion complexities. To address this challenge, we present REPARO, a novel approach for compositional 3D asset generation from single images. REPARO employs a two-step process: first, it extracts individual objects from the scene and reconstructs their 3D meshes using off-the-shelf image-to-3D models; then, it optimizes the layout of these meshes through differentiable rendering techniques, ensuring coherent scene composition. By integrating optimal transport-based long-range appearance loss term and high-level semantic loss term in the differentiable rendering, REPARO can effectively recover the layout of 3D assets. The proposed method can significantly enhance object independence, detail accuracy, and overall scene coherence. Extensive evaluation of multi-object scenes demonstrates that our REPARO offers a comprehensive approach to address the complexities of multi-object 3D scene generation from single images.
[ { "created": "Tue, 28 May 2024 18:45:10 GMT", "version": "v1" } ]
"2024-05-30T00:00:00"
[ [ "Han", "Haonan", "" ], [ "Yang", "Rui", "" ], [ "Liao", "Huan", "" ], [ "Xing", "Jiankai", "" ], [ "Xu", "Zunnan", "" ], [ "Yu", "Xiaoming", "" ], [ "Zha", "Junwei", "" ], [ "Li", "Xiu", "" ], [ "Li", "Wanhua", "" ] ]
0no_new_dataset
2009.08576
Jonathan Frankle
Jonathan Frankle, Gintare Karolina Dziugaite, Daniel M. Roy, Michael Carbin
Pruning Neural Networks at Initialization: Why are We Missing the Mark?
Published in ICLR 2021
null
null
null
cs.LG cs.CV cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work has explored the possibility of pruning neural networks at initialization. We assess proposals for doing so: SNIP (Lee et al., 2019), GraSP (Wang et al., 2020), SynFlow (Tanaka et al., 2020), and magnitude pruning. Although these methods surpass the trivial baseline of random pruning, they remain below the accuracy of magnitude pruning after training, and we endeavor to understand why. We show that, unlike pruning after training, randomly shuffling the weights these methods prune within each layer or sampling new initial values preserves or improves accuracy. As such, the per-weight pruning decisions made by these methods can be replaced by a per-layer choice of the fraction of weights to prune. This property suggests broader challenges with the underlying pruning heuristics, the desire to prune at initialization, or both.
[ { "created": "Fri, 18 Sep 2020 01:13:38 GMT", "version": "v1" }, { "created": "Sun, 21 Mar 2021 21:38:32 GMT", "version": "v2" } ]
"2021-03-23T00:00:00"
[ [ "Frankle", "Jonathan", "" ], [ "Dziugaite", "Gintare Karolina", "" ], [ "Roy", "Daniel M.", "" ], [ "Carbin", "Michael", "" ] ]
0no_new_dataset
2211.16752
Qiaodan Luo
Qiaodan Luo, Leonardo Christino, Fernando V Paulovich and Evangelos Milios
DimenFix: A novel meta-dimensionality reduction method for feature preservation
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dimensionality reduction has become an important research topic as demand for interpreting high-dimensional datasets has been increasing rapidly in recent years. There have been many dimensionality reduction methods with good performance in preserving the overall relationship among data points when mapping them to a lower-dimensional space. However, these existing methods fail to incorporate the difference in importance among features. To address this problem, we propose a novel meta-method, DimenFix, which can be operated upon any base dimensionality reduction method that involves a gradient-descent-like process. By allowing users to define the importance of different features, which is considered in dimensionality reduction, DimenFix creates new possibilities to visualize and understand a given dataset. Meanwhile, DimenFix does not increase the time cost or reduce the quality of dimensionality reduction with respect to the base dimensionality reduction used.
[ { "created": "Wed, 30 Nov 2022 05:35:22 GMT", "version": "v1" } ]
"2022-12-01T00:00:00"
[ [ "Luo", "Qiaodan", "" ], [ "Christino", "Leonardo", "" ], [ "Paulovich", "Fernando V", "" ], [ "Milios", "Evangelos", "" ] ]
0no_new_dataset
2209.09203
David Bertoin
David Bertoin, Adil Zouitine, Mehdi Zouitine, Emmanuel Rachelson
Look where you look! Saliency-guided Q-networks for generalization in visual Reinforcement Learning
Thirty-sixth Conference on Neural Information Processing Systems (NeurIPS 2022), Nov 2022, New Orleans, United States
null
null
null
cs.LG cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep reinforcement learning policies, despite their outstanding efficiency in simulated visual control tasks, have shown disappointing ability to generalize across disturbances in the input training images. Changes in image statistics or distracting background elements are pitfalls that prevent generalization and real-world applicability of such control policies. We elaborate on the intuition that a good visual policy should be able to identify which pixels are important for its decision, and preserve this identification of important sources of information across images. This implies that training of a policy with small generalization gap should focus on such important pixels and ignore the others. This leads to the introduction of saliency-guided Q-networks (SGQN), a generic method for visual reinforcement learning, that is compatible with any value function learning method. SGQN vastly improves the generalization capability of Soft Actor-Critic agents and outperforms existing stateof-the-art methods on the Deepmind Control Generalization benchmark, setting a new reference in terms of training efficiency, generalization gap, and policy interpretability.
[ { "created": "Fri, 16 Sep 2022 08:28:38 GMT", "version": "v1" }, { "created": "Thu, 29 Sep 2022 08:11:30 GMT", "version": "v2" }, { "created": "Wed, 8 Feb 2023 14:50:16 GMT", "version": "v3" } ]
"2023-02-09T00:00:00"
[ [ "Bertoin", "David", "" ], [ "Zouitine", "Adil", "" ], [ "Zouitine", "Mehdi", "" ], [ "Rachelson", "Emmanuel", "" ] ]
0no_new_dataset
1308.6118
Sorin Alupoaie
Sorin Alupoaie, P\'adraig Cunningham
Using tf-idf as an edge weighting scheme in user-object bipartite networks
null
null
null
null
cs.SI cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bipartite user-object networks are becoming increasingly popular in representing user interaction data in a web or e-commerce environment. They have certain characteristics and challenges that differentiates them from other bipartite networks. This paper analyzes the properties of five real world user-object networks. In all cases we found a heavy tail object degree distribution with popular objects connecting together a large part of the users causing significant edge inflation in the projected users network. We propose a novel edge weighting strategy based on tf-idf and show that the new scheme improves both the density and the quality of the community structure in the projections. The improvement is also noticed when comparing to partially random networks.
[ { "created": "Wed, 28 Aug 2013 10:25:02 GMT", "version": "v1" } ]
"2013-08-29T00:00:00"
[ [ "Alupoaie", "Sorin", "" ], [ "Cunningham", "Pádraig", "" ] ]
0no_new_dataset
1006.4396
Warren Schudy
Marek Karpinski and Warren Schudy
Faster Algorithms for Feedback Arc Set Tournament, Kemeny Rank Aggregation and Betweenness Tournament
14 pages. Version 1 of arXiv:0911.2214 includes a preliminary version of this work; version 2 does not
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study fixed parameter algorithms for three problems: Kemeny rank aggregation, feedback arc set tournament, and betweenness tournament. For Kemeny rank aggregation we give an algorithm with runtime O*(2^O(sqrt{OPT})), where n is the number of candidates, OPT is the cost of the optimal ranking, and O* hides polynomial factors. This is a dramatic improvement on the previously best known runtime of O*(2^O(OPT)). For feedback arc set tournament we give an algorithm with runtime O*(2^O(sqrt{OPT})), an improvement on the previously best known O*(OPT^O(sqrt{OPT})) (Alon, Lokshtanov and Saurabh 2009). For betweenness tournament we give an algorithm with runtime O*(2^O(sqrt{OPT/n})), where n is the number of vertices and OPT is the optimal cost. This improves on the previously known O*(OPT^O(OPT^{1/3}))$ (Saurabh 2009), especially when OPT is small. Unusually we can solve instances with OPT as large as n (log n)^2 in polynomial time!
[ { "created": "Wed, 23 Jun 2010 00:06:59 GMT", "version": "v1" } ]
"2010-06-24T00:00:00"
[ [ "Karpinski", "Marek", "" ], [ "Schudy", "Warren", "" ] ]
0no_new_dataset
1903.08199
Kasra Yazdani
Kasra Yazdani and Matthew Hale
Error Bounds and Guidelines for Privacy Calibration in Differentially Private Kalman Filtering
17 pages, 2 figures
null
null
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Differential privacy has emerged as a formal framework for protecting sensitive information in control systems. One key feature is that it is immune to post-processing, which means that arbitrary post-hoc computations can be performed on privatized data without weakening differential privacy. It is therefore common to filter private data streams. To characterize this setup, in this paper we present error and entropy bounds for Kalman filtering differentially private state trajectories. We consider systems in which an output trajectory is privatized in order to protect the state trajectory that produced it. We provide bounds on a priori and a posteriori error and differential entropy of a Kalman filter which is processing the privatized output trajectories. Using the error bounds we develop, we then provide guidelines to calibrate privacy levels in order to keep filter error within pre-specified bounds. Simulation results are presented to demonstrate these developments.
[ { "created": "Tue, 19 Mar 2019 18:17:32 GMT", "version": "v1" }, { "created": "Mon, 23 Sep 2019 16:15:58 GMT", "version": "v2" } ]
"2019-09-24T00:00:00"
[ [ "Yazdani", "Kasra", "" ], [ "Hale", "Matthew", "" ] ]
0no_new_dataset
1905.09904
Zheng Shou
Jiawei Ma, Zheng Shou, Alireza Zareian, Hassan Mansour, Anthony Vetro, Shih-Fu Chang
CDSA: Cross-Dimensional Self-Attention for Multivariate, Geo-tagged Time Series Imputation
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many real-world applications involve multivariate, geo-tagged time series data: at each location, multiple sensors record corresponding measurements. For example, air quality monitoring system records PM2.5, CO, etc. The resulting time-series data often has missing values due to device outages or communication errors. In order to impute the missing values, state-of-the-art methods are built on Recurrent Neural Networks (RNN), which process each time stamp sequentially, prohibiting the direct modeling of the relationship between distant time stamps. Recently, the self-attention mechanism has been proposed for sequence modeling tasks such as machine translation, significantly outperforming RNN because the relationship between each two time stamps can be modeled explicitly. In this paper, we are the first to adapt the self-attention mechanism for multivariate, geo-tagged time series data. In order to jointly capture the self-attention across multiple dimensions, including time, location and the sensor measurements, while maintain low computational complexity, we propose a novel approach called Cross-Dimensional Self-Attention (CDSA) to process each dimension sequentially, yet in an order-independent manner. Our extensive experiments on four real-world datasets, including three standard benchmarks and our newly collected NYC-traffic dataset, demonstrate that our approach outperforms the state-of-the-art imputation and forecasting methods. A detailed systematic analysis confirms the effectiveness of our design choices.
[ { "created": "Thu, 23 May 2019 20:13:12 GMT", "version": "v1" }, { "created": "Mon, 5 Aug 2019 06:15:44 GMT", "version": "v2" } ]
"2019-08-06T00:00:00"
[ [ "Ma", "Jiawei", "" ], [ "Shou", "Zheng", "" ], [ "Zareian", "Alireza", "" ], [ "Mansour", "Hassan", "" ], [ "Vetro", "Anthony", "" ], [ "Chang", "Shih-Fu", "" ] ]
1new_dataset
1404.4666
Edward Givelberg
Edward Givelberg
Object-Oriented Parallel Programming
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an object-oriented framework for parallel programming, which is based on the observation that programming objects can be naturally interpreted as processes. A parallel program consists of a collection of persistent processes that communicate by executing remote methods. We discuss code parallelization and process persistence, and explain the main ideas in the context of computations with very large data objects.
[ { "created": "Thu, 17 Apr 2014 22:36:44 GMT", "version": "v1" } ]
"2014-04-21T00:00:00"
[ [ "Givelberg", "Edward", "" ] ]
0no_new_dataset
1002.3222
Michel Reniers
Jeroen Keiren, Michel A. Reniers, and Tim A.C. Willemse
Structural Analysis of Boolean Equation Systems
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyse the problem of solving Boolean equation systems through the use of structure graphs. The latter are obtained through an elegant set of Plotkin-style deduction rules. Our main contribution is that we show that equation systems with bisimilar structure graphs have the same solution. We show that our work conservatively extends earlier work, conducted by Keiren and Willemse, in which dependency graphs were used to analyse a subclass of Boolean equation systems, viz., equation systems in standard recursive form. We illustrate our approach by a small example, demonstrating the effect of simplifying an equation system through minimisation of its structure graph.
[ { "created": "Wed, 17 Feb 2010 08:15:12 GMT", "version": "v1" } ]
"2010-02-18T00:00:00"
[ [ "Keiren", "Jeroen", "" ], [ "Reniers", "Michel A.", "" ], [ "Willemse", "Tim A. C.", "" ] ]
0no_new_dataset
1604.01980
Emanuel Laude
Emanuel Laude, Thomas M\"ollenhoff, Michael Moeller, Jan Lellmann, Daniel Cremers
Sublabel-Accurate Convex Relaxation of Vectorial Multilabel Energies
null
null
null
null
cs.CV math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convex relaxations of nonconvex multilabel problems have been demonstrated to produce superior (provably optimal or near-optimal) solutions to a variety of classical computer vision problems. Yet, they are of limited practical use as they require a fine discretization of the label space, entailing a huge demand in memory and runtime. In this work, we propose the first sublabel accurate convex relaxation for vectorial multilabel problems. The key idea is that we approximate the dataterm of the vectorial labeling problem in a piecewise convex (rather than piecewise linear) manner. As a result we have a more faithful approximation of the original cost function that provides a meaningful interpretation for the fractional solutions of the relaxed convex problem. In numerous experiments on large-displacement optical flow estimation and on color image denoising we demonstrate that the computed solutions have superior quality while requiring much lower memory and runtime.
[ { "created": "Thu, 7 Apr 2016 12:43:07 GMT", "version": "v1" }, { "created": "Mon, 10 Oct 2016 16:42:55 GMT", "version": "v2" } ]
"2016-10-11T00:00:00"
[ [ "Laude", "Emanuel", "" ], [ "Möllenhoff", "Thomas", "" ], [ "Moeller", "Michael", "" ], [ "Lellmann", "Jan", "" ], [ "Cremers", "Daniel", "" ] ]
0no_new_dataset
2212.00629
Lennart K\"ull
Lennart K\"ull
Analyzing the State of Computer Science Research with the DBLP Discovery Dataset
Master's Thesis, University of Wuppertal
null
null
null
cs.DL cs.CL
http://creativecommons.org/licenses/by-sa/4.0/
The number of scientific publications continues to rise exponentially, especially in Computer Science (CS). However, current solutions to analyze those publications restrict access behind a paywall, offer no features for visual analysis, limit access to their data, only focus on niches or sub-fields, and/or are not flexible and modular enough to be transferred to other datasets. In this thesis, we conduct a scientometric analysis to uncover the implicit patterns hidden in CS metadata and to determine the state of CS research. Specifically, we investigate trends of the quantity, impact, and topics for authors, venues, document types (conferences vs. journals), and fields of study (compared to, e.g., medicine). To achieve this we introduce the CS-Insights system, an interactive web application to analyze CS publications with various dashboards, filters, and visualizations. The data underlying this system is the DBLP Discovery Dataset (D3), which contains metadata from 5 million CS publications. Both D3 and CS-Insights are open-access, and CS-Insights can be easily adapted to other datasets in the future. The most interesting findings of our scientometric analysis include that i) there has been a stark increase in publications, authors, and venues in the last two decades, ii) many authors only recently joined the field, iii) the most cited authors and venues focus on computer vision and pattern recognition, while the most productive prefer engineering-related topics, iv) the preference of researchers to publish in conferences over journals dwindles, v) on average, journal articles receive twice as many citations compared to conference papers, but the contrast is much smaller for the most cited conferences and journals, and vi) journals also get more citations in all other investigated fields of study, while only CS and engineering publish more in conferences than journals.
[ { "created": "Thu, 1 Dec 2022 16:27:42 GMT", "version": "v1" } ]
"2022-12-02T00:00:00"
[ [ "Küll", "Lennart", "" ] ]
1new_dataset
2003.04079
Pedro Casas Dr.
Gonzalo Mar\'in, Pedro Casas, Germ\'an Capdehourat
DeepMAL -- Deep Learning Models for Malware Traffic Detection and Classification
3rd International Data Science Conference (IDSC 2020)
null
null
null
cs.CR cs.LG cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robust network security systems are essential to prevent and mitigate the harming effects of the ever-growing occurrence of network attacks. In recent years, machine learning-based systems have gain popularity for network security applications, usually considering the application of shallow models, which rely on the careful engineering of expert, handcrafted input features. The main limitation of this approach is that handcrafted features can fail to perform well under different scenarios and types of attacks. Deep Learning (DL) models can solve this limitation using their ability to learn feature representations from raw, non-processed data. In this paper we explore the power of DL models on the specific problem of detection and classification of malware network traffic. As a major advantage with respect to the state of the art, we consider raw measurements coming directly from the stream of monitored bytes as input to the proposed models, and evaluate different raw-traffic feature representations, including packet and flow-level ones. We introduce DeepMAL, a DL model which is able to capture the underlying statistics of malicious traffic, without any sort of expert handcrafted features. Using publicly available traffic traces containing different families of malware traffic, we show that DeepMAL can detect and classify malware flows with high accuracy, outperforming traditional, shallow-like models.
[ { "created": "Tue, 3 Mar 2020 16:54:26 GMT", "version": "v1" }, { "created": "Tue, 10 Mar 2020 16:56:46 GMT", "version": "v2" } ]
"2020-03-26T00:00:00"
[ [ "Marín", "Gonzalo", "" ], [ "Casas", "Pedro", "" ], [ "Capdehourat", "Germán", "" ] ]
0no_new_dataset
2104.08799
Yige Xu
Yichao Luo, Yige Xu, Jiacheng Ye, Xipeng Qiu, Qi Zhang
Keyphrase Generation with Fine-Grained Evaluation-Guided Reinforcement Learning
11 pages, Findings of EMNLP 2021
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aiming to generate a set of keyphrases, Keyphrase Generation (KG) is a classical task for capturing the central idea from a given document. Based on Seq2Seq models, the previous reinforcement learning framework on KG tasks utilizes the evaluation metrics to further improve the well-trained neural models. However, these KG evaluation metrics such as $F_1@5$ and $F_1@M$ are only aware of the exact correctness of predictions on phrase-level and ignore the semantic similarities between similar predictions and targets, which inhibits the model from learning deep linguistic patterns. In response to this problem, we propose a new fine-grained evaluation metric to improve the RL framework, which considers different granularities: token-level $F_1$ score, edit distance, duplication, and prediction quantities. On the whole, the new framework includes two reward functions: the fine-grained evaluation score and the vanilla $F_1$ score. This framework helps the model identifying some partial match phrases which can be further optimized as the exact match ones. Experiments on KG benchmarks show that our proposed training framework outperforms the previous RL training frameworks among all evaluation scores. In addition, our method can effectively ease the synonym problem and generate a higher quality prediction. The source code is available at \url{https://github.com/xuyige/FGRL4KG}.
[ { "created": "Sun, 18 Apr 2021 10:13:46 GMT", "version": "v1" }, { "created": "Fri, 10 Sep 2021 13:22:05 GMT", "version": "v2" } ]
"2021-09-13T00:00:00"
[ [ "Luo", "Yichao", "" ], [ "Xu", "Yige", "" ], [ "Ye", "Jiacheng", "" ], [ "Qiu", "Xipeng", "" ], [ "Zhang", "Qi", "" ] ]
0no_new_dataset
2305.03935
Kaiwen Zheng
Kaiwen Zheng, Cheng Lu, Jianfei Chen, Jun Zhu
Improved Techniques for Maximum Likelihood Estimation for Diffusion ODEs
Accepted in ICML2023
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diffusion models have exhibited excellent performance in various domains. The probability flow ordinary differential equation (ODE) of diffusion models (i.e., diffusion ODEs) is a particular case of continuous normalizing flows (CNFs), which enables deterministic inference and exact likelihood evaluation. However, the likelihood estimation results by diffusion ODEs are still far from those of the state-of-the-art likelihood-based generative models. In this work, we propose several improved techniques for maximum likelihood estimation for diffusion ODEs, including both training and evaluation perspectives. For training, we propose velocity parameterization and explore variance reduction techniques for faster convergence. We also derive an error-bounded high-order flow matching objective for finetuning, which improves the ODE likelihood and smooths its trajectory. For evaluation, we propose a novel training-free truncated-normal dequantization to fill the training-evaluation gap commonly existing in diffusion ODEs. Building upon these techniques, we achieve state-of-the-art likelihood estimation results on image datasets (2.56 on CIFAR-10, 3.43/3.69 on ImageNet-32) without variational dequantization or data augmentation, and 2.42 on CIFAR-10 with data augmentation. Code is available at \url{https://github.com/thu-ml/i-DODE}.
[ { "created": "Sat, 6 May 2023 05:21:24 GMT", "version": "v1" }, { "created": "Wed, 31 May 2023 18:05:40 GMT", "version": "v2" }, { "created": "Mon, 25 Sep 2023 13:38:46 GMT", "version": "v3" }, { "created": "Sat, 6 Apr 2024 07:01:53 GMT", "version": "v4" } ]
"2024-04-09T00:00:00"
[ [ "Zheng", "Kaiwen", "" ], [ "Lu", "Cheng", "" ], [ "Chen", "Jianfei", "" ], [ "Zhu", "Jun", "" ] ]
0no_new_dataset
2010.14263
Huiyue Yi
Huiyue Yi
Source Enumeration via RMT Estimator Based on Linear Shrinkage Estimation of Noise Eigenvalues Using Relatively Few Samples
15 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Estimating the number of signals embedded in noise is a fundamental problem in array signal processing. The classic RMT estimator based on random matrix theory (RMT) tends to under-estimate the number of signals as it does not consider the non-negligible bias term among eigenvalues for finite sample size. Moreover, the RMT estimator suffers from uncertainty in noise variance estimation problem. In order to overcome these problems, we firstly derive a more accurate expression for the distribution of the sample eigenvalues and the bias term among eigenvalues by utilizing the linear shrinkage (LS) estimate of noise sample eigenvalues. Then, we analyze the effect of the bias term among eigenvalues on the estimation performance of the RMT estimator, and derive the increased under-estimation probability of the RMT estimator incurred by this bias term. Based on these results, we propose a novel RMT estimator based on LS estimate of noise eigenvalues (termed as LS-RMT estimator) by incorporating the bias term into the decision criterion of the RMT estimator. As the LS-RMT estimator incorporates this bias term among eigenvalues into the decision criterion of the RMT estimator, it can detect signal eigenvalues immersed in this bias term. Therefore, the LS-RMT estimator can overcome the higher under-estimation probability of the RMT estimator incurred by the bias term among eigenvalues, and also avoids the uncertainty in the noise variance estimation suffered by the RMT estimator as the noise variance is estimated under the assumption that the eigenvalue being tested is arising from noise. Finally, extensive simulation results are presented to show that the proposed LS-RMT estimator outperforms the existing estimators.
[ { "created": "Tue, 27 Oct 2020 13:02:18 GMT", "version": "v1" } ]
"2020-10-28T00:00:00"
[ [ "Yi", "Huiyue", "" ] ]
0no_new_dataset
0906.3930
EPTCS
Dessislava Petrova-Antonova, Sylvia Ilieva
Towards a Unifying View of QoS-Enhanced Web Service Description and Discovery Approaches
null
EPTCS 2, 2009, pp. 99-113
10.4204/EPTCS.2.8
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The number of web services increased vastly in the last years. Various providers offer web services with the same functionality, so for web service consumers it is getting more complicated to select the web service, which best fits their requirements. That is why a lot of the research efforts point to discover semantic means for describing web services taking into account not only functional characteristics of services, but also the quality of service (QoS) properties such as availability, reliability, response time, trust, etc. This motivated us to research current approaches presenting complete solutions for QoS enabled web service description, publication and discovery. In this paper we present comparative analysis of these approaches according to their common principals. Based on such analysis we extract the essential aspects from them and propose a pattern for the development of QoS-aware service-oriented architectures.
[ { "created": "Mon, 22 Jun 2009 06:56:40 GMT", "version": "v1" } ]
"2009-06-23T00:00:00"
[ [ "Petrova-Antonova", "Dessislava", "" ], [ "Ilieva", "Sylvia", "" ] ]
0no_new_dataset
2308.01300
Yan Ma
Yan Ma, Weicong Liang, Bohan Chen, Yiduo Hao, Bojian Hou, Xiangyu Yue, Chao Zhang, Yuhui Yuan
Revisiting DETR Pre-training for Object Detection
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Motivated by the remarkable achievements of DETR-based approaches on COCO object detection and segmentation benchmarks, recent endeavors have been directed towards elevating their performance through self-supervised pre-training of Transformers while preserving a frozen backbone. Noteworthy advancements in accuracy have been documented in certain studies. Our investigation delved deeply into a representative approach, DETReg, and its performance assessment in the context of emerging models like $\mathcal{H}$-Deformable-DETR. Regrettably, DETReg proves inadequate in enhancing the performance of robust DETR-based models under full data conditions. To dissect the underlying causes, we conduct extensive experiments on COCO and PASCAL VOC probing elements such as the selection of pre-training datasets and strategies for pre-training target generation. By contrast, we employ an optimized approach named Simple Self-training which leads to marked enhancements through the combination of an improved box predictor and the Objects$365$ benchmark. The culmination of these endeavors results in a remarkable AP score of $59.3\%$ on the COCO val set, outperforming $\mathcal{H}$-Deformable-DETR + Swin-L without pre-training by $1.4\%$. Moreover, a series of synthetic pre-training datasets, generated by merging contemporary image-to-text(LLaVA) and text-to-image (SDXL) models, significantly amplifies object detection capabilities.
[ { "created": "Wed, 2 Aug 2023 17:39:30 GMT", "version": "v1" }, { "created": "Fri, 1 Dec 2023 18:25:19 GMT", "version": "v2" } ]
"2023-12-04T00:00:00"
[ [ "Ma", "Yan", "" ], [ "Liang", "Weicong", "" ], [ "Chen", "Bohan", "" ], [ "Hao", "Yiduo", "" ], [ "Hou", "Bojian", "" ], [ "Yue", "Xiangyu", "" ], [ "Zhang", "Chao", "" ], [ "Yuan", "Yuhui", "" ] ]
0no_new_dataset
2402.14563
Stephan Schl\"ogl PhD
Stephan Schl\"ogl, Gavin Doherty, Saturnino Luz
Wizard of Oz Experimentation for Language Technology Applications: Challenges and Tools
28 pages
Schlogl, S., Doherty, G., & Luz, S. (2015). Wizard of Oz Experimentation for Language Technology Applications: Challenges and Tools. Interacting with Computers 27(6), pp. 592-615
10.1093/iwc/iwu016
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wizard of OZ (WOZ) is a well-established method for simulating the functionality and user experience of future systems. Using a human wizard to mimic certain operations of a potential system is particularly useful in situations where extensive engineering effort would otherwise be needed to explore the design possibilities offered by such operations. The WOZ method has been widely used in connection with speech and language technologies, but advances in sensor technology and pattern recognition as well as new application areas such as human-robot interaction have made it increasingly relevant to the design of a wider range of interactive systems. In such cases achieving acceptable performance at the user interface level often hinges on resource intensive improvements such as domain tuning, which are better done once the overall design is relatively stable. While WOZ is recognised as a valuable prototyping technique, surprisingly little effort has been put into exploring it from a methodological point of view. Starting from a survey of the literature, this paper presents a systematic investigation and analysis of the design space for WOZ for language technology applications, and proposes a generic architecture for tool support that supports the integration of components for speech recognition and synthesis as well as for machine translation. This architecture is instantiated in WebWOZ - a new web-based open-source WOZ prototyping platform. The viability of generic support is explored empirically through a series of evaluations. Researchers from a variety of backgrounds were able to create experiments, independent of their previous experience with WOZ. The approach was further validated through a number of real experiments, which also helped to identify a number of possibilities for additional support, and flagged potential issues relating to consistency in Wizard performance.
[ { "created": "Thu, 22 Feb 2024 13:59:47 GMT", "version": "v1" } ]
"2024-02-23T00:00:00"
[ [ "Schlögl", "Stephan", "" ], [ "Doherty", "Gavin", "" ], [ "Luz", "Saturnino", "" ] ]
0no_new_dataset
2306.02842
Xiaolei Wang
Xiaolei Wang, Kun Zhou, Xinyu Tang, Wayne Xin Zhao, Fan Pan, Zhao Cao, Ji-Rong Wen
Improving Conversational Recommendation Systems via Counterfactual Data Simulation
Accepted by KDD 2023. Code: https://github.com/RUCAIBox/CFCRS
null
10.1145/3580305.3599387
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conversational recommender systems (CRSs) aim to provide recommendation services via natural language conversations. Although a number of approaches have been proposed for developing capable CRSs, they typically rely on sufficient training data for training. Since it is difficult to annotate recommendation-oriented dialogue datasets, existing CRS approaches often suffer from the issue of insufficient training due to the scarcity of training data. To address this issue, in this paper, we propose a CounterFactual data simulation approach for CRS, named CFCRS, to alleviate the issue of data scarcity in CRSs. Our approach is developed based on the framework of counterfactual data augmentation, which gradually incorporates the rewriting to the user preference from a real dialogue without interfering with the entire conversation flow. To develop our approach, we characterize user preference and organize the conversation flow by the entities involved in the dialogue, and design a multi-stage recommendation dialogue simulator based on a conversation flow language model. Under the guidance of the learned user preference and dialogue schema, the flow language model can produce reasonable, coherent conversation flows, which can be further realized into complete dialogues. Based on the simulator, we perform the intervention at the representations of the interacted entities of target users, and design an adversarial training method with a curriculum schedule that can gradually optimize the data augmentation strategy. Extensive experiments show that our approach can consistently boost the performance of several competitive CRSs, and outperform other data augmentation methods, especially when the training data is limited. Our code is publicly available at https://github.com/RUCAIBox/CFCRS.
[ { "created": "Mon, 5 Jun 2023 12:48:56 GMT", "version": "v1" } ]
"2024-06-21T00:00:00"
[ [ "Wang", "Xiaolei", "" ], [ "Zhou", "Kun", "" ], [ "Tang", "Xinyu", "" ], [ "Zhao", "Wayne Xin", "" ], [ "Pan", "Fan", "" ], [ "Cao", "Zhao", "" ], [ "Wen", "Ji-Rong", "" ] ]
1new_dataset
2404.12935
Sheeba Samuel
Sheeba Samuel and Daniel Mietchen
FAIR Jupyter: a knowledge graph approach to semantic sharing and granular exploration of a computational notebook reproducibility dataset
null
null
null
null
cs.CE
http://creativecommons.org/licenses/by/4.0/
The way in which data are shared can affect their utility and reusability. Here, we demonstrate how data that we had previously shared in bulk can be mobilized further through a knowledge graph that allows for much more granular exploration and interrogation. The original dataset is about the computational reproducibility of GitHub-hosted Jupyter notebooks associated with biomedical publications. It contains rich metadata about the publications, associated GitHub repositories and Jupyter notebooks, and the notebooks' reproducibility. We took this dataset, converted it into semantic triples and loaded these into a triple store to create a knowledge graph, FAIR Jupyter, that we made accessible via a web service. This enables granular data exploration and analysis through queries that can be tailored to specific use cases. Such queries may provide details about any of the variables from the original dataset, highlight relationships between them or combine some of the graph's content with materials from corresponding external resources. We provide a collection of example queries addressing a range of use cases in research and education. We also outline how sets of such queries can be used to profile specific content types, either individually or by class. We conclude by discussing how such a semantically enhanced sharing of complex datasets can both enhance their FAIRness, i.e., their findability, accessibility, interoperability, and reusability, and help identify and communicate best practices, particularly with regards to data quality, standardization, automation and reproducibility.
[ { "created": "Fri, 19 Apr 2024 15:07:23 GMT", "version": "v1" } ]
"2024-04-22T00:00:00"
[ [ "Samuel", "Sheeba", "" ], [ "Mietchen", "Daniel", "" ] ]
1new_dataset
2210.14979
Pirashanth Ratnamogan
Mathieu Grosso, Pirashanth Ratnamogan, Alexis Mathey, William Vanhuffel, Michael Fotso Fotso
Robust Domain Adaptation for Pre-trained Multilingual Neural Machine Translation Models
Accepted by EMNLP 2022 MMNLU Workshop
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by/4.0/
Recent literature has demonstrated the potential of multilingual Neural Machine Translation (mNMT) models. However, the most efficient models are not well suited to specialized industries. In these cases, internal data is scarce and expensive to find in all language pairs. Therefore, fine-tuning a mNMT model on a specialized domain is hard. In this context, we decided to focus on a new task: Domain Adaptation of a pre-trained mNMT model on a single pair of language while trying to maintain model quality on generic domain data for all language pairs. The risk of loss on generic domain and on other pairs is high. This task is key for mNMT model adoption in the industry and is at the border of many others. We propose a fine-tuning procedure for the generic mNMT that combines embeddings freezing and adversarial loss. Our experiments demonstrated that the procedure improves performances on specialized data with a minimal loss in initial performances on generic domain for all languages pairs, compared to a naive standard approach (+10.0 BLEU score on specialized data, -0.01 to -0.5 BLEU on WMT and Tatoeba datasets on the other pairs with M2M100).
[ { "created": "Wed, 26 Oct 2022 18:47:45 GMT", "version": "v1" } ]
"2022-10-28T00:00:00"
[ [ "Grosso", "Mathieu", "" ], [ "Ratnamogan", "Pirashanth", "" ], [ "Mathey", "Alexis", "" ], [ "Vanhuffel", "William", "" ], [ "Fotso", "Michael Fotso", "" ] ]
0no_new_dataset
1605.04447
Sayyed Ali Mirsoleimani
S. Ali Mirsoleimani, Aske Plaat, Jaap van den Herik and Jos Vermaseren
A New Method for Parallel Monte Carlo Tree Search
5 pages, 6 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years there has been much interest in the Monte Carlo tree search algorithm, a new, adaptive, randomized optimization algorithm. In fields as diverse as Artificial Intelligence, Operations Research, and High Energy Physics, research has established that Monte Carlo tree search can find good solutions without domain dependent heuristics. However, practice shows that reaching high performance on large parallel machines is not so successful as expected. This paper proposes a new method for parallel Monte Carlo tree search based on the pipeline computation pattern.
[ { "created": "Sat, 14 May 2016 18:28:08 GMT", "version": "v1" } ]
"2016-05-17T00:00:00"
[ [ "Mirsoleimani", "S. Ali", "" ], [ "Plaat", "Aske", "" ], [ "Herik", "Jaap van den", "" ], [ "Vermaseren", "Jos", "" ] ]
0no_new_dataset
1801.04069
Huoran Li
Huoran Li, Xuanzhe Liu, Qiaozhu Mei
Predicting Smartphone Battery Life based on Comprehensive and Real-time Usage Data
null
null
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smartphones and smartphone apps have undergone an explosive growth in the past decade. However, smartphone battery technology hasn't been able to keep pace with the rapid growth of the capacity and the functionality of smartphones and apps. As a result, battery has always been a bottleneck of a user's daily experience of smartphones. An accurate estimation of the remaining battery life could tremendously help the user to schedule their activities and use their smartphones more efficiently. Existing studies on battery life prediction have been primitive due to the lack of real-world smartphone usage data at scale. This paper presents a novel method that uses the state-of-the-art machine learning models for battery life prediction, based on comprehensive and real-time usage traces collected from smartphones. The proposed method is the first that identifies and addresses the severe data missing problem in this context, using a principled statistical metric called the concordance index. The method is evaluated using a dataset collected from 51 users for 21 months, which covers comprehensive and fine-grained smartphone usage traces including system status, sensor indicators, system events, and app status. We find that the remaining battery life of a smartphone can be accurately predicted based on how the user uses the device at the real-time, in the current session, and in history. The machine learning models successfully identify predictive features for battery life and their applicable scenarios.
[ { "created": "Fri, 12 Jan 2018 06:35:00 GMT", "version": "v1" } ]
"2018-01-15T00:00:00"
[ [ "Li", "Huoran", "" ], [ "Liu", "Xuanzhe", "" ], [ "Mei", "Qiaozhu", "" ] ]
1new_dataset
2304.07142
William Ravenscroft
William Ravenscroft and Stefan Goetze and Thomas Hain
On Data Sampling Strategies for Training Neural Network Speech Separation Models
Accepted for EUSIPCO 2023
null
null
null
cs.SD cs.AI cs.LG cs.NE eess.AS
http://creativecommons.org/licenses/by/4.0/
Speech separation remains an important area of multi-speaker signal processing. Deep neural network (DNN) models have attained the best performance on many speech separation benchmarks. Some of these models can take significant time to train and have high memory requirements. Previous work has proposed shortening training examples to address these issues but the impact of this on model performance is not yet well understood. In this work, the impact of applying these training signal length (TSL) limits is analysed for two speech separation models: SepFormer, a transformer model, and Conv-TasNet, a convolutional model. The WJS0-2Mix, WHAMR and Libri2Mix datasets are analysed in terms of signal length distribution and its impact on training efficiency. It is demonstrated that, for specific distributions, applying specific TSL limits results in better performance. This is shown to be mainly due to randomly sampling the start index of the waveforms resulting in more unique examples for training. A SepFormer model trained using a TSL limit of 4.42s and dynamic mixing (DM) is shown to match the best-performing SepFormer model trained with DM and unlimited signal lengths. Furthermore, the 4.42s TSL limit results in a 44% reduction in training time with WHAMR.
[ { "created": "Fri, 14 Apr 2023 14:05:52 GMT", "version": "v1" }, { "created": "Fri, 16 Jun 2023 13:42:10 GMT", "version": "v2" } ]
"2023-06-19T00:00:00"
[ [ "Ravenscroft", "William", "" ], [ "Goetze", "Stefan", "" ], [ "Hain", "Thomas", "" ] ]
1new_dataset
1912.01365
Andr\'e Gaul
Andr\'e Gaul, Ismail Khoffi, J\"org Liesen, Torsten St\"uber
Mathematical Analysis and Algorithms for Federated Byzantine Agreement Systems
null
null
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
We give an introduction to federated Byzantine agreement systems (FBAS) with many examples ranging from small "academic" cases to the current Stellar network. We then analyze the main concepts from a mathematical and an algorithmic point of view. Based on work of Lachowski we derive algorithms for quorum enumeration, checking quorum intersection, and computing the intact nodes with respect to a given set of ill-behaved (Byzantine) nodes. We also show that from the viewpoint of the intactness probability of nodes, which we introduce in this paper, a hierarchical setup of nodes is inferior to an arrangement that we call a symmetric simple FBAS. All algorithms described in this paper are implemented in the Python package Stellar Observatory, which is also used in some of the computed examples.
[ { "created": "Tue, 3 Dec 2019 13:53:29 GMT", "version": "v1" } ]
"2019-12-04T00:00:00"
[ [ "Gaul", "André", "" ], [ "Khoffi", "Ismail", "" ], [ "Liesen", "Jörg", "" ], [ "Stüber", "Torsten", "" ] ]
0no_new_dataset
1607.06797
Fariborz Taherkhani
Fariborz Taherkhani
A probabilistic patch based image representation using Conditional Random Field model for image classification
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
In this paper we proposed an ordered patch based method using Conditional Random Field (CRF) in order to encode local properties and their spatial relationship in images to address texture classification, face recognition, and scene classification problems. Typical image classification approaches work without considering spatial causality among distinctive properties of an image for image representation in feature space. In this method first, each image is encoded as a sequence of ordered patches, including local properties. Second, the sequence of these ordered patches is modeled as a probabilistic feature vector by CRF to model spatial relationship of these local properties. And finally, image classification is performed on such probabilistic image representation. Experimental results on several standard image datasets indicate that proposed method outperforms some of existing image classification methods.
[ { "created": "Fri, 22 Jul 2016 19:19:47 GMT", "version": "v1" }, { "created": "Wed, 5 Oct 2016 06:24:06 GMT", "version": "v2" } ]
"2016-10-06T00:00:00"
[ [ "Taherkhani", "Fariborz", "" ] ]
0no_new_dataset
2109.04440
Noel Alben
Noel Alben, Ranjani H.G
'1e0a': A Computational Approach to Rhythm Training
null
null
null
null
cs.MM
http://creativecommons.org/licenses/by/4.0/
We present a computational assessment system that promotes the learning of basic rhythmic patterns. The system is capable of generating multiple rhythmic patterns with increasing complexity within various cycle lengths. For a generated rhythm pattern the performance assessment of the learner is carried out through the statistical deviations calculated from the onset detection and temporal assessment of a learner's performance. This is compared with the generated pattern, and their performance accuracy forms the feedback to the learner. The system proceeds to generate a new pattern of increased complexity when performance assessment results are within certain error bounds. The system thus mimics a learner-teacher relationship as the learner progresses in their feedback-based learning. The choice of progression within a cycle for each pattern is determined by a predefined complexity metric. This metric is based on a coded element model for the perceptual processing of sequential stimuli. The model earlier proposed for a sequence of tones and non-tones, is now used for onsets and silences. This system is developed into a web-based application and provides accessibility for learning purposes. Analysis of the performance assessments shows that the complexity metric is indicative of the perceptual processing of rhythm patterns and can be used for rhythm learning.
[ { "created": "Thu, 9 Sep 2021 17:38:42 GMT", "version": "v1" } ]
"2021-09-10T00:00:00"
[ [ "Alben", "Noel", "" ], [ "G", "Ranjani H.", "" ] ]
0no_new_dataset
2402.00450
Qilong Yan
Qilong Yan, Yufeng Zhang, Jinghao Zhang, Jingpu Duan, Jian Yin
CPT: Competence-progressive Training Strategy for Few-shot Node Classification
arXiv admin note: substantial text overlap with arXiv:2206.11972 by other authors
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Graph Neural Networks (GNNs) have made significant advancements in node classification, but their success relies on sufficient labeled nodes per class in the training data. Real-world graph data often exhibits a long-tail distribution with sparse labels, emphasizing the importance of GNNs' ability in few-shot node classification, which entails categorizing nodes with limited data. Traditional episodic meta-learning approaches have shown promise in this domain, but they face an inherent limitation: it might lead the model to converge to suboptimal solutions because of random and uniform task assignment, ignoring task difficulty levels. This could lead the meta-learner to face complex tasks too soon, hindering proper learning. Ideally, the meta-learner should start with simple concepts and advance to more complex ones, like human learning. So, we introduce CPT, a novel two-stage curriculum learning method that aligns task difficulty with the meta-learner's progressive competence, enhancing overall performance. Specifically, in CPT's initial stage, the focus is on simpler tasks, fostering foundational skills for engaging with complex tasks later. Importantly, the second stage dynamically adjusts task difficulty based on the meta-learner's growing competence, aiming for optimal knowledge acquisition. Extensive experiments on popular node classification datasets demonstrate significant improvements of our strategy over existing methods.
[ { "created": "Thu, 1 Feb 2024 09:36:56 GMT", "version": "v1" }, { "created": "Fri, 23 Feb 2024 08:52:09 GMT", "version": "v2" } ]
"2024-02-26T00:00:00"
[ [ "Yan", "Qilong", "" ], [ "Zhang", "Yufeng", "" ], [ "Zhang", "Jinghao", "" ], [ "Duan", "Jingpu", "" ], [ "Yin", "Jian", "" ] ]
0no_new_dataset
2103.09113
Mariano Ceccato
Filippo Contro, Marco Crosara, Mariano Ceccato, Mila Dalla Preda
EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode
null
null
null
null
cs.SE cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the immutable nature of Ethereum smart contracts and of their transactions, quite many approaches have been proposed to detect defects and security problems before smart contracts become persistent in the blockchain and they are granted control on substantial financial value. Because smart contracts source code might not be available, static analysis approaches mostly face the challenge of analysing compiled Ethereum bytecode, that is available directly from the official blockchain. However, due to the intrinsic complexity of Ethereum bytecode (especially in jump resolution), static analysis encounters significant obstacles that reduce the accuracy of exiting automated tools. This paper presents a novel static analysis algorithm based on the symbolic execution of the Ethereum operand stack that allows us to resolve jumps in Ethereum bytecode and to construct an accurate control-flow graph (CFG) of the compiled smart contracts. EtherSolve is a prototype implementation of our approach. Experimental results on a significant set of real world Ethereum smart contracts show that EtherSolve improves the accuracy of the execrated CFGs with respect to the state of the art available approaches. Many static analysis techniques are based on the CFG representation of the code and would therefore benefit from the accurate extraction of the CFG. For example, we implemented a simple extension of EtherSolve that allows to detect instances of the re-entrancy vulnerability.
[ { "created": "Tue, 16 Mar 2021 14:51:53 GMT", "version": "v1" } ]
"2021-03-17T00:00:00"
[ [ "Contro", "Filippo", "" ], [ "Crosara", "Marco", "" ], [ "Ceccato", "Mariano", "" ], [ "Preda", "Mila Dalla", "" ] ]
1new_dataset
1906.00238
Alon Rozental
Alon Rozental
Adversarial Generation and Encoding of Nested Texts
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a new language model called AGENT, which stands for Adversarial Generation and Encoding of Nested Texts. AGENT is designed for encoding, generating and refining documents that consist of a long and coherent text, such as an entire book, provided they are hierarchically annotated (nested). i.e. divided into sentences, paragraphs and chapters. The core idea of our system is learning vector representations for each level of the text hierarchy (sentences, paragraphs, etc...), and train each such representation to perform 3 tasks: The task of reconstructing the sequence of vectors from a lower level that was used to create the representation, and generalized versions of the Masked Language Modeling (MLM) and "Next Sentence Prediction" tasks from BERT Devlin et al. [2018]. Additionally we present a new adversarial model for long text generation and suggest a way to improve the coherence of the generated text by traversing its vector representation tree.
[ { "created": "Sat, 1 Jun 2019 15:01:16 GMT", "version": "v1" } ]
"2019-06-04T00:00:00"
[ [ "Rozental", "Alon", "" ] ]
1new_dataset
2211.08217
Alan Lukezic
Nikola Djukic, Alan Lukezic, Vitjan Zavrtanik, Matej Kristan
A Low-Shot Object Counting Network With Iterative Prototype Adaptation
Accepted to ICCV2023, code: https://github.com/djukicn/loca
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
We consider low-shot counting of arbitrary semantic categories in the image using only few annotated exemplars (few-shot) or no exemplars (no-shot). The standard few-shot pipeline follows extraction of appearance queries from exemplars and matching them with image features to infer the object counts. Existing methods extract queries by feature pooling which neglects the shape information (e.g., size and aspect) and leads to a reduced object localization accuracy and count estimates. We propose a Low-shot Object Counting network with iterative prototype Adaptation (LOCA). Our main contribution is the new object prototype extraction module, which iteratively fuses the exemplar shape and appearance information with image features. The module is easily adapted to zero-shot scenarios, enabling LOCA to cover the entire spectrum of low-shot counting problems. LOCA outperforms all recent state-of-the-art methods on FSC147 benchmark by 20-30% in RMSE on one-shot and few-shot and achieves state-of-the-art on zero-shot scenarios, while demonstrating better generalization capabilities.
[ { "created": "Tue, 15 Nov 2022 15:39:23 GMT", "version": "v1" }, { "created": "Thu, 28 Sep 2023 13:20:18 GMT", "version": "v2" } ]
"2023-09-29T00:00:00"
[ [ "Djukic", "Nikola", "" ], [ "Lukezic", "Alan", "" ], [ "Zavrtanik", "Vitjan", "" ], [ "Kristan", "Matej", "" ] ]
0no_new_dataset
2012.15342
Thorsten Berger
Patrick Franz and Thorsten Berger and Ibrahim Fayaz and Sarah Nadi and Evgeny Groshev
ConfigFix: Interactive Configuration Conflict Resolution for the Linux Kernel
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Highly configurable systems are highly complex systems, with the Linux kernel arguably being one of the most well-known ones. Since 2007, it has been a frequent target of the research community, conducting empirical studies and building dedicated methods and tools for analyzing, configuring, testing, optimizing, and maintaining the kernel in the light of its vast configuration space. However, despite a large body of work, mainly bug fixes that were the result of such research made it back into the kernel's source tree. Unfortunately, Linux users still struggle with kernel configuration and resolving configuration conflicts, since the kernel largely lacks automated support. Additionally, there are technical and community requirements for supporting automated conflict resolution in the kernel, such as, for example, using a pure C-based solution that uses only compatible third-party libraries (if any). With the aim of contributing back to the Linux community, we present CONFIGFIX, a tooling that we integrated with the kernel configurator, that is purely implemented in C, and that is finally a working solution able to produce fixes for configuration conflicts. In this experience report, we describe our experiences ranging over a decade of building upon the large body of work from research on the Linux kernel configuration mechanisms as well as how we designed and realized CONFIGFIX while adhering to the Linux kernel's community requirements and standards. While CONFIGFIX helps Linux kernel users obtaining their desired configuration, the sound semantic abstraction we implement provides the basis for many of the above techniques supporting kernel configuration, helping researchers and kernel developers.
[ { "created": "Wed, 30 Dec 2020 22:17:15 GMT", "version": "v1" } ]
"2021-01-01T00:00:00"
[ [ "Franz", "Patrick", "" ], [ "Berger", "Thorsten", "" ], [ "Fayaz", "Ibrahim", "" ], [ "Nadi", "Sarah", "" ], [ "Groshev", "Evgeny", "" ] ]
0no_new_dataset
2404.05490
Baiyi Li
Baiyi Li, Edmond S.L. Ho, Hubert P.H. Shum and He Wang
Two-Person Interaction Augmentation with Skeleton Priors
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Close and continuous interaction with rich contacts is a crucial aspect of human activities (e.g. hugging, dancing) and of interest in many domains like activity recognition, motion prediction, character animation, etc. However, acquiring such skeletal motion is challenging. While direct motion capture is expensive and slow, motion editing/generation is also non-trivial, as complex contact patterns with topological and geometric constraints have to be retained. To this end, we propose a new deep learning method for two-body skeletal interaction motion augmentation, which can generate variations of contact-rich interactions with varying body sizes and proportions while retaining the key geometric/topological relations between two bodies. Our system can learn effectively from a relatively small amount of data and generalize to drastically different skeleton sizes. Through exhaustive evaluation and comparison, we show it can generate high-quality motions, has strong generalizability and outperforms traditional optimization-based methods and alternative deep learning solutions.
[ { "created": "Mon, 8 Apr 2024 13:11:57 GMT", "version": "v1" }, { "created": "Tue, 9 Apr 2024 18:55:43 GMT", "version": "v2" } ]
"2024-04-11T00:00:00"
[ [ "Li", "Baiyi", "" ], [ "Ho", "Edmond S. L.", "" ], [ "Shum", "Hubert P. H.", "" ], [ "Wang", "He", "" ] ]
1new_dataset
2403.08920
Carlos Olarte
Carlos Olarte and Peter Csaba \"Olveczky
Timed Strategies for Real-Time Rewrite Theories
null
null
null
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
In this paper we propose a language for conveniently defining a wide range of execution strategies for real-time rewrite theories, and provide Maude-strategy-implemented versions of most Real-Time Maude analysis methods, albeit with user-defined discrete and timed strategies. We also identify a new time sampling strategy that should provide both efficient and exhaustive analysis for many distributed real-time systems. We exemplify the use of our language and its analyses on a simple round trip time protocol, and compare the performance of standard Maude search with our strategy-implemented reachability analyses on the CASH scheduling algorithm benchmark.
[ { "created": "Wed, 13 Mar 2024 19:21:23 GMT", "version": "v1" } ]
"2024-03-15T00:00:00"
[ [ "Olarte", "Carlos", "" ], [ "Ölveczky", "Peter Csaba", "" ] ]
0no_new_dataset
2310.20024
Matin Macktoobian
Matin Macktoobian and Zhan Shu and Qing Zhao
Topology Recoverability Prediction for Ad-Hoc Robot Networks: A Data-Driven Fault-Tolerant Approach
null
IEEE Transactions on Signal and Information Processing over Networks, 2023
10.1109/TSIPN.2023.3328275
null
cs.RO cs.AI cs.LG cs.MA
http://creativecommons.org/licenses/by/4.0/
Faults occurring in ad-hoc robot networks may fatally perturb their topologies leading to disconnection of subsets of those networks. Optimal topology synthesis is generally resource-intensive and time-consuming to be done in real time for large ad-hoc robot networks. One should only perform topology re-computations if the probability of topology recoverability after the occurrence of any fault surpasses that of its irrecoverability. We formulate this problem as a binary classification problem. Then, we develop a two-pathway data-driven model based on Bayesian Gaussian mixture models that predicts the solution to a typical problem by two different pre-fault and post-fault prediction pathways. The results, obtained by the integration of the predictions of those pathways, clearly indicate the success of our model in solving the topology (ir)recoverability prediction problem compared to the best of current strategies found in the literature.
[ { "created": "Mon, 30 Oct 2023 21:16:46 GMT", "version": "v1" } ]
"2023-11-01T00:00:00"
[ [ "Macktoobian", "Matin", "" ], [ "Shu", "Zhan", "" ], [ "Zhao", "Qing", "" ] ]
0no_new_dataset
2309.05941
Cliff Zou
Mnassar Alyami, Abdulmajeed Alghamdi, Mohammed Alkhowaiter, Cliff Zou, Yan Solihin
Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks
15 pages, 4 figures, to appear in Sensors 2023
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Despite encryption, the packet size is still visible, enabling observers to infer private information in the Internet of Things (IoT) environment (e.g., IoT device identification). Packet padding obfuscates packet-length characteristics with a high data overhead because it relies on adding noise to the data. This paper proposes a more data-efficient approach that randomizes packet sizes without adding noise. We achieve this by splitting large TCP segments into random-sized chunks; hence, the packet length distribution is obfuscated without adding noise data. Our client-server implementation using TCP sockets demonstrates the feasibility of our approach at the application level. We realize our packet size control by adjusting two local socket-programming parameters. First, we enable the TCP_NODELAY option to send out each packet with our specified length. Second, we downsize the sending buffer to prevent the sender from pushing out more data than can be received, which could disable our control of the packet sizes. We simulate our defense on a network trace of four IoT devices and show a reduction in device classification accuracy from 98% to 63%, close to random guessing. Meanwhile, the real-world data transmission experiments show that the added latency is reasonable, less than 21%, while the added packet header overhead is only about 5%.
[ { "created": "Tue, 12 Sep 2023 03:33:36 GMT", "version": "v1" } ]
"2023-09-13T00:00:00"
[ [ "Alyami", "Mnassar", "" ], [ "Alghamdi", "Abdulmajeed", "" ], [ "Alkhowaiter", "Mohammed", "" ], [ "Zou", "Cliff", "" ], [ "Solihin", "Yan", "" ] ]
1new_dataset
2405.03808
Priyadarshini Pennathur
Priyadarshini R. Pennathur, Valerie Boksa, Arunkumar Pennathur, Andrew Kusiak, Beth Livingston
The Future of Office and Administrative Support Occupations in the Era of Artificial Intelligence: A Bibliometric Analysis
This work is being submitted to the IEEE for possible publication
null
null
null
cs.CY
http://creativecommons.org/licenses/by-nc-nd/4.0/
The U.S. Bureau of Labor Statistics projects that by the year 2029, the United States will lose a million jobs in the office and administrative support occupations because technology, automation, and artificial intelligence (AI) have the potential to substitute or replace the office and administrative functions performed by office workers. Despite the potential impact AI will have on office work and the important role office workers play in the American economy, we have limited knowledge of the state of the art research in office work at the intersection of emerging artificial intelligence technologies. In this study, we conducted a bibliometric analysis of the scholarly literature at the intersection of office work and artificial intelligence. We extracted literature sources from Compendex and Scopus databases and used VOSviewer for visualizing and quantifying our bibliometric analyses. Our findings from keywords analysis indicate that office automation, humans, human-computer interaction, and artificial intelligence occurred more frequently in the scholarly literature and had high link strengths. Keyword clusters from co-occurrence analysis indicate that intelligent buildings, robotics, and the internet of things are emerging topics in the office work domain. The two clusters related to ergonomics, worker characteristics, human performance, and safety indicate the types of human factors concerns that are more widely studied in office work settings. In summary, our findings on the state-of-the-art research in office work indicate that more studies have been conducted on smart buildings, robotics, and technology development for office work, compared to studies on office workers and their professional development.
[ { "created": "Mon, 6 May 2024 19:33:32 GMT", "version": "v1" } ]
"2024-05-08T00:00:00"
[ [ "Pennathur", "Priyadarshini R.", "" ], [ "Boksa", "Valerie", "" ], [ "Pennathur", "Arunkumar", "" ], [ "Kusiak", "Andrew", "" ], [ "Livingston", "Beth", "" ] ]
0no_new_dataset