id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
479
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
unknown | authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2407.11626 | Dongnan Jin | Dongnan Jin, Yali Liu, Qiuzhi Song, Xunju Ma, Yue Liu, Dehao Wu | Dynamic Dimension Wrapping (DDW) Algorithm: A Novel Approach for
Efficient Cross-Dimensional Search in Dynamic Multidimensional Spaces | null | null | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the real world, as the complexity of optimization problems continues to
increase, there is an urgent need to research more efficient optimization
methods. Current optimization algorithms excel in solving problems with a fixed
number of dimensions. However, their efficiency in searching dynamic
multi-dimensional spaces is unsatisfactory. In response to the challenge of
cross-dimensional search in multi-dimensional spaces with varying numbers of
dimensions, this study proposes a new optimization algorithm-Dynamic Dimension
Wrapping (DDW) algorithm. Firstly, by utilizing the Dynamic Time Warping (DTW)
algorithm and Euclidean distance, a mapping relationship between different time
series across dimensions is established, thus creating a fitness function
suitable for dimensionally dynamic multi-dimensional space. Additionally, DDW
introduces a novel, more efficient cross-dimensional search mechanism for
dynamic multidimensional spaces. Finally, through comparative tests with 31
optimization algorithms in dynamic multidimensional space search, the results
demonstrate that DDW exhibits outstanding search efficiency and provides search
results closest to the actual optimal solution.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 11:41:35 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 08:41:40 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Jin",
"Dongnan",
""
],
[
"Liu",
"Yali",
""
],
[
"Song",
"Qiuzhi",
""
],
[
"Ma",
"Xunju",
""
],
[
"Liu",
"Yue",
""
],
[
"Wu",
"Dehao",
""
]
] |
2407.11631 | Niklas Reich | Niklas Reich, Karsten Urban, J\"urgen Vorloeper | A parallel batch greedy algorithm in reduced basis methods: Convergence
rates and numerical results | 21 pages, 4 figures | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | The "classical" (weak) greedy algorithm is widely used within model order
reduction in order to compute a reduced basis in the offline training phase: An
a posteriori error estimator is maximized and the snapshot corresponding to the
maximizer is added to the basis. Since these snapshots are determined by a
sufficiently detailed discretization, the offline phase is often
computationally extremely costly. We suggest to replace the serial
determination of one snapshot after the other by a parallel approach. In order
to do so, we introduce a batch size $b$ and add $b$ snapshots to the current
basis in every greedy iteration. These snapshots are computed in parallel. We
prove convergence rates for this new batch greedy algorithm and compare them to
those of the classical (weak) greedy algorithm in the Hilbert and Banach space
case. Then, we present numerical results where we apply a (parallel)
implementation of the proposed algorithm to the linear elliptic thermal block
problem. We analyze the convergence rate as well as the offline and online
wall-clock times for different batch sizes. We show that the proposed variant
can significantly speed-up the offline phase while the size of the reduced
problem is only moderately increased. The benefit of the parallel batch greedy
increases for more complicated problems.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 11:50:04 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 11:28:24 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Reich",
"Niklas",
""
],
[
"Urban",
"Karsten",
""
],
[
"Vorloeper",
"Jürgen",
""
]
] |
2407.11635 | Ignacio Borsa Sanjuan | Ignacio Borsa, Daniel de Florian, Rodolfo Sassot, Marco Stratmann,
Werner Vogelsang | NNLO Global Analysis of Polarized Parton Distribution Functions | 5 pages, 5 figures | null | null | null | hep-ph | http://creativecommons.org/licenses/by/4.0/ | We present a next-to-next-to-leading order (NNLO) global QCD analysis of the
proton's helicity parton distribution functions (PDFs), the first of its kind.
To obtain the distributions, we use data for longitudinal spin asymmetries in
inclusive and semi-inclusive lepton-nucleon scattering as well as in weak-boson
and hadron or jet production in proton-proton scattering. We analyze the data
using QCD perturbation theory at NNLO accuracy, employing approximations
provided by the threshold resummation formalism in cases where full NNLO
results for partonic hard-scattering functions are not readily available. Our
numerical results suggest a remarkable perturbative stability of the extracted
helicity PDFs.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 11:58:11 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 21:31:54 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Borsa",
"Ignacio",
""
],
[
"de Florian",
"Daniel",
""
],
[
"Sassot",
"Rodolfo",
""
],
[
"Stratmann",
"Marco",
""
],
[
"Vogelsang",
"Werner",
""
]
] |
2407.11689 | Petal Mokryn | Petal B. Mokryn | A Topological View on Integration and Exterior Calculus | null | null | null | null | math.DG math.GN math.KT | http://creativecommons.org/licenses/by/4.0/ | A construction of integration, function calculus, and exterior calculus is
made, allowing for integration of unital magma valued functions against
(compactified) unital magma valued measures over arbitrary topological spaces.
The Riemann integral, geometric product integral, and Lebesgue integral are
shown as special cases. Notions similar to chain complexes are developed to
allow this form of integration to define notions of exterior derivative for
differential forms, and of derivatives of functions as well. Resulting
conclusions on integration, orientation, dimension, and differentiation are
discussed. Applications include calculus on fractals, stochastic analysis,
discrete analysis, and other novel forms of calculus.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 13:04:41 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 23:33:12 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Mokryn",
"Petal B.",
""
]
] |
2407.11727 | Tao Luo | BESIII Collaboration: M. Ablikim, M. N. Achasov, P. Adlarson, O.
Afedulidis, X. C. Ai, R. Aliberti, A. Amoroso, Q. An, Y. Bai, O. Bakina, I.
Balossino, Y. Ban, H.-R. Bao, V. Batozskaya, K. Begzsuren, N. Berger, M.
Berlowski, M. Bertani, D. Bettoni, F. Bianchi, E. Bianco, A. Bortone, I.
Boyko, R. A. Briere, A. Brueggemann, H. Cai, X. Cai, A. Calcaterra, G. F.
Cao, N. Cao, S. A. Cetin, J. F. Chang, G. R. Che, G. Chelkov, C. Chen, C. H.
Chen, Chao Chen, G. Chen, H. S. Chen, H. Y. Chen, M. L. Chen, S. J. Chen, S.
L. Chen, S. M. Chen, T. Chen, X. R. Chen, X. T. Chen, Y. B. Chen, Y. Q. Chen,
Z. J. Chen, Z. Y. Chen, S. K. Choi, G. Cibinetto, F. Cossio, J. J. Cui, H. L.
Dai, J. P. Dai, A. Dbeyssi, R. E. de Boer, D. Dedovich, C. Q. Deng, Z. Y.
Deng, A. Denig, I. Denysenko, M. Destefanis, F. De Mori, B. Ding, X. X. Ding,
Y. Ding, Y. Ding, J. Dong, L. Y. Dong, M. Y. Dong, X. Dong, M. C. Du, S. X.
Du, Y. Y. Duan, Z. H. Duan, P. Egorov, Y. H. Fan, J. Fang, J. Fang, S. S.
Fang, W. X. Fang, Y. Fang, Y. Q. Fang, R. Farinelli, L. Fava, F. Feldbauer,
G. Felici, C. Q. Feng, J. H. Feng, Y. T. Feng, M. Fritsch, C. D. Fu, J. L.
Fu, Y. W. Fu, H. Gao, X. B. Gao, Y. N. Gao, Yang Gao, S. Garbolino, I.
Garzia, L. Ge, P. T. Ge, Z. W. Ge, C. Geng, E. M. Gersabeck, A. Gilman, K.
Goetzen, L. Gong, W. X. Gong, W. Gradl, S. Gramigna, M. Greco, M. H. Gu, Y.
T. Gu, C. Y. Guan, A. Q. Guo, L. B. Guo, M. J. Guo, R. P. Guo, Y. P. Guo, A.
Guskov, J. Gutierrez, K. L. Han, T. T. Han, F. Hanisch, X. Q. Hao, F. A.
Harris, K. K. He, K. L. He, F. H. Heinsius, C. H. Heinz, Y. K. Heng, C.
Herold, T. Holtmann, P. C. Hong, G. Y. Hou, X. T. Hou, Y. R. Hou, Z. L. Hou,
B. Y. Hu, H. M. Hu, J. F. Hu, S. L. Hu, T. Hu, Y. Hu, G. S. Huang, K. X.
Huang, L. Q. Huang, X. T. Huang, Y. P. Huang, Y. S. Huang, T. Hussain, F.
H\"olzken, N. H\"usken, N. in der Wiesche, J. Jackson, S. Janchiv, J. H.
Jeong, Q. Ji, Q. P. Ji, W. Ji, X. B. Ji, X. L. Ji, Y. Y. Ji, X. Q. Jia, Z. K.
Jia, D. Jiang, H. B. Jiang, P. C. Jiang, S. S. Jiang, T. J. Jiang, X. S.
Jiang, Y. Jiang, J. B. Jiao, J. K. Jiao, Z. Jiao, S. Jin, Y. Jin, M. Q. Jing,
X. M. Jing, T. Johansson, S. Kabana, N. Kalantar-Nayestanaki, X. L. Kang, X.
S. Kang, M. Kavatsyuk, B. C. Ke, V. Khachatryan, A. Khoukaz, R. Kiuchi, O. B.
Kolcu, B. Kopf, M. Kuessner, X. Kui, N. Kumar, A. Kupsc, W. K\"uhn, J. J.
Lane, L. Lavezzi, T. T. Lei, Z. H. Lei, M. Lellmann, T. Lenz, C. Li, C. Li,
C. H. Li, Cheng Li, D. M. Li, F. Li, G. Li, H. B. Li, H. J. Li, H. N. Li, Hui
Li, J. R. Li, J. S. Li, K. Li, L. J. Li, L. K. Li, Lei Li, M. H. Li, P. R.
Li, Q. M. Li, Q. X. Li, R. Li, S. X. Li, T. Li, W. D. Li, W. G. Li, X. Li, X.
H. Li, X. L. Li, X. Y. Li, X. Z. Li, Y. G. Li, Z. J. Li, Z. Y. Li, C. Liang,
H. Liang, H. Liang, Y. F. Liang, Y. T. Liang, G. R. Liao, Y. P. Liao, J.
Libby, A. Limphirat, C. C. Lin, D. X. Lin, T. Lin, B. J. Liu, B. X. Liu, C.
Liu, C. X. Liu, F. Liu, F. H. Liu, Feng Liu, G. M. Liu, H. Liu, H. B. Liu, H.
H. Liu, H. M. Liu, Huihui Liu, J. B. Liu, J. Y. Liu, K. Liu, K. Y. Liu, Ke
Liu, L. Liu, L. C. Liu, Lu Liu, M. H. Liu, P. L. Liu, Q. Liu, S. B. Liu, T.
Liu, W. K. Liu, W. M. Liu, X. Liu, X. Liu, Y. Liu, Y. Liu, Y. B. Liu, Z. A.
Liu, Z. D. Liu, Z. Q. Liu, X. C. Lou, F. X. Lu, H. J. Lu, J. G. Lu, X. L. Lu,
Y. Lu, Y. P. Lu, Z. H. Lu, C. L. Luo, J. R. Luo, M. X. Luo, T. Luo, X. L.
Luo, X. R. Lyu, Y. F. Lyu, F. C. Ma, H. Ma, H. L. Ma, J. L. Ma, L. L. Ma, M.
M. Ma, Q. M. Ma, R. Q. Ma, T. Ma, X. T. Ma, X. Y. Ma, Y. Ma, Y. M. Ma, F. E.
Maas, M. Maggiora, S. Malde, Y. J. Mao, Z. P. Mao, S. Marcello, Z. X. Meng,
J. G. Messchendorp, G. Mezzadri, H. Miao, T. J. Min, R. E. Mitchell, X. H.
Mo, B. Moses, N. Yu. Muchnoi, J. Muskalla, Y. Nefedov, F. Nerling, L. S. Nie,
I. B. Nikolaev, Z. Ning, S. Nisar, Q. L. Niu, W. D. Niu, Y. Niu, S. L. Olsen,
Q. Ouyang, S. Pacetti, X. Pan, Y. Pan, A. Pathak, Y. P. Pei, M. Pelizaeus, H.
P. Peng, Y. Y. Peng, K. Peters, J. L. Ping, R. G. Ping, S. Plura, V. Prasad,
F. Z. Qi, H. Qi, H. R. Qi, M. Qi, T. Y. Qi, S. Qian, W. B. Qian, C. F. Qiao,
X. K. Qiao, J. J. Qin, L. Q. Qin, L. Y. Qin, X. P. Qin, X. S. Qin, Z. H. Qin,
J. F. Qiu, Z. H. Qu, C. F. Redmer, K. J. Ren, A. Rivetti, M. Rolo, G. Rong,
Ch. Rosner, S. N. Ruan, N. Salone, A. Sarantsev, Y. Schelhaas, K. Schoenning,
M. Scodeggio, K. Y. Shan, W. Shan, X. Y. Shan, Z. J. Shang, J. F. Shangguan,
L. G. Shao, M. Shao, C. P. Shen, H. F. Shen, W. H. Shen, X. Y. Shen, B. A.
Shi, H. Shi, H. C. Shi, J. L. Shi, J. Y. Shi, Q. Q. Shi, S. Y. Shi, X. Shi,
J. J. Song, T. Z. Song, W. M. Song, Y. J. Song, Y. X. Song, S. Sosio, S.
Spataro, F. Stieler, Y. J. Su, G. B. Sun, G. X. Sun, H. Sun, H. K. Sun, J. F.
Sun, K. Sun, L. Sun, S. S. Sun, T. Sun, W. Y. Sun, Y. Sun, Y. J. Sun, Y. Z.
Sun, Z. Q. Sun, Z. T. Sun, C. J. Tang, G. Y. Tang, J. Tang, M. Tang, Y. A.
Tang, L. Y. Tao, Q. T. Tao, M. Tat, J. X. Teng, V. Thoren, W. H. Tian, Y.
Tian, Z. F. Tian, I. Uman, Y. Wan, S. J. Wang, B. Wang, B. L. Wang, Bo Wang,
D. Y. Wang, F. Wang, H. J. Wang, J. J. Wang, J. P. Wang, K. Wang, L. L. Wang,
M. Wang, N. Y. Wang, S. Wang, S. Wang, T. Wang, T. J. Wang, W. Wang, W. Wang,
W. P. Wang, X. Wang, X. F. Wang, X. J. Wang, X. L. Wang, X. N. Wang, Y. Wang,
Y. D. Wang, Y. F. Wang, Y. L. Wang, Y. N. Wang, Y. Q. Wang, Yaqian Wang, Yi
Wang, Z. Wang, Z. L. Wang, Z. Y. Wang, Ziyi Wang, D. H. Wei, F. Weidner, S.
P. Wen, Y. R. Wen, U. Wiedner, G. Wilkinson, M. Wolke, L. Wollenberg, C. Wu,
J. F. Wu, L. H. Wu, L. J. Wu, X. Wu, X. H. Wu, Y. Wu, Y. H. Wu, Y. J. Wu, Z.
Wu, L. Xia, X. M. Xian, B. H. Xiang, T. Xiang, D. Xiao, G. Y. Xiao, S. Y.
Xiao, Y. L. Xiao, Z. J. Xiao, C. Xie, X. H. Xie, Y. Xie, Y. G. Xie, Y. H.
Xie, Z. P. Xie, T. Y. Xing, C. F. Xu, C. J. Xu, G. F. Xu, H. Y. Xu, M. Xu, Q.
J. Xu, Q. N. Xu, W. Xu, W. L. Xu, X. P. Xu, Y. C. Xu, Z. S. Xu, F. Yan, L.
Yan, W. B. Yan, W. C. Yan, X. Q. Yan, H. J. Yang, H. L. Yang, H. X. Yang, T.
Yang, Y. Yang, Y. F. Yang, Y. F. Yang, Y. X. Yang, Z. W. Yang, Z. P. Yao, M.
Ye, M. H. Ye, J. H. Yin, Z. Y. You, B. X. Yu, C. X. Yu, G. Yu, J. S. Yu, T.
Yu, X. D. Yu, Y. C. Yu, C. Z. Yuan, J. Yuan, J. Yuan, L. Yuan, S. C. Yuan, Y.
Yuan, Z. Y. Yuan, C. X. Yue, A. A. Zafar, F. R. Zeng, S. H. Zeng, X. Zeng, Y.
Zeng, Y. J. Zeng, Y. J. Zeng, X. Y. Zhai, Y. C. Zhai, Y. H. Zhan, A. Q.
Zhang, B. L. Zhang, B. X. Zhang, D. H. Zhang, G. Y. Zhang, H. Zhang, H.
Zhang, H. C. Zhang, H. H. Zhang, H. H. Zhang, H. Q. Zhang, H. R. Zhang, H. Y.
Zhang, J. Zhang, J. Zhang, J. J. Zhang, J. L. Zhang, J. Q. Zhang, J. S.
Zhang, J. W. Zhang, J. X. Zhang, J. Y. Zhang, J. Z. Zhang, Jianyu Zhang, L.
M. Zhang, Lei Zhang, P. Zhang, Q. Y. Zhang, R. Y. Zhang, S. H. Zhang, Shulei
Zhang, X. D. Zhang, X. M. Zhang, X. Y. Zhang, Y. Zhang, Y. Zhang, Y. T.
Zhang, Y. H. Zhang, Y. M. Zhang, Yan Zhang, Z. D. Zhang, Z. H. Zhang, Z. L.
Zhang, Z. Y. Zhang, Z. Y. Zhang, Z. Z. Zhang, G. Zhao, J. Y. Zhao, J. Z.
Zhao, L. Zhao, Lei Zhao, M. G. Zhao, N. Zhao, R. P. Zhao, S. J. Zhao, Y. B.
Zhao, Y. X. Zhao, Z. G. Zhao, A. Zhemchugov, B. Zheng, B. M. Zheng, J. P.
Zheng, W. J. Zheng, Y. H. Zheng, B. Zhong, X. Zhong, H. Zhou, J. Y. Zhou, L.
P. Zhou, S. Zhou, X. Zhou, X. K. Zhou, X. R. Zhou, X. Y. Zhou, Y. Z. Zhou, J.
Zhu, K. Zhu, K. J. Zhu, K. S. Zhu, L. Zhu, L. X. Zhu, S. H. Zhu, T. J. Zhu,
W. D. Zhu, Y. C. Zhu, Z. A. Zhu, J. H. Zou, J. Zu | Measurement of the branching fraction of $D^+_s\to \ell^+\nu_\ell$ via
$e^+e^-\to D^{*+}_{s} D^{*-}_{s}$ | 27 pages, 13 figures | null | null | null | hep-ex hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Based on $10.64~\mathrm{fb}^{-1}$ of $e^+e^-$ collision data taken at
center-of-mass energies between 4.237 and 4.699 GeV with the BESIII detector,
we study the leptonic $D^+_s$ decays using the $e^+e^-\to D^{*+}_{s}
D^{*-}_{s}$ process. The branching fractions of
$D_s^+\to\ell^+\nu_{\ell}\,(\ell=\mu,\tau)$ are measured to be
$\mathcal{B}(D_s^+\to\mu^+\nu_\mu)=(0.547\pm0.026_{\rm stat}\pm0.016_{\rm
syst})\%$ and $\mathcal{B}(D_s^+\to\tau^+\nu_\tau)=(5.60\pm0.16_{\rm
stat}\pm0.20_{\rm syst})\%$, respectively. The product of the decay constant
and Cabibbo-Kobayashi-Maskawa matrix element $|V_{cs}|$ is determined to be
$f_{D_s^+}|V_{cs}|=(246.5\pm5.9_{\rm stat}\pm3.6_{\rm syst}\pm0.5_{\rm
input})_{\mu\nu}~\mathrm{MeV}$ and $f_{D_s^+}|V_{cs}|=(252.7\pm3.6_{\rm
stat}\pm4.5_{\rm syst}\pm0.6_{\rm input}))_{\tau \nu}~\mathrm{MeV}$,
respectively. Taking the value of $|V_{cs}|$ from a global fit in the Standard
Model, we obtain ${f_{D^+_s}}=(252.8\pm6.0_{\rm stat}\pm3.7_{\rm
syst}\pm0.6_{\rm input})_{\mu\nu}$ MeV and ${f_{D^+_s}}=(259.2\pm3.6_{\rm
stat}\pm4.5_{\rm syst}\pm0.6_{\rm input})_{\tau \nu}$ MeV, respectively.
Conversely, taking the value for $f_{D_s^+}$ from the latest lattice quantum
chromodynamics calculation, we obtain $|V_{cs}| =(0.986\pm0.023_{\rm
stat}\pm0.014_{\rm syst}\pm0.003_{\rm input})_{\mu\nu}$ and $|V_{cs}| =
(1.011\pm0.014_{\rm stat}\pm0.018_{\rm syst}\pm0.003_{\rm input})_{\tau \nu}$,
respectively.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 13:47:17 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 14:07:59 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"BESIII Collaboration",
"",
""
],
[
"Ablikim",
"M.",
""
],
[
"Achasov",
"M. N.",
""
],
[
"Adlarson",
"P.",
""
],
[
"Afedulidis",
"O.",
""
],
[
"Ai",
"X. C.",
""
],
[
"Aliberti",
"R.",
""
],
[
"Amoroso",
"A.",
""
],
[
"An",
"Q.",
""
],
[
"Bai",
"Y.",
""
],
[
"Bakina",
"O.",
""
],
[
"Balossino",
"I.",
""
],
[
"Ban",
"Y.",
""
],
[
"Bao",
"H. -R.",
""
],
[
"Batozskaya",
"V.",
""
],
[
"Begzsuren",
"K.",
""
],
[
"Berger",
"N.",
""
],
[
"Berlowski",
"M.",
""
],
[
"Bertani",
"M.",
""
],
[
"Bettoni",
"D.",
""
],
[
"Bianchi",
"F.",
""
],
[
"Bianco",
"E.",
""
],
[
"Bortone",
"A.",
""
],
[
"Boyko",
"I.",
""
],
[
"Briere",
"R. A.",
""
],
[
"Brueggemann",
"A.",
""
],
[
"Cai",
"H.",
""
],
[
"Cai",
"X.",
""
],
[
"Calcaterra",
"A.",
""
],
[
"Cao",
"G. F.",
""
],
[
"Cao",
"N.",
""
],
[
"Cetin",
"S. A.",
""
],
[
"Chang",
"J. F.",
""
],
[
"Che",
"G. R.",
""
],
[
"Chelkov",
"G.",
""
],
[
"Chen",
"C.",
""
],
[
"Chen",
"C. H.",
""
],
[
"Chen",
"Chao",
""
],
[
"Chen",
"G.",
""
],
[
"Chen",
"H. S.",
""
],
[
"Chen",
"H. Y.",
""
],
[
"Chen",
"M. L.",
""
],
[
"Chen",
"S. J.",
""
],
[
"Chen",
"S. L.",
""
],
[
"Chen",
"S. M.",
""
],
[
"Chen",
"T.",
""
],
[
"Chen",
"X. R.",
""
],
[
"Chen",
"X. T.",
""
],
[
"Chen",
"Y. B.",
""
],
[
"Chen",
"Y. Q.",
""
],
[
"Chen",
"Z. J.",
""
],
[
"Chen",
"Z. Y.",
""
],
[
"Choi",
"S. K.",
""
],
[
"Cibinetto",
"G.",
""
],
[
"Cossio",
"F.",
""
],
[
"Cui",
"J. J.",
""
],
[
"Dai",
"H. L.",
""
],
[
"Dai",
"J. P.",
""
],
[
"Dbeyssi",
"A.",
""
],
[
"de Boer",
"R. E.",
""
],
[
"Dedovich",
"D.",
""
],
[
"Deng",
"C. Q.",
""
],
[
"Deng",
"Z. Y.",
""
],
[
"Denig",
"A.",
""
],
[
"Denysenko",
"I.",
""
],
[
"Destefanis",
"M.",
""
],
[
"De Mori",
"F.",
""
],
[
"Ding",
"B.",
""
],
[
"Ding",
"X. X.",
""
],
[
"Ding",
"Y.",
""
],
[
"Ding",
"Y.",
""
],
[
"Dong",
"J.",
""
],
[
"Dong",
"L. Y.",
""
],
[
"Dong",
"M. Y.",
""
],
[
"Dong",
"X.",
""
],
[
"Du",
"M. C.",
""
],
[
"Du",
"S. X.",
""
],
[
"Duan",
"Y. Y.",
""
],
[
"Duan",
"Z. H.",
""
],
[
"Egorov",
"P.",
""
],
[
"Fan",
"Y. H.",
""
],
[
"Fang",
"J.",
""
],
[
"Fang",
"J.",
""
],
[
"Fang",
"S. S.",
""
],
[
"Fang",
"W. X.",
""
],
[
"Fang",
"Y.",
""
],
[
"Fang",
"Y. Q.",
""
],
[
"Farinelli",
"R.",
""
],
[
"Fava",
"L.",
""
],
[
"Feldbauer",
"F.",
""
],
[
"Felici",
"G.",
""
],
[
"Feng",
"C. Q.",
""
],
[
"Feng",
"J. H.",
""
],
[
"Feng",
"Y. T.",
""
],
[
"Fritsch",
"M.",
""
],
[
"Fu",
"C. D.",
""
],
[
"Fu",
"J. L.",
""
],
[
"Fu",
"Y. W.",
""
],
[
"Gao",
"H.",
""
],
[
"Gao",
"X. B.",
""
],
[
"Gao",
"Y. N.",
""
],
[
"Gao",
"Yang",
""
],
[
"Garbolino",
"S.",
""
],
[
"Garzia",
"I.",
""
],
[
"Ge",
"L.",
""
],
[
"Ge",
"P. T.",
""
],
[
"Ge",
"Z. W.",
""
],
[
"Geng",
"C.",
""
],
[
"Gersabeck",
"E. M.",
""
],
[
"Gilman",
"A.",
""
],
[
"Goetzen",
"K.",
""
],
[
"Gong",
"L.",
""
],
[
"Gong",
"W. X.",
""
],
[
"Gradl",
"W.",
""
],
[
"Gramigna",
"S.",
""
],
[
"Greco",
"M.",
""
],
[
"Gu",
"M. H.",
""
],
[
"Gu",
"Y. T.",
""
],
[
"Guan",
"C. Y.",
""
],
[
"Guo",
"A. Q.",
""
],
[
"Guo",
"L. B.",
""
],
[
"Guo",
"M. J.",
""
],
[
"Guo",
"R. P.",
""
],
[
"Guo",
"Y. P.",
""
],
[
"Guskov",
"A.",
""
],
[
"Gutierrez",
"J.",
""
],
[
"Han",
"K. L.",
""
],
[
"Han",
"T. T.",
""
],
[
"Hanisch",
"F.",
""
],
[
"Hao",
"X. Q.",
""
],
[
"Harris",
"F. A.",
""
],
[
"He",
"K. K.",
""
],
[
"He",
"K. L.",
""
],
[
"Heinsius",
"F. H.",
""
],
[
"Heinz",
"C. H.",
""
],
[
"Heng",
"Y. K.",
""
],
[
"Herold",
"C.",
""
],
[
"Holtmann",
"T.",
""
],
[
"Hong",
"P. C.",
""
],
[
"Hou",
"G. Y.",
""
],
[
"Hou",
"X. T.",
""
],
[
"Hou",
"Y. R.",
""
],
[
"Hou",
"Z. L.",
""
],
[
"Hu",
"B. Y.",
""
],
[
"Hu",
"H. M.",
""
],
[
"Hu",
"J. F.",
""
],
[
"Hu",
"S. L.",
""
],
[
"Hu",
"T.",
""
],
[
"Hu",
"Y.",
""
],
[
"Huang",
"G. S.",
""
],
[
"Huang",
"K. X.",
""
],
[
"Huang",
"L. Q.",
""
],
[
"Huang",
"X. T.",
""
],
[
"Huang",
"Y. P.",
""
],
[
"Huang",
"Y. S.",
""
],
[
"Hussain",
"T.",
""
],
[
"Hölzken",
"F.",
""
],
[
"Hüsken",
"N.",
""
],
[
"der Wiesche",
"N. in",
""
],
[
"Jackson",
"J.",
""
],
[
"Janchiv",
"S.",
""
],
[
"Jeong",
"J. H.",
""
],
[
"Ji",
"Q.",
""
],
[
"Ji",
"Q. P.",
""
],
[
"Ji",
"W.",
""
],
[
"Ji",
"X. B.",
""
],
[
"Ji",
"X. L.",
""
],
[
"Ji",
"Y. Y.",
""
],
[
"Jia",
"X. Q.",
""
],
[
"Jia",
"Z. K.",
""
],
[
"Jiang",
"D.",
""
],
[
"Jiang",
"H. B.",
""
],
[
"Jiang",
"P. C.",
""
],
[
"Jiang",
"S. S.",
""
],
[
"Jiang",
"T. J.",
""
],
[
"Jiang",
"X. S.",
""
],
[
"Jiang",
"Y.",
""
],
[
"Jiao",
"J. B.",
""
],
[
"Jiao",
"J. K.",
""
],
[
"Jiao",
"Z.",
""
],
[
"Jin",
"S.",
""
],
[
"Jin",
"Y.",
""
],
[
"Jing",
"M. Q.",
""
],
[
"Jing",
"X. M.",
""
],
[
"Johansson",
"T.",
""
],
[
"Kabana",
"S.",
""
],
[
"Kalantar-Nayestanaki",
"N.",
""
],
[
"Kang",
"X. L.",
""
],
[
"Kang",
"X. S.",
""
],
[
"Kavatsyuk",
"M.",
""
],
[
"Ke",
"B. C.",
""
],
[
"Khachatryan",
"V.",
""
],
[
"Khoukaz",
"A.",
""
],
[
"Kiuchi",
"R.",
""
],
[
"Kolcu",
"O. B.",
""
],
[
"Kopf",
"B.",
""
],
[
"Kuessner",
"M.",
""
],
[
"Kui",
"X.",
""
],
[
"Kumar",
"N.",
""
],
[
"Kupsc",
"A.",
""
],
[
"Kühn",
"W.",
""
],
[
"Lane",
"J. J.",
""
],
[
"Lavezzi",
"L.",
""
],
[
"Lei",
"T. T.",
""
],
[
"Lei",
"Z. H.",
""
],
[
"Lellmann",
"M.",
""
],
[
"Lenz",
"T.",
""
],
[
"Li",
"C.",
""
],
[
"Li",
"C.",
""
],
[
"Li",
"C. H.",
""
],
[
"Li",
"Cheng",
""
],
[
"Li",
"D. M.",
""
],
[
"Li",
"F.",
""
],
[
"Li",
"G.",
""
],
[
"Li",
"H. B.",
""
],
[
"Li",
"H. J.",
""
],
[
"Li",
"H. N.",
""
],
[
"Li",
"Hui",
""
],
[
"Li",
"J. R.",
""
],
[
"Li",
"J. S.",
""
],
[
"Li",
"K.",
""
],
[
"Li",
"L. J.",
""
],
[
"Li",
"L. K.",
""
],
[
"Li",
"Lei",
""
],
[
"Li",
"M. H.",
""
],
[
"Li",
"P. R.",
""
],
[
"Li",
"Q. M.",
""
],
[
"Li",
"Q. X.",
""
],
[
"Li",
"R.",
""
],
[
"Li",
"S. X.",
""
],
[
"Li",
"T.",
""
],
[
"Li",
"W. D.",
""
],
[
"Li",
"W. G.",
""
],
[
"Li",
"X.",
""
],
[
"Li",
"X. H.",
""
],
[
"Li",
"X. L.",
""
],
[
"Li",
"X. Y.",
""
],
[
"Li",
"X. Z.",
""
],
[
"Li",
"Y. G.",
""
],
[
"Li",
"Z. J.",
""
],
[
"Li",
"Z. Y.",
""
],
[
"Liang",
"C.",
""
],
[
"Liang",
"H.",
""
],
[
"Liang",
"H.",
""
],
[
"Liang",
"Y. F.",
""
],
[
"Liang",
"Y. T.",
""
],
[
"Liao",
"G. R.",
""
],
[
"Liao",
"Y. P.",
""
],
[
"Libby",
"J.",
""
],
[
"Limphirat",
"A.",
""
],
[
"Lin",
"C. C.",
""
],
[
"Lin",
"D. X.",
""
],
[
"Lin",
"T.",
""
],
[
"Liu",
"B. J.",
""
],
[
"Liu",
"B. X.",
""
],
[
"Liu",
"C.",
""
],
[
"Liu",
"C. X.",
""
],
[
"Liu",
"F.",
""
],
[
"Liu",
"F. H.",
""
],
[
"Liu",
"Feng",
""
],
[
"Liu",
"G. M.",
""
],
[
"Liu",
"H.",
""
],
[
"Liu",
"H. B.",
""
],
[
"Liu",
"H. H.",
""
],
[
"Liu",
"H. M.",
""
],
[
"Liu",
"Huihui",
""
],
[
"Liu",
"J. B.",
""
],
[
"Liu",
"J. Y.",
""
],
[
"Liu",
"K.",
""
],
[
"Liu",
"K. Y.",
""
],
[
"Liu",
"Ke",
""
],
[
"Liu",
"L.",
""
],
[
"Liu",
"L. C.",
""
],
[
"Liu",
"Lu",
""
],
[
"Liu",
"M. H.",
""
],
[
"Liu",
"P. L.",
""
],
[
"Liu",
"Q.",
""
],
[
"Liu",
"S. B.",
""
],
[
"Liu",
"T.",
""
],
[
"Liu",
"W. K.",
""
],
[
"Liu",
"W. M.",
""
],
[
"Liu",
"X.",
""
],
[
"Liu",
"X.",
""
],
[
"Liu",
"Y.",
""
],
[
"Liu",
"Y.",
""
],
[
"Liu",
"Y. B.",
""
],
[
"Liu",
"Z. A.",
""
],
[
"Liu",
"Z. D.",
""
],
[
"Liu",
"Z. Q.",
""
],
[
"Lou",
"X. C.",
""
],
[
"Lu",
"F. X.",
""
],
[
"Lu",
"H. J.",
""
],
[
"Lu",
"J. G.",
""
],
[
"Lu",
"X. L.",
""
],
[
"Lu",
"Y.",
""
],
[
"Lu",
"Y. P.",
""
],
[
"Lu",
"Z. H.",
""
],
[
"Luo",
"C. L.",
""
],
[
"Luo",
"J. R.",
""
],
[
"Luo",
"M. X.",
""
],
[
"Luo",
"T.",
""
],
[
"Luo",
"X. L.",
""
],
[
"Lyu",
"X. R.",
""
],
[
"Lyu",
"Y. F.",
""
],
[
"Ma",
"F. C.",
""
],
[
"Ma",
"H.",
""
],
[
"Ma",
"H. L.",
""
],
[
"Ma",
"J. L.",
""
],
[
"Ma",
"L. L.",
""
],
[
"Ma",
"M. M.",
""
],
[
"Ma",
"Q. M.",
""
],
[
"Ma",
"R. Q.",
""
],
[
"Ma",
"T.",
""
],
[
"Ma",
"X. T.",
""
],
[
"Ma",
"X. Y.",
""
],
[
"Ma",
"Y.",
""
],
[
"Ma",
"Y. M.",
""
],
[
"Maas",
"F. E.",
""
],
[
"Maggiora",
"M.",
""
],
[
"Malde",
"S.",
""
],
[
"Mao",
"Y. J.",
""
],
[
"Mao",
"Z. P.",
""
],
[
"Marcello",
"S.",
""
],
[
"Meng",
"Z. X.",
""
],
[
"Messchendorp",
"J. G.",
""
],
[
"Mezzadri",
"G.",
""
],
[
"Miao",
"H.",
""
],
[
"Min",
"T. J.",
""
],
[
"Mitchell",
"R. E.",
""
],
[
"Mo",
"X. H.",
""
],
[
"Moses",
"B.",
""
],
[
"Muchnoi",
"N. Yu.",
""
],
[
"Muskalla",
"J.",
""
],
[
"Nefedov",
"Y.",
""
],
[
"Nerling",
"F.",
""
],
[
"Nie",
"L. S.",
""
],
[
"Nikolaev",
"I. B.",
""
],
[
"Ning",
"Z.",
""
],
[
"Nisar",
"S.",
""
],
[
"Niu",
"Q. L.",
""
],
[
"Niu",
"W. D.",
""
],
[
"Niu",
"Y.",
""
],
[
"Olsen",
"S. L.",
""
],
[
"Ouyang",
"Q.",
""
],
[
"Pacetti",
"S.",
""
],
[
"Pan",
"X.",
""
],
[
"Pan",
"Y.",
""
],
[
"Pathak",
"A.",
""
],
[
"Pei",
"Y. P.",
""
],
[
"Pelizaeus",
"M.",
""
],
[
"Peng",
"H. P.",
""
],
[
"Peng",
"Y. Y.",
""
],
[
"Peters",
"K.",
""
],
[
"Ping",
"J. L.",
""
],
[
"Ping",
"R. G.",
""
],
[
"Plura",
"S.",
""
],
[
"Prasad",
"V.",
""
],
[
"Qi",
"F. Z.",
""
],
[
"Qi",
"H.",
""
],
[
"Qi",
"H. R.",
""
],
[
"Qi",
"M.",
""
],
[
"Qi",
"T. Y.",
""
],
[
"Qian",
"S.",
""
],
[
"Qian",
"W. B.",
""
],
[
"Qiao",
"C. F.",
""
],
[
"Qiao",
"X. K.",
""
],
[
"Qin",
"J. J.",
""
],
[
"Qin",
"L. Q.",
""
],
[
"Qin",
"L. Y.",
""
],
[
"Qin",
"X. P.",
""
],
[
"Qin",
"X. S.",
""
],
[
"Qin",
"Z. H.",
""
],
[
"Qiu",
"J. F.",
""
],
[
"Qu",
"Z. H.",
""
],
[
"Redmer",
"C. F.",
""
],
[
"Ren",
"K. J.",
""
],
[
"Rivetti",
"A.",
""
],
[
"Rolo",
"M.",
""
],
[
"Rong",
"G.",
""
],
[
"Rosner",
"Ch.",
""
],
[
"Ruan",
"S. N.",
""
],
[
"Salone",
"N.",
""
],
[
"Sarantsev",
"A.",
""
],
[
"Schelhaas",
"Y.",
""
],
[
"Schoenning",
"K.",
""
],
[
"Scodeggio",
"M.",
""
],
[
"Shan",
"K. Y.",
""
],
[
"Shan",
"W.",
""
],
[
"Shan",
"X. Y.",
""
],
[
"Shang",
"Z. J.",
""
],
[
"Shangguan",
"J. F.",
""
],
[
"Shao",
"L. G.",
""
],
[
"Shao",
"M.",
""
],
[
"Shen",
"C. P.",
""
],
[
"Shen",
"H. F.",
""
],
[
"Shen",
"W. H.",
""
],
[
"Shen",
"X. Y.",
""
],
[
"Shi",
"B. A.",
""
],
[
"Shi",
"H.",
""
],
[
"Shi",
"H. C.",
""
],
[
"Shi",
"J. L.",
""
],
[
"Shi",
"J. Y.",
""
],
[
"Shi",
"Q. Q.",
""
],
[
"Shi",
"S. Y.",
""
],
[
"Shi",
"X.",
""
],
[
"Song",
"J. J.",
""
],
[
"Song",
"T. Z.",
""
],
[
"Song",
"W. M.",
""
],
[
"Song",
"Y. J.",
""
],
[
"Song",
"Y. X.",
""
],
[
"Sosio",
"S.",
""
],
[
"Spataro",
"S.",
""
],
[
"Stieler",
"F.",
""
],
[
"Su",
"Y. J.",
""
],
[
"Sun",
"G. B.",
""
],
[
"Sun",
"G. X.",
""
],
[
"Sun",
"H.",
""
],
[
"Sun",
"H. K.",
""
],
[
"Sun",
"J. F.",
""
],
[
"Sun",
"K.",
""
],
[
"Sun",
"L.",
""
],
[
"Sun",
"S. S.",
""
],
[
"Sun",
"T.",
""
],
[
"Sun",
"W. Y.",
""
],
[
"Sun",
"Y.",
""
],
[
"Sun",
"Y. J.",
""
],
[
"Sun",
"Y. Z.",
""
],
[
"Sun",
"Z. Q.",
""
],
[
"Sun",
"Z. T.",
""
],
[
"Tang",
"C. J.",
""
],
[
"Tang",
"G. Y.",
""
],
[
"Tang",
"J.",
""
],
[
"Tang",
"M.",
""
],
[
"Tang",
"Y. A.",
""
],
[
"Tao",
"L. Y.",
""
],
[
"Tao",
"Q. T.",
""
],
[
"Tat",
"M.",
""
],
[
"Teng",
"J. X.",
""
],
[
"Thoren",
"V.",
""
],
[
"Tian",
"W. H.",
""
],
[
"Tian",
"Y.",
""
],
[
"Tian",
"Z. F.",
""
],
[
"Uman",
"I.",
""
],
[
"Wan",
"Y.",
""
],
[
"Wang",
"S. J.",
""
],
[
"Wang",
"B.",
""
],
[
"Wang",
"B. L.",
""
],
[
"Wang",
"Bo",
""
],
[
"Wang",
"D. Y.",
""
],
[
"Wang",
"F.",
""
],
[
"Wang",
"H. J.",
""
],
[
"Wang",
"J. J.",
""
],
[
"Wang",
"J. P.",
""
],
[
"Wang",
"K.",
""
],
[
"Wang",
"L. L.",
""
],
[
"Wang",
"M.",
""
],
[
"Wang",
"N. Y.",
""
],
[
"Wang",
"S.",
""
],
[
"Wang",
"S.",
""
],
[
"Wang",
"T.",
""
],
[
"Wang",
"T. J.",
""
],
[
"Wang",
"W.",
""
],
[
"Wang",
"W.",
""
],
[
"Wang",
"W. P.",
""
],
[
"Wang",
"X.",
""
],
[
"Wang",
"X. F.",
""
],
[
"Wang",
"X. J.",
""
],
[
"Wang",
"X. L.",
""
],
[
"Wang",
"X. N.",
""
],
[
"Wang",
"Y.",
""
],
[
"Wang",
"Y. D.",
""
],
[
"Wang",
"Y. F.",
""
],
[
"Wang",
"Y. L.",
""
],
[
"Wang",
"Y. N.",
""
],
[
"Wang",
"Y. Q.",
""
],
[
"Wang",
"Yaqian",
""
],
[
"Wang",
"Yi",
""
],
[
"Wang",
"Z.",
""
],
[
"Wang",
"Z. L.",
""
],
[
"Wang",
"Z. Y.",
""
],
[
"Wang",
"Ziyi",
""
],
[
"Wei",
"D. H.",
""
],
[
"Weidner",
"F.",
""
],
[
"Wen",
"S. P.",
""
],
[
"Wen",
"Y. R.",
""
],
[
"Wiedner",
"U.",
""
],
[
"Wilkinson",
"G.",
""
],
[
"Wolke",
"M.",
""
],
[
"Wollenberg",
"L.",
""
],
[
"Wu",
"C.",
""
],
[
"Wu",
"J. F.",
""
],
[
"Wu",
"L. H.",
""
],
[
"Wu",
"L. J.",
""
],
[
"Wu",
"X.",
""
],
[
"Wu",
"X. H.",
""
],
[
"Wu",
"Y.",
""
],
[
"Wu",
"Y. H.",
""
],
[
"Wu",
"Y. J.",
""
],
[
"Wu",
"Z.",
""
],
[
"Xia",
"L.",
""
],
[
"Xian",
"X. M.",
""
],
[
"Xiang",
"B. H.",
""
],
[
"Xiang",
"T.",
""
],
[
"Xiao",
"D.",
""
],
[
"Xiao",
"G. Y.",
""
],
[
"Xiao",
"S. Y.",
""
],
[
"Xiao",
"Y. L.",
""
],
[
"Xiao",
"Z. J.",
""
],
[
"Xie",
"C.",
""
],
[
"Xie",
"X. H.",
""
],
[
"Xie",
"Y.",
""
],
[
"Xie",
"Y. G.",
""
],
[
"Xie",
"Y. H.",
""
],
[
"Xie",
"Z. P.",
""
],
[
"Xing",
"T. Y.",
""
],
[
"Xu",
"C. F.",
""
],
[
"Xu",
"C. J.",
""
],
[
"Xu",
"G. F.",
""
],
[
"Xu",
"H. Y.",
""
],
[
"Xu",
"M.",
""
],
[
"Xu",
"Q. J.",
""
],
[
"Xu",
"Q. N.",
""
],
[
"Xu",
"W.",
""
],
[
"Xu",
"W. L.",
""
],
[
"Xu",
"X. P.",
""
],
[
"Xu",
"Y. C.",
""
],
[
"Xu",
"Z. S.",
""
],
[
"Yan",
"F.",
""
],
[
"Yan",
"L.",
""
],
[
"Yan",
"W. B.",
""
],
[
"Yan",
"W. C.",
""
],
[
"Yan",
"X. Q.",
""
],
[
"Yang",
"H. J.",
""
],
[
"Yang",
"H. L.",
""
],
[
"Yang",
"H. X.",
""
],
[
"Yang",
"T.",
""
],
[
"Yang",
"Y.",
""
],
[
"Yang",
"Y. F.",
""
],
[
"Yang",
"Y. F.",
""
],
[
"Yang",
"Y. X.",
""
],
[
"Yang",
"Z. W.",
""
],
[
"Yao",
"Z. P.",
""
],
[
"Ye",
"M.",
""
],
[
"Ye",
"M. H.",
""
],
[
"Yin",
"J. H.",
""
],
[
"You",
"Z. Y.",
""
],
[
"Yu",
"B. X.",
""
],
[
"Yu",
"C. X.",
""
],
[
"Yu",
"G.",
""
],
[
"Yu",
"J. S.",
""
],
[
"Yu",
"T.",
""
],
[
"Yu",
"X. D.",
""
],
[
"Yu",
"Y. C.",
""
],
[
"Yuan",
"C. Z.",
""
],
[
"Yuan",
"J.",
""
],
[
"Yuan",
"J.",
""
],
[
"Yuan",
"L.",
""
],
[
"Yuan",
"S. C.",
""
],
[
"Yuan",
"Y.",
""
],
[
"Yuan",
"Z. Y.",
""
],
[
"Yue",
"C. X.",
""
],
[
"Zafar",
"A. A.",
""
],
[
"Zeng",
"F. R.",
""
],
[
"Zeng",
"S. H.",
""
],
[
"Zeng",
"X.",
""
],
[
"Zeng",
"Y.",
""
],
[
"Zeng",
"Y. J.",
""
],
[
"Zeng",
"Y. J.",
""
],
[
"Zhai",
"X. Y.",
""
],
[
"Zhai",
"Y. C.",
""
],
[
"Zhan",
"Y. H.",
""
],
[
"Zhang",
"A. Q.",
""
],
[
"Zhang",
"B. L.",
""
],
[
"Zhang",
"B. X.",
""
],
[
"Zhang",
"D. H.",
""
],
[
"Zhang",
"G. Y.",
""
],
[
"Zhang",
"H.",
""
],
[
"Zhang",
"H.",
""
],
[
"Zhang",
"H. C.",
""
],
[
"Zhang",
"H. H.",
""
],
[
"Zhang",
"H. H.",
""
],
[
"Zhang",
"H. Q.",
""
],
[
"Zhang",
"H. R.",
""
],
[
"Zhang",
"H. Y.",
""
],
[
"Zhang",
"J.",
""
],
[
"Zhang",
"J.",
""
],
[
"Zhang",
"J. J.",
""
],
[
"Zhang",
"J. L.",
""
],
[
"Zhang",
"J. Q.",
""
],
[
"Zhang",
"J. S.",
""
],
[
"Zhang",
"J. W.",
""
],
[
"Zhang",
"J. X.",
""
],
[
"Zhang",
"J. Y.",
""
],
[
"Zhang",
"J. Z.",
""
],
[
"Zhang",
"Jianyu",
""
],
[
"Zhang",
"L. M.",
""
],
[
"Zhang",
"Lei",
""
],
[
"Zhang",
"P.",
""
],
[
"Zhang",
"Q. Y.",
""
],
[
"Zhang",
"R. Y.",
""
],
[
"Zhang",
"S. H.",
""
],
[
"Zhang",
"Shulei",
""
],
[
"Zhang",
"X. D.",
""
],
[
"Zhang",
"X. M.",
""
],
[
"Zhang",
"X. Y.",
""
],
[
"Zhang",
"Y.",
""
],
[
"Zhang",
"Y.",
""
],
[
"Zhang",
"Y. T.",
""
],
[
"Zhang",
"Y. H.",
""
],
[
"Zhang",
"Y. M.",
""
],
[
"Zhang",
"Yan",
""
],
[
"Zhang",
"Z. D.",
""
],
[
"Zhang",
"Z. H.",
""
],
[
"Zhang",
"Z. L.",
""
],
[
"Zhang",
"Z. Y.",
""
],
[
"Zhang",
"Z. Y.",
""
],
[
"Zhang",
"Z. Z.",
""
],
[
"Zhao",
"G.",
""
],
[
"Zhao",
"J. Y.",
""
],
[
"Zhao",
"J. Z.",
""
],
[
"Zhao",
"L.",
""
],
[
"Zhao",
"Lei",
""
],
[
"Zhao",
"M. G.",
""
],
[
"Zhao",
"N.",
""
],
[
"Zhao",
"R. P.",
""
],
[
"Zhao",
"S. J.",
""
],
[
"Zhao",
"Y. B.",
""
],
[
"Zhao",
"Y. X.",
""
],
[
"Zhao",
"Z. G.",
""
],
[
"Zhemchugov",
"A.",
""
],
[
"Zheng",
"B.",
""
],
[
"Zheng",
"B. M.",
""
],
[
"Zheng",
"J. P.",
""
],
[
"Zheng",
"W. J.",
""
],
[
"Zheng",
"Y. H.",
""
],
[
"Zhong",
"B.",
""
],
[
"Zhong",
"X.",
""
],
[
"Zhou",
"H.",
""
],
[
"Zhou",
"J. Y.",
""
],
[
"Zhou",
"L. P.",
""
],
[
"Zhou",
"S.",
""
],
[
"Zhou",
"X.",
""
],
[
"Zhou",
"X. K.",
""
],
[
"Zhou",
"X. R.",
""
],
[
"Zhou",
"X. Y.",
""
],
[
"Zhou",
"Y. Z.",
""
],
[
"Zhu",
"J.",
""
],
[
"Zhu",
"K.",
""
],
[
"Zhu",
"K. J.",
""
],
[
"Zhu",
"K. S.",
""
],
[
"Zhu",
"L.",
""
],
[
"Zhu",
"L. X.",
""
],
[
"Zhu",
"S. H.",
""
],
[
"Zhu",
"T. J.",
""
],
[
"Zhu",
"W. D.",
""
],
[
"Zhu",
"Y. C.",
""
],
[
"Zhu",
"Z. A.",
""
],
[
"Zou",
"J. H.",
""
],
[
"Zu",
"J.",
""
]
] |
2407.11790 | Dengke Han | Dengke Han, Mingyu Yan, Xiaochun Ye, Dongrui Fan, Ninghui Sun | Characterizing and Understanding HGNN Training on GPUs | 23 pages, 14 figures, submitted to ACM TACO | null | null | null | cs.LG cs.AI cs.AR cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Owing to their remarkable representation capabilities for heterogeneous graph
data, Heterogeneous Graph Neural Networks (HGNNs) have been widely adopted in
many critical real-world domains such as recommendation systems and medical
analysis. Prior to their practical application, identifying the optimal HGNN
model parameters tailored to specific tasks through extensive training is a
time-consuming and costly process. To enhance the efficiency of HGNN training,
it is essential to characterize and analyze the execution semantics and
patterns within the training process to identify performance bottlenecks. In
this study, we conduct an in-depth quantification and analysis of two
mainstream HGNN training scenarios, including single-GPU and multi-GPU
distributed training. Based on the characterization results, we disclose the
performance bottlenecks and their underlying causes in different HGNN training
scenarios and provide optimization guidelines from both software and hardware
perspectives.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 14:45:46 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 00:50:49 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Han",
"Dengke",
""
],
[
"Yan",
"Mingyu",
""
],
[
"Ye",
"Xiaochun",
""
],
[
"Fan",
"Dongrui",
""
],
[
"Sun",
"Ninghui",
""
]
] |
2407.11921 | Wenxiang Jiang | Wenxiang Jiang, Hanwei Zhang, Shuo Zhao, Zhongwen Guo, Hao Wang | IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields | null | null | null | null | cs.CV cs.CR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Neural Radiance Field (NeRF) represents a significant advancement in computer
vision, offering implicit neural network-based scene representation and novel
view synthesis capabilities. Its applications span diverse fields including
robotics, urban mapping, autonomous navigation, virtual reality/augmented
reality, etc., some of which are considered high-risk AI applications. However,
despite its widespread adoption, the robustness and security of NeRF remain
largely unexplored. In this study, we contribute to this area by introducing
the Illusory Poisoning Attack against Neural Radiance Fields (IPA-NeRF). This
attack involves embedding a hidden backdoor view into NeRF, allowing it to
produce predetermined outputs, i.e. illusory, when presented with the specified
backdoor view while maintaining normal performance with standard inputs. Our
attack is specifically designed to deceive users or downstream models at a
particular position while ensuring that any abnormalities in NeRF remain
undetectable from other viewpoints. Experimental results demonstrate the
effectiveness of our Illusory Poisoning Attack, successfully presenting the
desired illusory on the specified viewpoint without impacting other views.
Notably, we achieve this attack by introducing small perturbations solely to
the training set. The code can be found at
https://github.com/jiang-wenxiang/IPA-NeRF.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 17:11:43 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 16:10:19 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Jiang",
"Wenxiang",
""
],
[
"Zhang",
"Hanwei",
""
],
[
"Zhao",
"Shuo",
""
],
[
"Guo",
"Zhongwen",
""
],
[
"Wang",
"Hao",
""
]
] |
2407.11926 | Alexander Jahn | Matthew Steinberg, Junyu Fan, Robert J. Harris, David Elkouss,
Sebastian Feld, Alexander Jahn | Far from Perfect: Quantum Error Correction with (Hyperinvariant) Evenbly
Codes | 22 pages, 13 figures | null | null | null | quant-ph hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new class of qubit codes that we call Evenbly codes, building
on a previous proposal of hyperinvariant tensor networks. Its tensor network
description consists of local, non-perfect tensors describing CSS codes
interspersed with Hadamard gates, placed on a hyperbolic $\{p,q\}$ geometry
with even $q\geq 4$, yielding an infinitely large class of subsystem codes. We
construct an example for a $\{5,4\}$ manifold and describe strategies of
logical gauge fixing that lead to different rates $k/n$ and distances $d$,
which we calculate analytically, finding distances which range from $d=2$ to $d
\sim n^{2/3}$ in the ungauged case. Investigating threshold performance under
erasure, depolarizing, and pure Pauli noise channels, we find that the code
exhibits a depolarizing noise threshold of about $19.1\%$ in the code-capacity
model and $50\%$ for pure Pauli and erasure channels under suitable gauges. We
also test a constant-rate version with $k/n = 0.125$, finding excellent error
resilience (about $40\%$) under the erasure channel. Recovery rates for these
and other settings are studied both under an optimal decoder as well as a more
efficient but non-optimal greedy decoder. We also consider generalizations
beyond the CSS tensor construction, compute error rates and thresholds for
other hyperbolic geometries, and discuss the relationship to holographic
bulk/boundary dualities. Our work indicates that Evenbly codes may show promise
for practical quantum computing applications.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 17:18:13 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Steinberg",
"Matthew",
""
],
[
"Fan",
"Junyu",
""
],
[
"Harris",
"Robert J.",
""
],
[
"Elkouss",
"David",
""
],
[
"Feld",
"Sebastian",
""
],
[
"Jahn",
"Alexander",
""
]
] |
2407.11962 | Jaehyeok Kim | Jaehyeok Kim, Dongyoon Wee, Dan Xu | Motion-Oriented Compositional Neural Radiance Fields for Monocular
Dynamic Human Modeling | Accepted by ECCV2024 | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces Motion-oriented Compositional Neural Radiance Fields
(MoCo-NeRF), a framework designed to perform free-viewpoint rendering of
monocular human videos via novel non-rigid motion modeling approach. In the
context of dynamic clothed humans, complex cloth dynamics generate non-rigid
motions that are intrinsically distinct from skeletal articulations and
critically important for the rendering quality. The conventional approach
models non-rigid motions as spatial (3D) deviations in addition to skeletal
transformations. However, it is either time-consuming or challenging to achieve
optimal quality due to its high learning complexity without a direct
supervision. To target this problem, we propose a novel approach of modeling
non-rigid motions as radiance residual fields to benefit from more direct color
supervision in the rendering and utilize the rigid radiance fields as a prior
to reduce the complexity of the learning process. Our approach utilizes a
single multiresolution hash encoding (MHE) to concurrently learn the canonical
T-pose representation from rigid skeletal motions and the radiance residual
field for non-rigid motions. Additionally, to further improve both training
efficiency and usability, we extend MoCo-NeRF to support simultaneous training
of multiple subjects within a single framework, thanks to our effective design
for modeling non-rigid motions. This scalability is achieved through the
integration of a global MHE and learnable identity codes in addition to
multiple local MHEs. We present extensive results on ZJU-MoCap and MonoCap,
clearly demonstrating state-of-the-art performance in both single- and
multi-subject settings. The code and model will be made publicly available at
the project page: https://stevejaehyeok.github.io/publications/moco-nerf.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 17:59:01 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 08:44:16 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Kim",
"Jaehyeok",
""
],
[
"Wee",
"Dongyoon",
""
],
[
"Xu",
"Dan",
""
]
] |
2407.12040 | Ranjan Sapkota | Ranjan Sapkota, Zhichao Meng, Dawood Ahmed, Martin Churuvija,
Xiaoqiang Du, Zenghong Ma, Manoj Karkee | Comprehensive Performance Evaluation of YOLOv10, YOLOv9 and YOLOv8 on
Detecting and Counting Fruitlet in Complex Orchard Environments | 15 figures, 2 tables | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | This study performed an extensive evaluation of the performances of all
configurations of YOLOv8, YOLOv9, and YOLOv10 object detection algorithms for
fruitlet (of green fruit) detection in commercial orchards. Additionally, this
research performed and validated in-field counting of fruitlets using an iPhone
and machine vision sensors in 5 different apple varieties (Scifresh, Scilate,
Honeycrisp, Cosmic crisp & Golden delicious). This comprehensive investigation
of total 17 different configurations (5 for YOLOv8, 6 for YOLOv9 and 6 for
YOLOv10) revealed that YOLOv9 outperforms YOLOv10 and YOLOv8 in terms of
mAP@50, while YOLOv10x outperformed all 17 configurations tested in terms of
precision and recall. Specifically, YOLOv9 Gelan-e achieved the highest mAP@50
of 0.935, outperforming YOLOv10n's 0.921 and YOLOv8s's 0.924. In terms of
precision, YOLOv10x achieved the highest precision of 0.908, indicating
superior object identification accuracy compared to other configurations tested
(e.g. YOLOv9 Gelan-c with a precision of 0.903 and YOLOv8m with 0.897. In terms
of recall, YOLOv10s achieved the highest in its series (0.872), while YOLOv9
Gelan m performed the best among YOLOv9 configurations (0.899), and YOLOv8n
performed the best among the YOLOv8 configurations (0.883). Meanwhile, three
configurations of YOLOv10: YOLOv10b, YOLOv10l, and YOLOv10x achieved superior
post-processing speeds of 1.5 milliseconds, outperforming all other
configurations within the YOLOv9 and YOLOv8 families. Specifically, YOLOv9
Gelan-e recorded a post-processing speed of 1.9 milliseconds, and YOLOv8m
achieved 2.1 milliseconds. Furthermore, YOLOv8n exhibited the highest inference
speed among all configurations tested, achieving a processing time of 4.1
milliseconds while YOLOv9 Gelan-t and YOLOv10n also demonstrated comparatively
slower inference speeds of 9.3 ms and 5.5 ms, respectively.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2024 17:59:55 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 01:58:57 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Sapkota",
"Ranjan",
""
],
[
"Meng",
"Zhichao",
""
],
[
"Ahmed",
"Dawood",
""
],
[
"Churuvija",
"Martin",
""
],
[
"Du",
"Xiaoqiang",
""
],
[
"Ma",
"Zenghong",
""
],
[
"Karkee",
"Manoj",
""
]
] |
2407.12192 | YuTe Lee | Sam Yu-Te Lee, Aryaman Bahukhandi, Dongyu Liu, and Kwan-Liu Ma | Towards Dataset-scale and Feature-oriented Evaluation of Text
Summarization in Large Language Model Prompts | null | null | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | Recent advancements in Large Language Models (LLMs) and Prompt Engineering
have made chatbot customization more accessible, significantly reducing
barriers to tasks that previously required programming skills. However, prompt
evaluation, especially at the dataset scale, remains complex due to the need to
assess prompts across thousands of test instances within a dataset. Our study,
based on a comprehensive literature review and pilot study, summarized five
critical challenges in prompt evaluation. In response, we introduce a
feature-oriented workflow for systematic prompt evaluation. In the context of
text summarization, our workflow advocates evaluation with summary
characteristics (feature metrics) such as complexity, formality, or
naturalness, instead of using traditional quality metrics like ROUGE. This
design choice enables a more user-friendly evaluation of prompts, as it guides
users in sorting through the ambiguity inherent in natural language. To support
this workflow, we introduce Awesum, a visual analytics system that facilitates
identifying optimal prompt refinements for text summarization through
interactive visualizations, featuring a novel Prompt Comparator design that
employs a BubbleSet-inspired design enhanced by dimensionality reduction
techniques. We evaluate the effectiveness and general applicability of the
system with practitioners from various domains and found that (1) our design
helps overcome the learning curve for non-technical people to conduct a
systematic evaluation of summarization prompts, and (2) our feature-oriented
workflow has the potential to generalize to other NLG and image-generation
tasks. For future works, we advocate moving towards feature-oriented evaluation
of LLM prompts and discuss unsolved challenges in terms of human-agent
interaction.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 21:36:43 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 05:08:03 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Lee",
"Sam Yu-Te",
""
],
[
"Bahukhandi",
"Aryaman",
""
],
[
"Liu",
"Dongyu",
""
],
[
"Ma",
"Kwan-Liu",
""
]
] |
2407.12210 | Markus Marks | Markus Marks, Manuel Knott, Neehar Kondapaneni, Elijah Cole, Thijs
Defraeye, Fernando Perez-Cruz, Pietro Perona | A Closer Look at Benchmarking Self-Supervised Pre-training with Image
Classification | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-supervised learning (SSL) is a machine learning approach where the data
itself provides supervision, eliminating the need for external labels. The
model is forced to learn about the data structure or context by solving a
pretext task. With SSL, models can learn from abundant and cheap unlabeled
data, significantly reducing the cost of training models where labels are
expensive or inaccessible. In Computer Vision, SSL is widely used as
pre-training followed by a downstream task, such as supervised transfer,
few-shot learning on smaller labeled data sets, and/or unsupervised clustering.
Unfortunately, it is infeasible to evaluate SSL methods on all possible
downstream tasks and objectively measure the quality of the learned
representation. Instead, SSL methods are evaluated using in-domain evaluation
protocols, such as fine-tuning, linear probing, and k-nearest neighbors (kNN).
However, it is not well understood how well these evaluation protocols estimate
the representation quality of a pre-trained model for different downstream
tasks under different conditions, such as dataset, metric, and model
architecture. We study how classification-based evaluation protocols for SSL
correlate and how well they predict downstream performance on different dataset
types. Our study includes eleven common image datasets and 26 models that were
pre-trained with different SSL methods or have different model backbones. We
find that in-domain linear/kNN probing protocols are, on average, the best
general predictors for out-of-domain performance. We further investigate the
importance of batch normalization and evaluate how robust correlations are for
different kinds of dataset domain shifts. We challenge assumptions about the
relationship between discriminative and generative self-supervised methods,
finding that most of their performance differences can be explained by changes
to model backbones.
| [
{
"version": "v1",
"created": "Tue, 16 Jul 2024 23:17:36 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 00:18:44 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Marks",
"Markus",
""
],
[
"Knott",
"Manuel",
""
],
[
"Kondapaneni",
"Neehar",
""
],
[
"Cole",
"Elijah",
""
],
[
"Defraeye",
"Thijs",
""
],
[
"Perez-Cruz",
"Fernando",
""
],
[
"Perona",
"Pietro",
""
]
] |
2407.12242 | Fanxu Meng | Fanxu Meng and Xiangzhen Zhou | Parameter Generation of Quantum Approximate Optimization Algorithm with
Diffusion Model | null | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Quantum computing presents a compelling prospect for revolutionizing the
field of combinatorial optimization, in virtue of the unique attributes of
quantum mechanics such as superposition and entanglement. The Quantum
Approximate Optimization Algorithm (QAOA), which is a variational hybrid
quantum-classical algorithm, stands out as leading proposals to efficiently
solve the Max-Cut problem, a representative example of combinatorial
optimization. However, its promised advantages strongly rely on parameters
initialization strategy, a critical aspect due to the non-convex and complex
optimization landscapes characterized by low-quality local minima issues.
Therefore, in this work, we formulate the problem of finding good initial
parameters as a generative task in which the generative machine learning model,
specifically the denoising diffusion probabilistic model (DDPM), is trained to
generate high-performing initial parameters for QAOA. The diffusion model is
capable of learning the distribution of high-performing parameters and then
synthesizing new parameters closer to optimal ones. Experiments with various
sized Max-Cut problem instances demonstrate that our diffusion process
consistently enhances QAOA effectiveness compared to random parameters
initialization. Moreover, our framework indicates the capacity of training on
small, classically simulatable problem instances, aiming at extrapolating to
larger instances to reduce quantum computational resource overhead.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 01:18:27 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 16:19:55 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Meng",
"Fanxu",
""
],
[
"Zhou",
"Xiangzhen",
""
]
] |
2407.12281 | Shuli Jiang | Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Farhan Ahmed, Ling Cai,
Nathalie Baracaldo | Turning Generative Models Degenerate: The Power of Data Poisoning
Attacks | 18 pages, 11 figures | null | null | null | cs.CR cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The increasing use of large language models (LLMs) trained by third parties
raises significant security concerns. In particular, malicious actors can
introduce backdoors through poisoning attacks to generate undesirable outputs.
While such attacks have been extensively studied in image domains and
classification tasks, they remain underexplored for natural language generation
(NLG) tasks. To address this gap, we conduct an investigation of various
poisoning techniques targeting the LLM's fine-tuning phase via prefix-tuning, a
Parameter Efficient Fine-Tuning (PEFT) method. We assess their effectiveness
across two generative tasks: text summarization and text completion; and we
also introduce new metrics to quantify the success and stealthiness of such NLG
poisoning attacks. Through our experiments, we find that the prefix-tuning
hyperparameters and trigger designs are the most crucial factors to influence
attack success and stealthiness. Moreover, we demonstrate that existing popular
defenses are ineffective against our poisoning attacks. Our study presents the
first systematic approach to understanding poisoning attacks targeting NLG
tasks during fine-tuning via PEFT across a wide range of triggers and attack
settings. We hope our findings will aid the AI security community in developing
effective defenses against such threats.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 03:02:15 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 05:52:35 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Jiang",
"Shuli",
""
],
[
"Kadhe",
"Swanand Ravindra",
""
],
[
"Zhou",
"Yi",
""
],
[
"Ahmed",
"Farhan",
""
],
[
"Cai",
"Ling",
""
],
[
"Baracaldo",
"Nathalie",
""
]
] |
2407.12288 | Hong Jun Jeon | Hong Jun Jeon, Benjamin Van Roy | Information-Theoretic Foundations for Machine Learning | null | null | null | null | stat.ML cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | The staggering progress of machine learning in the past decade has been a
sight to behold. In retrospect, it is both remarkable and unsettling that these
milestones were achievable with little to no rigorous theory to guide
experimentation. Despite this fact, practitioners have been able to guide their
future experimentation via observations from previous large-scale empirical
investigations. However, alluding to Plato's Allegory of the cave, it is likely
that the observations which form the field's notion of reality are but shadows
representing fragments of that reality. In this work, we propose a theoretical
framework which attempts to answer what exists outside of the cave. To the
theorist, we provide a framework which is mathematically rigorous and leaves
open many interesting ideas for future exploration. To the practitioner, we
provide a framework whose results are very intuitive, general, and which will
help form principles to guide future investigations. Concretely, we provide a
theoretical framework rooted in Bayesian statistics and Shannon's information
theory which is general enough to unify the analysis of many phenomena in
machine learning. Our framework characterizes the performance of an optimal
Bayesian learner, which considers the fundamental limits of information.
Throughout this work, we derive very general theoretical results and apply them
to derive insights specific to settings ranging from data which is
independently and identically distributed under an unknown distribution, to
data which is sequential, to data which exhibits hierarchical structure
amenable to meta-learning. We conclude with a section dedicated to
characterizing the performance of misspecified algorithms. These results are
exciting and particularly relevant as we strive to overcome increasingly
difficult machine learning challenges in this endlessly complex world.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 03:18:40 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 14:35:39 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Jeon",
"Hong Jun",
""
],
[
"Van Roy",
"Benjamin",
""
]
] |
2407.12302 | Takashi J. Moriya | Takashi J. Moriya | Superluminous supernovae | This is a pre-print of a chapter for the Encyclopedia of Astrophysics
(edited by I. Mandel, section editor F.R.N. Schneider) to be published by
Elsevier as a Reference Module | null | null | null | astro-ph.HE astro-ph.CO astro-ph.SR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Superluminous supernovae (SLSNe) are a population of supernovae (SNe) whose
peak luminosities are much larger than those of canonical SNe. Although SLSNe
were simply defined by their peak luminosity at first, it is currently
recognized that they show rich spectroscopic diversities including
hydrogen-poor (Type I) and hydrogen-rich (Type II) subtypes. The exact
mechanisms making SLSNe luminous are still not fully understood, but there are
mainly four major suggested luminosity sources (radioactive decay of 56Ni,
circumstellar interaction, magnetar spin-down, and fallback accretion). We
provide an overview of observational properties of SLSNe and major theoretical
models for them. Future transient surveys are expected to discover SLSNe at
high redshifts which will provide a critical information in revealing their
nature.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 03:50:17 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 09:22:04 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Moriya",
"Takashi J.",
""
]
] |
2407.12327 | Tejas Vaidhya | Ayush Kaushal, Tejas Pandey, Tejas Vaidhya, Aaryan Bhagat and Irina
Rish | Spectra: A Comprehensive Study of Ternary, Quantized, and FP16 Language
Models | 32 pages, 12 figures, and 10 tables | null | null | null | cs.LG cs.AI cs.CL | http://creativecommons.org/licenses/by/4.0/ | Post-training quantization is the leading method for addressing
memory-related bottlenecks in LLM inference, but unfortunately, it suffers from
significant performance degradation below 4-bit precision. An alternative
approach involves training compressed models directly at a low bitwidth (e.g.,
binary or ternary models). However, the performance, training dynamics, and
scaling trends of such models are not yet well understood. To address this
issue, we train and openly release the Spectra LLM suite consisting of 54
language models ranging from 99M to 3.9B parameters, trained on 300B tokens.
Spectra includes FloatLMs, post-training quantized QuantLMs (3, 4, 6, and 8
bits), and ternary LLMs (TriLMs) - our improved architecture for ternary
language modeling, which significantly outperforms previously proposed ternary
models of a given size (in bits), matching half-precision models at scale. For
example, TriLM 3.9B is (bit-wise) smaller than the half-precision FloatLM 830M,
but matches half-precision FloatLM 3.9B in commonsense reasoning and knowledge
benchmarks. However, TriLM 3.9B is also as toxic and stereotyping as FloatLM
3.9B, a model six times larger in size. Additionally, TriLM 3.9B lags behind
FloatLM in perplexity on validation splits and web-based corpora but performs
better on less noisy datasets like Lambada and PennTreeBank.
To enhance understanding of low-bitwidth models, we are releasing 500+
intermediate checkpoints of the Spectra suite at
\href{https://github.com/NolanoOrg/SpectraSuite}{https://github.com/NolanoOrg/SpectraSuite}.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 05:53:20 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Kaushal",
"Ayush",
""
],
[
"Pandey",
"Tejas",
""
],
[
"Vaidhya",
"Tejas",
""
],
[
"Bhagat",
"Aaryan",
""
],
[
"Rish",
"Irina",
""
]
] |
2407.12334 | Wenhao Wang | Benshan Mei and Saisai Xia and Wenhao Wang and Dongdai Lin | Cabin: Confining Untrusted Programs within Confidential VMs | ICICS 2024 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Confidential computing safeguards sensitive computations from untrusted
clouds, with Confidential Virtual Machines (CVMs) providing a secure
environment for guest OS. However, CVMs often come with large and vulnerable
operating system kernels, making them susceptible to attacks exploiting kernel
weaknesses. The imprecise control over the read/write access in the page table
has allowed attackers to exploit vulnerabilities. The lack of security
hierarchy leads to insufficient separation between untrusted applications and
guest OS, making the kernel susceptible to direct threats from untrusted
programs. This study proposes Cabin, an isolated execution framework within
guest VM utilizing the latest AMD SEV-SNP technology. Cabin shields untrusted
processes to the user space of a lower virtual machine privilege level (VMPL)
by introducing a proxy-kernel between the confined processes and the guest OS.
Furthermore, we propose execution protection mechanisms based on fine-gained
control of VMPL privilege for vulnerable programs and the proxy-kernel to
minimize the attack surface. We introduce asynchronous forwarding mechanism and
anonymous memory management to reduce the performance impact. The evaluation
results show that the Cabin framework incurs a modest overhead (5% on average)
on Nbench and WolfSSL benchmarks.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 06:23:28 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 01:37:07 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Mei",
"Benshan",
""
],
[
"Xia",
"Saisai",
""
],
[
"Wang",
"Wenhao",
""
],
[
"Lin",
"Dongdai",
""
]
] |
2407.12393 | Zheni Zeng | Zheni Zeng, Jiayi Chen, Huimin Chen, Yukun Yan, Yuxuan Chen, Zhiyuan
Liu, Maosong Sun | PersLLM: A Personified Training Approach for Large Language Models | 10 pages for main text, 5 figures | null | null | null | cs.CL cs.AI cs.CY | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Large language models exhibit aspects of human-level intelligence that
catalyze their application as human-like agents in domains such as social
simulations, human-machine interactions, and collaborative multi-agent systems.
However, the absence of distinct personalities, such as displaying ingratiating
behaviors, inconsistent opinions, and uniform response patterns, diminish LLMs
utility in practical applications. Addressing this, the development of
personality traits in LLMs emerges as a crucial area of research to unlock
their latent potential. Existing methods to personify LLMs generally involve
strategies like employing stylized training data for instruction tuning or
using prompt engineering to simulate different personalities. These methods
only capture superficial linguistic styles instead of the core of personalities
and are therefore not stable. In this study, we propose PersLLM, integrating
psychology-grounded principles of personality: social practice, consistency,
and dynamic development, into a comprehensive training methodology. We
incorporate personality traits directly into the model parameters, enhancing
the model's resistance to induction, promoting consistency, and supporting the
dynamic evolution of personality. Single-agent evaluation validates our
method's superiority, as it produces responses more aligned with reference
personalities compared to other approaches. Case studies for multi-agent
communication highlight its benefits in enhancing opinion consistency within
individual agents and fostering collaborative creativity among multiple agents
in dialogue contexts, potentially benefiting human simulation and multi-agent
cooperation. Additionally, human-agent interaction evaluations indicate that
our personified models significantly enhance interactive experiences,
underscoring the practical implications of our research.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 08:13:22 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 04:18:43 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Zeng",
"Zheni",
""
],
[
"Chen",
"Jiayi",
""
],
[
"Chen",
"Huimin",
""
],
[
"Yan",
"Yukun",
""
],
[
"Chen",
"Yuxuan",
""
],
[
"Liu",
"Zhiyuan",
""
],
[
"Sun",
"Maosong",
""
]
] |
2407.12414 | Christian Jepsen | Christopher P. Herzog, Christian B. Jepsen, Hugh Osborn and Yaron Oz | Extremal fixed points and Diophantine equations | v2: figure 3 fixed, new footnote on page 26, minor linguistic changes | null | null | null | hep-th | http://creativecommons.org/licenses/by/4.0/ | The coupling constants of fixed points in the $\epsilon$ expansion at one
loop are known to satisfy a quadratic bound due to Rychkov and Stergiou. We
refer to fixed points that saturate this bound as extremal fixed points. The
theories which contain such fixed points are those which undergo a saddle-node
bifurcation, entailing the presence of a marginal operator. Among bifundamental
theories, a few examples of infinite families of such theories are known. A
necessary condition for extremality is that the sizes of the factors of the
symmetry group of a given theory satisfy a specific Diophantine equation, given
in terms of what we call the extremality polynomial. In this work we study such
Diophantine equations and employ a combination of rigorous and probabilistic
estimates to argue that these infinite families constitute rare exceptions. The
Pell equation, Falting's theorem, Siegel's theorem, and elliptic curves figure
prominently in our analysis. In the cases we study here, more generic classes
of multi-fundamental theories saturate the Rychkov-Stergiou bound only in
sporadic cases or in limits where they degenerate into simpler known examples.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 08:54:35 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 17:21:42 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Herzog",
"Christopher P.",
""
],
[
"Jepsen",
"Christian B.",
""
],
[
"Osborn",
"Hugh",
""
],
[
"Oz",
"Yaron",
""
]
] |
2407.12415 | Xingyu Zhang | Xingyu Zhang, Siyu Zhao, Zeen Song, Huijie Guo, Jianqi Zhang, Changwen
Zheng, Wenwen Qiang | Not All Frequencies Are Created Equal:Towards a Dynamic Fusion of
Frequencies in Time-Series Forecasting | Accpeted by ACMMM2024 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Long-term time series forecasting is a long-standing challenge in various
applications. A central issue in time series forecasting is that methods should
expressively capture long-term dependency. Furthermore, time series forecasting
methods should be flexible when applied to different scenarios. Although
Fourier analysis offers an alternative to effectively capture reusable and
periodic patterns to achieve long-term forecasting in different scenarios,
existing methods often assume high-frequency components represent noise and
should be discarded in time series forecasting. However, we conduct a series of
motivation experiments and discover that the role of certain frequencies varies
depending on the scenarios. In some scenarios, removing high-frequency
components from the original time series can improve the forecasting
performance, while in others scenarios, removing them is harmful to forecasting
performance. Therefore, it is necessary to treat the frequencies differently
according to specific scenarios. To achieve this, we first reformulate the time
series forecasting problem as learning a transfer function of each frequency in
the Fourier domain. Further, we design Frequency Dynamic Fusion (FreDF), which
individually predicts each Fourier component, and dynamically fuses the output
of different frequencies. Moreover, we provide a novel insight into the
generalization ability of time series forecasting and propose the
generalization bound of time series forecasting. Then we prove FreDF has a
lower bound, indicating that FreDF has better generalization ability. Extensive
experiments conducted on multiple benchmark datasets and ablation studies
demonstrate the effectiveness of FreDF.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 08:54:41 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 09:27:25 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Zhang",
"Xingyu",
""
],
[
"Zhao",
"Siyu",
""
],
[
"Song",
"Zeen",
""
],
[
"Guo",
"Huijie",
""
],
[
"Zhang",
"Jianqi",
""
],
[
"Zheng",
"Changwen",
""
],
[
"Qiang",
"Wenwen",
""
]
] |
2407.12420 | Tian Tian | Shuangshuang Zeng, Tian Tian, Jiwoo Oh, Chih-Jen Shih | Direct Nanopatterning of Complex 3D Surfaces and Self-Aligned
Superlattices via Molecular-Beam Holographic Lithography | null | null | null | null | cond-mat.mtrl-sci cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conventional lithography methods involving pattern transfer through resist
templating face challenges of material compatibility with various process
solvents. Other approaches of direct material writing often compromise pattern
complexity and overlay accuracy. Here we explore a concept based on the moir\'e
interference of molecular beams to directly pattern complex three-dimensional
(3D) surfaces made by any evaporable materials, such as metals, oxides and
organic semiconductors. Our proposed approach, termed the Molecular-Beam
Holographic Lithography (MBHL), relies on precise control over angular
projections of material flux passing through nanoapertures superimposed on the
substrate, emulating the interference of coherent laser beams in interference
lithography. Incorporating with our computational lithography (CL) algorithm,
we have demonstrated self-aligned overlay of multiple material patterns to
yield binary up to quinary superlattices, with a critical dimension and overlay
accuracy on the order of 50 and 2 nanometers, respectively. The process is
expected to substantially expand the boundary of materials combination for
high-throughput fabrication of complex superstructures of translational
symmetry on arbitrary substrates, enabling new nanoimaging, sensing, catalysis,
and optoelectronic devices.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 09:00:31 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 13:37:12 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Zeng",
"Shuangshuang",
""
],
[
"Tian",
"Tian",
""
],
[
"Oh",
"Jiwoo",
""
],
[
"Shih",
"Chih-Jen",
""
]
] |
2407.12439 | Prosenjit Roy | Gyula Csat\'o and Prosenjit Roy | A fractional Hardy-Sobolev inequality of Michael-Simon type on convex
hypersurfaces | null | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | In this paper we prove a fractional version of a Caffarelli-Kohn-Nirenberg
type interpolation inequality on hypersurfaces $M\subset\R^{n+1}$ which are
boundaries of convex sets. The inequality carries a universal constant
independent of $M$ and involves the fractional mean curvature of $M.$ In
particular, it interpolates between the fractional Micheal-Simon Sobolev
inequality recently obtained by Cabr\'e, Cozzi, and the first author, and a new
fractional Hardy inequality on $M$. Our method, when restricted to the plane
case $M=\R^n$, gives a new simple proof of the fractional Hardy inequality. To
obtain the fractional Hardy inequality on a hypersurface, we establish an
inequality which bounds a weighted perimeter of $M$ by the standard perimeter
of $M$ (modulo a universal constant), and which is valid for all convex
hypersurfaces $M$.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 09:50:21 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 05:48:14 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Csató",
"Gyula",
""
],
[
"Roy",
"Prosenjit",
""
]
] |
2407.12468 | Marcos Fern\'andez-Pichel Dr | Marcos Fern\'andez-Pichel and Juan C. Pichel and David E. Losada | Search Engines, LLMs or Both? Evaluating Information Seeking Strategies
for Answering Health Questions | null | null | null | null | cs.IR cs.AI | http://creativecommons.org/licenses/by/4.0/ | Search engines have traditionally served as primary tools for information
seeking. However, the new Large Language Models (LLMs) have recently
demonstrated remarkable capabilities in multiple tasks and, specifically, their
adoption as question answering systems is becoming increasingly prevalent. It
is expected that LLM-based conversational systems and traditional web engines
will continue to coexist in the future, supporting end users in various ways.
But there is a need for more scientific research on the effectiveness of both
types of systems in facilitating accurate information seeking. In this study,
we focus on their merits in answering health questions. We conducted an
extensive study comparing different web search engines, LLMs and
retrieval-augmented (RAG) approaches. Our research reveals intriguing
conclusions. For example, we observed that the quality of webpages potentially
responding to a health question does not decline as we navigate further down
the ranked lists. However, according to our evaluation, web engines are less
accurate than LLMs in finding correct answers to health questions. On the other
hand, LLMs are quite sensitive to the input prompts, and we also found out that
RAG leads to highly effective information seeking methods.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 10:40:39 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 10:11:09 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Fernández-Pichel",
"Marcos",
""
],
[
"Pichel",
"Juan C.",
""
],
[
"Losada",
"David E.",
""
]
] |
2407.12477 | Georgy Kitavtsev | Georgy Kitavtsev | Composite solutions to a liquid bilayer model | 17 figures | null | null | null | math.AP physics.flu-dyn | http://creativecommons.org/licenses/by/4.0/ | This article continues the research initiated in [17]. We derive explicit
formulae for the leading order profiles of eleven types of stationary solutions
to a one-dimensional two-layer thin-film liquid model considered with an
intermolecular potential depending on both layer heights. The found solutions
are composed of the repeated elementary blocks (bulk, contact line and
ultra-thin film ones) being consistently asymptotically matched together. We
show that once considered on a finite interval with Neumann boundary conditions
these stationary solutions are either dynamically stable or weakly
translationally unstable. Other composite solutions are found to be numerically
unstable and rather exhibit complex coarsening dynamics.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 11:04:11 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 07:58:39 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Kitavtsev",
"Georgy",
""
]
] |
2407.12483 | Jan Held Held | Jan Held, Anthony Cioppa, Silvio Giancola, Abdullah Hamdi, Christel
Devue, Bernard Ghanem and Marc Van Droogenbroeck | Towards AI-Powered Video Assistant Referee System (VARS) for Association
Football | The paper is subject to the peer review process of Sports Engineering | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Over the past decade, the technology used by referees in football has
improved substantially, enhancing the fairness and accuracy of decisions. This
progress has culminated in the implementation of the Video Assistant Referee
(VAR), an innovation that enables backstage referees to review incidents on the
pitch from multiple points of view. However, the VAR is currently limited to
professional leagues due to its expensive infrastructure and the lack of
referees worldwide. In this paper, we present the semi-automated Video
Assistant Referee System (VARS) that leverages the latest findings in
multi-view video analysis. VARS sets a new state-of-the-art on the
SoccerNet-MVFoul dataset, a multi-view video dataset of football fouls. Our
VARS achieves a new state-of-the-art on the SoccerNet-MVFoul dataset by
recognizing the type of foul in 50% of instances and the appropriate sanction
in 46% of cases. Finally, we conducted a comparative study to investigate human
performance in classifying fouls and their corresponding severity and compared
these findings to our VARS. The results of our study highlight the potential of
our VARS to reach human performance and support football refereeing across all
levels of professional and amateur federations.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 11:09:03 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 07:18:23 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Held",
"Jan",
""
],
[
"Cioppa",
"Anthony",
""
],
[
"Giancola",
"Silvio",
""
],
[
"Hamdi",
"Abdullah",
""
],
[
"Devue",
"Christel",
""
],
[
"Ghanem",
"Bernard",
""
],
[
"Van Droogenbroeck",
"Marc",
""
]
] |
2407.12518 | Rodrigo Maulen-Soto | Rodrigo Maulen-Soto, Jalal Fadili, Peter Ochs | Inertial Methods with Viscous and Hessian driven Damping for Non-Convex
Optimization | 39 pages, 4 figures | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we aim to study non-convex minimization problems via
second-order (in-time) dynamics, including a non-vanishing viscous damping and
a geometric Hessian-driven damping. Second-order systems that only rely on a
viscous damping may suffer from oscillation problems towards the minima, while
the inclusion of a Hessian-driven damping term is known to reduce this effect
without explicit construction of the Hessian in practice. There are essentially
two ways to introduce the Hessian-driven damping term: explicitly or
implicitly. For each setting, we provide conditions on the damping coefficients
to ensure convergence of the gradient towards zero. Moreover, if the objective
function is definable, we show global convergence of the trajectory towards a
critical point as well as convergence rates. Besides, in the autonomous case,
if the objective function is Morse, we conclude that the trajectory converges
to a local minimum of the objective for almost all initializations. We also
study algorithmic schemes for both dynamics and prove all the previous
properties in the discrete setting under proper choice of the step-size.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 12:13:04 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 10:56:58 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Maulen-Soto",
"Rodrigo",
""
],
[
"Fadili",
"Jalal",
""
],
[
"Ochs",
"Peter",
""
]
] |
2407.12588 | Antoni Kowalczuk | Antoni Kowalczuk, Jan Dubi\'nski, Atiyeh Ashari Ghomi, Yi Sui, George
Stein, Jiapeng Wu, Jesse C. Cresswell, Franziska Boenisch, Adam Dziedzic | Benchmarking Robust Self-Supervised Learning Across Diverse Downstream
Tasks | Accepted at the ICML 2024 Workshop on Foundation Models in the Wild | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large-scale vision models have become integral in many applications due to
their unprecedented performance and versatility across downstream tasks.
However, the robustness of these foundation models has primarily been explored
for a single task, namely image classification. The vulnerability of other
common vision tasks, such as semantic segmentation and depth estimation,
remains largely unknown. We present a comprehensive empirical evaluation of the
adversarial robustness of self-supervised vision encoders across multiple
downstream tasks. Our attacks operate in the encoder embedding space and at the
downstream task output level. In both cases, current state-of-the-art
adversarial fine-tuning techniques tested only for classification significantly
degrade clean and robust performance on other tasks. Since the purpose of a
foundation model is to cater to multiple applications at once, our findings
reveal the need to enhance encoder robustness more broadly. Our code is
available at ${github.com/layer6ai-labs/ssl-robustness}$.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 14:12:34 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 06:55:33 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Kowalczuk",
"Antoni",
""
],
[
"Dubiński",
"Jan",
""
],
[
"Ghomi",
"Atiyeh Ashari",
""
],
[
"Sui",
"Yi",
""
],
[
"Stein",
"George",
""
],
[
"Wu",
"Jiapeng",
""
],
[
"Cresswell",
"Jesse C.",
""
],
[
"Boenisch",
"Franziska",
""
],
[
"Dziedzic",
"Adam",
""
]
] |
2407.12597 | Ammar Ahmed | Ammar Ahmed, Ali Shariq Imran, Abdul Manaf, Zenun Kastrati, and Sher
Muhammad Daudpota | Enhancing Wrist Abnormality Detection with YOLO: Analysis of
State-of-the-art Single-stage Detection Models | null | null | 10.1016/j.bspc.2024.106144 | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Diagnosing and treating abnormalities in the wrist, specifically distal
radius, and ulna fractures, is a crucial concern among children, adolescents,
and young adults, with a higher incidence rate during puberty. However, the
scarcity of radiologists and the lack of specialized training among medical
professionals pose a significant risk to patient care. This problem is further
exacerbated by the rising number of imaging studies and limited access to
specialist reporting in certain regions. This highlights the need for
innovative solutions to improve the diagnosis and treatment of wrist
abnormalities. Automated wrist fracture detection using object detection has
shown potential, but current studies mainly use two-stage detection methods
with limited evidence for single-stage effectiveness. This study employs
state-of-the-art single-stage deep neural network-based detection models
YOLOv5, YOLOv6, YOLOv7, and YOLOv8 to detect wrist abnormalities. Through
extensive experimentation, we found that these YOLO models outperform the
commonly used two-stage detection algorithm, Faster R-CNN, in bone fracture
detection. Additionally, compound-scaled variants of each YOLO model were
compared, with YOLOv8x demonstrating a fracture detection mean average
precision (mAP) of 0.95 and an overall mAP of 0.77 on the GRAZPEDWRI-DX
pediatric wrist dataset, highlighting the potential of single-stage models for
enhancing pediatric wrist imaging.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 14:21:53 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Ahmed",
"Ammar",
""
],
[
"Imran",
"Ali Shariq",
""
],
[
"Manaf",
"Abdul",
""
],
[
"Kastrati",
"Zenun",
""
],
[
"Daudpota",
"Sher Muhammad",
""
]
] |
2407.12677 | Denis Kuperberg | Thomas Colcombet, Amina Doumane, Denis Kuperberg | Tree algebras and bisimulation-invariant MSO on finite graphs | null | null | null | null | cs.LO | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We establish that the bisimulation invariant fragment of MSO over finite
transition systems is expressively equivalent over finite transition systems to
modal mu-calculus, a question that had remained open for several decades. The
proof goes by translating the question to an algebraic framework, and showing
that the languages of regular trees that are recognized by finitary tree
algebras whose sorts zero and one are finite are the regular ones, ie. the ones
expressible in mu-calculus. This corresponds for trees to a weak form of the
key translation of Wilke algebras to omega-semigroup over infinite words, and
was also a missing piece in the algebraic theory of regular languages of
infinite trees since twenty years.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 15:58:54 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 08:25:41 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Colcombet",
"Thomas",
""
],
[
"Doumane",
"Amina",
""
],
[
"Kuperberg",
"Denis",
""
]
] |
2407.12702 | Elona Dupont | Elona Dupont, Kseniya Cherenkova, Dimitrios Mallis, Gleb Gusev, Anis
Kacem, Djamila Aouada | TransCAD: A Hierarchical Transformer for CAD Sequence Inference from
Point Clouds | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | 3D reverse engineering, in which a CAD model is inferred given a 3D scan of a
physical object, is a research direction that offers many promising practical
applications. This paper proposes TransCAD, an end-to-end transformer-based
architecture that predicts the CAD sequence from a point cloud. TransCAD
leverages the structure of CAD sequences by using a hierarchical learning
strategy. A loop refiner is also introduced to regress sketch primitive
parameters. Rigorous experimentation on the DeepCAD and Fusion360 datasets show
that TransCAD achieves state-of-the-art results. The result analysis is
supported with a proposed metric for CAD sequence, the mean Average Precision
of CAD Sequence, that addresses the limitations of existing metrics.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 16:24:36 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 10:27:36 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Dupont",
"Elona",
""
],
[
"Cherenkova",
"Kseniya",
""
],
[
"Mallis",
"Dimitrios",
""
],
[
"Gusev",
"Gleb",
""
],
[
"Kacem",
"Anis",
""
],
[
"Aouada",
"Djamila",
""
]
] |
2407.12718 | Yuanzhi Zhu | Yuanzhi Zhu, Xingchao Liu, Qiang Liu | SlimFlow: Training Smaller One-Step Diffusion Models with Rectified Flow | ECCV 2024 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion models excel in high-quality generation but suffer from slow
inference due to iterative sampling. While recent methods have successfully
transformed diffusion models into one-step generators, they neglect model size
reduction, limiting their applicability in compute-constrained scenarios. This
paper aims to develop small, efficient one-step diffusion models based on the
powerful rectified flow framework, by exploring joint compression of inference
steps and model size. The rectified flow framework trains one-step generative
models using two operations, reflow and distillation. Compared with the
original framework, squeezing the model size brings two new challenges: (1) the
initialization mismatch between large teachers and small students during
reflow; (2) the underperformance of naive distillation on small student models.
To overcome these issues, we propose Annealing Reflow and Flow-Guided
Distillation, which together comprise our SlimFlow framework. With our novel
framework, we train a one-step diffusion model with an FID of 5.02 and 15.7M
parameters, outperforming the previous state-of-the-art one-step diffusion
model (FID=6.47, 19.4M parameters) on CIFAR10. On ImageNet 64$\times$64 and
FFHQ 64$\times$64, our method yields small one-step diffusion models that are
comparable to larger models, showcasing the effectiveness of our method in
creating compact, efficient one-step diffusion models.
| [
{
"version": "v1",
"created": "Wed, 17 Jul 2024 16:38:45 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2024 03:23:13 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Zhu",
"Yuanzhi",
""
],
[
"Liu",
"Xingchao",
""
],
[
"Liu",
"Qiang",
""
]
] |
2407.12785 | Kexin Li | Kexin Li, Xiaojing Xu | Large-Time Behavior of Solutions to Compressible Navier-Stokes System in
Unbounded Domains with Degenerate Heat-Conductivity and Large Data | 24 pages. arXiv admin note: text overlap with arXiv:1809.00609 | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are concerned with the large-time behavior of solutions to the initial and
initial boundary value problems with large initial data for the compressible
Navier-Stokes system with degenerate heat-conductivity describing the
one-dimensional motion of a viscous heat-conducting perfect polytropic gas in
unbounded domains. Both the specific volume and temperature are proved to be
bounded from below and above independently of both time and space. Moreover, it
is shown that the global solution is asymptotically stable as time tends to
infinity.
| [
{
"version": "v1",
"created": "Sun, 9 Jun 2024 02:13:56 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Li",
"Kexin",
""
],
[
"Xu",
"Xiaojing",
""
]
] |
2407.12786 | Sukanya Bhattacharjee | Sukanya Bhattacharjee, Parag Chaudhuri | Cube2Pipes : Investigating Hybrid Gameplay Using AR and a Tangible 3D
Puzzle | null | null | null | null | cs.HC cs.GR | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We present our game, Cube2Pipes, as an attempt to investigate a unique
gameplay design where we use a tangible 3D spatial puzzle, in the form of a 2X2
Rubik's Cube, as an interface to a tabletop mobile augmented reality (AR) game.
The game interface adapts to user movement and interaction with both virtual
and tangible elements via computer vision based tracking. This game can be seen
as an instance of generic interactive hybrid systems as it involves interaction
with both virtual and real, tangible elements. We present a thorough user
evaluation about various aspects of the gameplay in order to answer the
question as to whether hybrid gameplay involving both real and virtual
interfaces and elements is more captivating and preferred by users, than
standard (baseline) gameplay with only virtual elements. We use multiple
industry standard user study questionnaires to try and answer this question. We
also try to determine whether the game facilitates understanding of the spatial
moves required to solve a Rubik's Cube, and the efficacy of a tangible puzzle
interface to a tabletop AR game.
| [
{
"version": "v1",
"created": "Sat, 15 Jun 2024 20:00:56 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Bhattacharjee",
"Sukanya",
""
],
[
"Chaudhuri",
"Parag",
""
]
] |
2407.12787 | Matthew Barthet | Matthew Barthet, Maria Kaselimi, Kosmas Pinitas, Konstantinos
Makantasis, Antonios Liapis, Georgios N. Yannakakis | GameVibe: A Multimodal Affective Game Corpus | 11 pages, 5 figures, 1 table | null | null | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As online video and streaming platforms continue to grow, affective computing
research has undergone a shift towards more complex studies involving multiple
modalities. However, there is still a lack of readily available datasets with
high-quality audiovisual stimuli. In this paper, we present GameVibe, a novel
affect corpus which consists of multimodal audiovisual stimuli, including
in-game behavioural observations and third-person affect labels for viewer
engagement. The corpus consists of videos from a diverse set of publicly
available gameplay sessions across 30 games, with particular attention to
ensure high-quality stimuli with good audiovisual and gameplay diversity.
Furthermore, we present an analysis on the reliability of the annotators in
terms of inter-annotator agreement.
| [
{
"version": "v1",
"created": "Mon, 17 Jun 2024 10:52:52 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Barthet",
"Matthew",
""
],
[
"Kaselimi",
"Maria",
""
],
[
"Pinitas",
"Kosmas",
""
],
[
"Makantasis",
"Konstantinos",
""
],
[
"Liapis",
"Antonios",
""
],
[
"Yannakakis",
"Georgios N.",
""
]
] |
2407.12788 | Weihao Yan | Weihao Yan, Yeqiang Qian, Yueyuan Li, Tao Li, Chunxiang Wang, Ming
Yang | SS-ADA: A Semi-Supervised Active Domain Adaptation Framework for
Semantic Segmentation | 12 pages,13 figures,8 tables | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semantic segmentation plays an important role in intelligent vehicles,
providing pixel-level semantic information about the environment. However, the
labeling budget is expensive and time-consuming when semantic segmentation
model is applied to new driving scenarios. To reduce the costs, semi-supervised
semantic segmentation methods have been proposed to leverage large quantities
of unlabeled images. Despite this, their performance still falls short of the
accuracy required for practical applications, which is typically achieved by
supervised learning. A significant shortcoming is that they typically select
unlabeled images for annotation randomly, neglecting the assessment of sample
value for model training. In this paper, we propose a novel semi-supervised
active domain adaptation (SS-ADA) framework for semantic segmentation that
employs an image-level acquisition strategy. SS-ADA integrates active learning
into semi-supervised semantic segmentation to achieve the accuracy of
supervised learning with a limited amount of labeled data from the target
domain. Additionally, we design an IoU-based class weighting strategy to
alleviate the class imbalance problem using annotations from active learning.
We conducted extensive experiments on synthetic-to-real and real-to-real domain
adaptation settings. The results demonstrate the effectiveness of our method.
SS-ADA can achieve or even surpass the accuracy of its supervised learning
counterpart with only 25% of the target labeled data when using a real-time
segmentation model. The code for SS-ADA is available at
https://github.com/ywher/SS-ADA.
| [
{
"version": "v1",
"created": "Mon, 17 Jun 2024 13:40:42 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Yan",
"Weihao",
""
],
[
"Qian",
"Yeqiang",
""
],
[
"Li",
"Yueyuan",
""
],
[
"Li",
"Tao",
""
],
[
"Wang",
"Chunxiang",
""
],
[
"Yang",
"Ming",
""
]
] |
2407.12789 | Laurens Engwegen | Laurens Engwegen, Daan Brinks, Wendelin B\"ohmer | Generalisation to unseen topologies: Towards control of biological
neural network activity | null | null | null | null | q-bio.NC cs.AI cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Novel imaging and neurostimulation techniques open doors for advancements in
closed-loop control of activity in biological neural networks. This would allow
for applications in the investigation of activity propagation, and for
diagnosis and treatment of pathological behaviour. Due to the partially
observable characteristics of activity propagation, through networks in which
edges can not be observed, and the dynamic nature of neuronal systems, there is
a need for adaptive, generalisable control. In this paper, we introduce an
environment that procedurally generates neuronal networks with different
topologies to investigate this generalisation problem. Additionally, an
existing transformer-based architecture is adjusted to evaluate the
generalisation performance of a deep RL agent in the presented partially
observable environment. The agent demonstrates the capability to generalise
control from a limited number of training networks to unseen test networks.
| [
{
"version": "v1",
"created": "Mon, 17 Jun 2024 13:53:39 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Engwegen",
"Laurens",
""
],
[
"Brinks",
"Daan",
""
],
[
"Böhmer",
"Wendelin",
""
]
] |
2407.12790 | Michal Chudoba | Michal Chudoba and Rudolf Rosa | GPT Czech Poet: Generation of Czech Poetic Strophes with Language Models | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | High-quality automated poetry generation systems are currently only available
for a small subset of languages. We introduce a new model for generating poetry
in Czech language, based on fine-tuning a pre-trained Large Language Model. We
demonstrate that guiding the generation process by explicitly specifying
strophe parameters within the poem text strongly improves the effectiveness of
the model. We also find that appropriate tokenization is crucial, showing that
tokenization methods based on syllables or individual characters instead of
subwords prove superior in generating poetic strophes. We further enhance the
results by introducing \textit{Forced~generation}, adding explicit
specifications of meter and verse parameters at inference time based on the
already generated text. We evaluate a range of setups, showing that our
proposed approach achieves high accuracies in rhyming and metric aspects of
formal quality of the generated poems.
| [
{
"version": "v1",
"created": "Tue, 18 Jun 2024 06:19:45 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Chudoba",
"Michal",
""
],
[
"Rosa",
"Rudolf",
""
]
] |
2407.12791 | Huansheng Ning Prof | Qikai Wei, Mingzhi Yang, Jinqiang Wang, Wenwei Mao, Jiabo Xu,
Huansheng Ning | TourLLM: Enhancing LLMs with Tourism Knowledge | null | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, large language models (LLMs) have demonstrated their effectiveness
in various natural language processing (NLP) tasks. However, the lack of
tourism knowledge limits the performance of LLMs in tourist attraction
presentations and travel planning. To address this challenge, we constructed a
supervised fine-tuning dataset for the culture and tourism domain, named
Cultour. This dataset consists of three parts: tourism knowledge base QA data,
travelogues data, and tourism diversity QA data. Additionally, we propose
TourLLM, a Qwen-based model supervised fine-tuned with Cultour, to improve the
quality of the information provided about attractions and travel planning. To
evaluate the performance of TourLLM, we employed both automatic and human
evaluation, and we proposed a human evaluation criterion named CRA
(Consistency, Readability, Availability). The experimental results demonstrate
the effectiveness of the responses generated by the TourLLM. Our proposed
Cultour is accessible at https://github.com/mrweiqk/Cultour.
| [
{
"version": "v1",
"created": "Tue, 18 Jun 2024 09:15:46 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Wei",
"Qikai",
""
],
[
"Yang",
"Mingzhi",
""
],
[
"Wang",
"Jinqiang",
""
],
[
"Mao",
"Wenwei",
""
],
[
"Xu",
"Jiabo",
""
],
[
"Ning",
"Huansheng",
""
]
] |
2407.12792 | Vittorio Giammarino | Vittorio Giammarino, James Queeney, Ioannis Ch. Paschalidis | Visually Robust Adversarial Imitation Learning from Videos with
Contrastive Learning | null | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by/4.0/ | We propose C-LAIfO, a computationally efficient algorithm designed for
imitation learning from videos, even in the presence of visual mismatch between
agent and expert domains. We analyze the problem of imitation from expert
videos with visual discrepancies, and introduce a solution for robust latent
space estimation using contrastive learning and data augmentation. Provided a
visually robust latent space, our algorithm performs imitation entirely within
this space using off-policy adversarial imitation learning. We conduct a
thorough ablation study to justify our design choices and test C-LAIfO on
high-dimensional continuous robotic tasks. Additionally, we demonstrate how
C-LAIfO can be combined with other reward signals to facilitate learning on a
set of challenging hand manipulation tasks with sparse rewards. Our experiments
show improved performance compared to baseline methods, highlighting the
effectiveness and versatility of C-LAIfO. To ensure reproducibility, we provide
open access to our code.
| [
{
"version": "v1",
"created": "Tue, 18 Jun 2024 20:56:18 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Giammarino",
"Vittorio",
""
],
[
"Queeney",
"James",
""
],
[
"Paschalidis",
"Ioannis Ch.",
""
]
] |
2407.12793 | Qianyu Huang | Qianyu Huang and Tongfang Zhao | Data Collection and Labeling Techniques for Machine Learning | null | null | null | null | cs.DB cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data collection and labeling are critical bottlenecks in the deployment of
machine learning applications. With the increasing complexity and diversity of
applications, the need for efficient and scalable data collection and labeling
techniques has become paramount. This paper provides a review of the
state-of-the-art methods in data collection, data labeling, and the improvement
of existing data and models. By integrating perspectives from both the machine
learning and data management communities, we aim to provide a holistic view of
the current landscape and identify future research directions.
| [
{
"version": "v1",
"created": "Wed, 19 Jun 2024 06:01:28 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Huang",
"Qianyu",
""
],
[
"Zhao",
"Tongfang",
""
]
] |
2407.12794 | George Octavian Barbulescu | George-Octavian B\u{a}rbulescu, Taiyi Wang, Zak Singh, Eiko Yoneki | Learned Graph Rewriting with Equality Saturation: A New Paradigm in
Relational Query Rewrite and Beyond | null | null | null | null | cs.DB cs.LG | http://creativecommons.org/licenses/by/4.0/ | Query rewrite systems perform graph substitutions using rewrite rules to
generate optimal SQL query plans. Rewriting logical and physical relational
query plans is proven to be an NP-hard sequential decision-making problem with
a search space exponential in the number of rewrite rules. In this paper, we
address the query rewrite problem by interleaving Equality Saturation and Graph
Reinforcement Learning (RL). The proposed system, Aurora, rewrites relational
queries by guiding Equality Saturation, a method from compiler literature to
perform non-destructive graph rewriting, with a novel RL agent that embeds both
the spatial structure of the query graph as well as the temporal dimension
associated with the sequential construction of query plans. Our results show
Graph Reinforcement Learning for non-destructive graph rewriting yields SQL
plans orders of magnitude faster than existing equality saturation solvers,
while also achieving competitive results against mainstream query optimisers.
| [
{
"version": "v1",
"created": "Wed, 19 Jun 2024 21:11:19 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Bărbulescu",
"George-Octavian",
""
],
[
"Wang",
"Taiyi",
""
],
[
"Singh",
"Zak",
""
],
[
"Yoneki",
"Eiko",
""
]
] |
2407.12795 | Martin Schmalzried | Martin Schmalzried | The need of a self for self-driving cars a theoretical model applying
homeostasis to self driving | Pre-print draft | null | null | null | cs.HC cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper explores the concept of creating a "self" for self-driving cars
through a homeostatic architecture designed to enhance their autonomy, safety,
and efficiency. The proposed system integrates inward focused sensors to
monitor the car's internal state, such as the condition of its metal bodywork,
wheels, engine, and battery, establishing a baseline homeostatic state
representing optimal functionality. Outward facing sensors, like cameras and
LIDAR, are then interpreted via their impact on the car's homeostatic state by
quantifying deviations from homeostasis. This contrasts with the approach of
trying to make cars "see" reality in a similar way to humans and identify
elements in their reality in the same way humans. Virtual environments would be
leveraged to accelerate training. Additionally, cars are programmed to
communicate and share experiences via blockchain technology, learning from each
other's mistakes while maintaining individualized training models. A dedicated
language for self-driving cars is proposed to enable nuanced interpretation and
response to environmental data. This architecture allows self-driving cars to
dynamically adjust their behavior based on internal and external feedback,
promoting cooperation and continuous improvement. The study concludes by
discussing the broader implications for AI development, potential real-world
applications, and future research directions.
| [
{
"version": "v1",
"created": "Wed, 19 Jun 2024 22:26:26 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Schmalzried",
"Martin",
""
]
] |
2407.12796 | Ethan Mollick | Ethan Mollick, Lilach Mollick, Natalie Bach, LJ Ciccarelli, Ben
Przystanski, and Daniel Ravipinto | AI Agents and Education: Simulated Practice at Scale | null | null | null | null | cs.CY | http://creativecommons.org/licenses/by/4.0/ | This paper explores the potential of generative AI in creating adaptive
educational simulations. By leveraging a system of multiple AI agents,
simulations can provide personalized learning experiences, offering students
the opportunity to practice skills in scenarios with AI-generated mentors,
role-players, and instructor-facing evaluators. We describe a prototype,
PitchQuest, a venture capital pitching simulator that showcases the
capabilities of AI in delivering instruction, facilitating practice, and
providing tailored feedback. The paper discusses the pedagogy behind the
simulation, the technology powering it, and the ethical considerations in using
AI for education. While acknowledging the limitations and need for rigorous
testing, we propose that generative AI can significantly lower the barriers to
creating effective, engaging simulations, opening up new possibilities for
experiential learning at scale.
| [
{
"version": "v1",
"created": "Thu, 20 Jun 2024 05:26:04 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Mollick",
"Ethan",
""
],
[
"Mollick",
"Lilach",
""
],
[
"Bach",
"Natalie",
""
],
[
"Ciccarelli",
"LJ",
""
],
[
"Przystanski",
"Ben",
""
],
[
"Ravipinto",
"Daniel",
""
]
] |
2407.12797 | Wenbo Sun | Wenbo Sun, Jiaqi Wang, Qiming Guo, Ziyu Li, Wenlu Wang, Rihan Hai | CEBench: A Benchmarking Toolkit for the Cost-Effectiveness of LLM
Pipelines | null | null | null | null | cs.PF cs.LG | http://creativecommons.org/licenses/by/4.0/ | Online Large Language Model (LLM) services such as ChatGPT and Claude 3 have
transformed business operations and academic research by effortlessly enabling
new opportunities. However, due to data-sharing restrictions, sectors such as
healthcare and finance prefer to deploy local LLM applications using costly
hardware resources. This scenario requires a balance between the effectiveness
advantages of LLMs and significant financial burdens. Additionally, the rapid
evolution of models increases the frequency and redundancy of benchmarking
efforts. Existing benchmarking toolkits, which typically focus on
effectiveness, often overlook economic considerations, making their findings
less applicable to practical scenarios. To address these challenges, we
introduce CEBench, an open-source toolkit specifically designed for
multi-objective benchmarking that focuses on the critical trade-offs between
expenditure and effectiveness required for LLM deployments. CEBench allows for
easy modifications through configuration files, enabling stakeholders to
effectively assess and optimize these trade-offs. This strategic capability
supports crucial decision-making processes aimed at maximizing effectiveness
while minimizing cost impacts. By streamlining the evaluation process and
emphasizing cost-effectiveness, CEBench seeks to facilitate the development of
economically viable AI solutions across various industries and research fields.
The code and demonstration are available in
\url{https://github.com/amademicnoboday12/CEBench}.
| [
{
"version": "v1",
"created": "Thu, 20 Jun 2024 21:36:00 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Sun",
"Wenbo",
""
],
[
"Wang",
"Jiaqi",
""
],
[
"Guo",
"Qiming",
""
],
[
"Li",
"Ziyu",
""
],
[
"Wang",
"Wenlu",
""
],
[
"Hai",
"Rihan",
""
]
] |
2407.12798 | Sheng hui Xu | Wenjun Li, Shudong Wang, Dong Zhao, Shenghui Xu, Zhaoming Pan, Zhimin
Zhang | Multi-Granularity and Multi-modal Feature Interaction Approach for Text
Video Retrieval | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The key of the text-to-video retrieval (TVR) task lies in learning the unique
similarity between each pair of text (consisting of words) and video
(consisting of audio and image frames) representations. However, some problems
exist in the representation alignment of video and text, such as a text, and
further each word, are of different importance for video frames. Besides, audio
usually carries additional or critical information for TVR in the case that
frames carry little valid information. Therefore, in TVR task,
multi-granularity representation of text, including whole sentence and every
word, and the modal of audio are salutary which are underutilized in most
existing works. To address this, we propose a novel multi-granularity feature
interaction module called MGFI, consisting of text-frame and word-frame, for
video-text representations alignment. Moreover, we introduce a cross-modal
feature interaction module of audio and text called CMFI to solve the problem
of insufficient expression of frames in the video. Experiments on benchmark
datasets such as MSR-VTT, MSVD, DiDeMo show that the proposed method
outperforms the existing state-of-the-art methods.
| [
{
"version": "v1",
"created": "Fri, 21 Jun 2024 02:28:06 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Li",
"Wenjun",
""
],
[
"Wang",
"Shudong",
""
],
[
"Zhao",
"Dong",
""
],
[
"Xu",
"Shenghui",
""
],
[
"Pan",
"Zhaoming",
""
],
[
"Zhang",
"Zhimin",
""
]
] |
2407.12799 | Jonas Vogt | Jonas Vogt | A comprehensive overview of the protocols associated with Intelligent
Transportation Systems | 39 pages, 1 figure | null | null | null | cs.NI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This white paper offers a comprehensive overview of the protocols utilized in
the field of intelligent transportation systems (ITS). The paper presents a
comprehensive overview of protocols from all layers of the Open System
Interconnection (OSI) model. The protocols encompass a range of communication
technologies, including ad-hoc, mobile broadband, and fiber-optic cable. All of
these protocols are utilized in the field of intelligent transportation systems
(ITS) and must exchange information at some point. The current development
leads to a much tighter connection between ecosystems that were previously
isolated or not connected. This situation necessitates a comprehensive
understanding of the protocols at all layers to ensure the establishment of
safe and secure applications within the field of intelligent transportation
systems (ITS).
| [
{
"version": "v1",
"created": "Fri, 21 Jun 2024 11:53:26 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Vogt",
"Jonas",
""
]
] |
2407.12800 | Jo\~ao Madeiras Pereira | Edgar Santos, Claudia Ribeiro, Manuel Fradinho and Jo\~ao Pereira | Digital Storytelling for Competence Development in Games | null | null | null | null | cs.HC cs.GR | http://creativecommons.org/licenses/by/4.0/ | The acquisition of complex knowledge and competences raises difficult
challenges for the supporting tools within the corporate environment, which
digital storytelling presents a potential solution. Traditionally, a driving
goal of digital storytelling is the generation of dramatic stories with human
significance, but for learning purposes, the need for drama is complemented by
the requirement of achieving particular learning outcomes. This paper presents
a narrative engine that supports emergent storytelling to support the
development of complex competences in the learning domains of project
management and innovation. The approach is based on the adaptation on the
Fabula model combined with cases representing situated contexts associated to
particular competences. These cases are then triggered to influence the
unfolding of the story such that a learner encounters dramatic points in the
narrative where the associated competences need to be used. In addition to the
description of the approach and corresponding narrative engine, an illustration
is presented of how the competence 'conflict management' influences a story.
| [
{
"version": "v1",
"created": "Fri, 21 Jun 2024 17:06:58 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Santos",
"Edgar",
""
],
[
"Ribeiro",
"Claudia",
""
],
[
"Fradinho",
"Manuel",
""
],
[
"Pereira",
"João",
""
]
] |
2407.12801 | Rajesh Ranjan | Shailja Gupta, Rajesh Ranjan | Evaluation of LLMs Biases Towards Elite Universities: A Persona-Based
Exploration | 14 pages, 4 Figures | null | null | null | cs.CY cs.HC | http://creativecommons.org/licenses/by/4.0/ | Elite universities are a dream destination for not just students but also top
employers who get a supply of amazing talents. When we hear about top
universities, the first thing that comes to mind is their academic rigor,
prestigious reputation, and highly successful alumni. However, society at large
is not just represented by a few elite universities, but several others. We
have seen several examples where many, even without formal education, built big
businesses. There are various instances in which several people, however
talented, couldn't make it to top elite universities because of several
resource constraints. For recruitment of candidates, we do see candidates from
a few elite universities well represented in top technology companies. However,
we found during our study that LLMs go overboard in representing that. Why is
it a problem, though? LLMs are now becoming mainstream and may play a role in
evaluating candidates' relevance in the recruitment process across industries.
Our study investigates whether LLMs are biased toward Elite universities like
Stanford University, Harvard University, University of California, Berkley, and
MIT. Our research compares the performance of three popular large language
models by adopting a novel persona-based approach and compares the predicted
educational backgrounds of professionals in the technology industry with actual
data collected from LinkedIn. Specifically, we examined GPT-3.5, Gemini, and
Claude 3 Sonnet predictions for job positions such as VP Product, Director of
Product, Product Manager, VP Engineering, Director of Engineering, and Software
Engineer at Microsoft, Meta, and Google. We noticed biases in LLMs' prediction
of educational backgrounds. We are confident that our research will propel the
study of LLM biases and our suggested strategies could mitigate biases in
LLM-based use cases and applications.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2024 04:09:03 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Gupta",
"Shailja",
""
],
[
"Ranjan",
"Rajesh",
""
]
] |
2407.12802 | Xu Yang | Xu Yang, Gopi Krishnan Rajbahadur, Dayi Lin, Shaowei Wang, Zhen Ming
(Jack) Jiang | SimClone: Detecting Tabular Data Clones using Value Similarity | 24 pages, 9 figures | null | null | null | cs.DB cs.AI cs.LG cs.SE | http://creativecommons.org/licenses/by/4.0/ | Data clones are defined as multiple copies of the same data among datasets.
Presence of data clones between datasets can cause issues such as difficulties
in managing data assets and data license violations when using datasets with
clones to build AI software. However, detecting data clones is not trivial.
Majority of the prior studies in this area rely on structural information to
detect data clones (e.g., font size, column header). However, tabular datasets
used to build AI software are typically stored without any structural
information. In this paper, we propose a novel method called SimClone for data
clone detection in tabular datasets without relying on structural information.
SimClone method utilizes value similarities for data clone detection. We also
propose a visualization approach as a part of our SimClone method to help
locate the exact position of the cloned data between a dataset pair. Our
results show that our SimClone outperforms the current state-of-the-art method
by at least 20\% in terms of both F1-score and AUC. In addition, SimClone's
visualization component helps identify the exact location of the data clone in
a dataset with a Precision@10 value of 0.80 in the top 20 true positive
predictions.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2024 04:16:32 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Yang",
"Xu",
"",
"Jack"
],
[
"Rajbahadur",
"Gopi Krishnan",
"",
"Jack"
],
[
"Lin",
"Dayi",
"",
"Jack"
],
[
"Wang",
"Shaowei",
"",
"Jack"
],
[
"Ming",
"Zhen",
"",
"Jack"
],
[
"Jiang",
"",
""
]
] |
2407.12803 | Karim Armanious | Karim Armanious, Maurice Quach, Michael Ulrich, Timo Winterling,
Johannes Friesen, Sascha Braun, Daniel Jenet, Yuri Feldman, Eitan Kosman,
Philipp Rapp, Volker Fischer, Marc Sons, Lukas Kohns, Daniel Eckstein,
Daniela Egbert, Simone Letsch, Corinna Voege, Felix Huttner, Alexander
Bartler, Robert Maiwald, Yancong Lin, Ulf R\"uegg, Claudius Gl\"aser, Bastian
Bischoff, Jascha Freess, Karsten Haug, Kathrin Klee, and Holger Caesar | Bosch Street Dataset: A Multi-Modal Dataset with Imaging Radar for
Automated Driving | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper introduces the Bosch street dataset (BSD), a novel multi-modal
large-scale dataset aimed at promoting highly automated driving (HAD) and
advanced driver-assistance systems (ADAS) research. Unlike existing datasets,
BSD offers a unique integration of high-resolution imaging radar, lidar, and
camera sensors, providing unprecedented 360-degree coverage to bridge the
current gap in high-resolution radar data availability. Spanning urban, rural,
and highway environments, BSD enables detailed exploration into radar-based
object detection and sensor fusion techniques. The dataset is aimed at
facilitating academic and research collaborations between Bosch and current and
future partners. This aims to foster joint efforts in developing cutting-edge
HAD and ADAS technologies. The paper describes the dataset's key attributes,
including its scalability, radar resolution, and labeling methodology. Key
offerings also include initial benchmarks for sensor modalities and a
development kit tailored for extensive data analysis and performance
evaluation, underscoring our commitment to contributing valuable resources to
the HAD and ADAS research community.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2024 14:40:56 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Armanious",
"Karim",
""
],
[
"Quach",
"Maurice",
""
],
[
"Ulrich",
"Michael",
""
],
[
"Winterling",
"Timo",
""
],
[
"Friesen",
"Johannes",
""
],
[
"Braun",
"Sascha",
""
],
[
"Jenet",
"Daniel",
""
],
[
"Feldman",
"Yuri",
""
],
[
"Kosman",
"Eitan",
""
],
[
"Rapp",
"Philipp",
""
],
[
"Fischer",
"Volker",
""
],
[
"Sons",
"Marc",
""
],
[
"Kohns",
"Lukas",
""
],
[
"Eckstein",
"Daniel",
""
],
[
"Egbert",
"Daniela",
""
],
[
"Letsch",
"Simone",
""
],
[
"Voege",
"Corinna",
""
],
[
"Huttner",
"Felix",
""
],
[
"Bartler",
"Alexander",
""
],
[
"Maiwald",
"Robert",
""
],
[
"Lin",
"Yancong",
""
],
[
"Rüegg",
"Ulf",
""
],
[
"Gläser",
"Claudius",
""
],
[
"Bischoff",
"Bastian",
""
],
[
"Freess",
"Jascha",
""
],
[
"Haug",
"Karsten",
""
],
[
"Klee",
"Kathrin",
""
],
[
"Caesar",
"Holger",
""
]
] |
2407.12804 | Katherine Collins | Katherine M. Collins, Valerie Chen, Ilia Sucholutsky, Hannah Rose
Kirk, Malak Sadek, Holli Sargeant, Ameet Talwalkar, Adrian Weller, Umang
Bhatt | Modulating Language Model Experiences through Frictions | Pre-print, under review | null | null | null | cs.HC cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Language models are transforming the ways that their users engage with the
world. Despite impressive capabilities, over-consumption of language model
outputs risks propagating unchecked errors in the short-term and damaging human
capabilities for critical thinking in the long-term, particularly in
knowledge-based tasks. How can we develop scaffolding around language models to
curate more appropriate use? We propose selective frictions for language model
experiences, inspired by behavioral science interventions, to dampen misuse.
Frictions involve small modifications to a user's experience, e.g., the
addition of a button impeding model access and reminding a user of their
expertise relative to the model. Through a user study with real humans, we
observe shifts in user behavior from the imposition of a friction over LLMs in
the context of a multi-topic question-answering task as a representative task
that people may use LLMs for, e.g., in education and information retrieval. We
find that frictions modulate over-reliance by driving down users' click rates
while minimally affecting accuracy for those topics. Yet, frictions may have
unintended effects. We find marked differences in users' click behaviors even
on topics where frictions were not provisioned. Our contributions motivate
further study of human-AI behavioral interaction to inform more effective and
appropriate LLM use.
| [
{
"version": "v1",
"created": "Mon, 24 Jun 2024 16:31:11 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Collins",
"Katherine M.",
""
],
[
"Chen",
"Valerie",
""
],
[
"Sucholutsky",
"Ilia",
""
],
[
"Kirk",
"Hannah Rose",
""
],
[
"Sadek",
"Malak",
""
],
[
"Sargeant",
"Holli",
""
],
[
"Talwalkar",
"Ameet",
""
],
[
"Weller",
"Adrian",
""
],
[
"Bhatt",
"Umang",
""
]
] |
2407.12805 | Anwaar Ulhaq Dr | Anwaar Ulhaq | Dark Transformer: A Video Transformer for Action Recognition in the Dark | 8 Figures, 12 Pages | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Recognizing human actions in adverse lighting conditions presents significant
challenges in computer vision, with wide-ranging applications in visual
surveillance and nighttime driving. Existing methods tackle action recognition
and dark enhancement separately, limiting the potential for end-to-end learning
of spatiotemporal representations for video action classification. This paper
introduces Dark Transformer, a novel video transformer-based approach for
action recognition in low-light environments. Dark Transformer leverages
spatiotemporal self-attention mechanisms in cross-domain settings to enhance
cross-domain action recognition. By extending video transformers to learn
cross-domain knowledge, Dark Transformer achieves state-of-the-art performance
on benchmark action recognition datasets, including InFAR, XD145, and ARID. The
proposed approach demonstrates significant promise in addressing the challenges
of action recognition in adverse lighting conditions, offering practical
implications for real-world applications.
| [
{
"version": "v1",
"created": "Tue, 25 Jun 2024 01:25:12 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Ulhaq",
"Anwaar",
""
]
] |
2407.12806 | Komal S | Komal | Advanced Mathematical Modelling for Energy-Efficient Data Transmission
and Fusion in Wireless Sensor Networks | 18 pages, 8 Figures, 3 Tables | null | null | null | cs.NI eess.SP | http://creativecommons.org/licenses/by/4.0/ | Wireless Sensor Networks (WSNs) are indispensable for data-intensive
applications, necessitating efficient energy management and robust data fusion
techniques. This paper proposes an integrated framework leveraging fuzzy logic
and backpropagation neural networks (BPNN) to enhance energy efficiency and
data accuracy in WSNs. The model focuses on optimizing Cluster Head (CH)
selection using fuzzy logic, considering parameters such as energy levels,
proximity to the base station, and local density centrality. A Minimum Spanning
Tree (MST) algorithm is employed for energy-efficient data transmission from
sensor nodes to CHs, minimizing energy consumption during data routing.
BPNN-based data fusion at CHs reduces redundant data transmissions to the base
station, thereby optimizing energy utilization and enhancing overall network
performance. Simulation results demonstrate substantial improvements over
conventional methods, including a 30% increase in network longevity, 25%
improvement in data accuracy, and a 40% reduction in energy consumption. These
gains are attributed to the intelligent CH selection strategy enabled by fuzzy
logic, which ensures efficient resource allocation and minimizes energy
wastage. The effectiveness of the proposed approach is validated through
comprehensive simulations, showcasing its ability to prolong network lifetime,
maintain data integrity, and improve energy efficiency. The integration of
fuzzy logic and BPNN not only addresses the challenges of energy management and
data fusion in WSNs but also provides a scalable and adaptable framework for
future applications requiring reliable and sustainable sensor network
operations. The source code is available at
https://github.com/hikomal/BPNN_WSN.git
| [
{
"version": "v1",
"created": "Tue, 25 Jun 2024 11:56:43 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Komal",
"",
""
]
] |
2407.12807 | Md Abdul Baset Sarker | Md Abdul Baset Sarker, Juan Pablo S. Sola, Aaron Jones, Evan Laing,
Ernesto Sola-Thomas, Masudul H. Imtiaz | Vision Controlled Sensorized Prosthetic Hand | null | null | null | null | cs.HC cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper presents a sensorized vision-enabled prosthetic hand aimed at
replicating a natural hand's performance, functionality, appearance, and
comfort. The design goal was to create an accessible substitution with a
user-friendly interface requiring little to no training. Our mechanical hand
uses a camera and embedded processors to perform most of these tasks. The
interfaced pressure sensor is used to get pressure feedback and ensure a safe
grasp of the object; an accelerometer is used to detect gestures and release
the object. Unlike current EMG-based designs, the prototyped hand does not
require personalized training. The details of the design, trade-offs, results,
and informing the next iteration are presented in this paper.
| [
{
"version": "v1",
"created": "Tue, 25 Jun 2024 14:44:04 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Sarker",
"Md Abdul Baset",
""
],
[
"Sola",
"Juan Pablo S.",
""
],
[
"Jones",
"Aaron",
""
],
[
"Laing",
"Evan",
""
],
[
"Sola-Thomas",
"Ernesto",
""
],
[
"Imtiaz",
"Masudul H.",
""
]
] |
2407.12808 | John Violos | John Violos, Symeon Papadopoulos, Ioannis Kompatsiaris | Towards Optimal Trade-offs in Knowledge Distillation for CNNs and Vision
Transformers at the Edge | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | This paper discusses four facets of the Knowledge Distillation (KD) process
for Convolutional Neural Networks (CNNs) and Vision Transformer (ViT)
architectures, particularly when executed on edge devices with constrained
processing capabilities. First, we conduct a comparative analysis of the KD
process between CNNs and ViT architectures, aiming to elucidate the feasibility
and efficacy of employing different architectural configurations for the
teacher and student, while assessing their performance and efficiency. Second,
we explore the impact of varying the size of the student model on accuracy and
inference speed, while maintaining a constant KD duration. Third, we examine
the effects of employing higher resolution images on the accuracy, memory
footprint and computational workload. Last, we examine the performance
improvements obtained by fine-tuning the student model after KD to specific
downstream tasks. Through empirical evaluations and analyses, this research
provides AI practitioners with insights into optimal strategies for maximizing
the effectiveness of the KD process on edge devices.
| [
{
"version": "v1",
"created": "Tue, 25 Jun 2024 16:15:02 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Violos",
"John",
""
],
[
"Papadopoulos",
"Symeon",
""
],
[
"Kompatsiaris",
"Ioannis",
""
]
] |
2407.12809 | Taha Hassan | Taha Hassan, Bob Edmison, Daron Williams, Larry Cox II, Matthew
Louvet, Bart Knijnenburg, D. Scott McCrickard | Simplify, Consolidate, Intervene: Facilitating Institutional Support
with Mental Models of Learning Management System Use | CSCW 2024 (accepted for publication) | null | null | null | cs.HC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Measuring instructors' adoption of learning management system (LMS) tools is
a critical first step in evaluating the efficacy of online teaching and
learning at scale. Existing models for LMS adoption are often qualitative,
learner-centered, and difficult to leverage towards institutional support. We
propose depth-of-use (DOU): an intuitive measurement model for faculty's
utilization of a university-wide LMS and their needs for institutional support.
We hypothesis-test the relationship between DOU and course attributes like
modality, participation, logistics, and outcomes. In a large-scale analysis of
metadata from 30000+ courses offered at Virginia Tech over two years, we find
that a pervasive need for scale, interoperability and ubiquitous access drives
LMS adoption by university instructors. We then demonstrate how DOU can help
faculty members identify the opportunity-cost of transition from legacy apps to
LMS tools. We also describe how DOU can help instructional designers and IT
organizational leadership evaluate the impact of their support allocation,
faculty development and LMS evangelism initiatives.
| [
{
"version": "v1",
"created": "Wed, 26 Jun 2024 03:47:32 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Hassan",
"Taha",
""
],
[
"Edmison",
"Bob",
""
],
[
"Williams",
"Daron",
""
],
[
"Cox",
"Larry",
"II"
],
[
"Louvet",
"Matthew",
""
],
[
"Knijnenburg",
"Bart",
""
],
[
"McCrickard",
"D. Scott",
""
]
] |
2407.12810 | Abel C. H. Chen | Abel C. H. Chen, Chia-Shen Chang | A Study on the Situation of Connected Car Patent Portfolios | in Chinese language | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, the countries of the world have drafted the specifications
of connected cars; for instance, the Security Credential Management System
(SCMS) has been proposed by United States Department of Transportation (USDOT),
and the Cooperative Intelligent Transportation System (C-ITS) Credential
Management System (CCMS) has been proposed by European Union (EU). Therefore,
several companies have developed the technology and productions of connected
cars based on specifications, and connected car patent portfolios have been
proactively performed. Therefore, this study uses Patent Search System (PSS) to
find and analyze the contents of patents for obtaining the innovation reports
of connected cars according to patents. This study considers the single-factor
and two-factors to analyze the relationships of annuals, major technology
leaders, major market leaders, and major technology and applications for
exploring the patent portfolios of technology leaders and market leaders in
connected cars.
| [
{
"version": "v1",
"created": "Wed, 26 Jun 2024 04:04:02 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Chen",
"Abel C. H.",
""
],
[
"Chang",
"Chia-Shen",
""
]
] |
2407.12811 | Ori Henderson-Sapir | Antreas Theodosiou, Ori Henderson-Sapir, Yauhen Baravets, Oliver T.
Cobcroft, Samuel M. Sentschuk, Jack A. Stone, David J. Ottaway, and Pavel
Peterka | Understanding the temperature conditions for controlled splicing between
silica and fluoride fibers | * Authors contributed equally | null | null | null | physics.optics | http://creativecommons.org/licenses/by/4.0/ | This study explores the efficacy of thermal splicing conditions between
silica and zirconium-fluoride fibers, focusing on achieving mechanical strength
between the two fibers. A comprehensive characterization of the thermal profile
in the hot zone of the filament splicer was conducted using a fiber Bragg
grating, providing valuable insights into its stability and overall
performance. Results demonstrate mechanically strong joints and suggest a very
narrow temperature window to achieve strong connection between the two
materials. Moreover, we characterize the surface composition of the ZrF4 fiber
using energy dispersive spectroscopy following splicing at ideal temperatures,
as well as at higher and lower temperatures. This work paves the way towards
future implementation of silica and fluoride fibers splicing using alternative
splicing solutions such as CO2 laser system while raising interesting facts for
further studies in the specific field.
| [
{
"version": "v1",
"created": "Thu, 27 Jun 2024 02:57:35 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Theodosiou",
"Antreas",
""
],
[
"Henderson-Sapir",
"Ori",
""
],
[
"Baravets",
"Yauhen",
""
],
[
"Cobcroft",
"Oliver T.",
""
],
[
"Sentschuk",
"Samuel M.",
""
],
[
"Stone",
"Jack A.",
""
],
[
"Ottaway",
"David J.",
""
],
[
"Peterka",
"Pavel",
""
]
] |
2407.12812 | Maike Sonnewald | Katherine A. Rosenfeld, Maike Sonnewald, Sonia J. Jindal, Kevin A.
McCarthy, Joshua L. Proctor | Building Understandable Messaging for Policy and Evidence Review
(BUMPER) with AI | 21 pages, 6 figures | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | We introduce a framework for the use of large language models (LLMs) in
Building Understandable Messaging for Policy and Evidence Review (BUMPER). LLMs
are proving capable of providing interfaces for understanding and synthesizing
large databases of diverse media. This presents an exciting opportunity to
supercharge the translation of scientific evidence into policy and action,
thereby improving livelihoods around the world. However, these models also pose
challenges related to access, trust-worthiness, and accountability. The BUMPER
framework is built atop a scientific knowledge base (e.g., documentation, code,
survey data) by the same scientists (e.g., individual contributor, lab,
consortium). We focus on a solution that builds trustworthiness through
transparency, scope-limiting, explicit-checks, and uncertainty measures. LLMs
are rapidly being adopted and consequences are poorly understood. The framework
addresses open questions regarding the reliability of LLMs and their use in
high-stakes applications. We provide a worked example in health policy for a
model designed to inform measles control programs. We argue that this framework
can facilitate accessibility of and confidence in scientific evidence for
policymakers, drive a focus on policy-relevance and translatability for
researchers, and ultimately increase and accelerate the impact of scientific
knowledge used for policy decisions.
| [
{
"version": "v1",
"created": "Thu, 27 Jun 2024 05:03:03 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Rosenfeld",
"Katherine A.",
""
],
[
"Sonnewald",
"Maike",
""
],
[
"Jindal",
"Sonia J.",
""
],
[
"McCarthy",
"Kevin A.",
""
],
[
"Proctor",
"Joshua L.",
""
]
] |
2407.12813 | Yinheng Li | Yinheng Li, Rogerio Bonatti, Sara Abdali, Justin Wagle, Kazuhito
Koishida | Data Generation using Large Language Models for Text Classification: An
Empirical Case Study | Accepted by DMLR @ ICML 2024 | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Using Large Language Models (LLMs) to generate synthetic data for model
training has become increasingly popular in recent years. While LLMs are
capable of producing realistic training data, the effectiveness of data
generation is influenced by various factors, including the choice of prompt,
task complexity, and the quality, quantity, and diversity of the generated
data. In this work, we focus exclusively on using synthetic data for text
classification tasks. Specifically, we use natural language understanding (NLU)
models trained on synthetic data to assess the quality of synthetic data from
different generation approaches. This work provides an empirical analysis of
the impact of these factors and offers recommendations for better data
generation practices.
| [
{
"version": "v1",
"created": "Thu, 27 Jun 2024 21:41:43 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Li",
"Yinheng",
""
],
[
"Bonatti",
"Rogerio",
""
],
[
"Abdali",
"Sara",
""
],
[
"Wagle",
"Justin",
""
],
[
"Koishida",
"Kazuhito",
""
]
] |
2407.12814 | Priyanshu Priya | Priyanshu Priya, Mauajama Firdaus, Asif Ekbal | Computational Politeness in Natural Language Processing: A Survey | Manuscript accepted at the ACM Computing Surveys (DOI:
https://doi.org/10.1145/3654660) | ACM Comput. Surv. 56, 9, Article 241 (May 2024) | 10.1145/3654660 | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Computational approach to politeness is the task of automatically predicting
and generating politeness in text. This is a pivotal task for conversational
analysis, given the ubiquity and challenges of politeness in interactions. The
computational approach to politeness has witnessed great interest from the
conversational analysis community. This article is a compilation of past works
in computational politeness in natural language processing. We view four
milestones in the research so far, viz. supervised and weakly-supervised
feature extraction to identify and induce politeness in a given text,
incorporation of context beyond the target text, study of politeness across
different social factors, and study the relationship between politeness and
various sociolinguistic cues. In this article, we describe the datasets,
approaches, trends, and issues in computational politeness research. We also
discuss representative performance values and provide pointers to future works,
as given in the prior works. In terms of resources to understand the
state-of-the-art, this survey presents several valuable illustrations, most
prominently, a table summarizing the past papers along different dimensions,
such as the types of features, annotation techniques, and datasets used.
| [
{
"version": "v1",
"created": "Fri, 28 Jun 2024 06:46:36 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Priya",
"Priyanshu",
""
],
[
"Firdaus",
"Mauajama",
""
],
[
"Ekbal",
"Asif",
""
]
] |
2407.12815 | Shanu Sushmita | Anjali Rawal, Hui Wang, Youjia Zheng, Yu-Hsuan Lin, Shanu Sushmita | SMLT-MUGC: Small, Medium, and Large Texts -- Machine versus
User-Generated Content Detection and Comparison | null | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | Large language models (LLMs) have gained significant attention due to their
ability to mimic human language. Identifying texts generated by LLMs is crucial
for understanding their capabilities and mitigating potential consequences.
This paper analyzes datasets of varying text lengths: small, medium, and large.
We compare the performance of machine learning algorithms on four datasets: (1)
small (tweets from Election, FIFA, and Game of Thrones), (2) medium (Wikipedia
introductions and PubMed abstracts), and (3) large (OpenAI web text dataset).
Our results indicate that LLMs with very large parameters (such as the XL-1542
variant of GPT2 with 1542 million parameters) were harder (74%) to detect using
traditional machine learning methods. However, detecting texts of varying
lengths from LLMs with smaller parameters (762 million or less) can be done
with high accuracy (96% and above). We examine the characteristics of human and
machine-generated texts across multiple dimensions, including linguistics,
personality, sentiment, bias, and morality. Our findings indicate that
machine-generated texts generally have higher readability and closely mimic
human moral judgments but differ in personality traits. SVM and Voting
Classifier (VC) models consistently achieve high performance across most
datasets, while Decision Tree (DT) models show the lowest performance. Model
performance drops when dealing with rephrased texts, particularly shorter texts
like tweets. This study underscores the challenges and importance of detecting
LLM-generated texts and suggests directions for future research to improve
detection methods and understand the nuanced capabilities of LLMs.
| [
{
"version": "v1",
"created": "Fri, 28 Jun 2024 22:19:01 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Rawal",
"Anjali",
""
],
[
"Wang",
"Hui",
""
],
[
"Zheng",
"Youjia",
""
],
[
"Lin",
"Yu-Hsuan",
""
],
[
"Sushmita",
"Shanu",
""
]
] |
2407.12816 | Fabrizio Riguzzi PhD | Fabrizio Riguzzi | Quantum Algorithms for Weighted Constrained Sampling and Weighted Model
Counting | Under submission | null | null | null | quant-ph cs.AI | http://creativecommons.org/licenses/by/4.0/ | We consider the problems of weighted constrained sampling and weighted model
counting, where we are given a propositional formula and a weight for each
world. The first problem consists of sampling worlds with a probability
proportional to their weight given that the formula is satisfied. The latter is
the problem of computing the sum of the weights of the models of the formula.
Both have applications in many fields such as probabilistic reasoning,
graphical models, statistical physics, statistics and hardware verification. In
this article, we propose QWCS and QWMC, quantum algorithms for performing
weighted constrained sampling and weighted model counting, respectively. Both
are based on the quantum search/quantum model counting algorithms that are
modified to take into account the weights. In the black box model of
computation, where we can only query an oracle for evaluating the Boolean
function given an assignment, QWCS requires
$O(2^{\frac{n}{2}}+1/\sqrt{\text{WMC}})$ oracle calls, where where $n$ is the
number of Boolean variables and $\text{WMC}$ is the normalized between 0 and 1
weighted model count of the formula, while a classical algorithm has a
complexity of $\Omega(1/\text{WMC})$. QWMC takes $\Theta(2^{\frac{n}{2}})$
oracle calss, while classically the best complexity is $\Theta(2^n)$, thus
achieving a quadratic speedup.
| [
{
"version": "v1",
"created": "Sat, 29 Jun 2024 09:44:44 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Riguzzi",
"Fabrizio",
""
]
] |
2407.12817 | Hao Shi | Yuchun Shu, Bo Hu, Yifeng He, Hao Shi, Longbiao Wang, Jianwu Dang | Error Correction by Paying Attention to Both Acoustic and Confidence
References for Automatic Speech Recognition | null | null | null | null | cs.CL cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | Accurately finding the wrong words in the automatic speech recognition (ASR)
hypothesis and recovering them well-founded is the goal of speech error
correction. In this paper, we propose a non-autoregressive speech error
correction method. A Confidence Module measures the uncertainty of each word of
the N-best ASR hypotheses as the reference to find the wrong word position.
Besides, the acoustic feature from the ASR encoder is also used to provide the
correct pronunciation references. N-best candidates from ASR are aligned using
the edit path, to confirm each other and recover some missing character errors.
Furthermore, the cross-attention mechanism fuses the information between error
correction references and the ASR hypothesis. The experimental results show
that both the acoustic and confidence references help with error correction.
The proposed system reduces the error rate by 21% compared with the ASR model.
| [
{
"version": "v1",
"created": "Sat, 29 Jun 2024 17:56:28 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Shu",
"Yuchun",
""
],
[
"Hu",
"Bo",
""
],
[
"He",
"Yifeng",
""
],
[
"Shi",
"Hao",
""
],
[
"Wang",
"Longbiao",
""
],
[
"Dang",
"Jianwu",
""
]
] |
2407.12818 | Dishank Aggarwal | Dishank Aggarwal, Pushpak Bhattacharyya, Bhaskaran Raman | "I understand why I got this grade": Automatic Short Answer Grading with
Feedback | null | null | null | null | cs.CL cs.AI cs.CY | http://creativecommons.org/licenses/by/4.0/ | The demand for efficient and accurate assessment methods has intensified as
education systems transition to digital platforms. Providing feedback is
essential in educational settings and goes beyond simply conveying marks as it
justifies the assigned marks. In this context, we present a significant
advancement in automated grading by introducing Engineering Short Answer
Feedback (EngSAF) -- a dataset of 5.8k student answers accompanied by reference
answers and questions for the Automatic Short Answer Grading (ASAG) task. The
EngSAF dataset is meticulously curated to cover a diverse range of subjects,
questions, and answer patterns from multiple engineering domains. We leverage
state-of-the-art large language models' (LLMs) generative capabilities with our
Label-Aware Synthetic Feedback Generation (LASFG) strategy to include feedback
in our dataset. This paper underscores the importance of enhanced feedback in
practical educational settings, outlines dataset annotation and feedback
generation processes, conducts a thorough EngSAF analysis, and provides
different LLMs-based zero-shot and finetuned baselines for future comparison.
Additionally, we demonstrate the efficiency and effectiveness of the ASAG
system through its deployment in a real-world end-semester exam at the Indian
Institute of Technology Bombay (IITB), showcasing its practical viability and
potential for broader implementation in educational institutions.
| [
{
"version": "v1",
"created": "Sun, 30 Jun 2024 15:42:18 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Aggarwal",
"Dishank",
""
],
[
"Bhattacharyya",
"Pushpak",
""
],
[
"Raman",
"Bhaskaran",
""
]
] |
2407.12819 | Vlad-Andrei B\u{a}doiu | Alexandru M. Gherghescu, Vlad-Andrei B\u{a}doiu, Alexandru Agache,
Mihai-Valentin Dumitru, Iuliu Vasilescu, Radu Mantu, Costin Raiciu | A Look Into Training Large Language Models on Next Generation
Datacenters | null | null | null | null | cs.DC cs.CL cs.LG cs.NI | http://creativecommons.org/licenses/by/4.0/ | Is it still worth doing computer networking research? What are relevant
problems in this space given the supremacy of hyperscalers in deployed large
networks? We take an unconventional approach to finding relevant research
directions, by starting from Microsoft's plans to build a $100 billion
datacenter for ML. Our goal is to understand what models could be trained in
such a datacenter, as well as the high-level challenges one may encounter in
doing so.
We first examine the constraints imposed by cooling and power requirements
for our target datacenter and find that it is infeasible to build in a single
location. We use LLM scaling laws to determine that we could train models of
50T or 100T. Finally, we examine how distributed training might work for these
models, and what the networking requirements are. We conclude that building the
datacenter and training such models is technically possible, but this requires
a novel NIC-based multipath transport along with a redesign of the entire
training stack, outlining a research agenda for our community in the near
future.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2024 10:33:46 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Gherghescu",
"Alexandru M.",
""
],
[
"Bădoiu",
"Vlad-Andrei",
""
],
[
"Agache",
"Alexandru",
""
],
[
"Dumitru",
"Mihai-Valentin",
""
],
[
"Vasilescu",
"Iuliu",
""
],
[
"Mantu",
"Radu",
""
],
[
"Raiciu",
"Costin",
""
]
] |
2407.12820 | Hailin Zhang | Hailin Zhang, Xiaodong Ji, Yilin Chen, Fangcheng Fu, Xupeng Miao,
Xiaonan Nie, Weipeng Chen, Bin Cui | PQCache: Product Quantization-based KVCache for Long Context LLM
Inference | null | null | null | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the field of Large Language Models (LLMs) continues to evolve, the context
length in inference is steadily growing. Key-Value Cache (KVCache), a crucial
component in LLM inference, has now become the primary memory bottleneck due to
limited GPU memory. Current methods selectively determine suitable keys and
values for self-attention computation in LLMs to address the issue. However,
they either fall short in maintaining model quality or result in high serving
latency. Drawing inspiration from advanced embedding retrieval techniques used
in the database community, we consider the storage and searching of KVCache as
a typical embedding retrieval problem. We propose PQCache, which employs
Product Quantization (PQ) to manage KVCache, maintaining model quality while
ensuring low serving latency. During the prefilling phase, we apply PQ to
tokens' keys for each LLM layer and head. During the autoregressive decoding
phase, for each newly generated token, we first identify important tokens
through Maximum Inner-Product Search (MIPS) using PQ codes and centroids, then
fetch the corresponding key-value pairs for self-attention computation. Through
meticulous design of overlapping and caching, we minimize any additional
computation and communication overhead during both phases. Extensive
experiments show that PQCache achieves both effectiveness and efficiency. It
maintains model quality even when only 1/5 of the tokens are involved in
attention, while attaining acceptable system latency.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2024 13:05:42 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Zhang",
"Hailin",
""
],
[
"Ji",
"Xiaodong",
""
],
[
"Chen",
"Yilin",
""
],
[
"Fu",
"Fangcheng",
""
],
[
"Miao",
"Xupeng",
""
],
[
"Nie",
"Xiaonan",
""
],
[
"Chen",
"Weipeng",
""
],
[
"Cui",
"Bin",
""
]
] |
2407.12821 | Yongfeng Zhang | Zelong Li, Shuyuan Xu, Kai Mei, Wenyue Hua, Balaji Rama, Om Raheja,
Hao Wang, He Zhu, Yongfeng Zhang | AutoFlow: Automated Workflow Generation for Large Language Model Agents | Open source code available at https://github.com/agiresearch/AutoFlow | null | null | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advancements in Large Language Models (LLMs) have shown significant
progress in understanding complex natural language. One important application
of LLM is LLM-based AI Agent, which leverages the ability of LLM as well as
external tools for complex-task solving. To make sure LLM Agents follow an
effective and reliable procedure to solve the given task, manually designed
workflows are usually used to guide the working mechanism of agents. However,
manually designing the workflows requires considerable efforts and domain
knowledge, making it difficult to develop and deploy agents on massive scales.
To address these issues, we propose AutoFlow, a framework designed to
automatically generate workflows for agents to solve complex tasks. AutoFlow
takes natural language program as the format of agent workflow and employs a
workflow optimization procedure to iteratively optimize the workflow quality.
Besides, this work offers two workflow generation methods: fine-tuning-based
and in-context-based methods, making the AutoFlow framework applicable to both
open-source and closed-source LLMs. Experimental results show that our
framework can produce robust and reliable agent workflows. We believe that the
automatic generation and interpretation of workflows in natural language
represent a promising paradigm for solving complex tasks, particularly with the
rapid development of LLMs. The source code of this work is available at
https://github.com/agiresearch/AutoFlow.
| [
{
"version": "v1",
"created": "Mon, 1 Jul 2024 21:05:02 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Li",
"Zelong",
""
],
[
"Xu",
"Shuyuan",
""
],
[
"Mei",
"Kai",
""
],
[
"Hua",
"Wenyue",
""
],
[
"Rama",
"Balaji",
""
],
[
"Raheja",
"Om",
""
],
[
"Wang",
"Hao",
""
],
[
"Zhu",
"He",
""
],
[
"Zhang",
"Yongfeng",
""
]
] |
2407.12822 | Kabilan Elangovan | Kabilan Elangovan, Jasmine Chiat Ling Ong, Liyuan Jin, Benjamin Jun
Jie Seng, Yu Heng Kwan, Lit Soo Tan, Ryan Jian Zhong, Justina Koi Li Ma, YuHe
Ke, Nan Liu, Kathleen M Giacomini, Daniel Shu Wei Ting | Lightweight Large Language Model for Medication Enquiry: Med-Pal | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/publicdomain/zero/1.0/ | Large Language Models (LLMs) have emerged as a potential solution to assist
digital health development with patient education, commonly medication-related
enquires. We trained and validated Med-Pal, a medication domain-specific
LLM-chatbot fine-tuned with a fine-grained and expert curated dataset from a
selection of five light-weighted open-source LLMs of smaller parameter size (7
billion or less) regarding computational constraints and prioritizing
operational efficiency. A multi-disciplinary team performed a clinical
evaluation of LLMs responses using the SCORE criteria, focusing on safety,
accuracy, bias, reproducibility, and ease of understanding. Best performing
light-weighted LLM was chosen as Med-Pal for further engineering with
guard-railing using adversarial prompting. Med-Pal and existing light-weighted
LLMs, including pretrained Biomistral and finetuned Meerkat, were validated on
an independent dataset on a broad range of medication-related questions (231 in
total), 12 different question types across 14 different medication classes.
Mistral-7b emerged as the top performer among selected lightweight LLMs,
achieving the highest median score of 14 and 71.9% high-quality responses in
accuracy and safety domains, hence chosen as the backbone LLM for Med-Pal. When
compared against Biomistral, Med-pal outperformed in generating responses
appropriate for patient communication, with significant reductions bias and
errors typical of general LLMs. Comparable performance was observed when
comparing Med-Pal with Meerkat. Med-Pal showcases the feasibility of developing
and employing fine-tuned light-weighted LLMs to enhance digital health
communications.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2024 03:32:39 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Elangovan",
"Kabilan",
""
],
[
"Ong",
"Jasmine Chiat Ling",
""
],
[
"Jin",
"Liyuan",
""
],
[
"Seng",
"Benjamin Jun Jie",
""
],
[
"Kwan",
"Yu Heng",
""
],
[
"Tan",
"Lit Soo",
""
],
[
"Zhong",
"Ryan Jian",
""
],
[
"Ma",
"Justina Koi Li",
""
],
[
"Ke",
"YuHe",
""
],
[
"Liu",
"Nan",
""
],
[
"Giacomini",
"Kathleen M",
""
],
[
"Ting",
"Daniel Shu Wei",
""
]
] |
2407.12823 | Kangyun Ning | Kangyun Ning, Yisong Su, Xueqiang Lv, Yuanzhe Zhang, Jian Liu, Kang
Liu and Jinan Xu | WTU-EVAL: A Whether-or-Not Tool Usage Evaluation Benchmark for Large
Language Models | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Although Large Language Models (LLMs) excel in NLP tasks, they still need
external tools to extend their ability. Current research on tool learning with
LLMs often assumes mandatory tool use, which does not always align with
real-world situations, where the necessity for tools is uncertain, and
incorrect or unnecessary use of tools can damage the general abilities of LLMs.
Therefore, we propose to explore whether LLMs can discern their ability
boundaries and use tools flexibly. We then introduce the Whether-or-not tool
usage Evaluation benchmark (WTU-Eval) to assess LLMs with eleven datasets,
where six of them are tool-usage datasets, and five are general datasets. LLMs
are prompted to use tools according to their needs. The results of eight LLMs
on WTU-Eval reveal that LLMs frequently struggle to determine tool use in
general datasets, and LLMs' performance in tool-usage datasets improves when
their ability is similar to ChatGPT. In both datasets, incorrect tool usage
significantly impairs LLMs' performance. To mitigate this, we also develop the
finetuning dataset to enhance tool decision-making. Fine-tuning Llama2-7B
results in a 14\% average performance improvement and a 16.8\% decrease in
incorrect tool usage. We will release the WTU-Eval benchmark.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2024 12:07:38 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Ning",
"Kangyun",
""
],
[
"Su",
"Yisong",
""
],
[
"Lv",
"Xueqiang",
""
],
[
"Zhang",
"Yuanzhe",
""
],
[
"Liu",
"Jian",
""
],
[
"Liu",
"Kang",
""
],
[
"Xu",
"Jinan",
""
]
] |
2407.12824 | Xavier Suau Cuadros | Xavier Suau, Pieter Delobelle, Katherine Metcalf, Armand Joulin,
Nicholas Apostoloff, Luca Zappella, Pau Rodr\'iguez | Whispering Experts: Neural Interventions for Toxicity Mitigation in
Language Models | ICML 2024, 8 pages + appendix | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | An important issue with Large Language Models (LLMs) is their undesired
ability to generate toxic language. In this work, we show that the neurons
responsible for toxicity can be determined by their power to discriminate toxic
sentences, and that toxic language can be mitigated by reducing their
activation levels proportionally to this power. We propose AUROC adaptation
(AurA), an intervention that can be applied to any pre-trained LLM to mitigate
toxicity. As the intervention is proportional to the ability of each neuron to
discriminate toxic content, it is free of any model-dependent hyperparameters.
We show that AurA can achieve up to $2.2 \times$ reduction in toxicity with
only a $0.72$ perplexity increase. We also show that AurA is effective with
models of different scale (from 1.5B to 40B parameters), and its effectiveness
in mitigating toxic language, while preserving common-sense zero-shot
abilities, holds across all scales. AurA can be combined with pre-prompting
strategies, boosting its average mitigation potential from $1.28\times$ to
$2.35\times$. Moreover, AurA can counteract adversarial pre-prompts that
maliciously elicit toxic content, making it an effective method for deploying
safer and less toxic models.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2024 12:48:29 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Suau",
"Xavier",
""
],
[
"Delobelle",
"Pieter",
""
],
[
"Metcalf",
"Katherine",
""
],
[
"Joulin",
"Armand",
""
],
[
"Apostoloff",
"Nicholas",
""
],
[
"Zappella",
"Luca",
""
],
[
"Rodríguez",
"Pau",
""
]
] |
2407.12825 | Shengjie Li | Shengjie Li, Yinhao Xiao | A Depression Detection Method Based on Multi-Modal Feature Fusion Using
Cross-Attention | null | null | null | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Depression, a prevalent and serious mental health issue, affects
approximately 3.8\% of the global population. Despite the existence of
effective treatments, over 75\% of individuals in low- and middle-income
countries remain untreated, partly due to the challenge in accurately
diagnosing depression in its early stages. This paper introduces a novel method
for detecting depression based on multi-modal feature fusion utilizing
cross-attention. By employing MacBERT as a pre-training model to extract
lexical features from text and incorporating an additional Transformer module
to refine task-specific contextual understanding, the model's adaptability to
the targeted task is enhanced. Diverging from previous practices of simply
concatenating multimodal features, this approach leverages cross-attention for
feature integration, significantly improving the accuracy in depression
detection and enabling a more comprehensive and precise analysis of user
emotions and behaviors. Furthermore, a Multi-Modal Feature Fusion Network based
on Cross-Attention (MFFNC) is constructed, demonstrating exceptional
performance in the task of depression identification. The experimental results
indicate that our method achieves an accuracy of 0.9495 on the test dataset,
marking a substantial improvement over existing approaches. Moreover, it
outlines a promising methodology for other social media platforms and tasks
involving multi-modal processing. Timely identification and intervention for
individuals with depression are crucial for saving lives, highlighting the
immense potential of technology in facilitating early intervention for mental
health issues.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2024 13:13:35 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Li",
"Shengjie",
""
],
[
"Xiao",
"Yinhao",
""
]
] |
2407.12826 | Sai Koneru | Elphin Tom Joe and Sai Dileep Koneru and Christine J Kirchhoff | Assessing the Effectiveness of GPT-4o in Climate Change Evidence
Synthesis and Systematic Assessments: Preliminary Insights | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | In this research short, we examine the potential of using GPT-4o, a
state-of-the-art large language model (LLM) to undertake evidence synthesis and
systematic assessment tasks. Traditional workflows for such tasks involve large
groups of domain experts who manually review and synthesize vast amounts of
literature. The exponential growth of scientific literature and recent advances
in LLMs provide an opportunity to complementing these traditional workflows
with new age tools. We assess the efficacy of GPT-4o to do these tasks on a
sample from the dataset created by the Global Adaptation Mapping Initiative
(GAMI) where we check the accuracy of climate change adaptation related feature
extraction from the scientific literature across three levels of expertise. Our
results indicate that while GPT-4o can achieve high accuracy in low-expertise
tasks like geographic location identification, their performance in
intermediate and high-expertise tasks, such as stakeholder identification and
assessment of depth of the adaptation response, is less reliable. The findings
motivate the need for designing assessment workflows that utilize the strengths
of models like GPT-4o while also providing refinements to improve their
performance on these tasks.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2024 13:14:57 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Joe",
"Elphin Tom",
""
],
[
"Koneru",
"Sai Dileep",
""
],
[
"Kirchhoff",
"Christine J",
""
]
] |
2407.12827 | Yang Yang | Shupeng Zhong, Xinger Li, Shushan Jin, Yang Yang | The Solution for The PST-KDD-2024 OAG-Challenge | null | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we introduce the second-place solution in the KDD-2024
OAG-Challenge paper source tracing track. Our solution is mainly based on two
methods, BERT and GCN, and combines the reasoning results of BERT and GCN in
the final submission to achieve complementary performance. In the BERT
solution, we focus on processing the fragments that appear in the references of
the paper, and use a variety of operations to reduce the redundant interference
in the fragments, so that the information received by BERT is more refined. In
the GCN solution, we map information such as paper fragments, abstracts, and
titles to a high-dimensional semantic space through an embedding model, and try
to build edges between titles, abstracts, and fragments to integrate contextual
relationships for judgment. In the end, our solution achieved a remarkable
score of 0.47691 in the competition.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2024 14:15:05 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Zhong",
"Shupeng",
""
],
[
"Li",
"Xinger",
""
],
[
"Jin",
"Shushan",
""
],
[
"Yang",
"Yang",
""
]
] |
2407.12828 | Jiaxin Qin | Jiaxin Qin, Zixuan Zhang, Chi Han, Manling Li, Pengfei Yu, Heng Ji | Why Does New Knowledge Create Messy Ripple Effects in LLMs? | null | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Extensive previous research has focused on post-training knowledge editing
(KE) for language models (LMs) to ensure that knowledge remains accurate and
up-to-date. One desired property and open question in KE is to let edited LMs
correctly handle ripple effects, where LM is expected to answer its logically
related knowledge accurately. In this paper, we answer the question of why most
KE methods still create messy ripple effects. We conduct extensive analysis and
identify a salient indicator, GradSim, that effectively reveals when and why
updated knowledge ripples in LMs. GradSim is computed by the cosine similarity
between gradients of the original fact and its related knowledge. We observe a
strong positive correlation between ripple effect performance and GradSim
across different LMs, KE methods, and evaluation metrics. Further
investigations into three counter-intuitive failure cases (Negation,
Over-Ripple, Multi-Lingual) of ripple effects demonstrate that these failures
are often associated with very low GradSim. This finding validates that GradSim
is an effective indicator of when knowledge ripples in LMs.
| [
{
"version": "v1",
"created": "Tue, 2 Jul 2024 14:33:44 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Qin",
"Jiaxin",
""
],
[
"Zhang",
"Zixuan",
""
],
[
"Han",
"Chi",
""
],
[
"Li",
"Manling",
""
],
[
"Yu",
"Pengfei",
""
],
[
"Ji",
"Heng",
""
]
] |
2407.12829 | Kaiyuan Yang | Zhiyu Chen, Ziyuan Wen, Weier Wan, Akhil Reddy Pakala, Yiwei Zou,
Wei-Chen Wei, Zengyi Li, Yubei Chen, Kaiyuan Yang | PICO-RAM: A PVT-Insensitive Analog Compute-In-Memory SRAM Macro with
In-Situ Multi-Bit Charge Computing and 6T Thin-Cell-Compatible Layout | This manuscript has been accepted to IEEE Journal of Solid-State
Circuits (JSSC) | null | null | null | cs.AR cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analog compute-in-memory (CIM) in static random-access memory (SRAM) is
promising for accelerating deep learning inference by circumventing the memory
wall and exploiting ultra-efficient analog low-precision arithmetic. Latest
analog CIM designs attempt bit-parallel schemes for multi-bit analog
Matrix-Vector Multiplication (MVM), aiming at higher energy efficiency,
throughput, and training simplicity and robustness over conventional bit-serial
methods that digitally shift-and-add multiple partial analog computing results.
However, bit-parallel operations require more complex analog computations and
become more sensitive to well-known analog CIM challenges, including large cell
areas, inefficient and inaccurate multi-bit analog operations, and
vulnerability to PVT variations. This paper presents PICO-RAM, a
PVT-insensitive and compact CIM SRAM macro with charge-domain bit-parallel
computation. It adopts a multi-bit thin-cell Multiply-Accumulate (MAC) unit
that shares the same transistor layout as the most compact 6T SRAM cell. All
analog computing modules, including digital-to-analog converters (DACs), MAC
units, analog shift-and-add, and analog-to-digital converters (ADCs) reuse one
set of local capacitors inside the array, performing in-situ computation to
save area and enhance accuracy. A compact 8.5-bit dual-threshold time-domain
ADC power gates the main path most of the time, leading to a significant energy
reduction. Our 65-nm prototype achieves the highest weight storage density of
559 Kb/mm${^2}$ and exceptional robustness to temperature and voltage
variations (-40 to 105 $^{\circ}$C and 0.65 to 1.2 V) among SRAM-based analog
CIM designs.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2024 03:46:59 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Chen",
"Zhiyu",
""
],
[
"Wen",
"Ziyuan",
""
],
[
"Wan",
"Weier",
""
],
[
"Pakala",
"Akhil Reddy",
""
],
[
"Zou",
"Yiwei",
""
],
[
"Wei",
"Wei-Chen",
""
],
[
"Li",
"Zengyi",
""
],
[
"Chen",
"Yubei",
""
],
[
"Yang",
"Kaiyuan",
""
]
] |
2407.12830 | Sai Sathiesh Rajan | Sai Sathiesh Rajan, Ezekiel Soremekun, Sudipta Chattopadhyay | Knowledge-based Consistency Testing of Large Language Models | 14 pages, 6 figures, 14 tables, Submitted to ACL ARR (June 2024) | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In this work, we systematically expose and measure the inconsistency and
knowledge gaps of Large Language Models (LLMs). Specifically, we propose an
automated testing framework (called KONTEST) which leverages a knowledge graph
to construct test cases. KONTEST probes and measures the inconsistencies in the
LLM's knowledge of the world via a combination of semantically-equivalent
queries and test oracles (metamorphic or ontological oracle). KONTEST further
mitigates knowledge gaps via a weighted LLM model ensemble. Using four
state-of-the-art LLMs (Falcon, Gemini, GPT3.5, and Llama2), we show that
KONTEST generates 19.2% error inducing inputs (1917 errors from 9983 test
inputs). It also reveals a 16.5% knowledge gap across all tested LLMs.
KONTEST's mitigation method reduces LLM knowledge gap by 32.48%. Our ablation
study further shows that GPT3.5 is not suitable for knowledge-based consistency
testing because it is only 60%-68% effective in knowledge construction.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2024 11:16:54 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Rajan",
"Sai Sathiesh",
""
],
[
"Soremekun",
"Ezekiel",
""
],
[
"Chattopadhyay",
"Sudipta",
""
]
] |
2407.12831 | Lennart B\"urger | Lennart B\"urger, Fred A. Hamprecht, Boaz Nadler | Truth is Universal: Robust Detection of Lies in LLMs | 10 pages, 30 figures | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) have revolutionised natural language processing,
exhibiting impressive human-like capabilities. In particular, LLMs are capable
of "lying", knowingly outputting false statements. Hence, it is of interest and
importance to develop methods to detect when LLMs lie. Indeed, several authors
trained classifiers to detect LLM lies based on their internal model
activations. However, other researchers showed that these classifiers may fail
to generalise, for example to negated statements. In this work, we aim to
develop a robust method to detect when an LLM is lying. To this end, we make
the following key contributions: (i) We demonstrate the existence of a
two-dimensional subspace, along which the activation vectors of true and false
statements can be separated. Notably, this finding is universal and holds for
various LLMs, including Gemma-7B, LLaMA2-13B and LLaMA3-8B. Our analysis
explains the generalisation failures observed in previous studies and sets the
stage for more robust lie detection; (ii) Building upon (i), we construct an
accurate LLM lie detector. Empirically, our proposed classifier achieves
state-of-the-art performance, distinguishing simple true and false statements
with 94% accuracy and detecting more complex real-world lies with 95% accuracy.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2024 13:01:54 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Bürger",
"Lennart",
""
],
[
"Hamprecht",
"Fred A.",
""
],
[
"Nadler",
"Boaz",
""
]
] |
2407.12832 | Paulo Cavalin | Paulo Cavalin, Pedro Henrique Domingues, Claudio Pinhanez | Sentence-level Aggregation of Lexical Metrics Correlate Stronger with
Human Judgements than Corpus-level Aggregation | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | In this paper we show that corpus-level aggregation hinders considerably the
capability of lexical metrics to accurately evaluate machine translation (MT)
systems. With empirical experiments we demonstrate that averaging individual
segment-level scores can make metrics such as BLEU and chrF correlate much
stronger with human judgements and make them behave considerably more similar
to neural metrics such as COMET and BLEURT. We show that this difference exists
because corpus- and segment-level aggregation differs considerably owing to the
classical average of ratio versus ratio of averages Mathematical problem.
Moreover, as we also show, such difference affects considerably the statistical
robustness of corpus-level aggregation. Considering that neural metrics
currently only cover a small set of sufficiently-resourced languages, the
results in this paper can help make the evaluation of MT systems for
low-resource languages more trustworthy.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2024 13:46:24 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Cavalin",
"Paulo",
""
],
[
"Domingues",
"Pedro Henrique",
""
],
[
"Pinhanez",
"Claudio",
""
]
] |
2407.12833 | Irina Abdullaeva Mrs | Irina Abdullaeva, Andrei Filatov, Mikhail Orlov, Ivan Karpukhin,
Viacheslav Vasilev, Denis Dimitrov, Andrey Kuznetsov, Ivan Kireev, Andrey
Savchenko | ESQA: Event Sequences Question Answering | 25 pages, 3 figures | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Event sequences (ESs) arise in many practical domains including finance,
retail, social networks, and healthcare. In the context of machine learning,
event sequences can be seen as a special type of tabular data with annotated
timestamps. Despite the importance of ESs modeling and analysis, little effort
was made in adapting large language models (LLMs) to the ESs domain. In this
paper, we highlight the common difficulties of ESs processing and propose a
novel solution capable of solving multiple downstream tasks with little or no
finetuning. In particular, we solve the problem of working with long sequences
and improve time and numeric features processing. The resulting method, called
ESQA, effectively utilizes the power of LLMs and, according to extensive
experiments, achieves state-of-the-art results in the ESs domain.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2024 15:41:54 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Abdullaeva",
"Irina",
""
],
[
"Filatov",
"Andrei",
""
],
[
"Orlov",
"Mikhail",
""
],
[
"Karpukhin",
"Ivan",
""
],
[
"Vasilev",
"Viacheslav",
""
],
[
"Dimitrov",
"Denis",
""
],
[
"Kuznetsov",
"Andrey",
""
],
[
"Kireev",
"Ivan",
""
],
[
"Savchenko",
"Andrey",
""
]
] |
2407.12834 | Arav Karighattam | Arav V. Karighattam | Heegner point constructions and fundamental units in cubic fields | 26 pages. Feedback appreciated! | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove the existence of nontrivial rational Heegner points on the elliptic
curve $y^2 = x^3 + p$ when $p \equiv 5 \pmod{36}$ and $h_K$ is odd, and on the
elliptic curve $y^2 = x^3 - p$ when $p \equiv 23 \pmod{36}$ and $h_K$ is odd.
This follows from our expression for the fundamental unit of the non-Galois
cubic extension $K=\mathbb{Q}(\sqrt[3]{p})$ in terms of the class number $h_K$
and the norm of a special value of a modular function of level $6$ for any odd
prime $p \equiv 2$ or $5 \pmod{9}$, which is an analogue of a theorem of
Dirichlet in 1840 expressing the fundamental unit of a real quadratic field in
terms of the class number and a product of cyclotomic units.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2024 17:46:28 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Karighattam",
"Arav V.",
""
]
] |
2407.12835 | Mochen Yang | Jinghui Zhang, Dandan Qiao, Mochen Yang, Qiang Wei | Regurgitative Training: The Value of Real Data in Training Large
Language Models | null | null | null | null | cs.CL cs.AI stat.ML | http://creativecommons.org/licenses/by/4.0/ | What happens if we train a new Large Language Model (LLM) using data that are
at least partially generated by other LLMs? The explosive success of LLMs means
that a substantial amount of content online will be generated by LLMs rather
than humans, which will inevitably enter the training datasets of
next-generation LLMs. We evaluate the implications of such "regurgitative
training" on LLM performance. Through fine-tuning GPT-3.5 with data generated
either by itself or by other LLMs in a machine translation task, we find strong
evidence that regurgitative training clearly handicaps the performance of LLMs.
The same performance loss of regurgitative training is observed on transformer
models that we train from scratch. We find suggestive evidence that the
performance disadvantage of regurgitative training can be attributed to at
least two mechanisms: (1) higher error rates and (2) lower lexical diversity in
LLM-generated data as compared to real data. Based on these mechanisms, we
propose and evaluate three different strategies to mitigate the performance
loss of regurgitative training. First, we devise data-driven metrics to gauge
the quality of each LLM-generated data instance, and then carry out an ordered
training process where high-quality data are added before low-quality ones.
Second, we combine data generated by multiple different LLMs (as an attempt to
increase lexical diversity). Third, we train an AI detection classifier to
differentiate between LLM- and human-generated data, and include LLM-generated
data in the order of resemblance to human-generated data. All three strategies
can improve the performance of regurgitative training to some extent but are
not always able to fully close the gap from training with real data. Our
results highlight the value of real, human-generated data in training LLMs,
which cannot be easily substituted by synthetic, LLM-generated data.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2024 18:42:55 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Zhang",
"Jinghui",
""
],
[
"Qiao",
"Dandan",
""
],
[
"Yang",
"Mochen",
""
],
[
"Wei",
"Qiang",
""
]
] |
2407.12836 | Peter Gr\"onquist | Peter Gr\"onquist | OSPC: Artificial VLM Features for Hateful Meme Detection | null | null | 10.1145/3589335.3665996 | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | The digital revolution and the advent of the world wide web have transformed
human communication, notably through the emergence of memes. While memes are a
popular and straightforward form of expression, they can also be used to spread
misinformation and hate due to their anonymity and ease of use. In response to
these challenges, this paper introduces a solution developed by team 'Baseline'
for the AI Singapore Online Safety Prize Challenge. Focusing on computational
efficiency and feature engineering, the solution achieved an AUROC of 0.76 and
an accuracy of 0.69 on the test dataset. As key features, the solution
leverages the inherent probabilistic capabilities of large Vision-Language
Models (VLMs) to generate task-adapted feature encodings from text, and applies
a distilled quantization tailored to the specific cultural nuances present in
Singapore. This type of processing and fine-tuning can be adapted to various
visual and textual understanding and classification tasks, and even applied on
private VLMs such as OpenAI's GPT. Finally it can eliminate the need for
extensive model training on large GPUs for resource constrained applications,
also offering a solution when little or no data is available.
| [
{
"version": "v1",
"created": "Wed, 3 Jul 2024 21:35:52 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Grönquist",
"Peter",
""
]
] |
2407.12837 | Tomohiro Uchiyama | Tomohiro Uchiyama | Keynesian chaos revisited: odd period cycles and ergodic properties | null | null | null | null | econ.GN q-fin.EC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study two standard (Keynesian) dynamic macroeconomic models
(one is piecewise linear and the other is nonlinear). Our purpose is twofold:
(1)~For each model, we give a complete characterisation for the existence of a
topological chaos (of the GDP levels), (2)~Even if a chaos exists, using
ergodic theory, we show that it is possible to predict the future GDP levels
"on average". This paper gives a new application of a celebrated result in
ergodic theory by A. Avila (2014 fields medalist). We believe that our
method/strategy in this paper is generic enough to be used to analyse many
other (seemingly untractable) chaotic economic models.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2024 02:01:40 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Uchiyama",
"Tomohiro",
""
]
] |
2407.12838 | Laura Manrique-G\'omez | Laura Manrique-G\'omez and Tony Montes and Rub\'en Manrique | Historical Ink: 19th Century Latin American Spanish Newspaper Corpus
with LLM OCR Correction | null | null | null | null | cs.CL cs.DL | http://creativecommons.org/licenses/by/4.0/ | This paper presents two significant contributions: first, a novel dataset of
19th-century Latin American press texts, which addresses the lack of
specialized corpora for historical and linguistic analysis in this region.
Second, it introduces a framework for OCR error correction and linguistic
surface form detection in digitized corpora, utilizing a Large Language Model.
This framework is adaptable to various contexts and, in this paper, is
specifically applied to the newly created dataset.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2024 02:10:18 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Manrique-Gómez",
"Laura",
""
],
[
"Montes",
"Tony",
""
],
[
"Manrique",
"Rubén",
""
]
] |
2407.12839 | Nabarun Mondal Mr | Hemil Ruparel, Nabarun Mondal | A Formal Analysis of Iterated TDD | To be submitted to IEEE Transactions on Software Engineering | null | null | null | cs.SE cs.SY eess.SY math.DS math.OC | http://creativecommons.org/licenses/by/4.0/ | In this paper we formally analyze the software methodology called (iterated)
Test Driven Development (TDD). We formally define Specification, Software,
Testing, Equivalence Partitions, Coupling, to argue about the nature of the
software development in terms of TDD. We formalize Iterative TDD and find a
context in which iterated TDD ``provably produce'' ``provably correct code''
from ``specifications'' while being stable in terms of iterated code churns. We
demonstrate that outside this context iterated TDD will exhibit chaotic
behavior, implying unpredictable messy amount of code churn. We argue that the
research finding of ``ineffective'' iterated TDD found by earlier researches
are due to missing this context, while the findings of ``effective'' iterated
TDD is due to accidentally falling into the context or simply placebo.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2024 08:07:35 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Ruparel",
"Hemil",
""
],
[
"Mondal",
"Nabarun",
""
]
] |
2407.12840 | Filippo E. Nuccio Mortarino Majno di Capriglio | Dagur Asgeirsson, Riccardo Brasca (IMJ-PRG (UMR\_7586)), Nikolas Kuhn
(UiO), Filippo Alberto Edoardo Nuccio Mortarino Majno Di Capriglio (ICJ, UJM,
CTN), Adam Topaz | Categorical Foundations of Formalized Condensed Mathematics | null | null | null | null | math.CT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Condensed mathematics, developed by Clausen and Scholze over the last few
years, proposes a generalization of topology with better categorical
properties. It replaces the concept of a topological space by that of a
condensed set, which can be defined as a sheaf for the coherent topology on a
certain category of compact Hausdorff spaces. In this case, the sheaf condition
has a fairly simple explicit description, which arises from studying the
relationship between the coherent, regular and extensive topologies. In this
paper, we establish this relationship under minimal assumptions on the
category, going beyond the case of compact Hausdorff spaces. Along the way, we
also provide a characterizations of sheaves and covering sieves for these
categories. All results in this paper have been fully formalized in the Lean
proof assistant.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2024 09:05:37 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Asgeirsson",
"Dagur",
"",
"IMJ-PRG"
],
[
"Brasca",
"Riccardo",
"",
"IMJ-PRG"
],
[
"Kuhn",
"Nikolas",
"",
"UiO"
],
[
"Di Capriglio",
"Filippo Alberto Edoardo Nuccio Mortarino Majno",
"",
"ICJ, UJM,\n CTN"
],
[
"Topaz",
"Adam",
""
]
] |
2407.12841 | Yuxi Xia | Yuxi Xia, Kilm Zaporojets, Benjamin Roth | What to do if language models disagree? Black-box model ensembling for
textual and visual question answering | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | A diverse range of large language models (LLMs), e.g., ChatGPT, and visual
question answering (VQA) models, e.g., BLIP, have been developed for solving
textual and visual question answering tasks. However, both LLMs and VQA models
encounter challenges when applied to task-specific datasets. Fine-tuning these
models is either difficult, as it requires access via APIs, rendering them as
black-boxes, or costly due to the need of tuning a large number of parameters.
To address this, we introduce InfoSel, a data-efficient and lightweight
ensemble method that learns to dynamically pick the winner from existing
black-box models for predictions on both textual and multimodal visual question
answering tasks. Unlike traditional ensemble models, InfoSel does not rely on
prediction probabilities or confidences, which typically are not available in
black-box models. Experimental results on four datasets demonstrate that our
approach achieves an absolute increase of up to +5.27% in the F1-score compared
to standalone LLMs. Remarkably, this improvement is achieved by utilizing only
1K training instances and 110M model parameters for training task-specific
ensemble models.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2024 12:59:10 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Xia",
"Yuxi",
""
],
[
"Zaporojets",
"Kilm",
""
],
[
"Roth",
"Benjamin",
""
]
] |
2407.12842 | Wenguan Wang | Jian Ma, Wenguan Wang, Yi Yang, Feng Zheng | MS2SL: Multimodal Spoken Data-Driven Continuous Sign Language Production | Accepted to ACL 2024 Findings; Project Page:
https://hechang25.github.io/MS2SL | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sign language understanding has made significant strides; however, there is
still no viable solution for generating sign sequences directly from entire
spoken content, e.g., text or speech. In this paper, we propose a unified
framework for continuous sign language production, easing communication between
sign and non-sign language users. In particular, a sequence diffusion model,
utilizing embeddings extracted from text or speech, is crafted to generate sign
predictions step by step. Moreover, by creating a joint embedding space for
text, audio, and sign, we bind these modalities and leverage the semantic
consistency among them to provide informative feedback for the model training.
This embedding-consistency learning strategy minimizes the reliance on sign
triplets and ensures continuous model refinement, even with a missing audio
modality. Experiments on How2Sign and PHOENIX14T datasets demonstrate that our
model achieves competitive performance in sign language production.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2024 13:53:50 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Ma",
"Jian",
""
],
[
"Wang",
"Wenguan",
""
],
[
"Yang",
"Yi",
""
],
[
"Zheng",
"Feng",
""
]
] |
2407.12843 | Andong Hua | Andong Hua, Mehak Preet Dhaliwal, Ryan Burke, Yao Qin | NutriBench: A Dataset for Evaluating Large Language Models in
Carbohydrate Estimation from Meal Descriptions | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Accurate nutrition estimation helps people make informed decisions about
their dietary choices and is crucial for preventing serious health issues. We
present NutriBench, the first publicly available natural language meal
description based nutrition benchmark. NutriBench consists of 5,000
human-verified meal descriptions with macro-nutrient labels, including
carbohydrates, proteins, fats, and calories. The data is divided into 15
subsets varying in complexity based on the number, servings, and popularity of
the food items in the meal and the specificity of serving size descriptions. We
conducted an extensive evaluation of seven popular and state-of-the-art Large
Language Models (LLMs), including GPT-3.5, Llama-3, and a medical
domain-specific model with standard, Chain-of-Thought and Retrieval-Augmented
Generation strategies on our benchmark for carbohydrate estimation. We also
conducted a human study involving expert and non-expert participants and found
that LLMs can provide more accurate and faster predictions over a range of
complex queries. We present a thorough analysis and comparison of different
LLMs, highlighting the opportunities and challenges of using LLMs for nutrition
estimation in real-life scenarios. Our benchmark is publicly available at:
https://mehak126.github.io/nutribench.html
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2024 15:10:51 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Hua",
"Andong",
""
],
[
"Dhaliwal",
"Mehak Preet",
""
],
[
"Burke",
"Ryan",
""
],
[
"Qin",
"Yao",
""
]
] |
2407.12844 | Alex Kipnis | Alex Kipnis, Konstantinos Voudouris, Luca M. Schulze Buschoff, Eric
Schulz | $\texttt{metabench}$ -- A Sparse Benchmark to Measure General Ability in
Large Language Models | LLMs, benchmarking, IRT, information, compression | null | null | null | cs.CL cs.LG stat.ML | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Large Language Models (LLMs) vary in their abilities on a range of tasks.
Initiatives such as the $\texttt{Open LLM Leaderboard}$ aim to quantify these
differences with several large benchmarks (sets of test items to which an LLM
can respond either correctly or incorrectly). However, high correlations within
and between benchmark scores suggest that (1) there exists a small set of
common underlying abilities that these benchmarks measure, and (2) items tap
into redundant information and the benchmarks may thus be considerably
compressed. We use data from $n > 5000$ LLMs to identify the most informative
items of six benchmarks, ARC, GSM8K, HellaSwag, MMLU, TruthfulQA and WinoGrande
(with $d=28,632$ items in total). From them we distill a sparse benchmark,
$\texttt{metabench}$, that has less than $3\%$ of the original size of all six
benchmarks combined. This new sparse benchmark goes beyond point scores by
yielding estimators of the underlying benchmark-specific abilities. We show
that these estimators (1) can be used to reconstruct each original
$\textit{individual}$ benchmark score with, on average, $1.5\%$ root mean
square error (RMSE), (2) reconstruct the original $\textit{total}$ score with
$0.8\%$ RMSE, and (3) have a single underlying common factor whose Spearman
correlation with the total score is $r = 0.93$.
| [
{
"version": "v1",
"created": "Thu, 4 Jul 2024 17:57:38 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Kipnis",
"Alex",
""
],
[
"Voudouris",
"Konstantinos",
""
],
[
"Buschoff",
"Luca M. Schulze",
""
],
[
"Schulz",
"Eric",
""
]
] |
2407.12845 | Siyao Yang | Bo Lin, Haoxuan Wang, Siyao Yang, Zhenning Cai | Time-dependent Regularized 13-Moment Equations with Onsager Boundary
Conditions in the Linear Regime | 30 pages, 24 figures | null | null | null | math.AP physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop the time-dependent regularized 13-moment equations for general
elastic collision models under the linear regime. Detailed derivation shows the
proposed equations have super-Burnett order for small Knudsen numbers, and the
moment equations enjoy a symmetric structure. A new modification of Onsager
boundary conditions is proposed to ensure stability as well as the removal of
undesired boundary layers. Numerical examples of one-dimensional channel flows
is conducted to verified our model.
| [
{
"version": "v1",
"created": "Fri, 5 Jul 2024 07:30:11 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Lin",
"Bo",
""
],
[
"Wang",
"Haoxuan",
""
],
[
"Yang",
"Siyao",
""
],
[
"Cai",
"Zhenning",
""
]
] |
2407.12846 | Bumjin Park | Bumjin Park and Jaesik Choi | Identifying the Source of Generation for Large Language Models | ICPRAI 2024 | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Large language models (LLMs) memorize text from several sources of documents.
In pretraining, LLM trains to maximize the likelihood of text but neither
receives the source of the text nor memorizes the source. Accordingly, LLM can
not provide document information on the generated content, and users do not
obtain any hint of reliability, which is crucial for factuality or privacy
infringement. This work introduces token-level source identification in the
decoding step, which maps the token representation to the reference document.
We propose a bi-gram source identifier, a multi-layer perceptron with two
successive token representations as input for better generalization. We conduct
extensive experiments on Wikipedia and PG19 datasets with several LLMs, layer
locations, and identifier sizes. The overall results show a possibility of
token-level source identifiers for tracing the document, a crucial problem for
the safe use of LLMs.
| [
{
"version": "v1",
"created": "Fri, 5 Jul 2024 08:52:15 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Park",
"Bumjin",
""
],
[
"Choi",
"Jaesik",
""
]
] |
2407.12847 | Roland Daynauth | Roland Daynauth, Jason Mars | Aligning Model Evaluations with Human Preferences: Mitigating Token
Count Bias in Language Model Assessments | null | null | null | null | cs.CL cs.AI cs.HC | http://creativecommons.org/licenses/by/4.0/ | The SLAM paper demonstrated that on-device Small Language Models (SLMs) are a
viable and cost-effective alternative to API-based Large Language Models
(LLMs), such as OpenAI's GPT-4, offering comparable performance and stability.
However, SLAM also identified discrepancies between human preferences and
traditional auto-evaluators. This follow-up paper explores methods to align LLM
evaluator preferences with human evaluations by addressing biases, particularly
toward higher token counts. We employed Bayesian statistics and a t-test to
quantify this bias and developed a recalibration procedure to adjust the
GPTScorer. Our findings significantly improve aligning the recalibrated LLM
evaluator with human evaluations across multiple use cases. For instance,
spearman's ranking correlation score in the Recommendation use case improved
from -27.27 to 44.55. These results highlight the importance of accounting for
biases in automated evaluations to ensure fair and accurate model assessments.
The recalibration process enhances the reliability of automated evaluators,
leading to better AI models that align with human values and expectations. This
study provides a robust methodology for future research into bias correction
and emphasizes the feasibility and benefits of developing human-aligned AI
evaluation systems.
| [
{
"version": "v1",
"created": "Fri, 5 Jul 2024 09:26:40 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Daynauth",
"Roland",
""
],
[
"Mars",
"Jason",
""
]
] |
2407.12848 | Aniket Deroy | Aniket Deroy, Kripabandhu Ghosh, Saptarshi Ghosh | Applicability of Large Language Models and Generative Models for Legal
Case Judgement Summarization | Accepted at Artificial Intelligence and Law, 2024 | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatic summarization of legal case judgements, which are known to be long
and complex, has traditionally been tried via extractive summarization models.
In recent years, generative models including abstractive summarization models
and Large language models (LLMs) have gained huge popularity. In this paper, we
explore the applicability of such models for legal case judgement
summarization. We applied various domain specific abstractive summarization
models and general domain LLMs as well as extractive summarization models over
two sets of legal case judgements from the United Kingdom (UK) Supreme Court
and the Indian (IN) Supreme Court and evaluated the quality of the generated
summaries. We also perform experiments on a third dataset of legal documents of
a different type, Government reports from the United States (US). Results show
that abstractive summarization models and LLMs generally perform better than
the extractive methods as per traditional metrics for evaluating summary
quality. However, detailed investigation shows the presence of inconsistencies
and hallucinations in the outputs of the generative models, and we explore ways
to reduce the hallucinations and inconsistencies in the summaries. Overall, the
investigation suggests that further improvements are needed to enhance the
reliability of abstractive models and LLMs for legal case judgement
summarization. At present, a human-in-the-loop technique is more suitable for
performing manual checks to identify inconsistencies in the generated
summaries.
| [
{
"version": "v1",
"created": "Sat, 6 Jul 2024 04:49:40 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Deroy",
"Aniket",
""
],
[
"Ghosh",
"Kripabandhu",
""
],
[
"Ghosh",
"Saptarshi",
""
]
] |
2407.12849 | Keith Kwan | Keith Kwan | Large language models are good medical coders, if provided with tools | 7 pages, 1 figure, 2 tables | null | null | null | cs.IR cs.CL | http://creativecommons.org/licenses/by/4.0/ | This study presents a novel two-stage Retrieve-Rank system for automated
ICD-10-CM medical coding, comparing its performance against a Vanilla Large
Language Model (LLM) approach. Evaluating both systems on a dataset of 100
single-term medical conditions, the Retrieve-Rank system achieved 100% accuracy
in predicting correct ICD-10-CM codes, significantly outperforming the Vanilla
LLM (GPT-3.5-turbo), which achieved only 6% accuracy. Our analysis demonstrates
the Retrieve-Rank system's superior precision in handling various medical terms
across different specialties. While these results are promising, we acknowledge
the limitations of using simplified inputs and the need for further testing on
more complex, realistic medical cases. This research contributes to the ongoing
effort to improve the efficiency and accuracy of medical coding, highlighting
the importance of retrieval-based approaches.
| [
{
"version": "v1",
"created": "Sat, 6 Jul 2024 06:58:51 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Kwan",
"Keith",
""
]
] |
2407.12850 | Mina Remeli | Mina Remeli, Moritz Hardt and Robert C. Williamson | Limits to Predicting Online Speech Using Large Language Models | null | null | null | null | cs.CL cs.CY cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We study the predictability of online speech on social media, and whether
predictability improves with information outside a user's own posts. Recent
work suggests that the predictive information contained in posts written by a
user's peers can surpass that of the user's own posts. Motivated by the success
of large language models, we empirically test this hypothesis. We define
unpredictability as a measure of the model's uncertainty, i.e., its negative
log-likelihood on future tokens given context. As the basis of our study, we
collect a corpus of 6.25M posts from more than five thousand X (previously
Twitter) users and their peers. Across three large language models ranging in
size from 1 billion to 70 billion parameters, we find that predicting a user's
posts from their peers' posts performs poorly. Moreover, the value of the
user's own posts for prediction is consistently higher than that of their
peers'. Across the board, we find that the predictability of social media posts
remains low, comparable to predicting financial news without context. We extend
our investigation with a detailed analysis about the causes of unpredictability
and the robustness of our findings. Specifically, we observe that a significant
amount of predictive uncertainty comes from hashtags and @-mentions. Moreover,
our results replicate if instead of prompting the model with additional
context, we finetune on additional context.
| [
{
"version": "v1",
"created": "Mon, 8 Jul 2024 09:50:49 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Remeli",
"Mina",
""
],
[
"Hardt",
"Moritz",
""
],
[
"Williamson",
"Robert C.",
""
]
] |
2407.12851 | Zixin Shu | Zixin Shu, Rui Hua, Dengying Yan, Chenxia Lu, Ning Xu, Jun Li, Hui
Zhu, Jia Zhang, Dan Zhao, Chenyang Hui, Junqiu Ye, Chu Liao, Qi Hao, Wen Ye,
Cheng Luo, Xinyan Wang, Chuang Cheng, Xiaodong Li, Baoyan Liu, Xiaji Zhou,
Runshun Zhang, Min Xu, Xuezhong Zhou | ISPO: An Integrated Ontology of Symptom Phenotypes for Semantic
Integration of Traditional Chinese Medical Data | 39 pages, 6 figures, 6 tables | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Symptom phenotypes are one of the key types of manifestations for diagnosis
and treatment of various disease conditions. However, the diversity of symptom
terminologies is one of the major obstacles hindering the analysis and
knowledge sharing of various types of symptom-related medical data particularly
in the fields of Traditional Chinese Medicine (TCM). Objective: This study
aimed to construct an Integrated Ontology of symptom phenotypes (ISPO) to
support the data mining of Chinese EMRs and real-world study in TCM field.
Methods: To construct an integrated ontology of symptom phenotypes (ISPO), we
manually annotated classical TCM textbooks and large-scale Chinese electronic
medical records (EMRs) to collect symptom terms with support from a medical
text annotation system. Furthermore, to facilitate the semantic
interoperability between different terminologies, we incorporated public
available biomedical vocabularies by manual mapping between Chinese terms and
English terms with cross-references to source vocabularies. In addition, we
evaluated the ISPO using independent clinical EMRs to provide a high-usable
medical ontology for clinical data analysis. Results: By integrating 78,696
inpatient cases of EMRs, 5 biomedical vocabularies, 21 TCM books and
dictionaries, ISPO provides 3,147 concepts, 23,475 terms, and 55,552 definition
or contextual texts. Adhering to the taxonomical structure of the related
anatomical systems of symptom phenotypes, ISPO provides 12 top-level categories
and 79 middle-level sub-categories. The validation of data analysis showed the
ISPO has a coverage rate of 95.35%, 98.53% and 92.66% for symptom terms with
occurrence rates of 0.5% in additional three independent curated clinical
datasets, which can demonstrate the significant value of ISPO in mapping
clinical terms to ontologies.
| [
{
"version": "v1",
"created": "Mon, 8 Jul 2024 15:23:50 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Shu",
"Zixin",
""
],
[
"Hua",
"Rui",
""
],
[
"Yan",
"Dengying",
""
],
[
"Lu",
"Chenxia",
""
],
[
"Xu",
"Ning",
""
],
[
"Li",
"Jun",
""
],
[
"Zhu",
"Hui",
""
],
[
"Zhang",
"Jia",
""
],
[
"Zhao",
"Dan",
""
],
[
"Hui",
"Chenyang",
""
],
[
"Ye",
"Junqiu",
""
],
[
"Liao",
"Chu",
""
],
[
"Hao",
"Qi",
""
],
[
"Ye",
"Wen",
""
],
[
"Luo",
"Cheng",
""
],
[
"Wang",
"Xinyan",
""
],
[
"Cheng",
"Chuang",
""
],
[
"Li",
"Xiaodong",
""
],
[
"Liu",
"Baoyan",
""
],
[
"Zhou",
"Xiaji",
""
],
[
"Zhang",
"Runshun",
""
],
[
"Xu",
"Min",
""
],
[
"Zhou",
"Xuezhong",
""
]
] |
2407.12852 | Tony Montes | Tony Montes and Laura Manrique-G\'omez and Rub\'en Manrique | Historical Ink: Semantic Shift Detection for 19th Century Spanish | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | This paper explores the evolution of word meanings in 19th-century Spanish
texts, with an emphasis on Latin American Spanish, using computational
linguistics techniques. It addresses the Semantic Shift Detection (SSD) task,
which is crucial for understanding linguistic evolution, particularly in
historical contexts. The study focuses on analyzing a set of Spanish target
words. To achieve this, a 19th-century Spanish corpus is constructed, and a
customizable pipeline for SSD tasks is developed. This pipeline helps find the
senses of a word and measure their semantic change between two corpora using
fine-tuned BERT-like models with old Spanish texts for both Latin American and
general Spanish cases. The results provide valuable insights into the cultural
and societal shifts reflected in language changes over time
| [
{
"version": "v1",
"created": "Mon, 8 Jul 2024 16:49:34 GMT"
}
] | "2024-07-19T00:00:00" | [
[
"Montes",
"Tony",
""
],
[
"Manrique-Gómez",
"Laura",
""
],
[
"Manrique",
"Rubén",
""
]
] |