id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
479
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
unknown
authors_parsed
sequencelengths
1
2.83k
2407.11626
Dongnan Jin
Dongnan Jin, Yali Liu, Qiuzhi Song, Xunju Ma, Yue Liu, Dehao Wu
Dynamic Dimension Wrapping (DDW) Algorithm: A Novel Approach for Efficient Cross-Dimensional Search in Dynamic Multidimensional Spaces
null
null
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the real world, as the complexity of optimization problems continues to increase, there is an urgent need to research more efficient optimization methods. Current optimization algorithms excel in solving problems with a fixed number of dimensions. However, their efficiency in searching dynamic multi-dimensional spaces is unsatisfactory. In response to the challenge of cross-dimensional search in multi-dimensional spaces with varying numbers of dimensions, this study proposes a new optimization algorithm-Dynamic Dimension Wrapping (DDW) algorithm. Firstly, by utilizing the Dynamic Time Warping (DTW) algorithm and Euclidean distance, a mapping relationship between different time series across dimensions is established, thus creating a fitness function suitable for dimensionally dynamic multi-dimensional space. Additionally, DDW introduces a novel, more efficient cross-dimensional search mechanism for dynamic multidimensional spaces. Finally, through comparative tests with 31 optimization algorithms in dynamic multidimensional space search, the results demonstrate that DDW exhibits outstanding search efficiency and provides search results closest to the actual optimal solution.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 11:41:35 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 08:41:40 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Jin", "Dongnan", "" ], [ "Liu", "Yali", "" ], [ "Song", "Qiuzhi", "" ], [ "Ma", "Xunju", "" ], [ "Liu", "Yue", "" ], [ "Wu", "Dehao", "" ] ]
2407.11631
Niklas Reich
Niklas Reich, Karsten Urban, J\"urgen Vorloeper
A parallel batch greedy algorithm in reduced basis methods: Convergence rates and numerical results
21 pages, 4 figures
null
null
null
math.NA cs.NA
http://creativecommons.org/licenses/by/4.0/
The "classical" (weak) greedy algorithm is widely used within model order reduction in order to compute a reduced basis in the offline training phase: An a posteriori error estimator is maximized and the snapshot corresponding to the maximizer is added to the basis. Since these snapshots are determined by a sufficiently detailed discretization, the offline phase is often computationally extremely costly. We suggest to replace the serial determination of one snapshot after the other by a parallel approach. In order to do so, we introduce a batch size $b$ and add $b$ snapshots to the current basis in every greedy iteration. These snapshots are computed in parallel. We prove convergence rates for this new batch greedy algorithm and compare them to those of the classical (weak) greedy algorithm in the Hilbert and Banach space case. Then, we present numerical results where we apply a (parallel) implementation of the proposed algorithm to the linear elliptic thermal block problem. We analyze the convergence rate as well as the offline and online wall-clock times for different batch sizes. We show that the proposed variant can significantly speed-up the offline phase while the size of the reduced problem is only moderately increased. The benefit of the parallel batch greedy increases for more complicated problems.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 11:50:04 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 11:28:24 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Reich", "Niklas", "" ], [ "Urban", "Karsten", "" ], [ "Vorloeper", "Jürgen", "" ] ]
2407.11635
Ignacio Borsa Sanjuan
Ignacio Borsa, Daniel de Florian, Rodolfo Sassot, Marco Stratmann, Werner Vogelsang
NNLO Global Analysis of Polarized Parton Distribution Functions
5 pages, 5 figures
null
null
null
hep-ph
http://creativecommons.org/licenses/by/4.0/
We present a next-to-next-to-leading order (NNLO) global QCD analysis of the proton's helicity parton distribution functions (PDFs), the first of its kind. To obtain the distributions, we use data for longitudinal spin asymmetries in inclusive and semi-inclusive lepton-nucleon scattering as well as in weak-boson and hadron or jet production in proton-proton scattering. We analyze the data using QCD perturbation theory at NNLO accuracy, employing approximations provided by the threshold resummation formalism in cases where full NNLO results for partonic hard-scattering functions are not readily available. Our numerical results suggest a remarkable perturbative stability of the extracted helicity PDFs.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 11:58:11 GMT" }, { "version": "v2", "created": "Wed, 17 Jul 2024 21:31:54 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Borsa", "Ignacio", "" ], [ "de Florian", "Daniel", "" ], [ "Sassot", "Rodolfo", "" ], [ "Stratmann", "Marco", "" ], [ "Vogelsang", "Werner", "" ] ]
2407.11689
Petal Mokryn
Petal B. Mokryn
A Topological View on Integration and Exterior Calculus
null
null
null
null
math.DG math.GN math.KT
http://creativecommons.org/licenses/by/4.0/
A construction of integration, function calculus, and exterior calculus is made, allowing for integration of unital magma valued functions against (compactified) unital magma valued measures over arbitrary topological spaces. The Riemann integral, geometric product integral, and Lebesgue integral are shown as special cases. Notions similar to chain complexes are developed to allow this form of integration to define notions of exterior derivative for differential forms, and of derivatives of functions as well. Resulting conclusions on integration, orientation, dimension, and differentiation are discussed. Applications include calculus on fractals, stochastic analysis, discrete analysis, and other novel forms of calculus.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 13:04:41 GMT" }, { "version": "v2", "created": "Wed, 17 Jul 2024 23:33:12 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Mokryn", "Petal B.", "" ] ]
2407.11727
Tao Luo
BESIII Collaboration: M. Ablikim, M. N. Achasov, P. Adlarson, O. Afedulidis, X. C. Ai, R. Aliberti, A. Amoroso, Q. An, Y. Bai, O. Bakina, I. Balossino, Y. Ban, H.-R. Bao, V. Batozskaya, K. Begzsuren, N. Berger, M. Berlowski, M. Bertani, D. Bettoni, F. Bianchi, E. Bianco, A. Bortone, I. Boyko, R. A. Briere, A. Brueggemann, H. Cai, X. Cai, A. Calcaterra, G. F. Cao, N. Cao, S. A. Cetin, J. F. Chang, G. R. Che, G. Chelkov, C. Chen, C. H. Chen, Chao Chen, G. Chen, H. S. Chen, H. Y. Chen, M. L. Chen, S. J. Chen, S. L. Chen, S. M. Chen, T. Chen, X. R. Chen, X. T. Chen, Y. B. Chen, Y. Q. Chen, Z. J. Chen, Z. Y. Chen, S. K. Choi, G. Cibinetto, F. Cossio, J. J. Cui, H. L. Dai, J. P. Dai, A. Dbeyssi, R. E. de Boer, D. Dedovich, C. Q. Deng, Z. Y. Deng, A. Denig, I. Denysenko, M. Destefanis, F. De Mori, B. Ding, X. X. Ding, Y. Ding, Y. Ding, J. Dong, L. Y. Dong, M. Y. Dong, X. Dong, M. C. Du, S. X. Du, Y. Y. Duan, Z. H. Duan, P. Egorov, Y. H. Fan, J. Fang, J. Fang, S. S. Fang, W. X. Fang, Y. Fang, Y. Q. Fang, R. Farinelli, L. Fava, F. Feldbauer, G. Felici, C. Q. Feng, J. H. Feng, Y. T. Feng, M. Fritsch, C. D. Fu, J. L. Fu, Y. W. Fu, H. Gao, X. B. Gao, Y. N. Gao, Yang Gao, S. Garbolino, I. Garzia, L. Ge, P. T. Ge, Z. W. Ge, C. Geng, E. M. Gersabeck, A. Gilman, K. Goetzen, L. Gong, W. X. Gong, W. Gradl, S. Gramigna, M. Greco, M. H. Gu, Y. T. Gu, C. Y. Guan, A. Q. Guo, L. B. Guo, M. J. Guo, R. P. Guo, Y. P. Guo, A. Guskov, J. Gutierrez, K. L. Han, T. T. Han, F. Hanisch, X. Q. Hao, F. A. Harris, K. K. He, K. L. He, F. H. Heinsius, C. H. Heinz, Y. K. Heng, C. Herold, T. Holtmann, P. C. Hong, G. Y. Hou, X. T. Hou, Y. R. Hou, Z. L. Hou, B. Y. Hu, H. M. Hu, J. F. Hu, S. L. Hu, T. Hu, Y. Hu, G. S. Huang, K. X. Huang, L. Q. Huang, X. T. Huang, Y. P. Huang, Y. S. Huang, T. Hussain, F. H\"olzken, N. H\"usken, N. in der Wiesche, J. Jackson, S. Janchiv, J. H. Jeong, Q. Ji, Q. P. Ji, W. Ji, X. B. Ji, X. L. Ji, Y. Y. Ji, X. Q. Jia, Z. K. Jia, D. Jiang, H. B. Jiang, P. C. Jiang, S. S. Jiang, T. J. Jiang, X. S. Jiang, Y. Jiang, J. B. Jiao, J. K. Jiao, Z. Jiao, S. Jin, Y. Jin, M. Q. Jing, X. M. Jing, T. Johansson, S. Kabana, N. Kalantar-Nayestanaki, X. L. Kang, X. S. Kang, M. Kavatsyuk, B. C. Ke, V. Khachatryan, A. Khoukaz, R. Kiuchi, O. B. Kolcu, B. Kopf, M. Kuessner, X. Kui, N. Kumar, A. Kupsc, W. K\"uhn, J. J. Lane, L. Lavezzi, T. T. Lei, Z. H. Lei, M. Lellmann, T. Lenz, C. Li, C. Li, C. H. Li, Cheng Li, D. M. Li, F. Li, G. Li, H. B. Li, H. J. Li, H. N. Li, Hui Li, J. R. Li, J. S. Li, K. Li, L. J. Li, L. K. Li, Lei Li, M. H. Li, P. R. Li, Q. M. Li, Q. X. Li, R. Li, S. X. Li, T. Li, W. D. Li, W. G. Li, X. Li, X. H. Li, X. L. Li, X. Y. Li, X. Z. Li, Y. G. Li, Z. J. Li, Z. Y. Li, C. Liang, H. Liang, H. Liang, Y. F. Liang, Y. T. Liang, G. R. Liao, Y. P. Liao, J. Libby, A. Limphirat, C. C. Lin, D. X. Lin, T. Lin, B. J. Liu, B. X. Liu, C. Liu, C. X. Liu, F. Liu, F. H. Liu, Feng Liu, G. M. Liu, H. Liu, H. B. Liu, H. H. Liu, H. M. Liu, Huihui Liu, J. B. Liu, J. Y. Liu, K. Liu, K. Y. Liu, Ke Liu, L. Liu, L. C. Liu, Lu Liu, M. H. Liu, P. L. Liu, Q. Liu, S. B. Liu, T. Liu, W. K. Liu, W. M. Liu, X. Liu, X. Liu, Y. Liu, Y. Liu, Y. B. Liu, Z. A. Liu, Z. D. Liu, Z. Q. Liu, X. C. Lou, F. X. Lu, H. J. Lu, J. G. Lu, X. L. Lu, Y. Lu, Y. P. Lu, Z. H. Lu, C. L. Luo, J. R. Luo, M. X. Luo, T. Luo, X. L. Luo, X. R. Lyu, Y. F. Lyu, F. C. Ma, H. Ma, H. L. Ma, J. L. Ma, L. L. Ma, M. M. Ma, Q. M. Ma, R. Q. Ma, T. Ma, X. T. Ma, X. Y. Ma, Y. Ma, Y. M. Ma, F. E. Maas, M. Maggiora, S. Malde, Y. J. Mao, Z. P. Mao, S. Marcello, Z. X. Meng, J. G. Messchendorp, G. Mezzadri, H. Miao, T. J. Min, R. E. Mitchell, X. H. Mo, B. Moses, N. Yu. Muchnoi, J. Muskalla, Y. Nefedov, F. Nerling, L. S. Nie, I. B. Nikolaev, Z. Ning, S. Nisar, Q. L. Niu, W. D. Niu, Y. Niu, S. L. Olsen, Q. Ouyang, S. Pacetti, X. Pan, Y. Pan, A. Pathak, Y. P. Pei, M. Pelizaeus, H. P. Peng, Y. Y. Peng, K. Peters, J. L. Ping, R. G. Ping, S. Plura, V. Prasad, F. Z. Qi, H. Qi, H. R. Qi, M. Qi, T. Y. Qi, S. Qian, W. B. Qian, C. F. Qiao, X. K. Qiao, J. J. Qin, L. Q. Qin, L. Y. Qin, X. P. Qin, X. S. Qin, Z. H. Qin, J. F. Qiu, Z. H. Qu, C. F. Redmer, K. J. Ren, A. Rivetti, M. Rolo, G. Rong, Ch. Rosner, S. N. Ruan, N. Salone, A. Sarantsev, Y. Schelhaas, K. Schoenning, M. Scodeggio, K. Y. Shan, W. Shan, X. Y. Shan, Z. J. Shang, J. F. Shangguan, L. G. Shao, M. Shao, C. P. Shen, H. F. Shen, W. H. Shen, X. Y. Shen, B. A. Shi, H. Shi, H. C. Shi, J. L. Shi, J. Y. Shi, Q. Q. Shi, S. Y. Shi, X. Shi, J. J. Song, T. Z. Song, W. M. Song, Y. J. Song, Y. X. Song, S. Sosio, S. Spataro, F. Stieler, Y. J. Su, G. B. Sun, G. X. Sun, H. Sun, H. K. Sun, J. F. Sun, K. Sun, L. Sun, S. S. Sun, T. Sun, W. Y. Sun, Y. Sun, Y. J. Sun, Y. Z. Sun, Z. Q. Sun, Z. T. Sun, C. J. Tang, G. Y. Tang, J. Tang, M. Tang, Y. A. Tang, L. Y. Tao, Q. T. Tao, M. Tat, J. X. Teng, V. Thoren, W. H. Tian, Y. Tian, Z. F. Tian, I. Uman, Y. Wan, S. J. Wang, B. Wang, B. L. Wang, Bo Wang, D. Y. Wang, F. Wang, H. J. Wang, J. J. Wang, J. P. Wang, K. Wang, L. L. Wang, M. Wang, N. Y. Wang, S. Wang, S. Wang, T. Wang, T. J. Wang, W. Wang, W. Wang, W. P. Wang, X. Wang, X. F. Wang, X. J. Wang, X. L. Wang, X. N. Wang, Y. Wang, Y. D. Wang, Y. F. Wang, Y. L. Wang, Y. N. Wang, Y. Q. Wang, Yaqian Wang, Yi Wang, Z. Wang, Z. L. Wang, Z. Y. Wang, Ziyi Wang, D. H. Wei, F. Weidner, S. P. Wen, Y. R. Wen, U. Wiedner, G. Wilkinson, M. Wolke, L. Wollenberg, C. Wu, J. F. Wu, L. H. Wu, L. J. Wu, X. Wu, X. H. Wu, Y. Wu, Y. H. Wu, Y. J. Wu, Z. Wu, L. Xia, X. M. Xian, B. H. Xiang, T. Xiang, D. Xiao, G. Y. Xiao, S. Y. Xiao, Y. L. Xiao, Z. J. Xiao, C. Xie, X. H. Xie, Y. Xie, Y. G. Xie, Y. H. Xie, Z. P. Xie, T. Y. Xing, C. F. Xu, C. J. Xu, G. F. Xu, H. Y. Xu, M. Xu, Q. J. Xu, Q. N. Xu, W. Xu, W. L. Xu, X. P. Xu, Y. C. Xu, Z. S. Xu, F. Yan, L. Yan, W. B. Yan, W. C. Yan, X. Q. Yan, H. J. Yang, H. L. Yang, H. X. Yang, T. Yang, Y. Yang, Y. F. Yang, Y. F. Yang, Y. X. Yang, Z. W. Yang, Z. P. Yao, M. Ye, M. H. Ye, J. H. Yin, Z. Y. You, B. X. Yu, C. X. Yu, G. Yu, J. S. Yu, T. Yu, X. D. Yu, Y. C. Yu, C. Z. Yuan, J. Yuan, J. Yuan, L. Yuan, S. C. Yuan, Y. Yuan, Z. Y. Yuan, C. X. Yue, A. A. Zafar, F. R. Zeng, S. H. Zeng, X. Zeng, Y. Zeng, Y. J. Zeng, Y. J. Zeng, X. Y. Zhai, Y. C. Zhai, Y. H. Zhan, A. Q. Zhang, B. L. Zhang, B. X. Zhang, D. H. Zhang, G. Y. Zhang, H. Zhang, H. Zhang, H. C. Zhang, H. H. Zhang, H. H. Zhang, H. Q. Zhang, H. R. Zhang, H. Y. Zhang, J. Zhang, J. Zhang, J. J. Zhang, J. L. Zhang, J. Q. Zhang, J. S. Zhang, J. W. Zhang, J. X. Zhang, J. Y. Zhang, J. Z. Zhang, Jianyu Zhang, L. M. Zhang, Lei Zhang, P. Zhang, Q. Y. Zhang, R. Y. Zhang, S. H. Zhang, Shulei Zhang, X. D. Zhang, X. M. Zhang, X. Y. Zhang, Y. Zhang, Y. Zhang, Y. T. Zhang, Y. H. Zhang, Y. M. Zhang, Yan Zhang, Z. D. Zhang, Z. H. Zhang, Z. L. Zhang, Z. Y. Zhang, Z. Y. Zhang, Z. Z. Zhang, G. Zhao, J. Y. Zhao, J. Z. Zhao, L. Zhao, Lei Zhao, M. G. Zhao, N. Zhao, R. P. Zhao, S. J. Zhao, Y. B. Zhao, Y. X. Zhao, Z. G. Zhao, A. Zhemchugov, B. Zheng, B. M. Zheng, J. P. Zheng, W. J. Zheng, Y. H. Zheng, B. Zhong, X. Zhong, H. Zhou, J. Y. Zhou, L. P. Zhou, S. Zhou, X. Zhou, X. K. Zhou, X. R. Zhou, X. Y. Zhou, Y. Z. Zhou, J. Zhu, K. Zhu, K. J. Zhu, K. S. Zhu, L. Zhu, L. X. Zhu, S. H. Zhu, T. J. Zhu, W. D. Zhu, Y. C. Zhu, Z. A. Zhu, J. H. Zou, J. Zu
Measurement of the branching fraction of $D^+_s\to \ell^+\nu_\ell$ via $e^+e^-\to D^{*+}_{s} D^{*-}_{s}$
27 pages, 13 figures
null
null
null
hep-ex hep-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on $10.64~\mathrm{fb}^{-1}$ of $e^+e^-$ collision data taken at center-of-mass energies between 4.237 and 4.699 GeV with the BESIII detector, we study the leptonic $D^+_s$ decays using the $e^+e^-\to D^{*+}_{s} D^{*-}_{s}$ process. The branching fractions of $D_s^+\to\ell^+\nu_{\ell}\,(\ell=\mu,\tau)$ are measured to be $\mathcal{B}(D_s^+\to\mu^+\nu_\mu)=(0.547\pm0.026_{\rm stat}\pm0.016_{\rm syst})\%$ and $\mathcal{B}(D_s^+\to\tau^+\nu_\tau)=(5.60\pm0.16_{\rm stat}\pm0.20_{\rm syst})\%$, respectively. The product of the decay constant and Cabibbo-Kobayashi-Maskawa matrix element $|V_{cs}|$ is determined to be $f_{D_s^+}|V_{cs}|=(246.5\pm5.9_{\rm stat}\pm3.6_{\rm syst}\pm0.5_{\rm input})_{\mu\nu}~\mathrm{MeV}$ and $f_{D_s^+}|V_{cs}|=(252.7\pm3.6_{\rm stat}\pm4.5_{\rm syst}\pm0.6_{\rm input}))_{\tau \nu}~\mathrm{MeV}$, respectively. Taking the value of $|V_{cs}|$ from a global fit in the Standard Model, we obtain ${f_{D^+_s}}=(252.8\pm6.0_{\rm stat}\pm3.7_{\rm syst}\pm0.6_{\rm input})_{\mu\nu}$ MeV and ${f_{D^+_s}}=(259.2\pm3.6_{\rm stat}\pm4.5_{\rm syst}\pm0.6_{\rm input})_{\tau \nu}$ MeV, respectively. Conversely, taking the value for $f_{D_s^+}$ from the latest lattice quantum chromodynamics calculation, we obtain $|V_{cs}| =(0.986\pm0.023_{\rm stat}\pm0.014_{\rm syst}\pm0.003_{\rm input})_{\mu\nu}$ and $|V_{cs}| = (1.011\pm0.014_{\rm stat}\pm0.018_{\rm syst}\pm0.003_{\rm input})_{\tau \nu}$, respectively.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 13:47:17 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 14:07:59 GMT" } ]
"2024-07-19T00:00:00"
[ [ "BESIII Collaboration", "", "" ], [ "Ablikim", "M.", "" ], [ "Achasov", "M. N.", "" ], [ "Adlarson", "P.", "" ], [ "Afedulidis", "O.", "" ], [ "Ai", "X. C.", "" ], [ "Aliberti", "R.", "" ], [ "Amoroso", "A.", "" ], [ "An", "Q.", "" ], [ "Bai", "Y.", "" ], [ "Bakina", "O.", "" ], [ "Balossino", "I.", "" ], [ "Ban", "Y.", "" ], [ "Bao", "H. -R.", "" ], [ "Batozskaya", "V.", "" ], [ "Begzsuren", "K.", "" ], [ "Berger", "N.", "" ], [ "Berlowski", "M.", "" ], [ "Bertani", "M.", "" ], [ "Bettoni", "D.", "" ], [ "Bianchi", "F.", "" ], [ "Bianco", "E.", "" ], [ "Bortone", "A.", "" ], [ "Boyko", "I.", "" ], [ "Briere", "R. A.", "" ], [ "Brueggemann", "A.", "" ], [ "Cai", "H.", "" ], [ "Cai", "X.", "" ], [ "Calcaterra", "A.", "" ], [ "Cao", "G. F.", "" ], [ "Cao", "N.", "" ], [ "Cetin", "S. A.", "" ], [ "Chang", "J. F.", "" ], [ "Che", "G. R.", "" ], [ "Chelkov", "G.", "" ], [ "Chen", "C.", "" ], [ "Chen", "C. H.", "" ], [ "Chen", "Chao", "" ], [ "Chen", "G.", "" ], [ "Chen", "H. S.", "" ], [ "Chen", "H. Y.", "" ], [ "Chen", "M. L.", "" ], [ "Chen", "S. J.", "" ], [ "Chen", "S. L.", "" ], [ "Chen", "S. M.", "" ], [ "Chen", "T.", "" ], [ "Chen", "X. R.", "" ], [ "Chen", "X. T.", "" ], [ "Chen", "Y. B.", "" ], [ "Chen", "Y. Q.", "" ], [ "Chen", "Z. J.", "" ], [ "Chen", "Z. Y.", "" ], [ "Choi", "S. K.", "" ], [ "Cibinetto", "G.", "" ], [ "Cossio", "F.", "" ], [ "Cui", "J. J.", "" ], [ "Dai", "H. L.", "" ], [ "Dai", "J. P.", "" ], [ "Dbeyssi", "A.", "" ], [ "de Boer", "R. E.", "" ], [ "Dedovich", "D.", "" ], [ "Deng", "C. Q.", "" ], [ "Deng", "Z. Y.", "" ], [ "Denig", "A.", "" ], [ "Denysenko", "I.", "" ], [ "Destefanis", "M.", "" ], [ "De Mori", "F.", "" ], [ "Ding", "B.", "" ], [ "Ding", "X. X.", "" ], [ "Ding", "Y.", "" ], [ "Ding", "Y.", "" ], [ "Dong", "J.", "" ], [ "Dong", "L. Y.", "" ], [ "Dong", "M. Y.", "" ], [ "Dong", "X.", "" ], [ "Du", "M. C.", "" ], [ "Du", "S. X.", "" ], [ "Duan", "Y. Y.", "" ], [ "Duan", "Z. H.", "" ], [ "Egorov", "P.", "" ], [ "Fan", "Y. H.", "" ], [ "Fang", "J.", "" ], [ "Fang", "J.", "" ], [ "Fang", "S. S.", "" ], [ "Fang", "W. X.", "" ], [ "Fang", "Y.", "" ], [ "Fang", "Y. Q.", "" ], [ "Farinelli", "R.", "" ], [ "Fava", "L.", "" ], [ "Feldbauer", "F.", "" ], [ "Felici", "G.", "" ], [ "Feng", "C. Q.", "" ], [ "Feng", "J. H.", "" ], [ "Feng", "Y. T.", "" ], [ "Fritsch", "M.", "" ], [ "Fu", "C. D.", "" ], [ "Fu", "J. L.", "" ], [ "Fu", "Y. W.", "" ], [ "Gao", "H.", "" ], [ "Gao", "X. B.", "" ], [ "Gao", "Y. N.", "" ], [ "Gao", "Yang", "" ], [ "Garbolino", "S.", "" ], [ "Garzia", "I.", "" ], [ "Ge", "L.", "" ], [ "Ge", "P. T.", "" ], [ "Ge", "Z. W.", "" ], [ "Geng", "C.", "" ], [ "Gersabeck", "E. M.", "" ], [ "Gilman", "A.", "" ], [ "Goetzen", "K.", "" ], [ "Gong", "L.", "" ], [ "Gong", "W. X.", "" ], [ "Gradl", "W.", "" ], [ "Gramigna", "S.", "" ], [ "Greco", "M.", "" ], [ "Gu", "M. H.", "" ], [ "Gu", "Y. T.", "" ], [ "Guan", "C. Y.", "" ], [ "Guo", "A. Q.", "" ], [ "Guo", "L. B.", "" ], [ "Guo", "M. J.", "" ], [ "Guo", "R. P.", "" ], [ "Guo", "Y. P.", "" ], [ "Guskov", "A.", "" ], [ "Gutierrez", "J.", "" ], [ "Han", "K. L.", "" ], [ "Han", "T. T.", "" ], [ "Hanisch", "F.", "" ], [ "Hao", "X. Q.", "" ], [ "Harris", "F. A.", "" ], [ "He", "K. K.", "" ], [ "He", "K. L.", "" ], [ "Heinsius", "F. H.", "" ], [ "Heinz", "C. H.", "" ], [ "Heng", "Y. K.", "" ], [ "Herold", "C.", "" ], [ "Holtmann", "T.", "" ], [ "Hong", "P. C.", "" ], [ "Hou", "G. Y.", "" ], [ "Hou", "X. T.", "" ], [ "Hou", "Y. R.", "" ], [ "Hou", "Z. L.", "" ], [ "Hu", "B. Y.", "" ], [ "Hu", "H. M.", "" ], [ "Hu", "J. F.", "" ], [ "Hu", "S. L.", "" ], [ "Hu", "T.", "" ], [ "Hu", "Y.", "" ], [ "Huang", "G. S.", "" ], [ "Huang", "K. X.", "" ], [ "Huang", "L. Q.", "" ], [ "Huang", "X. T.", "" ], [ "Huang", "Y. P.", "" ], [ "Huang", "Y. S.", "" ], [ "Hussain", "T.", "" ], [ "Hölzken", "F.", "" ], [ "Hüsken", "N.", "" ], [ "der Wiesche", "N. in", "" ], [ "Jackson", "J.", "" ], [ "Janchiv", "S.", "" ], [ "Jeong", "J. H.", "" ], [ "Ji", "Q.", "" ], [ "Ji", "Q. P.", "" ], [ "Ji", "W.", "" ], [ "Ji", "X. B.", "" ], [ "Ji", "X. L.", "" ], [ "Ji", "Y. Y.", "" ], [ "Jia", "X. Q.", "" ], [ "Jia", "Z. K.", "" ], [ "Jiang", "D.", "" ], [ "Jiang", "H. B.", "" ], [ "Jiang", "P. C.", "" ], [ "Jiang", "S. S.", "" ], [ "Jiang", "T. J.", "" ], [ "Jiang", "X. S.", "" ], [ "Jiang", "Y.", "" ], [ "Jiao", "J. B.", "" ], [ "Jiao", "J. K.", "" ], [ "Jiao", "Z.", "" ], [ "Jin", "S.", "" ], [ "Jin", "Y.", "" ], [ "Jing", "M. Q.", "" ], [ "Jing", "X. M.", "" ], [ "Johansson", "T.", "" ], [ "Kabana", "S.", "" ], [ "Kalantar-Nayestanaki", "N.", "" ], [ "Kang", "X. L.", "" ], [ "Kang", "X. S.", "" ], [ "Kavatsyuk", "M.", "" ], [ "Ke", "B. C.", "" ], [ "Khachatryan", "V.", "" ], [ "Khoukaz", "A.", "" ], [ "Kiuchi", "R.", "" ], [ "Kolcu", "O. B.", "" ], [ "Kopf", "B.", "" ], [ "Kuessner", "M.", "" ], [ "Kui", "X.", "" ], [ "Kumar", "N.", "" ], [ "Kupsc", "A.", "" ], [ "Kühn", "W.", "" ], [ "Lane", "J. J.", "" ], [ "Lavezzi", "L.", "" ], [ "Lei", "T. T.", "" ], [ "Lei", "Z. H.", "" ], [ "Lellmann", "M.", "" ], [ "Lenz", "T.", "" ], [ "Li", "C.", "" ], [ "Li", "C.", "" ], [ "Li", "C. H.", "" ], [ "Li", "Cheng", "" ], [ "Li", "D. M.", "" ], [ "Li", "F.", "" ], [ "Li", "G.", "" ], [ "Li", "H. B.", "" ], [ "Li", "H. J.", "" ], [ "Li", "H. N.", "" ], [ "Li", "Hui", "" ], [ "Li", "J. R.", "" ], [ "Li", "J. S.", "" ], [ "Li", "K.", "" ], [ "Li", "L. J.", "" ], [ "Li", "L. K.", "" ], [ "Li", "Lei", "" ], [ "Li", "M. H.", "" ], [ "Li", "P. R.", "" ], [ "Li", "Q. M.", "" ], [ "Li", "Q. X.", "" ], [ "Li", "R.", "" ], [ "Li", "S. X.", "" ], [ "Li", "T.", "" ], [ "Li", "W. D.", "" ], [ "Li", "W. G.", "" ], [ "Li", "X.", "" ], [ "Li", "X. H.", "" ], [ "Li", "X. L.", "" ], [ "Li", "X. Y.", "" ], [ "Li", "X. Z.", "" ], [ "Li", "Y. G.", "" ], [ "Li", "Z. J.", "" ], [ "Li", "Z. Y.", "" ], [ "Liang", "C.", "" ], [ "Liang", "H.", "" ], [ "Liang", "H.", "" ], [ "Liang", "Y. F.", "" ], [ "Liang", "Y. T.", "" ], [ "Liao", "G. R.", "" ], [ "Liao", "Y. P.", "" ], [ "Libby", "J.", "" ], [ "Limphirat", "A.", "" ], [ "Lin", "C. C.", "" ], [ "Lin", "D. X.", "" ], [ "Lin", "T.", "" ], [ "Liu", "B. J.", "" ], [ "Liu", "B. X.", "" ], [ "Liu", "C.", "" ], [ "Liu", "C. X.", "" ], [ "Liu", "F.", "" ], [ "Liu", "F. H.", "" ], [ "Liu", "Feng", "" ], [ "Liu", "G. M.", "" ], [ "Liu", "H.", "" ], [ "Liu", "H. B.", "" ], [ "Liu", "H. H.", "" ], [ "Liu", "H. M.", "" ], [ "Liu", "Huihui", "" ], [ "Liu", "J. B.", "" ], [ "Liu", "J. Y.", "" ], [ "Liu", "K.", "" ], [ "Liu", "K. Y.", "" ], [ "Liu", "Ke", "" ], [ "Liu", "L.", "" ], [ "Liu", "L. C.", "" ], [ "Liu", "Lu", "" ], [ "Liu", "M. H.", "" ], [ "Liu", "P. L.", "" ], [ "Liu", "Q.", "" ], [ "Liu", "S. B.", "" ], [ "Liu", "T.", "" ], [ "Liu", "W. K.", "" ], [ "Liu", "W. M.", "" ], [ "Liu", "X.", "" ], [ "Liu", "X.", "" ], [ "Liu", "Y.", "" ], [ "Liu", "Y.", "" ], [ "Liu", "Y. B.", "" ], [ "Liu", "Z. A.", "" ], [ "Liu", "Z. D.", "" ], [ "Liu", "Z. Q.", "" ], [ "Lou", "X. C.", "" ], [ "Lu", "F. X.", "" ], [ "Lu", "H. J.", "" ], [ "Lu", "J. G.", "" ], [ "Lu", "X. L.", "" ], [ "Lu", "Y.", "" ], [ "Lu", "Y. P.", "" ], [ "Lu", "Z. H.", "" ], [ "Luo", "C. L.", "" ], [ "Luo", "J. R.", "" ], [ "Luo", "M. X.", "" ], [ "Luo", "T.", "" ], [ "Luo", "X. L.", "" ], [ "Lyu", "X. R.", "" ], [ "Lyu", "Y. F.", "" ], [ "Ma", "F. C.", "" ], [ "Ma", "H.", "" ], [ "Ma", "H. L.", "" ], [ "Ma", "J. L.", "" ], [ "Ma", "L. L.", "" ], [ "Ma", "M. M.", "" ], [ "Ma", "Q. M.", "" ], [ "Ma", "R. Q.", "" ], [ "Ma", "T.", "" ], [ "Ma", "X. T.", "" ], [ "Ma", "X. Y.", "" ], [ "Ma", "Y.", "" ], [ "Ma", "Y. M.", "" ], [ "Maas", "F. E.", "" ], [ "Maggiora", "M.", "" ], [ "Malde", "S.", "" ], [ "Mao", "Y. J.", "" ], [ "Mao", "Z. P.", "" ], [ "Marcello", "S.", "" ], [ "Meng", "Z. X.", "" ], [ "Messchendorp", "J. G.", "" ], [ "Mezzadri", "G.", "" ], [ "Miao", "H.", "" ], [ "Min", "T. J.", "" ], [ "Mitchell", "R. E.", "" ], [ "Mo", "X. H.", "" ], [ "Moses", "B.", "" ], [ "Muchnoi", "N. Yu.", "" ], [ "Muskalla", "J.", "" ], [ "Nefedov", "Y.", "" ], [ "Nerling", "F.", "" ], [ "Nie", "L. S.", "" ], [ "Nikolaev", "I. B.", "" ], [ "Ning", "Z.", "" ], [ "Nisar", "S.", "" ], [ "Niu", "Q. L.", "" ], [ "Niu", "W. D.", "" ], [ "Niu", "Y.", "" ], [ "Olsen", "S. L.", "" ], [ "Ouyang", "Q.", "" ], [ "Pacetti", "S.", "" ], [ "Pan", "X.", "" ], [ "Pan", "Y.", "" ], [ "Pathak", "A.", "" ], [ "Pei", "Y. P.", "" ], [ "Pelizaeus", "M.", "" ], [ "Peng", "H. P.", "" ], [ "Peng", "Y. Y.", "" ], [ "Peters", "K.", "" ], [ "Ping", "J. L.", "" ], [ "Ping", "R. G.", "" ], [ "Plura", "S.", "" ], [ "Prasad", "V.", "" ], [ "Qi", "F. Z.", "" ], [ "Qi", "H.", "" ], [ "Qi", "H. R.", "" ], [ "Qi", "M.", "" ], [ "Qi", "T. Y.", "" ], [ "Qian", "S.", "" ], [ "Qian", "W. B.", "" ], [ "Qiao", "C. F.", "" ], [ "Qiao", "X. K.", "" ], [ "Qin", "J. J.", "" ], [ "Qin", "L. Q.", "" ], [ "Qin", "L. Y.", "" ], [ "Qin", "X. P.", "" ], [ "Qin", "X. S.", "" ], [ "Qin", "Z. H.", "" ], [ "Qiu", "J. F.", "" ], [ "Qu", "Z. H.", "" ], [ "Redmer", "C. F.", "" ], [ "Ren", "K. J.", "" ], [ "Rivetti", "A.", "" ], [ "Rolo", "M.", "" ], [ "Rong", "G.", "" ], [ "Rosner", "Ch.", "" ], [ "Ruan", "S. N.", "" ], [ "Salone", "N.", "" ], [ "Sarantsev", "A.", "" ], [ "Schelhaas", "Y.", "" ], [ "Schoenning", "K.", "" ], [ "Scodeggio", "M.", "" ], [ "Shan", "K. Y.", "" ], [ "Shan", "W.", "" ], [ "Shan", "X. Y.", "" ], [ "Shang", "Z. J.", "" ], [ "Shangguan", "J. F.", "" ], [ "Shao", "L. G.", "" ], [ "Shao", "M.", "" ], [ "Shen", "C. P.", "" ], [ "Shen", "H. F.", "" ], [ "Shen", "W. H.", "" ], [ "Shen", "X. Y.", "" ], [ "Shi", "B. A.", "" ], [ "Shi", "H.", "" ], [ "Shi", "H. C.", "" ], [ "Shi", "J. L.", "" ], [ "Shi", "J. Y.", "" ], [ "Shi", "Q. Q.", "" ], [ "Shi", "S. Y.", "" ], [ "Shi", "X.", "" ], [ "Song", "J. J.", "" ], [ "Song", "T. Z.", "" ], [ "Song", "W. M.", "" ], [ "Song", "Y. J.", "" ], [ "Song", "Y. X.", "" ], [ "Sosio", "S.", "" ], [ "Spataro", "S.", "" ], [ "Stieler", "F.", "" ], [ "Su", "Y. J.", "" ], [ "Sun", "G. B.", "" ], [ "Sun", "G. X.", "" ], [ "Sun", "H.", "" ], [ "Sun", "H. K.", "" ], [ "Sun", "J. F.", "" ], [ "Sun", "K.", "" ], [ "Sun", "L.", "" ], [ "Sun", "S. S.", "" ], [ "Sun", "T.", "" ], [ "Sun", "W. Y.", "" ], [ "Sun", "Y.", "" ], [ "Sun", "Y. J.", "" ], [ "Sun", "Y. Z.", "" ], [ "Sun", "Z. Q.", "" ], [ "Sun", "Z. T.", "" ], [ "Tang", "C. J.", "" ], [ "Tang", "G. Y.", "" ], [ "Tang", "J.", "" ], [ "Tang", "M.", "" ], [ "Tang", "Y. A.", "" ], [ "Tao", "L. Y.", "" ], [ "Tao", "Q. T.", "" ], [ "Tat", "M.", "" ], [ "Teng", "J. X.", "" ], [ "Thoren", "V.", "" ], [ "Tian", "W. H.", "" ], [ "Tian", "Y.", "" ], [ "Tian", "Z. F.", "" ], [ "Uman", "I.", "" ], [ "Wan", "Y.", "" ], [ "Wang", "S. J.", "" ], [ "Wang", "B.", "" ], [ "Wang", "B. L.", "" ], [ "Wang", "Bo", "" ], [ "Wang", "D. Y.", "" ], [ "Wang", "F.", "" ], [ "Wang", "H. J.", "" ], [ "Wang", "J. J.", "" ], [ "Wang", "J. P.", "" ], [ "Wang", "K.", "" ], [ "Wang", "L. L.", "" ], [ "Wang", "M.", "" ], [ "Wang", "N. Y.", "" ], [ "Wang", "S.", "" ], [ "Wang", "S.", "" ], [ "Wang", "T.", "" ], [ "Wang", "T. J.", "" ], [ "Wang", "W.", "" ], [ "Wang", "W.", "" ], [ "Wang", "W. P.", "" ], [ "Wang", "X.", "" ], [ "Wang", "X. F.", "" ], [ "Wang", "X. J.", "" ], [ "Wang", "X. L.", "" ], [ "Wang", "X. N.", "" ], [ "Wang", "Y.", "" ], [ "Wang", "Y. D.", "" ], [ "Wang", "Y. F.", "" ], [ "Wang", "Y. L.", "" ], [ "Wang", "Y. N.", "" ], [ "Wang", "Y. Q.", "" ], [ "Wang", "Yaqian", "" ], [ "Wang", "Yi", "" ], [ "Wang", "Z.", "" ], [ "Wang", "Z. L.", "" ], [ "Wang", "Z. Y.", "" ], [ "Wang", "Ziyi", "" ], [ "Wei", "D. H.", "" ], [ "Weidner", "F.", "" ], [ "Wen", "S. P.", "" ], [ "Wen", "Y. R.", "" ], [ "Wiedner", "U.", "" ], [ "Wilkinson", "G.", "" ], [ "Wolke", "M.", "" ], [ "Wollenberg", "L.", "" ], [ "Wu", "C.", "" ], [ "Wu", "J. F.", "" ], [ "Wu", "L. H.", "" ], [ "Wu", "L. J.", "" ], [ "Wu", "X.", "" ], [ "Wu", "X. H.", "" ], [ "Wu", "Y.", "" ], [ "Wu", "Y. H.", "" ], [ "Wu", "Y. J.", "" ], [ "Wu", "Z.", "" ], [ "Xia", "L.", "" ], [ "Xian", "X. M.", "" ], [ "Xiang", "B. H.", "" ], [ "Xiang", "T.", "" ], [ "Xiao", "D.", "" ], [ "Xiao", "G. Y.", "" ], [ "Xiao", "S. Y.", "" ], [ "Xiao", "Y. L.", "" ], [ "Xiao", "Z. J.", "" ], [ "Xie", "C.", "" ], [ "Xie", "X. H.", "" ], [ "Xie", "Y.", "" ], [ "Xie", "Y. G.", "" ], [ "Xie", "Y. H.", "" ], [ "Xie", "Z. P.", "" ], [ "Xing", "T. Y.", "" ], [ "Xu", "C. F.", "" ], [ "Xu", "C. J.", "" ], [ "Xu", "G. F.", "" ], [ "Xu", "H. Y.", "" ], [ "Xu", "M.", "" ], [ "Xu", "Q. J.", "" ], [ "Xu", "Q. N.", "" ], [ "Xu", "W.", "" ], [ "Xu", "W. L.", "" ], [ "Xu", "X. P.", "" ], [ "Xu", "Y. C.", "" ], [ "Xu", "Z. S.", "" ], [ "Yan", "F.", "" ], [ "Yan", "L.", "" ], [ "Yan", "W. B.", "" ], [ "Yan", "W. C.", "" ], [ "Yan", "X. Q.", "" ], [ "Yang", "H. J.", "" ], [ "Yang", "H. L.", "" ], [ "Yang", "H. X.", "" ], [ "Yang", "T.", "" ], [ "Yang", "Y.", "" ], [ "Yang", "Y. F.", "" ], [ "Yang", "Y. F.", "" ], [ "Yang", "Y. X.", "" ], [ "Yang", "Z. W.", "" ], [ "Yao", "Z. P.", "" ], [ "Ye", "M.", "" ], [ "Ye", "M. H.", "" ], [ "Yin", "J. H.", "" ], [ "You", "Z. Y.", "" ], [ "Yu", "B. X.", "" ], [ "Yu", "C. X.", "" ], [ "Yu", "G.", "" ], [ "Yu", "J. S.", "" ], [ "Yu", "T.", "" ], [ "Yu", "X. D.", "" ], [ "Yu", "Y. C.", "" ], [ "Yuan", "C. Z.", "" ], [ "Yuan", "J.", "" ], [ "Yuan", "J.", "" ], [ "Yuan", "L.", "" ], [ "Yuan", "S. C.", "" ], [ "Yuan", "Y.", "" ], [ "Yuan", "Z. Y.", "" ], [ "Yue", "C. X.", "" ], [ "Zafar", "A. A.", "" ], [ "Zeng", "F. R.", "" ], [ "Zeng", "S. H.", "" ], [ "Zeng", "X.", "" ], [ "Zeng", "Y.", "" ], [ "Zeng", "Y. J.", "" ], [ "Zeng", "Y. J.", "" ], [ "Zhai", "X. Y.", "" ], [ "Zhai", "Y. C.", "" ], [ "Zhan", "Y. H.", "" ], [ "Zhang", "A. Q.", "" ], [ "Zhang", "B. L.", "" ], [ "Zhang", "B. X.", "" ], [ "Zhang", "D. H.", "" ], [ "Zhang", "G. Y.", "" ], [ "Zhang", "H.", "" ], [ "Zhang", "H.", "" ], [ "Zhang", "H. C.", "" ], [ "Zhang", "H. H.", "" ], [ "Zhang", "H. H.", "" ], [ "Zhang", "H. Q.", "" ], [ "Zhang", "H. R.", "" ], [ "Zhang", "H. Y.", "" ], [ "Zhang", "J.", "" ], [ "Zhang", "J.", "" ], [ "Zhang", "J. J.", "" ], [ "Zhang", "J. L.", "" ], [ "Zhang", "J. Q.", "" ], [ "Zhang", "J. S.", "" ], [ "Zhang", "J. W.", "" ], [ "Zhang", "J. X.", "" ], [ "Zhang", "J. Y.", "" ], [ "Zhang", "J. Z.", "" ], [ "Zhang", "Jianyu", "" ], [ "Zhang", "L. M.", "" ], [ "Zhang", "Lei", "" ], [ "Zhang", "P.", "" ], [ "Zhang", "Q. Y.", "" ], [ "Zhang", "R. Y.", "" ], [ "Zhang", "S. H.", "" ], [ "Zhang", "Shulei", "" ], [ "Zhang", "X. D.", "" ], [ "Zhang", "X. M.", "" ], [ "Zhang", "X. Y.", "" ], [ "Zhang", "Y.", "" ], [ "Zhang", "Y.", "" ], [ "Zhang", "Y. T.", "" ], [ "Zhang", "Y. H.", "" ], [ "Zhang", "Y. M.", "" ], [ "Zhang", "Yan", "" ], [ "Zhang", "Z. D.", "" ], [ "Zhang", "Z. H.", "" ], [ "Zhang", "Z. L.", "" ], [ "Zhang", "Z. Y.", "" ], [ "Zhang", "Z. Y.", "" ], [ "Zhang", "Z. Z.", "" ], [ "Zhao", "G.", "" ], [ "Zhao", "J. Y.", "" ], [ "Zhao", "J. Z.", "" ], [ "Zhao", "L.", "" ], [ "Zhao", "Lei", "" ], [ "Zhao", "M. G.", "" ], [ "Zhao", "N.", "" ], [ "Zhao", "R. P.", "" ], [ "Zhao", "S. J.", "" ], [ "Zhao", "Y. B.", "" ], [ "Zhao", "Y. X.", "" ], [ "Zhao", "Z. G.", "" ], [ "Zhemchugov", "A.", "" ], [ "Zheng", "B.", "" ], [ "Zheng", "B. M.", "" ], [ "Zheng", "J. P.", "" ], [ "Zheng", "W. J.", "" ], [ "Zheng", "Y. H.", "" ], [ "Zhong", "B.", "" ], [ "Zhong", "X.", "" ], [ "Zhou", "H.", "" ], [ "Zhou", "J. Y.", "" ], [ "Zhou", "L. P.", "" ], [ "Zhou", "S.", "" ], [ "Zhou", "X.", "" ], [ "Zhou", "X. K.", "" ], [ "Zhou", "X. R.", "" ], [ "Zhou", "X. Y.", "" ], [ "Zhou", "Y. Z.", "" ], [ "Zhu", "J.", "" ], [ "Zhu", "K.", "" ], [ "Zhu", "K. J.", "" ], [ "Zhu", "K. S.", "" ], [ "Zhu", "L.", "" ], [ "Zhu", "L. X.", "" ], [ "Zhu", "S. H.", "" ], [ "Zhu", "T. J.", "" ], [ "Zhu", "W. D.", "" ], [ "Zhu", "Y. C.", "" ], [ "Zhu", "Z. A.", "" ], [ "Zou", "J. H.", "" ], [ "Zu", "J.", "" ] ]
2407.11790
Dengke Han
Dengke Han, Mingyu Yan, Xiaochun Ye, Dongrui Fan, Ninghui Sun
Characterizing and Understanding HGNN Training on GPUs
23 pages, 14 figures, submitted to ACM TACO
null
null
null
cs.LG cs.AI cs.AR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Owing to their remarkable representation capabilities for heterogeneous graph data, Heterogeneous Graph Neural Networks (HGNNs) have been widely adopted in many critical real-world domains such as recommendation systems and medical analysis. Prior to their practical application, identifying the optimal HGNN model parameters tailored to specific tasks through extensive training is a time-consuming and costly process. To enhance the efficiency of HGNN training, it is essential to characterize and analyze the execution semantics and patterns within the training process to identify performance bottlenecks. In this study, we conduct an in-depth quantification and analysis of two mainstream HGNN training scenarios, including single-GPU and multi-GPU distributed training. Based on the characterization results, we disclose the performance bottlenecks and their underlying causes in different HGNN training scenarios and provide optimization guidelines from both software and hardware perspectives.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 14:45:46 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 00:50:49 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Han", "Dengke", "" ], [ "Yan", "Mingyu", "" ], [ "Ye", "Xiaochun", "" ], [ "Fan", "Dongrui", "" ], [ "Sun", "Ninghui", "" ] ]
2407.11921
Wenxiang Jiang
Wenxiang Jiang, Hanwei Zhang, Shuo Zhao, Zhongwen Guo, Hao Wang
IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields
null
null
null
null
cs.CV cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
Neural Radiance Field (NeRF) represents a significant advancement in computer vision, offering implicit neural network-based scene representation and novel view synthesis capabilities. Its applications span diverse fields including robotics, urban mapping, autonomous navigation, virtual reality/augmented reality, etc., some of which are considered high-risk AI applications. However, despite its widespread adoption, the robustness and security of NeRF remain largely unexplored. In this study, we contribute to this area by introducing the Illusory Poisoning Attack against Neural Radiance Fields (IPA-NeRF). This attack involves embedding a hidden backdoor view into NeRF, allowing it to produce predetermined outputs, i.e. illusory, when presented with the specified backdoor view while maintaining normal performance with standard inputs. Our attack is specifically designed to deceive users or downstream models at a particular position while ensuring that any abnormalities in NeRF remain undetectable from other viewpoints. Experimental results demonstrate the effectiveness of our Illusory Poisoning Attack, successfully presenting the desired illusory on the specified viewpoint without impacting other views. Notably, we achieve this attack by introducing small perturbations solely to the training set. The code can be found at https://github.com/jiang-wenxiang/IPA-NeRF.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 17:11:43 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 16:10:19 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Jiang", "Wenxiang", "" ], [ "Zhang", "Hanwei", "" ], [ "Zhao", "Shuo", "" ], [ "Guo", "Zhongwen", "" ], [ "Wang", "Hao", "" ] ]
2407.11926
Alexander Jahn
Matthew Steinberg, Junyu Fan, Robert J. Harris, David Elkouss, Sebastian Feld, Alexander Jahn
Far from Perfect: Quantum Error Correction with (Hyperinvariant) Evenbly Codes
22 pages, 13 figures
null
null
null
quant-ph hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new class of qubit codes that we call Evenbly codes, building on a previous proposal of hyperinvariant tensor networks. Its tensor network description consists of local, non-perfect tensors describing CSS codes interspersed with Hadamard gates, placed on a hyperbolic $\{p,q\}$ geometry with even $q\geq 4$, yielding an infinitely large class of subsystem codes. We construct an example for a $\{5,4\}$ manifold and describe strategies of logical gauge fixing that lead to different rates $k/n$ and distances $d$, which we calculate analytically, finding distances which range from $d=2$ to $d \sim n^{2/3}$ in the ungauged case. Investigating threshold performance under erasure, depolarizing, and pure Pauli noise channels, we find that the code exhibits a depolarizing noise threshold of about $19.1\%$ in the code-capacity model and $50\%$ for pure Pauli and erasure channels under suitable gauges. We also test a constant-rate version with $k/n = 0.125$, finding excellent error resilience (about $40\%$) under the erasure channel. Recovery rates for these and other settings are studied both under an optimal decoder as well as a more efficient but non-optimal greedy decoder. We also consider generalizations beyond the CSS tensor construction, compute error rates and thresholds for other hyperbolic geometries, and discuss the relationship to holographic bulk/boundary dualities. Our work indicates that Evenbly codes may show promise for practical quantum computing applications.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 17:18:13 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Steinberg", "Matthew", "" ], [ "Fan", "Junyu", "" ], [ "Harris", "Robert J.", "" ], [ "Elkouss", "David", "" ], [ "Feld", "Sebastian", "" ], [ "Jahn", "Alexander", "" ] ]
2407.11962
Jaehyeok Kim
Jaehyeok Kim, Dongyoon Wee, Dan Xu
Motion-Oriented Compositional Neural Radiance Fields for Monocular Dynamic Human Modeling
Accepted by ECCV2024
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces Motion-oriented Compositional Neural Radiance Fields (MoCo-NeRF), a framework designed to perform free-viewpoint rendering of monocular human videos via novel non-rigid motion modeling approach. In the context of dynamic clothed humans, complex cloth dynamics generate non-rigid motions that are intrinsically distinct from skeletal articulations and critically important for the rendering quality. The conventional approach models non-rigid motions as spatial (3D) deviations in addition to skeletal transformations. However, it is either time-consuming or challenging to achieve optimal quality due to its high learning complexity without a direct supervision. To target this problem, we propose a novel approach of modeling non-rigid motions as radiance residual fields to benefit from more direct color supervision in the rendering and utilize the rigid radiance fields as a prior to reduce the complexity of the learning process. Our approach utilizes a single multiresolution hash encoding (MHE) to concurrently learn the canonical T-pose representation from rigid skeletal motions and the radiance residual field for non-rigid motions. Additionally, to further improve both training efficiency and usability, we extend MoCo-NeRF to support simultaneous training of multiple subjects within a single framework, thanks to our effective design for modeling non-rigid motions. This scalability is achieved through the integration of a global MHE and learnable identity codes in addition to multiple local MHEs. We present extensive results on ZJU-MoCap and MonoCap, clearly demonstrating state-of-the-art performance in both single- and multi-subject settings. The code and model will be made publicly available at the project page: https://stevejaehyeok.github.io/publications/moco-nerf.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 17:59:01 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 08:44:16 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Kim", "Jaehyeok", "" ], [ "Wee", "Dongyoon", "" ], [ "Xu", "Dan", "" ] ]
2407.12040
Ranjan Sapkota
Ranjan Sapkota, Zhichao Meng, Dawood Ahmed, Martin Churuvija, Xiaoqiang Du, Zenghong Ma, Manoj Karkee
Comprehensive Performance Evaluation of YOLOv10, YOLOv9 and YOLOv8 on Detecting and Counting Fruitlet in Complex Orchard Environments
15 figures, 2 tables
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
This study performed an extensive evaluation of the performances of all configurations of YOLOv8, YOLOv9, and YOLOv10 object detection algorithms for fruitlet (of green fruit) detection in commercial orchards. Additionally, this research performed and validated in-field counting of fruitlets using an iPhone and machine vision sensors in 5 different apple varieties (Scifresh, Scilate, Honeycrisp, Cosmic crisp & Golden delicious). This comprehensive investigation of total 17 different configurations (5 for YOLOv8, 6 for YOLOv9 and 6 for YOLOv10) revealed that YOLOv9 outperforms YOLOv10 and YOLOv8 in terms of mAP@50, while YOLOv10x outperformed all 17 configurations tested in terms of precision and recall. Specifically, YOLOv9 Gelan-e achieved the highest mAP@50 of 0.935, outperforming YOLOv10n's 0.921 and YOLOv8s's 0.924. In terms of precision, YOLOv10x achieved the highest precision of 0.908, indicating superior object identification accuracy compared to other configurations tested (e.g. YOLOv9 Gelan-c with a precision of 0.903 and YOLOv8m with 0.897. In terms of recall, YOLOv10s achieved the highest in its series (0.872), while YOLOv9 Gelan m performed the best among YOLOv9 configurations (0.899), and YOLOv8n performed the best among the YOLOv8 configurations (0.883). Meanwhile, three configurations of YOLOv10: YOLOv10b, YOLOv10l, and YOLOv10x achieved superior post-processing speeds of 1.5 milliseconds, outperforming all other configurations within the YOLOv9 and YOLOv8 families. Specifically, YOLOv9 Gelan-e recorded a post-processing speed of 1.9 milliseconds, and YOLOv8m achieved 2.1 milliseconds. Furthermore, YOLOv8n exhibited the highest inference speed among all configurations tested, achieving a processing time of 4.1 milliseconds while YOLOv9 Gelan-t and YOLOv10n also demonstrated comparatively slower inference speeds of 9.3 ms and 5.5 ms, respectively.
[ { "version": "v1", "created": "Mon, 1 Jul 2024 17:59:55 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 01:58:57 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Sapkota", "Ranjan", "" ], [ "Meng", "Zhichao", "" ], [ "Ahmed", "Dawood", "" ], [ "Churuvija", "Martin", "" ], [ "Du", "Xiaoqiang", "" ], [ "Ma", "Zenghong", "" ], [ "Karkee", "Manoj", "" ] ]
2407.12192
YuTe Lee
Sam Yu-Te Lee, Aryaman Bahukhandi, Dongyu Liu, and Kwan-Liu Ma
Towards Dataset-scale and Feature-oriented Evaluation of Text Summarization in Large Language Model Prompts
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
Recent advancements in Large Language Models (LLMs) and Prompt Engineering have made chatbot customization more accessible, significantly reducing barriers to tasks that previously required programming skills. However, prompt evaluation, especially at the dataset scale, remains complex due to the need to assess prompts across thousands of test instances within a dataset. Our study, based on a comprehensive literature review and pilot study, summarized five critical challenges in prompt evaluation. In response, we introduce a feature-oriented workflow for systematic prompt evaluation. In the context of text summarization, our workflow advocates evaluation with summary characteristics (feature metrics) such as complexity, formality, or naturalness, instead of using traditional quality metrics like ROUGE. This design choice enables a more user-friendly evaluation of prompts, as it guides users in sorting through the ambiguity inherent in natural language. To support this workflow, we introduce Awesum, a visual analytics system that facilitates identifying optimal prompt refinements for text summarization through interactive visualizations, featuring a novel Prompt Comparator design that employs a BubbleSet-inspired design enhanced by dimensionality reduction techniques. We evaluate the effectiveness and general applicability of the system with practitioners from various domains and found that (1) our design helps overcome the learning curve for non-technical people to conduct a systematic evaluation of summarization prompts, and (2) our feature-oriented workflow has the potential to generalize to other NLG and image-generation tasks. For future works, we advocate moving towards feature-oriented evaluation of LLM prompts and discuss unsolved challenges in terms of human-agent interaction.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 21:36:43 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 05:08:03 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Lee", "Sam Yu-Te", "" ], [ "Bahukhandi", "Aryaman", "" ], [ "Liu", "Dongyu", "" ], [ "Ma", "Kwan-Liu", "" ] ]
2407.12210
Markus Marks
Markus Marks, Manuel Knott, Neehar Kondapaneni, Elijah Cole, Thijs Defraeye, Fernando Perez-Cruz, Pietro Perona
A Closer Look at Benchmarking Self-Supervised Pre-training with Image Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-supervised learning (SSL) is a machine learning approach where the data itself provides supervision, eliminating the need for external labels. The model is forced to learn about the data structure or context by solving a pretext task. With SSL, models can learn from abundant and cheap unlabeled data, significantly reducing the cost of training models where labels are expensive or inaccessible. In Computer Vision, SSL is widely used as pre-training followed by a downstream task, such as supervised transfer, few-shot learning on smaller labeled data sets, and/or unsupervised clustering. Unfortunately, it is infeasible to evaluate SSL methods on all possible downstream tasks and objectively measure the quality of the learned representation. Instead, SSL methods are evaluated using in-domain evaluation protocols, such as fine-tuning, linear probing, and k-nearest neighbors (kNN). However, it is not well understood how well these evaluation protocols estimate the representation quality of a pre-trained model for different downstream tasks under different conditions, such as dataset, metric, and model architecture. We study how classification-based evaluation protocols for SSL correlate and how well they predict downstream performance on different dataset types. Our study includes eleven common image datasets and 26 models that were pre-trained with different SSL methods or have different model backbones. We find that in-domain linear/kNN probing protocols are, on average, the best general predictors for out-of-domain performance. We further investigate the importance of batch normalization and evaluate how robust correlations are for different kinds of dataset domain shifts. We challenge assumptions about the relationship between discriminative and generative self-supervised methods, finding that most of their performance differences can be explained by changes to model backbones.
[ { "version": "v1", "created": "Tue, 16 Jul 2024 23:17:36 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 00:18:44 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Marks", "Markus", "" ], [ "Knott", "Manuel", "" ], [ "Kondapaneni", "Neehar", "" ], [ "Cole", "Elijah", "" ], [ "Defraeye", "Thijs", "" ], [ "Perez-Cruz", "Fernando", "" ], [ "Perona", "Pietro", "" ] ]
2407.12242
Fanxu Meng
Fanxu Meng and Xiangzhen Zhou
Parameter Generation of Quantum Approximate Optimization Algorithm with Diffusion Model
null
null
null
null
quant-ph
http://creativecommons.org/licenses/by/4.0/
Quantum computing presents a compelling prospect for revolutionizing the field of combinatorial optimization, in virtue of the unique attributes of quantum mechanics such as superposition and entanglement. The Quantum Approximate Optimization Algorithm (QAOA), which is a variational hybrid quantum-classical algorithm, stands out as leading proposals to efficiently solve the Max-Cut problem, a representative example of combinatorial optimization. However, its promised advantages strongly rely on parameters initialization strategy, a critical aspect due to the non-convex and complex optimization landscapes characterized by low-quality local minima issues. Therefore, in this work, we formulate the problem of finding good initial parameters as a generative task in which the generative machine learning model, specifically the denoising diffusion probabilistic model (DDPM), is trained to generate high-performing initial parameters for QAOA. The diffusion model is capable of learning the distribution of high-performing parameters and then synthesizing new parameters closer to optimal ones. Experiments with various sized Max-Cut problem instances demonstrate that our diffusion process consistently enhances QAOA effectiveness compared to random parameters initialization. Moreover, our framework indicates the capacity of training on small, classically simulatable problem instances, aiming at extrapolating to larger instances to reduce quantum computational resource overhead.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 01:18:27 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 16:19:55 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Meng", "Fanxu", "" ], [ "Zhou", "Xiangzhen", "" ] ]
2407.12281
Shuli Jiang
Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Farhan Ahmed, Ling Cai, Nathalie Baracaldo
Turning Generative Models Degenerate: The Power of Data Poisoning Attacks
18 pages, 11 figures
null
null
null
cs.CR cs.AI
http://creativecommons.org/licenses/by-nc-sa/4.0/
The increasing use of large language models (LLMs) trained by third parties raises significant security concerns. In particular, malicious actors can introduce backdoors through poisoning attacks to generate undesirable outputs. While such attacks have been extensively studied in image domains and classification tasks, they remain underexplored for natural language generation (NLG) tasks. To address this gap, we conduct an investigation of various poisoning techniques targeting the LLM's fine-tuning phase via prefix-tuning, a Parameter Efficient Fine-Tuning (PEFT) method. We assess their effectiveness across two generative tasks: text summarization and text completion; and we also introduce new metrics to quantify the success and stealthiness of such NLG poisoning attacks. Through our experiments, we find that the prefix-tuning hyperparameters and trigger designs are the most crucial factors to influence attack success and stealthiness. Moreover, we demonstrate that existing popular defenses are ineffective against our poisoning attacks. Our study presents the first systematic approach to understanding poisoning attacks targeting NLG tasks during fine-tuning via PEFT across a wide range of triggers and attack settings. We hope our findings will aid the AI security community in developing effective defenses against such threats.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 03:02:15 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 05:52:35 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Jiang", "Shuli", "" ], [ "Kadhe", "Swanand Ravindra", "" ], [ "Zhou", "Yi", "" ], [ "Ahmed", "Farhan", "" ], [ "Cai", "Ling", "" ], [ "Baracaldo", "Nathalie", "" ] ]
2407.12288
Hong Jun Jeon
Hong Jun Jeon, Benjamin Van Roy
Information-Theoretic Foundations for Machine Learning
null
null
null
null
stat.ML cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
The staggering progress of machine learning in the past decade has been a sight to behold. In retrospect, it is both remarkable and unsettling that these milestones were achievable with little to no rigorous theory to guide experimentation. Despite this fact, practitioners have been able to guide their future experimentation via observations from previous large-scale empirical investigations. However, alluding to Plato's Allegory of the cave, it is likely that the observations which form the field's notion of reality are but shadows representing fragments of that reality. In this work, we propose a theoretical framework which attempts to answer what exists outside of the cave. To the theorist, we provide a framework which is mathematically rigorous and leaves open many interesting ideas for future exploration. To the practitioner, we provide a framework whose results are very intuitive, general, and which will help form principles to guide future investigations. Concretely, we provide a theoretical framework rooted in Bayesian statistics and Shannon's information theory which is general enough to unify the analysis of many phenomena in machine learning. Our framework characterizes the performance of an optimal Bayesian learner, which considers the fundamental limits of information. Throughout this work, we derive very general theoretical results and apply them to derive insights specific to settings ranging from data which is independently and identically distributed under an unknown distribution, to data which is sequential, to data which exhibits hierarchical structure amenable to meta-learning. We conclude with a section dedicated to characterizing the performance of misspecified algorithms. These results are exciting and particularly relevant as we strive to overcome increasingly difficult machine learning challenges in this endlessly complex world.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 03:18:40 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 14:35:39 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Jeon", "Hong Jun", "" ], [ "Van Roy", "Benjamin", "" ] ]
2407.12302
Takashi J. Moriya
Takashi J. Moriya
Superluminous supernovae
This is a pre-print of a chapter for the Encyclopedia of Astrophysics (edited by I. Mandel, section editor F.R.N. Schneider) to be published by Elsevier as a Reference Module
null
null
null
astro-ph.HE astro-ph.CO astro-ph.SR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Superluminous supernovae (SLSNe) are a population of supernovae (SNe) whose peak luminosities are much larger than those of canonical SNe. Although SLSNe were simply defined by their peak luminosity at first, it is currently recognized that they show rich spectroscopic diversities including hydrogen-poor (Type I) and hydrogen-rich (Type II) subtypes. The exact mechanisms making SLSNe luminous are still not fully understood, but there are mainly four major suggested luminosity sources (radioactive decay of 56Ni, circumstellar interaction, magnetar spin-down, and fallback accretion). We provide an overview of observational properties of SLSNe and major theoretical models for them. Future transient surveys are expected to discover SLSNe at high redshifts which will provide a critical information in revealing their nature.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 03:50:17 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 09:22:04 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Moriya", "Takashi J.", "" ] ]
2407.12327
Tejas Vaidhya
Ayush Kaushal, Tejas Pandey, Tejas Vaidhya, Aaryan Bhagat and Irina Rish
Spectra: A Comprehensive Study of Ternary, Quantized, and FP16 Language Models
32 pages, 12 figures, and 10 tables
null
null
null
cs.LG cs.AI cs.CL
http://creativecommons.org/licenses/by/4.0/
Post-training quantization is the leading method for addressing memory-related bottlenecks in LLM inference, but unfortunately, it suffers from significant performance degradation below 4-bit precision. An alternative approach involves training compressed models directly at a low bitwidth (e.g., binary or ternary models). However, the performance, training dynamics, and scaling trends of such models are not yet well understood. To address this issue, we train and openly release the Spectra LLM suite consisting of 54 language models ranging from 99M to 3.9B parameters, trained on 300B tokens. Spectra includes FloatLMs, post-training quantized QuantLMs (3, 4, 6, and 8 bits), and ternary LLMs (TriLMs) - our improved architecture for ternary language modeling, which significantly outperforms previously proposed ternary models of a given size (in bits), matching half-precision models at scale. For example, TriLM 3.9B is (bit-wise) smaller than the half-precision FloatLM 830M, but matches half-precision FloatLM 3.9B in commonsense reasoning and knowledge benchmarks. However, TriLM 3.9B is also as toxic and stereotyping as FloatLM 3.9B, a model six times larger in size. Additionally, TriLM 3.9B lags behind FloatLM in perplexity on validation splits and web-based corpora but performs better on less noisy datasets like Lambada and PennTreeBank. To enhance understanding of low-bitwidth models, we are releasing 500+ intermediate checkpoints of the Spectra suite at \href{https://github.com/NolanoOrg/SpectraSuite}{https://github.com/NolanoOrg/SpectraSuite}.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 05:53:20 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Kaushal", "Ayush", "" ], [ "Pandey", "Tejas", "" ], [ "Vaidhya", "Tejas", "" ], [ "Bhagat", "Aaryan", "" ], [ "Rish", "Irina", "" ] ]
2407.12334
Wenhao Wang
Benshan Mei and Saisai Xia and Wenhao Wang and Dongdai Lin
Cabin: Confining Untrusted Programs within Confidential VMs
ICICS 2024
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Confidential computing safeguards sensitive computations from untrusted clouds, with Confidential Virtual Machines (CVMs) providing a secure environment for guest OS. However, CVMs often come with large and vulnerable operating system kernels, making them susceptible to attacks exploiting kernel weaknesses. The imprecise control over the read/write access in the page table has allowed attackers to exploit vulnerabilities. The lack of security hierarchy leads to insufficient separation between untrusted applications and guest OS, making the kernel susceptible to direct threats from untrusted programs. This study proposes Cabin, an isolated execution framework within guest VM utilizing the latest AMD SEV-SNP technology. Cabin shields untrusted processes to the user space of a lower virtual machine privilege level (VMPL) by introducing a proxy-kernel between the confined processes and the guest OS. Furthermore, we propose execution protection mechanisms based on fine-gained control of VMPL privilege for vulnerable programs and the proxy-kernel to minimize the attack surface. We introduce asynchronous forwarding mechanism and anonymous memory management to reduce the performance impact. The evaluation results show that the Cabin framework incurs a modest overhead (5% on average) on Nbench and WolfSSL benchmarks.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 06:23:28 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 01:37:07 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Mei", "Benshan", "" ], [ "Xia", "Saisai", "" ], [ "Wang", "Wenhao", "" ], [ "Lin", "Dongdai", "" ] ]
2407.12393
Zheni Zeng
Zheni Zeng, Jiayi Chen, Huimin Chen, Yukun Yan, Yuxuan Chen, Zhiyuan Liu, Maosong Sun
PersLLM: A Personified Training Approach for Large Language Models
10 pages for main text, 5 figures
null
null
null
cs.CL cs.AI cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
Large language models exhibit aspects of human-level intelligence that catalyze their application as human-like agents in domains such as social simulations, human-machine interactions, and collaborative multi-agent systems. However, the absence of distinct personalities, such as displaying ingratiating behaviors, inconsistent opinions, and uniform response patterns, diminish LLMs utility in practical applications. Addressing this, the development of personality traits in LLMs emerges as a crucial area of research to unlock their latent potential. Existing methods to personify LLMs generally involve strategies like employing stylized training data for instruction tuning or using prompt engineering to simulate different personalities. These methods only capture superficial linguistic styles instead of the core of personalities and are therefore not stable. In this study, we propose PersLLM, integrating psychology-grounded principles of personality: social practice, consistency, and dynamic development, into a comprehensive training methodology. We incorporate personality traits directly into the model parameters, enhancing the model's resistance to induction, promoting consistency, and supporting the dynamic evolution of personality. Single-agent evaluation validates our method's superiority, as it produces responses more aligned with reference personalities compared to other approaches. Case studies for multi-agent communication highlight its benefits in enhancing opinion consistency within individual agents and fostering collaborative creativity among multiple agents in dialogue contexts, potentially benefiting human simulation and multi-agent cooperation. Additionally, human-agent interaction evaluations indicate that our personified models significantly enhance interactive experiences, underscoring the practical implications of our research.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 08:13:22 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 04:18:43 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Zeng", "Zheni", "" ], [ "Chen", "Jiayi", "" ], [ "Chen", "Huimin", "" ], [ "Yan", "Yukun", "" ], [ "Chen", "Yuxuan", "" ], [ "Liu", "Zhiyuan", "" ], [ "Sun", "Maosong", "" ] ]
2407.12414
Christian Jepsen
Christopher P. Herzog, Christian B. Jepsen, Hugh Osborn and Yaron Oz
Extremal fixed points and Diophantine equations
v2: figure 3 fixed, new footnote on page 26, minor linguistic changes
null
null
null
hep-th
http://creativecommons.org/licenses/by/4.0/
The coupling constants of fixed points in the $\epsilon$ expansion at one loop are known to satisfy a quadratic bound due to Rychkov and Stergiou. We refer to fixed points that saturate this bound as extremal fixed points. The theories which contain such fixed points are those which undergo a saddle-node bifurcation, entailing the presence of a marginal operator. Among bifundamental theories, a few examples of infinite families of such theories are known. A necessary condition for extremality is that the sizes of the factors of the symmetry group of a given theory satisfy a specific Diophantine equation, given in terms of what we call the extremality polynomial. In this work we study such Diophantine equations and employ a combination of rigorous and probabilistic estimates to argue that these infinite families constitute rare exceptions. The Pell equation, Falting's theorem, Siegel's theorem, and elliptic curves figure prominently in our analysis. In the cases we study here, more generic classes of multi-fundamental theories saturate the Rychkov-Stergiou bound only in sporadic cases or in limits where they degenerate into simpler known examples.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 08:54:35 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 17:21:42 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Herzog", "Christopher P.", "" ], [ "Jepsen", "Christian B.", "" ], [ "Osborn", "Hugh", "" ], [ "Oz", "Yaron", "" ] ]
2407.12415
Xingyu Zhang
Xingyu Zhang, Siyu Zhao, Zeen Song, Huijie Guo, Jianqi Zhang, Changwen Zheng, Wenwen Qiang
Not All Frequencies Are Created Equal:Towards a Dynamic Fusion of Frequencies in Time-Series Forecasting
Accpeted by ACMMM2024
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Long-term time series forecasting is a long-standing challenge in various applications. A central issue in time series forecasting is that methods should expressively capture long-term dependency. Furthermore, time series forecasting methods should be flexible when applied to different scenarios. Although Fourier analysis offers an alternative to effectively capture reusable and periodic patterns to achieve long-term forecasting in different scenarios, existing methods often assume high-frequency components represent noise and should be discarded in time series forecasting. However, we conduct a series of motivation experiments and discover that the role of certain frequencies varies depending on the scenarios. In some scenarios, removing high-frequency components from the original time series can improve the forecasting performance, while in others scenarios, removing them is harmful to forecasting performance. Therefore, it is necessary to treat the frequencies differently according to specific scenarios. To achieve this, we first reformulate the time series forecasting problem as learning a transfer function of each frequency in the Fourier domain. Further, we design Frequency Dynamic Fusion (FreDF), which individually predicts each Fourier component, and dynamically fuses the output of different frequencies. Moreover, we provide a novel insight into the generalization ability of time series forecasting and propose the generalization bound of time series forecasting. Then we prove FreDF has a lower bound, indicating that FreDF has better generalization ability. Extensive experiments conducted on multiple benchmark datasets and ablation studies demonstrate the effectiveness of FreDF.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 08:54:41 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 09:27:25 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Zhang", "Xingyu", "" ], [ "Zhao", "Siyu", "" ], [ "Song", "Zeen", "" ], [ "Guo", "Huijie", "" ], [ "Zhang", "Jianqi", "" ], [ "Zheng", "Changwen", "" ], [ "Qiang", "Wenwen", "" ] ]
2407.12420
Tian Tian
Shuangshuang Zeng, Tian Tian, Jiwoo Oh, Chih-Jen Shih
Direct Nanopatterning of Complex 3D Surfaces and Self-Aligned Superlattices via Molecular-Beam Holographic Lithography
null
null
null
null
cond-mat.mtrl-sci cond-mat.mes-hall
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional lithography methods involving pattern transfer through resist templating face challenges of material compatibility with various process solvents. Other approaches of direct material writing often compromise pattern complexity and overlay accuracy. Here we explore a concept based on the moir\'e interference of molecular beams to directly pattern complex three-dimensional (3D) surfaces made by any evaporable materials, such as metals, oxides and organic semiconductors. Our proposed approach, termed the Molecular-Beam Holographic Lithography (MBHL), relies on precise control over angular projections of material flux passing through nanoapertures superimposed on the substrate, emulating the interference of coherent laser beams in interference lithography. Incorporating with our computational lithography (CL) algorithm, we have demonstrated self-aligned overlay of multiple material patterns to yield binary up to quinary superlattices, with a critical dimension and overlay accuracy on the order of 50 and 2 nanometers, respectively. The process is expected to substantially expand the boundary of materials combination for high-throughput fabrication of complex superstructures of translational symmetry on arbitrary substrates, enabling new nanoimaging, sensing, catalysis, and optoelectronic devices.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 09:00:31 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 13:37:12 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Zeng", "Shuangshuang", "" ], [ "Tian", "Tian", "" ], [ "Oh", "Jiwoo", "" ], [ "Shih", "Chih-Jen", "" ] ]
2407.12439
Prosenjit Roy
Gyula Csat\'o and Prosenjit Roy
A fractional Hardy-Sobolev inequality of Michael-Simon type on convex hypersurfaces
null
null
null
null
math.AP
http://creativecommons.org/licenses/by/4.0/
In this paper we prove a fractional version of a Caffarelli-Kohn-Nirenberg type interpolation inequality on hypersurfaces $M\subset\R^{n+1}$ which are boundaries of convex sets. The inequality carries a universal constant independent of $M$ and involves the fractional mean curvature of $M.$ In particular, it interpolates between the fractional Micheal-Simon Sobolev inequality recently obtained by Cabr\'e, Cozzi, and the first author, and a new fractional Hardy inequality on $M$. Our method, when restricted to the plane case $M=\R^n$, gives a new simple proof of the fractional Hardy inequality. To obtain the fractional Hardy inequality on a hypersurface, we establish an inequality which bounds a weighted perimeter of $M$ by the standard perimeter of $M$ (modulo a universal constant), and which is valid for all convex hypersurfaces $M$.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 09:50:21 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 05:48:14 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Csató", "Gyula", "" ], [ "Roy", "Prosenjit", "" ] ]
2407.12468
Marcos Fern\'andez-Pichel Dr
Marcos Fern\'andez-Pichel and Juan C. Pichel and David E. Losada
Search Engines, LLMs or Both? Evaluating Information Seeking Strategies for Answering Health Questions
null
null
null
null
cs.IR cs.AI
http://creativecommons.org/licenses/by/4.0/
Search engines have traditionally served as primary tools for information seeking. However, the new Large Language Models (LLMs) have recently demonstrated remarkable capabilities in multiple tasks and, specifically, their adoption as question answering systems is becoming increasingly prevalent. It is expected that LLM-based conversational systems and traditional web engines will continue to coexist in the future, supporting end users in various ways. But there is a need for more scientific research on the effectiveness of both types of systems in facilitating accurate information seeking. In this study, we focus on their merits in answering health questions. We conducted an extensive study comparing different web search engines, LLMs and retrieval-augmented (RAG) approaches. Our research reveals intriguing conclusions. For example, we observed that the quality of webpages potentially responding to a health question does not decline as we navigate further down the ranked lists. However, according to our evaluation, web engines are less accurate than LLMs in finding correct answers to health questions. On the other hand, LLMs are quite sensitive to the input prompts, and we also found out that RAG leads to highly effective information seeking methods.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 10:40:39 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 10:11:09 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Fernández-Pichel", "Marcos", "" ], [ "Pichel", "Juan C.", "" ], [ "Losada", "David E.", "" ] ]
2407.12477
Georgy Kitavtsev
Georgy Kitavtsev
Composite solutions to a liquid bilayer model
17 figures
null
null
null
math.AP physics.flu-dyn
http://creativecommons.org/licenses/by/4.0/
This article continues the research initiated in [17]. We derive explicit formulae for the leading order profiles of eleven types of stationary solutions to a one-dimensional two-layer thin-film liquid model considered with an intermolecular potential depending on both layer heights. The found solutions are composed of the repeated elementary blocks (bulk, contact line and ultra-thin film ones) being consistently asymptotically matched together. We show that once considered on a finite interval with Neumann boundary conditions these stationary solutions are either dynamically stable or weakly translationally unstable. Other composite solutions are found to be numerically unstable and rather exhibit complex coarsening dynamics.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 11:04:11 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 07:58:39 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Kitavtsev", "Georgy", "" ] ]
2407.12483
Jan Held Held
Jan Held, Anthony Cioppa, Silvio Giancola, Abdullah Hamdi, Christel Devue, Bernard Ghanem and Marc Van Droogenbroeck
Towards AI-Powered Video Assistant Referee System (VARS) for Association Football
The paper is subject to the peer review process of Sports Engineering
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Over the past decade, the technology used by referees in football has improved substantially, enhancing the fairness and accuracy of decisions. This progress has culminated in the implementation of the Video Assistant Referee (VAR), an innovation that enables backstage referees to review incidents on the pitch from multiple points of view. However, the VAR is currently limited to professional leagues due to its expensive infrastructure and the lack of referees worldwide. In this paper, we present the semi-automated Video Assistant Referee System (VARS) that leverages the latest findings in multi-view video analysis. VARS sets a new state-of-the-art on the SoccerNet-MVFoul dataset, a multi-view video dataset of football fouls. Our VARS achieves a new state-of-the-art on the SoccerNet-MVFoul dataset by recognizing the type of foul in 50% of instances and the appropriate sanction in 46% of cases. Finally, we conducted a comparative study to investigate human performance in classifying fouls and their corresponding severity and compared these findings to our VARS. The results of our study highlight the potential of our VARS to reach human performance and support football refereeing across all levels of professional and amateur federations.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 11:09:03 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 07:18:23 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Held", "Jan", "" ], [ "Cioppa", "Anthony", "" ], [ "Giancola", "Silvio", "" ], [ "Hamdi", "Abdullah", "" ], [ "Devue", "Christel", "" ], [ "Ghanem", "Bernard", "" ], [ "Van Droogenbroeck", "Marc", "" ] ]
2407.12518
Rodrigo Maulen-Soto
Rodrigo Maulen-Soto, Jalal Fadili, Peter Ochs
Inertial Methods with Viscous and Hessian driven Damping for Non-Convex Optimization
39 pages, 4 figures
null
null
null
math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we aim to study non-convex minimization problems via second-order (in-time) dynamics, including a non-vanishing viscous damping and a geometric Hessian-driven damping. Second-order systems that only rely on a viscous damping may suffer from oscillation problems towards the minima, while the inclusion of a Hessian-driven damping term is known to reduce this effect without explicit construction of the Hessian in practice. There are essentially two ways to introduce the Hessian-driven damping term: explicitly or implicitly. For each setting, we provide conditions on the damping coefficients to ensure convergence of the gradient towards zero. Moreover, if the objective function is definable, we show global convergence of the trajectory towards a critical point as well as convergence rates. Besides, in the autonomous case, if the objective function is Morse, we conclude that the trajectory converges to a local minimum of the objective for almost all initializations. We also study algorithmic schemes for both dynamics and prove all the previous properties in the discrete setting under proper choice of the step-size.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 12:13:04 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 10:56:58 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Maulen-Soto", "Rodrigo", "" ], [ "Fadili", "Jalal", "" ], [ "Ochs", "Peter", "" ] ]
2407.12588
Antoni Kowalczuk
Antoni Kowalczuk, Jan Dubi\'nski, Atiyeh Ashari Ghomi, Yi Sui, George Stein, Jiapeng Wu, Jesse C. Cresswell, Franziska Boenisch, Adam Dziedzic
Benchmarking Robust Self-Supervised Learning Across Diverse Downstream Tasks
Accepted at the ICML 2024 Workshop on Foundation Models in the Wild
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale vision models have become integral in many applications due to their unprecedented performance and versatility across downstream tasks. However, the robustness of these foundation models has primarily been explored for a single task, namely image classification. The vulnerability of other common vision tasks, such as semantic segmentation and depth estimation, remains largely unknown. We present a comprehensive empirical evaluation of the adversarial robustness of self-supervised vision encoders across multiple downstream tasks. Our attacks operate in the encoder embedding space and at the downstream task output level. In both cases, current state-of-the-art adversarial fine-tuning techniques tested only for classification significantly degrade clean and robust performance on other tasks. Since the purpose of a foundation model is to cater to multiple applications at once, our findings reveal the need to enhance encoder robustness more broadly. Our code is available at ${github.com/layer6ai-labs/ssl-robustness}$.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 14:12:34 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 06:55:33 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Kowalczuk", "Antoni", "" ], [ "Dubiński", "Jan", "" ], [ "Ghomi", "Atiyeh Ashari", "" ], [ "Sui", "Yi", "" ], [ "Stein", "George", "" ], [ "Wu", "Jiapeng", "" ], [ "Cresswell", "Jesse C.", "" ], [ "Boenisch", "Franziska", "" ], [ "Dziedzic", "Adam", "" ] ]
2407.12597
Ammar Ahmed
Ammar Ahmed, Ali Shariq Imran, Abdul Manaf, Zenun Kastrati, and Sher Muhammad Daudpota
Enhancing Wrist Abnormality Detection with YOLO: Analysis of State-of-the-art Single-stage Detection Models
null
null
10.1016/j.bspc.2024.106144
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Diagnosing and treating abnormalities in the wrist, specifically distal radius, and ulna fractures, is a crucial concern among children, adolescents, and young adults, with a higher incidence rate during puberty. However, the scarcity of radiologists and the lack of specialized training among medical professionals pose a significant risk to patient care. This problem is further exacerbated by the rising number of imaging studies and limited access to specialist reporting in certain regions. This highlights the need for innovative solutions to improve the diagnosis and treatment of wrist abnormalities. Automated wrist fracture detection using object detection has shown potential, but current studies mainly use two-stage detection methods with limited evidence for single-stage effectiveness. This study employs state-of-the-art single-stage deep neural network-based detection models YOLOv5, YOLOv6, YOLOv7, and YOLOv8 to detect wrist abnormalities. Through extensive experimentation, we found that these YOLO models outperform the commonly used two-stage detection algorithm, Faster R-CNN, in bone fracture detection. Additionally, compound-scaled variants of each YOLO model were compared, with YOLOv8x demonstrating a fracture detection mean average precision (mAP) of 0.95 and an overall mAP of 0.77 on the GRAZPEDWRI-DX pediatric wrist dataset, highlighting the potential of single-stage models for enhancing pediatric wrist imaging.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 14:21:53 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Ahmed", "Ammar", "" ], [ "Imran", "Ali Shariq", "" ], [ "Manaf", "Abdul", "" ], [ "Kastrati", "Zenun", "" ], [ "Daudpota", "Sher Muhammad", "" ] ]
2407.12677
Denis Kuperberg
Thomas Colcombet, Amina Doumane, Denis Kuperberg
Tree algebras and bisimulation-invariant MSO on finite graphs
null
null
null
null
cs.LO
http://creativecommons.org/licenses/by-nc-nd/4.0/
We establish that the bisimulation invariant fragment of MSO over finite transition systems is expressively equivalent over finite transition systems to modal mu-calculus, a question that had remained open for several decades. The proof goes by translating the question to an algebraic framework, and showing that the languages of regular trees that are recognized by finitary tree algebras whose sorts zero and one are finite are the regular ones, ie. the ones expressible in mu-calculus. This corresponds for trees to a weak form of the key translation of Wilke algebras to omega-semigroup over infinite words, and was also a missing piece in the algebraic theory of regular languages of infinite trees since twenty years.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 15:58:54 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 08:25:41 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Colcombet", "Thomas", "" ], [ "Doumane", "Amina", "" ], [ "Kuperberg", "Denis", "" ] ]
2407.12702
Elona Dupont
Elona Dupont, Kseniya Cherenkova, Dimitrios Mallis, Gleb Gusev, Anis Kacem, Djamila Aouada
TransCAD: A Hierarchical Transformer for CAD Sequence Inference from Point Clouds
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
3D reverse engineering, in which a CAD model is inferred given a 3D scan of a physical object, is a research direction that offers many promising practical applications. This paper proposes TransCAD, an end-to-end transformer-based architecture that predicts the CAD sequence from a point cloud. TransCAD leverages the structure of CAD sequences by using a hierarchical learning strategy. A loop refiner is also introduced to regress sketch primitive parameters. Rigorous experimentation on the DeepCAD and Fusion360 datasets show that TransCAD achieves state-of-the-art results. The result analysis is supported with a proposed metric for CAD sequence, the mean Average Precision of CAD Sequence, that addresses the limitations of existing metrics.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 16:24:36 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 10:27:36 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Dupont", "Elona", "" ], [ "Cherenkova", "Kseniya", "" ], [ "Mallis", "Dimitrios", "" ], [ "Gusev", "Gleb", "" ], [ "Kacem", "Anis", "" ], [ "Aouada", "Djamila", "" ] ]
2407.12718
Yuanzhi Zhu
Yuanzhi Zhu, Xingchao Liu, Qiang Liu
SlimFlow: Training Smaller One-Step Diffusion Models with Rectified Flow
ECCV 2024
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diffusion models excel in high-quality generation but suffer from slow inference due to iterative sampling. While recent methods have successfully transformed diffusion models into one-step generators, they neglect model size reduction, limiting their applicability in compute-constrained scenarios. This paper aims to develop small, efficient one-step diffusion models based on the powerful rectified flow framework, by exploring joint compression of inference steps and model size. The rectified flow framework trains one-step generative models using two operations, reflow and distillation. Compared with the original framework, squeezing the model size brings two new challenges: (1) the initialization mismatch between large teachers and small students during reflow; (2) the underperformance of naive distillation on small student models. To overcome these issues, we propose Annealing Reflow and Flow-Guided Distillation, which together comprise our SlimFlow framework. With our novel framework, we train a one-step diffusion model with an FID of 5.02 and 15.7M parameters, outperforming the previous state-of-the-art one-step diffusion model (FID=6.47, 19.4M parameters) on CIFAR10. On ImageNet 64$\times$64 and FFHQ 64$\times$64, our method yields small one-step diffusion models that are comparable to larger models, showcasing the effectiveness of our method in creating compact, efficient one-step diffusion models.
[ { "version": "v1", "created": "Wed, 17 Jul 2024 16:38:45 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2024 03:23:13 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Zhu", "Yuanzhi", "" ], [ "Liu", "Xingchao", "" ], [ "Liu", "Qiang", "" ] ]
2407.12785
Kexin Li
Kexin Li, Xiaojing Xu
Large-Time Behavior of Solutions to Compressible Navier-Stokes System in Unbounded Domains with Degenerate Heat-Conductivity and Large Data
24 pages. arXiv admin note: text overlap with arXiv:1809.00609
null
null
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are concerned with the large-time behavior of solutions to the initial and initial boundary value problems with large initial data for the compressible Navier-Stokes system with degenerate heat-conductivity describing the one-dimensional motion of a viscous heat-conducting perfect polytropic gas in unbounded domains. Both the specific volume and temperature are proved to be bounded from below and above independently of both time and space. Moreover, it is shown that the global solution is asymptotically stable as time tends to infinity.
[ { "version": "v1", "created": "Sun, 9 Jun 2024 02:13:56 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Li", "Kexin", "" ], [ "Xu", "Xiaojing", "" ] ]
2407.12786
Sukanya Bhattacharjee
Sukanya Bhattacharjee, Parag Chaudhuri
Cube2Pipes : Investigating Hybrid Gameplay Using AR and a Tangible 3D Puzzle
null
null
null
null
cs.HC cs.GR
http://creativecommons.org/licenses/by-nc-nd/4.0/
We present our game, Cube2Pipes, as an attempt to investigate a unique gameplay design where we use a tangible 3D spatial puzzle, in the form of a 2X2 Rubik's Cube, as an interface to a tabletop mobile augmented reality (AR) game. The game interface adapts to user movement and interaction with both virtual and tangible elements via computer vision based tracking. This game can be seen as an instance of generic interactive hybrid systems as it involves interaction with both virtual and real, tangible elements. We present a thorough user evaluation about various aspects of the gameplay in order to answer the question as to whether hybrid gameplay involving both real and virtual interfaces and elements is more captivating and preferred by users, than standard (baseline) gameplay with only virtual elements. We use multiple industry standard user study questionnaires to try and answer this question. We also try to determine whether the game facilitates understanding of the spatial moves required to solve a Rubik's Cube, and the efficacy of a tangible puzzle interface to a tabletop AR game.
[ { "version": "v1", "created": "Sat, 15 Jun 2024 20:00:56 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Bhattacharjee", "Sukanya", "" ], [ "Chaudhuri", "Parag", "" ] ]
2407.12787
Matthew Barthet
Matthew Barthet, Maria Kaselimi, Kosmas Pinitas, Konstantinos Makantasis, Antonios Liapis, Georgios N. Yannakakis
GameVibe: A Multimodal Affective Game Corpus
11 pages, 5 figures, 1 table
null
null
null
cs.HC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As online video and streaming platforms continue to grow, affective computing research has undergone a shift towards more complex studies involving multiple modalities. However, there is still a lack of readily available datasets with high-quality audiovisual stimuli. In this paper, we present GameVibe, a novel affect corpus which consists of multimodal audiovisual stimuli, including in-game behavioural observations and third-person affect labels for viewer engagement. The corpus consists of videos from a diverse set of publicly available gameplay sessions across 30 games, with particular attention to ensure high-quality stimuli with good audiovisual and gameplay diversity. Furthermore, we present an analysis on the reliability of the annotators in terms of inter-annotator agreement.
[ { "version": "v1", "created": "Mon, 17 Jun 2024 10:52:52 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Barthet", "Matthew", "" ], [ "Kaselimi", "Maria", "" ], [ "Pinitas", "Kosmas", "" ], [ "Makantasis", "Konstantinos", "" ], [ "Liapis", "Antonios", "" ], [ "Yannakakis", "Georgios N.", "" ] ]
2407.12788
Weihao Yan
Weihao Yan, Yeqiang Qian, Yueyuan Li, Tao Li, Chunxiang Wang, Ming Yang
SS-ADA: A Semi-Supervised Active Domain Adaptation Framework for Semantic Segmentation
12 pages,13 figures,8 tables
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Semantic segmentation plays an important role in intelligent vehicles, providing pixel-level semantic information about the environment. However, the labeling budget is expensive and time-consuming when semantic segmentation model is applied to new driving scenarios. To reduce the costs, semi-supervised semantic segmentation methods have been proposed to leverage large quantities of unlabeled images. Despite this, their performance still falls short of the accuracy required for practical applications, which is typically achieved by supervised learning. A significant shortcoming is that they typically select unlabeled images for annotation randomly, neglecting the assessment of sample value for model training. In this paper, we propose a novel semi-supervised active domain adaptation (SS-ADA) framework for semantic segmentation that employs an image-level acquisition strategy. SS-ADA integrates active learning into semi-supervised semantic segmentation to achieve the accuracy of supervised learning with a limited amount of labeled data from the target domain. Additionally, we design an IoU-based class weighting strategy to alleviate the class imbalance problem using annotations from active learning. We conducted extensive experiments on synthetic-to-real and real-to-real domain adaptation settings. The results demonstrate the effectiveness of our method. SS-ADA can achieve or even surpass the accuracy of its supervised learning counterpart with only 25% of the target labeled data when using a real-time segmentation model. The code for SS-ADA is available at https://github.com/ywher/SS-ADA.
[ { "version": "v1", "created": "Mon, 17 Jun 2024 13:40:42 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Yan", "Weihao", "" ], [ "Qian", "Yeqiang", "" ], [ "Li", "Yueyuan", "" ], [ "Li", "Tao", "" ], [ "Wang", "Chunxiang", "" ], [ "Yang", "Ming", "" ] ]
2407.12789
Laurens Engwegen
Laurens Engwegen, Daan Brinks, Wendelin B\"ohmer
Generalisation to unseen topologies: Towards control of biological neural network activity
null
null
null
null
q-bio.NC cs.AI cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Novel imaging and neurostimulation techniques open doors for advancements in closed-loop control of activity in biological neural networks. This would allow for applications in the investigation of activity propagation, and for diagnosis and treatment of pathological behaviour. Due to the partially observable characteristics of activity propagation, through networks in which edges can not be observed, and the dynamic nature of neuronal systems, there is a need for adaptive, generalisable control. In this paper, we introduce an environment that procedurally generates neuronal networks with different topologies to investigate this generalisation problem. Additionally, an existing transformer-based architecture is adjusted to evaluate the generalisation performance of a deep RL agent in the presented partially observable environment. The agent demonstrates the capability to generalise control from a limited number of training networks to unseen test networks.
[ { "version": "v1", "created": "Mon, 17 Jun 2024 13:53:39 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Engwegen", "Laurens", "" ], [ "Brinks", "Daan", "" ], [ "Böhmer", "Wendelin", "" ] ]
2407.12790
Michal Chudoba
Michal Chudoba and Rudolf Rosa
GPT Czech Poet: Generation of Czech Poetic Strophes with Language Models
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
High-quality automated poetry generation systems are currently only available for a small subset of languages. We introduce a new model for generating poetry in Czech language, based on fine-tuning a pre-trained Large Language Model. We demonstrate that guiding the generation process by explicitly specifying strophe parameters within the poem text strongly improves the effectiveness of the model. We also find that appropriate tokenization is crucial, showing that tokenization methods based on syllables or individual characters instead of subwords prove superior in generating poetic strophes. We further enhance the results by introducing \textit{Forced~generation}, adding explicit specifications of meter and verse parameters at inference time based on the already generated text. We evaluate a range of setups, showing that our proposed approach achieves high accuracies in rhyming and metric aspects of formal quality of the generated poems.
[ { "version": "v1", "created": "Tue, 18 Jun 2024 06:19:45 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Chudoba", "Michal", "" ], [ "Rosa", "Rudolf", "" ] ]
2407.12791
Huansheng Ning Prof
Qikai Wei, Mingzhi Yang, Jinqiang Wang, Wenwei Mao, Jiabo Xu, Huansheng Ning
TourLLM: Enhancing LLMs with Tourism Knowledge
null
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, large language models (LLMs) have demonstrated their effectiveness in various natural language processing (NLP) tasks. However, the lack of tourism knowledge limits the performance of LLMs in tourist attraction presentations and travel planning. To address this challenge, we constructed a supervised fine-tuning dataset for the culture and tourism domain, named Cultour. This dataset consists of three parts: tourism knowledge base QA data, travelogues data, and tourism diversity QA data. Additionally, we propose TourLLM, a Qwen-based model supervised fine-tuned with Cultour, to improve the quality of the information provided about attractions and travel planning. To evaluate the performance of TourLLM, we employed both automatic and human evaluation, and we proposed a human evaluation criterion named CRA (Consistency, Readability, Availability). The experimental results demonstrate the effectiveness of the responses generated by the TourLLM. Our proposed Cultour is accessible at https://github.com/mrweiqk/Cultour.
[ { "version": "v1", "created": "Tue, 18 Jun 2024 09:15:46 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Wei", "Qikai", "" ], [ "Yang", "Mingzhi", "" ], [ "Wang", "Jinqiang", "" ], [ "Mao", "Wenwei", "" ], [ "Xu", "Jiabo", "" ], [ "Ning", "Huansheng", "" ] ]
2407.12792
Vittorio Giammarino
Vittorio Giammarino, James Queeney, Ioannis Ch. Paschalidis
Visually Robust Adversarial Imitation Learning from Videos with Contrastive Learning
null
null
null
null
cs.LG cs.CV
http://creativecommons.org/licenses/by/4.0/
We propose C-LAIfO, a computationally efficient algorithm designed for imitation learning from videos, even in the presence of visual mismatch between agent and expert domains. We analyze the problem of imitation from expert videos with visual discrepancies, and introduce a solution for robust latent space estimation using contrastive learning and data augmentation. Provided a visually robust latent space, our algorithm performs imitation entirely within this space using off-policy adversarial imitation learning. We conduct a thorough ablation study to justify our design choices and test C-LAIfO on high-dimensional continuous robotic tasks. Additionally, we demonstrate how C-LAIfO can be combined with other reward signals to facilitate learning on a set of challenging hand manipulation tasks with sparse rewards. Our experiments show improved performance compared to baseline methods, highlighting the effectiveness and versatility of C-LAIfO. To ensure reproducibility, we provide open access to our code.
[ { "version": "v1", "created": "Tue, 18 Jun 2024 20:56:18 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Giammarino", "Vittorio", "" ], [ "Queeney", "James", "" ], [ "Paschalidis", "Ioannis Ch.", "" ] ]
2407.12793
Qianyu Huang
Qianyu Huang and Tongfang Zhao
Data Collection and Labeling Techniques for Machine Learning
null
null
null
null
cs.DB cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data collection and labeling are critical bottlenecks in the deployment of machine learning applications. With the increasing complexity and diversity of applications, the need for efficient and scalable data collection and labeling techniques has become paramount. This paper provides a review of the state-of-the-art methods in data collection, data labeling, and the improvement of existing data and models. By integrating perspectives from both the machine learning and data management communities, we aim to provide a holistic view of the current landscape and identify future research directions.
[ { "version": "v1", "created": "Wed, 19 Jun 2024 06:01:28 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Huang", "Qianyu", "" ], [ "Zhao", "Tongfang", "" ] ]
2407.12794
George Octavian Barbulescu
George-Octavian B\u{a}rbulescu, Taiyi Wang, Zak Singh, Eiko Yoneki
Learned Graph Rewriting with Equality Saturation: A New Paradigm in Relational Query Rewrite and Beyond
null
null
null
null
cs.DB cs.LG
http://creativecommons.org/licenses/by/4.0/
Query rewrite systems perform graph substitutions using rewrite rules to generate optimal SQL query plans. Rewriting logical and physical relational query plans is proven to be an NP-hard sequential decision-making problem with a search space exponential in the number of rewrite rules. In this paper, we address the query rewrite problem by interleaving Equality Saturation and Graph Reinforcement Learning (RL). The proposed system, Aurora, rewrites relational queries by guiding Equality Saturation, a method from compiler literature to perform non-destructive graph rewriting, with a novel RL agent that embeds both the spatial structure of the query graph as well as the temporal dimension associated with the sequential construction of query plans. Our results show Graph Reinforcement Learning for non-destructive graph rewriting yields SQL plans orders of magnitude faster than existing equality saturation solvers, while also achieving competitive results against mainstream query optimisers.
[ { "version": "v1", "created": "Wed, 19 Jun 2024 21:11:19 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Bărbulescu", "George-Octavian", "" ], [ "Wang", "Taiyi", "" ], [ "Singh", "Zak", "" ], [ "Yoneki", "Eiko", "" ] ]
2407.12795
Martin Schmalzried
Martin Schmalzried
The need of a self for self-driving cars a theoretical model applying homeostasis to self driving
Pre-print draft
null
null
null
cs.HC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper explores the concept of creating a "self" for self-driving cars through a homeostatic architecture designed to enhance their autonomy, safety, and efficiency. The proposed system integrates inward focused sensors to monitor the car's internal state, such as the condition of its metal bodywork, wheels, engine, and battery, establishing a baseline homeostatic state representing optimal functionality. Outward facing sensors, like cameras and LIDAR, are then interpreted via their impact on the car's homeostatic state by quantifying deviations from homeostasis. This contrasts with the approach of trying to make cars "see" reality in a similar way to humans and identify elements in their reality in the same way humans. Virtual environments would be leveraged to accelerate training. Additionally, cars are programmed to communicate and share experiences via blockchain technology, learning from each other's mistakes while maintaining individualized training models. A dedicated language for self-driving cars is proposed to enable nuanced interpretation and response to environmental data. This architecture allows self-driving cars to dynamically adjust their behavior based on internal and external feedback, promoting cooperation and continuous improvement. The study concludes by discussing the broader implications for AI development, potential real-world applications, and future research directions.
[ { "version": "v1", "created": "Wed, 19 Jun 2024 22:26:26 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Schmalzried", "Martin", "" ] ]
2407.12796
Ethan Mollick
Ethan Mollick, Lilach Mollick, Natalie Bach, LJ Ciccarelli, Ben Przystanski, and Daniel Ravipinto
AI Agents and Education: Simulated Practice at Scale
null
null
null
null
cs.CY
http://creativecommons.org/licenses/by/4.0/
This paper explores the potential of generative AI in creating adaptive educational simulations. By leveraging a system of multiple AI agents, simulations can provide personalized learning experiences, offering students the opportunity to practice skills in scenarios with AI-generated mentors, role-players, and instructor-facing evaluators. We describe a prototype, PitchQuest, a venture capital pitching simulator that showcases the capabilities of AI in delivering instruction, facilitating practice, and providing tailored feedback. The paper discusses the pedagogy behind the simulation, the technology powering it, and the ethical considerations in using AI for education. While acknowledging the limitations and need for rigorous testing, we propose that generative AI can significantly lower the barriers to creating effective, engaging simulations, opening up new possibilities for experiential learning at scale.
[ { "version": "v1", "created": "Thu, 20 Jun 2024 05:26:04 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Mollick", "Ethan", "" ], [ "Mollick", "Lilach", "" ], [ "Bach", "Natalie", "" ], [ "Ciccarelli", "LJ", "" ], [ "Przystanski", "Ben", "" ], [ "Ravipinto", "Daniel", "" ] ]
2407.12797
Wenbo Sun
Wenbo Sun, Jiaqi Wang, Qiming Guo, Ziyu Li, Wenlu Wang, Rihan Hai
CEBench: A Benchmarking Toolkit for the Cost-Effectiveness of LLM Pipelines
null
null
null
null
cs.PF cs.LG
http://creativecommons.org/licenses/by/4.0/
Online Large Language Model (LLM) services such as ChatGPT and Claude 3 have transformed business operations and academic research by effortlessly enabling new opportunities. However, due to data-sharing restrictions, sectors such as healthcare and finance prefer to deploy local LLM applications using costly hardware resources. This scenario requires a balance between the effectiveness advantages of LLMs and significant financial burdens. Additionally, the rapid evolution of models increases the frequency and redundancy of benchmarking efforts. Existing benchmarking toolkits, which typically focus on effectiveness, often overlook economic considerations, making their findings less applicable to practical scenarios. To address these challenges, we introduce CEBench, an open-source toolkit specifically designed for multi-objective benchmarking that focuses on the critical trade-offs between expenditure and effectiveness required for LLM deployments. CEBench allows for easy modifications through configuration files, enabling stakeholders to effectively assess and optimize these trade-offs. This strategic capability supports crucial decision-making processes aimed at maximizing effectiveness while minimizing cost impacts. By streamlining the evaluation process and emphasizing cost-effectiveness, CEBench seeks to facilitate the development of economically viable AI solutions across various industries and research fields. The code and demonstration are available in \url{https://github.com/amademicnoboday12/CEBench}.
[ { "version": "v1", "created": "Thu, 20 Jun 2024 21:36:00 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Sun", "Wenbo", "" ], [ "Wang", "Jiaqi", "" ], [ "Guo", "Qiming", "" ], [ "Li", "Ziyu", "" ], [ "Wang", "Wenlu", "" ], [ "Hai", "Rihan", "" ] ]
2407.12798
Sheng hui Xu
Wenjun Li, Shudong Wang, Dong Zhao, Shenghui Xu, Zhaoming Pan, Zhimin Zhang
Multi-Granularity and Multi-modal Feature Interaction Approach for Text Video Retrieval
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The key of the text-to-video retrieval (TVR) task lies in learning the unique similarity between each pair of text (consisting of words) and video (consisting of audio and image frames) representations. However, some problems exist in the representation alignment of video and text, such as a text, and further each word, are of different importance for video frames. Besides, audio usually carries additional or critical information for TVR in the case that frames carry little valid information. Therefore, in TVR task, multi-granularity representation of text, including whole sentence and every word, and the modal of audio are salutary which are underutilized in most existing works. To address this, we propose a novel multi-granularity feature interaction module called MGFI, consisting of text-frame and word-frame, for video-text representations alignment. Moreover, we introduce a cross-modal feature interaction module of audio and text called CMFI to solve the problem of insufficient expression of frames in the video. Experiments on benchmark datasets such as MSR-VTT, MSVD, DiDeMo show that the proposed method outperforms the existing state-of-the-art methods.
[ { "version": "v1", "created": "Fri, 21 Jun 2024 02:28:06 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Li", "Wenjun", "" ], [ "Wang", "Shudong", "" ], [ "Zhao", "Dong", "" ], [ "Xu", "Shenghui", "" ], [ "Pan", "Zhaoming", "" ], [ "Zhang", "Zhimin", "" ] ]
2407.12799
Jonas Vogt
Jonas Vogt
A comprehensive overview of the protocols associated with Intelligent Transportation Systems
39 pages, 1 figure
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-nd/4.0/
This white paper offers a comprehensive overview of the protocols utilized in the field of intelligent transportation systems (ITS). The paper presents a comprehensive overview of protocols from all layers of the Open System Interconnection (OSI) model. The protocols encompass a range of communication technologies, including ad-hoc, mobile broadband, and fiber-optic cable. All of these protocols are utilized in the field of intelligent transportation systems (ITS) and must exchange information at some point. The current development leads to a much tighter connection between ecosystems that were previously isolated or not connected. This situation necessitates a comprehensive understanding of the protocols at all layers to ensure the establishment of safe and secure applications within the field of intelligent transportation systems (ITS).
[ { "version": "v1", "created": "Fri, 21 Jun 2024 11:53:26 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Vogt", "Jonas", "" ] ]
2407.12800
Jo\~ao Madeiras Pereira
Edgar Santos, Claudia Ribeiro, Manuel Fradinho and Jo\~ao Pereira
Digital Storytelling for Competence Development in Games
null
null
null
null
cs.HC cs.GR
http://creativecommons.org/licenses/by/4.0/
The acquisition of complex knowledge and competences raises difficult challenges for the supporting tools within the corporate environment, which digital storytelling presents a potential solution. Traditionally, a driving goal of digital storytelling is the generation of dramatic stories with human significance, but for learning purposes, the need for drama is complemented by the requirement of achieving particular learning outcomes. This paper presents a narrative engine that supports emergent storytelling to support the development of complex competences in the learning domains of project management and innovation. The approach is based on the adaptation on the Fabula model combined with cases representing situated contexts associated to particular competences. These cases are then triggered to influence the unfolding of the story such that a learner encounters dramatic points in the narrative where the associated competences need to be used. In addition to the description of the approach and corresponding narrative engine, an illustration is presented of how the competence 'conflict management' influences a story.
[ { "version": "v1", "created": "Fri, 21 Jun 2024 17:06:58 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Santos", "Edgar", "" ], [ "Ribeiro", "Claudia", "" ], [ "Fradinho", "Manuel", "" ], [ "Pereira", "João", "" ] ]
2407.12801
Rajesh Ranjan
Shailja Gupta, Rajesh Ranjan
Evaluation of LLMs Biases Towards Elite Universities: A Persona-Based Exploration
14 pages, 4 Figures
null
null
null
cs.CY cs.HC
http://creativecommons.org/licenses/by/4.0/
Elite universities are a dream destination for not just students but also top employers who get a supply of amazing talents. When we hear about top universities, the first thing that comes to mind is their academic rigor, prestigious reputation, and highly successful alumni. However, society at large is not just represented by a few elite universities, but several others. We have seen several examples where many, even without formal education, built big businesses. There are various instances in which several people, however talented, couldn't make it to top elite universities because of several resource constraints. For recruitment of candidates, we do see candidates from a few elite universities well represented in top technology companies. However, we found during our study that LLMs go overboard in representing that. Why is it a problem, though? LLMs are now becoming mainstream and may play a role in evaluating candidates' relevance in the recruitment process across industries. Our study investigates whether LLMs are biased toward Elite universities like Stanford University, Harvard University, University of California, Berkley, and MIT. Our research compares the performance of three popular large language models by adopting a novel persona-based approach and compares the predicted educational backgrounds of professionals in the technology industry with actual data collected from LinkedIn. Specifically, we examined GPT-3.5, Gemini, and Claude 3 Sonnet predictions for job positions such as VP Product, Director of Product, Product Manager, VP Engineering, Director of Engineering, and Software Engineer at Microsoft, Meta, and Google. We noticed biases in LLMs' prediction of educational backgrounds. We are confident that our research will propel the study of LLM biases and our suggested strategies could mitigate biases in LLM-based use cases and applications.
[ { "version": "v1", "created": "Mon, 24 Jun 2024 04:09:03 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Gupta", "Shailja", "" ], [ "Ranjan", "Rajesh", "" ] ]
2407.12802
Xu Yang
Xu Yang, Gopi Krishnan Rajbahadur, Dayi Lin, Shaowei Wang, Zhen Ming (Jack) Jiang
SimClone: Detecting Tabular Data Clones using Value Similarity
24 pages, 9 figures
null
null
null
cs.DB cs.AI cs.LG cs.SE
http://creativecommons.org/licenses/by/4.0/
Data clones are defined as multiple copies of the same data among datasets. Presence of data clones between datasets can cause issues such as difficulties in managing data assets and data license violations when using datasets with clones to build AI software. However, detecting data clones is not trivial. Majority of the prior studies in this area rely on structural information to detect data clones (e.g., font size, column header). However, tabular datasets used to build AI software are typically stored without any structural information. In this paper, we propose a novel method called SimClone for data clone detection in tabular datasets without relying on structural information. SimClone method utilizes value similarities for data clone detection. We also propose a visualization approach as a part of our SimClone method to help locate the exact position of the cloned data between a dataset pair. Our results show that our SimClone outperforms the current state-of-the-art method by at least 20\% in terms of both F1-score and AUC. In addition, SimClone's visualization component helps identify the exact location of the data clone in a dataset with a Precision@10 value of 0.80 in the top 20 true positive predictions.
[ { "version": "v1", "created": "Mon, 24 Jun 2024 04:16:32 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Yang", "Xu", "", "Jack" ], [ "Rajbahadur", "Gopi Krishnan", "", "Jack" ], [ "Lin", "Dayi", "", "Jack" ], [ "Wang", "Shaowei", "", "Jack" ], [ "Ming", "Zhen", "", "Jack" ], [ "Jiang", "", "" ] ]
2407.12803
Karim Armanious
Karim Armanious, Maurice Quach, Michael Ulrich, Timo Winterling, Johannes Friesen, Sascha Braun, Daniel Jenet, Yuri Feldman, Eitan Kosman, Philipp Rapp, Volker Fischer, Marc Sons, Lukas Kohns, Daniel Eckstein, Daniela Egbert, Simone Letsch, Corinna Voege, Felix Huttner, Alexander Bartler, Robert Maiwald, Yancong Lin, Ulf R\"uegg, Claudius Gl\"aser, Bastian Bischoff, Jascha Freess, Karsten Haug, Kathrin Klee, and Holger Caesar
Bosch Street Dataset: A Multi-Modal Dataset with Imaging Radar for Automated Driving
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
This paper introduces the Bosch street dataset (BSD), a novel multi-modal large-scale dataset aimed at promoting highly automated driving (HAD) and advanced driver-assistance systems (ADAS) research. Unlike existing datasets, BSD offers a unique integration of high-resolution imaging radar, lidar, and camera sensors, providing unprecedented 360-degree coverage to bridge the current gap in high-resolution radar data availability. Spanning urban, rural, and highway environments, BSD enables detailed exploration into radar-based object detection and sensor fusion techniques. The dataset is aimed at facilitating academic and research collaborations between Bosch and current and future partners. This aims to foster joint efforts in developing cutting-edge HAD and ADAS technologies. The paper describes the dataset's key attributes, including its scalability, radar resolution, and labeling methodology. Key offerings also include initial benchmarks for sensor modalities and a development kit tailored for extensive data analysis and performance evaluation, underscoring our commitment to contributing valuable resources to the HAD and ADAS research community.
[ { "version": "v1", "created": "Mon, 24 Jun 2024 14:40:56 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Armanious", "Karim", "" ], [ "Quach", "Maurice", "" ], [ "Ulrich", "Michael", "" ], [ "Winterling", "Timo", "" ], [ "Friesen", "Johannes", "" ], [ "Braun", "Sascha", "" ], [ "Jenet", "Daniel", "" ], [ "Feldman", "Yuri", "" ], [ "Kosman", "Eitan", "" ], [ "Rapp", "Philipp", "" ], [ "Fischer", "Volker", "" ], [ "Sons", "Marc", "" ], [ "Kohns", "Lukas", "" ], [ "Eckstein", "Daniel", "" ], [ "Egbert", "Daniela", "" ], [ "Letsch", "Simone", "" ], [ "Voege", "Corinna", "" ], [ "Huttner", "Felix", "" ], [ "Bartler", "Alexander", "" ], [ "Maiwald", "Robert", "" ], [ "Lin", "Yancong", "" ], [ "Rüegg", "Ulf", "" ], [ "Gläser", "Claudius", "" ], [ "Bischoff", "Bastian", "" ], [ "Freess", "Jascha", "" ], [ "Haug", "Karsten", "" ], [ "Klee", "Kathrin", "" ], [ "Caesar", "Holger", "" ] ]
2407.12804
Katherine Collins
Katherine M. Collins, Valerie Chen, Ilia Sucholutsky, Hannah Rose Kirk, Malak Sadek, Holli Sargeant, Ameet Talwalkar, Adrian Weller, Umang Bhatt
Modulating Language Model Experiences through Frictions
Pre-print, under review
null
null
null
cs.HC cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Language models are transforming the ways that their users engage with the world. Despite impressive capabilities, over-consumption of language model outputs risks propagating unchecked errors in the short-term and damaging human capabilities for critical thinking in the long-term, particularly in knowledge-based tasks. How can we develop scaffolding around language models to curate more appropriate use? We propose selective frictions for language model experiences, inspired by behavioral science interventions, to dampen misuse. Frictions involve small modifications to a user's experience, e.g., the addition of a button impeding model access and reminding a user of their expertise relative to the model. Through a user study with real humans, we observe shifts in user behavior from the imposition of a friction over LLMs in the context of a multi-topic question-answering task as a representative task that people may use LLMs for, e.g., in education and information retrieval. We find that frictions modulate over-reliance by driving down users' click rates while minimally affecting accuracy for those topics. Yet, frictions may have unintended effects. We find marked differences in users' click behaviors even on topics where frictions were not provisioned. Our contributions motivate further study of human-AI behavioral interaction to inform more effective and appropriate LLM use.
[ { "version": "v1", "created": "Mon, 24 Jun 2024 16:31:11 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Collins", "Katherine M.", "" ], [ "Chen", "Valerie", "" ], [ "Sucholutsky", "Ilia", "" ], [ "Kirk", "Hannah Rose", "" ], [ "Sadek", "Malak", "" ], [ "Sargeant", "Holli", "" ], [ "Talwalkar", "Ameet", "" ], [ "Weller", "Adrian", "" ], [ "Bhatt", "Umang", "" ] ]
2407.12805
Anwaar Ulhaq Dr
Anwaar Ulhaq
Dark Transformer: A Video Transformer for Action Recognition in the Dark
8 Figures, 12 Pages
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Recognizing human actions in adverse lighting conditions presents significant challenges in computer vision, with wide-ranging applications in visual surveillance and nighttime driving. Existing methods tackle action recognition and dark enhancement separately, limiting the potential for end-to-end learning of spatiotemporal representations for video action classification. This paper introduces Dark Transformer, a novel video transformer-based approach for action recognition in low-light environments. Dark Transformer leverages spatiotemporal self-attention mechanisms in cross-domain settings to enhance cross-domain action recognition. By extending video transformers to learn cross-domain knowledge, Dark Transformer achieves state-of-the-art performance on benchmark action recognition datasets, including InFAR, XD145, and ARID. The proposed approach demonstrates significant promise in addressing the challenges of action recognition in adverse lighting conditions, offering practical implications for real-world applications.
[ { "version": "v1", "created": "Tue, 25 Jun 2024 01:25:12 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Ulhaq", "Anwaar", "" ] ]
2407.12806
Komal S
Komal
Advanced Mathematical Modelling for Energy-Efficient Data Transmission and Fusion in Wireless Sensor Networks
18 pages, 8 Figures, 3 Tables
null
null
null
cs.NI eess.SP
http://creativecommons.org/licenses/by/4.0/
Wireless Sensor Networks (WSNs) are indispensable for data-intensive applications, necessitating efficient energy management and robust data fusion techniques. This paper proposes an integrated framework leveraging fuzzy logic and backpropagation neural networks (BPNN) to enhance energy efficiency and data accuracy in WSNs. The model focuses on optimizing Cluster Head (CH) selection using fuzzy logic, considering parameters such as energy levels, proximity to the base station, and local density centrality. A Minimum Spanning Tree (MST) algorithm is employed for energy-efficient data transmission from sensor nodes to CHs, minimizing energy consumption during data routing. BPNN-based data fusion at CHs reduces redundant data transmissions to the base station, thereby optimizing energy utilization and enhancing overall network performance. Simulation results demonstrate substantial improvements over conventional methods, including a 30% increase in network longevity, 25% improvement in data accuracy, and a 40% reduction in energy consumption. These gains are attributed to the intelligent CH selection strategy enabled by fuzzy logic, which ensures efficient resource allocation and minimizes energy wastage. The effectiveness of the proposed approach is validated through comprehensive simulations, showcasing its ability to prolong network lifetime, maintain data integrity, and improve energy efficiency. The integration of fuzzy logic and BPNN not only addresses the challenges of energy management and data fusion in WSNs but also provides a scalable and adaptable framework for future applications requiring reliable and sustainable sensor network operations. The source code is available at https://github.com/hikomal/BPNN_WSN.git
[ { "version": "v1", "created": "Tue, 25 Jun 2024 11:56:43 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Komal", "", "" ] ]
2407.12807
Md Abdul Baset Sarker
Md Abdul Baset Sarker, Juan Pablo S. Sola, Aaron Jones, Evan Laing, Ernesto Sola-Thomas, Masudul H. Imtiaz
Vision Controlled Sensorized Prosthetic Hand
null
null
null
null
cs.HC cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
This paper presents a sensorized vision-enabled prosthetic hand aimed at replicating a natural hand's performance, functionality, appearance, and comfort. The design goal was to create an accessible substitution with a user-friendly interface requiring little to no training. Our mechanical hand uses a camera and embedded processors to perform most of these tasks. The interfaced pressure sensor is used to get pressure feedback and ensure a safe grasp of the object; an accelerometer is used to detect gestures and release the object. Unlike current EMG-based designs, the prototyped hand does not require personalized training. The details of the design, trade-offs, results, and informing the next iteration are presented in this paper.
[ { "version": "v1", "created": "Tue, 25 Jun 2024 14:44:04 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Sarker", "Md Abdul Baset", "" ], [ "Sola", "Juan Pablo S.", "" ], [ "Jones", "Aaron", "" ], [ "Laing", "Evan", "" ], [ "Sola-Thomas", "Ernesto", "" ], [ "Imtiaz", "Masudul H.", "" ] ]
2407.12808
John Violos
John Violos, Symeon Papadopoulos, Ioannis Kompatsiaris
Towards Optimal Trade-offs in Knowledge Distillation for CNNs and Vision Transformers at the Edge
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
This paper discusses four facets of the Knowledge Distillation (KD) process for Convolutional Neural Networks (CNNs) and Vision Transformer (ViT) architectures, particularly when executed on edge devices with constrained processing capabilities. First, we conduct a comparative analysis of the KD process between CNNs and ViT architectures, aiming to elucidate the feasibility and efficacy of employing different architectural configurations for the teacher and student, while assessing their performance and efficiency. Second, we explore the impact of varying the size of the student model on accuracy and inference speed, while maintaining a constant KD duration. Third, we examine the effects of employing higher resolution images on the accuracy, memory footprint and computational workload. Last, we examine the performance improvements obtained by fine-tuning the student model after KD to specific downstream tasks. Through empirical evaluations and analyses, this research provides AI practitioners with insights into optimal strategies for maximizing the effectiveness of the KD process on edge devices.
[ { "version": "v1", "created": "Tue, 25 Jun 2024 16:15:02 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Violos", "John", "" ], [ "Papadopoulos", "Symeon", "" ], [ "Kompatsiaris", "Ioannis", "" ] ]
2407.12809
Taha Hassan
Taha Hassan, Bob Edmison, Daron Williams, Larry Cox II, Matthew Louvet, Bart Knijnenburg, D. Scott McCrickard
Simplify, Consolidate, Intervene: Facilitating Institutional Support with Mental Models of Learning Management System Use
CSCW 2024 (accepted for publication)
null
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-nd/4.0/
Measuring instructors' adoption of learning management system (LMS) tools is a critical first step in evaluating the efficacy of online teaching and learning at scale. Existing models for LMS adoption are often qualitative, learner-centered, and difficult to leverage towards institutional support. We propose depth-of-use (DOU): an intuitive measurement model for faculty's utilization of a university-wide LMS and their needs for institutional support. We hypothesis-test the relationship between DOU and course attributes like modality, participation, logistics, and outcomes. In a large-scale analysis of metadata from 30000+ courses offered at Virginia Tech over two years, we find that a pervasive need for scale, interoperability and ubiquitous access drives LMS adoption by university instructors. We then demonstrate how DOU can help faculty members identify the opportunity-cost of transition from legacy apps to LMS tools. We also describe how DOU can help instructional designers and IT organizational leadership evaluate the impact of their support allocation, faculty development and LMS evangelism initiatives.
[ { "version": "v1", "created": "Wed, 26 Jun 2024 03:47:32 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Hassan", "Taha", "" ], [ "Edmison", "Bob", "" ], [ "Williams", "Daron", "" ], [ "Cox", "Larry", "II" ], [ "Louvet", "Matthew", "" ], [ "Knijnenburg", "Bart", "" ], [ "McCrickard", "D. Scott", "" ] ]
2407.12810
Abel C. H. Chen
Abel C. H. Chen, Chia-Shen Chang
A Study on the Situation of Connected Car Patent Portfolios
in Chinese language
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, the countries of the world have drafted the specifications of connected cars; for instance, the Security Credential Management System (SCMS) has been proposed by United States Department of Transportation (USDOT), and the Cooperative Intelligent Transportation System (C-ITS) Credential Management System (CCMS) has been proposed by European Union (EU). Therefore, several companies have developed the technology and productions of connected cars based on specifications, and connected car patent portfolios have been proactively performed. Therefore, this study uses Patent Search System (PSS) to find and analyze the contents of patents for obtaining the innovation reports of connected cars according to patents. This study considers the single-factor and two-factors to analyze the relationships of annuals, major technology leaders, major market leaders, and major technology and applications for exploring the patent portfolios of technology leaders and market leaders in connected cars.
[ { "version": "v1", "created": "Wed, 26 Jun 2024 04:04:02 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Chen", "Abel C. H.", "" ], [ "Chang", "Chia-Shen", "" ] ]
2407.12811
Ori Henderson-Sapir
Antreas Theodosiou, Ori Henderson-Sapir, Yauhen Baravets, Oliver T. Cobcroft, Samuel M. Sentschuk, Jack A. Stone, David J. Ottaway, and Pavel Peterka
Understanding the temperature conditions for controlled splicing between silica and fluoride fibers
* Authors contributed equally
null
null
null
physics.optics
http://creativecommons.org/licenses/by/4.0/
This study explores the efficacy of thermal splicing conditions between silica and zirconium-fluoride fibers, focusing on achieving mechanical strength between the two fibers. A comprehensive characterization of the thermal profile in the hot zone of the filament splicer was conducted using a fiber Bragg grating, providing valuable insights into its stability and overall performance. Results demonstrate mechanically strong joints and suggest a very narrow temperature window to achieve strong connection between the two materials. Moreover, we characterize the surface composition of the ZrF4 fiber using energy dispersive spectroscopy following splicing at ideal temperatures, as well as at higher and lower temperatures. This work paves the way towards future implementation of silica and fluoride fibers splicing using alternative splicing solutions such as CO2 laser system while raising interesting facts for further studies in the specific field.
[ { "version": "v1", "created": "Thu, 27 Jun 2024 02:57:35 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Theodosiou", "Antreas", "" ], [ "Henderson-Sapir", "Ori", "" ], [ "Baravets", "Yauhen", "" ], [ "Cobcroft", "Oliver T.", "" ], [ "Sentschuk", "Samuel M.", "" ], [ "Stone", "Jack A.", "" ], [ "Ottaway", "David J.", "" ], [ "Peterka", "Pavel", "" ] ]
2407.12812
Maike Sonnewald
Katherine A. Rosenfeld, Maike Sonnewald, Sonia J. Jindal, Kevin A. McCarthy, Joshua L. Proctor
Building Understandable Messaging for Policy and Evidence Review (BUMPER) with AI
21 pages, 6 figures
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
We introduce a framework for the use of large language models (LLMs) in Building Understandable Messaging for Policy and Evidence Review (BUMPER). LLMs are proving capable of providing interfaces for understanding and synthesizing large databases of diverse media. This presents an exciting opportunity to supercharge the translation of scientific evidence into policy and action, thereby improving livelihoods around the world. However, these models also pose challenges related to access, trust-worthiness, and accountability. The BUMPER framework is built atop a scientific knowledge base (e.g., documentation, code, survey data) by the same scientists (e.g., individual contributor, lab, consortium). We focus on a solution that builds trustworthiness through transparency, scope-limiting, explicit-checks, and uncertainty measures. LLMs are rapidly being adopted and consequences are poorly understood. The framework addresses open questions regarding the reliability of LLMs and their use in high-stakes applications. We provide a worked example in health policy for a model designed to inform measles control programs. We argue that this framework can facilitate accessibility of and confidence in scientific evidence for policymakers, drive a focus on policy-relevance and translatability for researchers, and ultimately increase and accelerate the impact of scientific knowledge used for policy decisions.
[ { "version": "v1", "created": "Thu, 27 Jun 2024 05:03:03 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Rosenfeld", "Katherine A.", "" ], [ "Sonnewald", "Maike", "" ], [ "Jindal", "Sonia J.", "" ], [ "McCarthy", "Kevin A.", "" ], [ "Proctor", "Joshua L.", "" ] ]
2407.12813
Yinheng Li
Yinheng Li, Rogerio Bonatti, Sara Abdali, Justin Wagle, Kazuhito Koishida
Data Generation using Large Language Models for Text Classification: An Empirical Case Study
Accepted by DMLR @ ICML 2024
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
Using Large Language Models (LLMs) to generate synthetic data for model training has become increasingly popular in recent years. While LLMs are capable of producing realistic training data, the effectiveness of data generation is influenced by various factors, including the choice of prompt, task complexity, and the quality, quantity, and diversity of the generated data. In this work, we focus exclusively on using synthetic data for text classification tasks. Specifically, we use natural language understanding (NLU) models trained on synthetic data to assess the quality of synthetic data from different generation approaches. This work provides an empirical analysis of the impact of these factors and offers recommendations for better data generation practices.
[ { "version": "v1", "created": "Thu, 27 Jun 2024 21:41:43 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Li", "Yinheng", "" ], [ "Bonatti", "Rogerio", "" ], [ "Abdali", "Sara", "" ], [ "Wagle", "Justin", "" ], [ "Koishida", "Kazuhito", "" ] ]
2407.12814
Priyanshu Priya
Priyanshu Priya, Mauajama Firdaus, Asif Ekbal
Computational Politeness in Natural Language Processing: A Survey
Manuscript accepted at the ACM Computing Surveys (DOI: https://doi.org/10.1145/3654660)
ACM Comput. Surv. 56, 9, Article 241 (May 2024)
10.1145/3654660
null
cs.CL cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
Computational approach to politeness is the task of automatically predicting and generating politeness in text. This is a pivotal task for conversational analysis, given the ubiquity and challenges of politeness in interactions. The computational approach to politeness has witnessed great interest from the conversational analysis community. This article is a compilation of past works in computational politeness in natural language processing. We view four milestones in the research so far, viz. supervised and weakly-supervised feature extraction to identify and induce politeness in a given text, incorporation of context beyond the target text, study of politeness across different social factors, and study the relationship between politeness and various sociolinguistic cues. In this article, we describe the datasets, approaches, trends, and issues in computational politeness research. We also discuss representative performance values and provide pointers to future works, as given in the prior works. In terms of resources to understand the state-of-the-art, this survey presents several valuable illustrations, most prominently, a table summarizing the past papers along different dimensions, such as the types of features, annotation techniques, and datasets used.
[ { "version": "v1", "created": "Fri, 28 Jun 2024 06:46:36 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Priya", "Priyanshu", "" ], [ "Firdaus", "Mauajama", "" ], [ "Ekbal", "Asif", "" ] ]
2407.12815
Shanu Sushmita
Anjali Rawal, Hui Wang, Youjia Zheng, Yu-Hsuan Lin, Shanu Sushmita
SMLT-MUGC: Small, Medium, and Large Texts -- Machine versus User-Generated Content Detection and Comparison
null
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by/4.0/
Large language models (LLMs) have gained significant attention due to their ability to mimic human language. Identifying texts generated by LLMs is crucial for understanding their capabilities and mitigating potential consequences. This paper analyzes datasets of varying text lengths: small, medium, and large. We compare the performance of machine learning algorithms on four datasets: (1) small (tweets from Election, FIFA, and Game of Thrones), (2) medium (Wikipedia introductions and PubMed abstracts), and (3) large (OpenAI web text dataset). Our results indicate that LLMs with very large parameters (such as the XL-1542 variant of GPT2 with 1542 million parameters) were harder (74%) to detect using traditional machine learning methods. However, detecting texts of varying lengths from LLMs with smaller parameters (762 million or less) can be done with high accuracy (96% and above). We examine the characteristics of human and machine-generated texts across multiple dimensions, including linguistics, personality, sentiment, bias, and morality. Our findings indicate that machine-generated texts generally have higher readability and closely mimic human moral judgments but differ in personality traits. SVM and Voting Classifier (VC) models consistently achieve high performance across most datasets, while Decision Tree (DT) models show the lowest performance. Model performance drops when dealing with rephrased texts, particularly shorter texts like tweets. This study underscores the challenges and importance of detecting LLM-generated texts and suggests directions for future research to improve detection methods and understand the nuanced capabilities of LLMs.
[ { "version": "v1", "created": "Fri, 28 Jun 2024 22:19:01 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Rawal", "Anjali", "" ], [ "Wang", "Hui", "" ], [ "Zheng", "Youjia", "" ], [ "Lin", "Yu-Hsuan", "" ], [ "Sushmita", "Shanu", "" ] ]
2407.12816
Fabrizio Riguzzi PhD
Fabrizio Riguzzi
Quantum Algorithms for Weighted Constrained Sampling and Weighted Model Counting
Under submission
null
null
null
quant-ph cs.AI
http://creativecommons.org/licenses/by/4.0/
We consider the problems of weighted constrained sampling and weighted model counting, where we are given a propositional formula and a weight for each world. The first problem consists of sampling worlds with a probability proportional to their weight given that the formula is satisfied. The latter is the problem of computing the sum of the weights of the models of the formula. Both have applications in many fields such as probabilistic reasoning, graphical models, statistical physics, statistics and hardware verification. In this article, we propose QWCS and QWMC, quantum algorithms for performing weighted constrained sampling and weighted model counting, respectively. Both are based on the quantum search/quantum model counting algorithms that are modified to take into account the weights. In the black box model of computation, where we can only query an oracle for evaluating the Boolean function given an assignment, QWCS requires $O(2^{\frac{n}{2}}+1/\sqrt{\text{WMC}})$ oracle calls, where where $n$ is the number of Boolean variables and $\text{WMC}$ is the normalized between 0 and 1 weighted model count of the formula, while a classical algorithm has a complexity of $\Omega(1/\text{WMC})$. QWMC takes $\Theta(2^{\frac{n}{2}})$ oracle calss, while classically the best complexity is $\Theta(2^n)$, thus achieving a quadratic speedup.
[ { "version": "v1", "created": "Sat, 29 Jun 2024 09:44:44 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Riguzzi", "Fabrizio", "" ] ]
2407.12817
Hao Shi
Yuchun Shu, Bo Hu, Yifeng He, Hao Shi, Longbiao Wang, Jianwu Dang
Error Correction by Paying Attention to Both Acoustic and Confidence References for Automatic Speech Recognition
null
null
null
null
cs.CL cs.SD eess.AS
http://creativecommons.org/licenses/by/4.0/
Accurately finding the wrong words in the automatic speech recognition (ASR) hypothesis and recovering them well-founded is the goal of speech error correction. In this paper, we propose a non-autoregressive speech error correction method. A Confidence Module measures the uncertainty of each word of the N-best ASR hypotheses as the reference to find the wrong word position. Besides, the acoustic feature from the ASR encoder is also used to provide the correct pronunciation references. N-best candidates from ASR are aligned using the edit path, to confirm each other and recover some missing character errors. Furthermore, the cross-attention mechanism fuses the information between error correction references and the ASR hypothesis. The experimental results show that both the acoustic and confidence references help with error correction. The proposed system reduces the error rate by 21% compared with the ASR model.
[ { "version": "v1", "created": "Sat, 29 Jun 2024 17:56:28 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Shu", "Yuchun", "" ], [ "Hu", "Bo", "" ], [ "He", "Yifeng", "" ], [ "Shi", "Hao", "" ], [ "Wang", "Longbiao", "" ], [ "Dang", "Jianwu", "" ] ]
2407.12818
Dishank Aggarwal
Dishank Aggarwal, Pushpak Bhattacharyya, Bhaskaran Raman
"I understand why I got this grade": Automatic Short Answer Grading with Feedback
null
null
null
null
cs.CL cs.AI cs.CY
http://creativecommons.org/licenses/by/4.0/
The demand for efficient and accurate assessment methods has intensified as education systems transition to digital platforms. Providing feedback is essential in educational settings and goes beyond simply conveying marks as it justifies the assigned marks. In this context, we present a significant advancement in automated grading by introducing Engineering Short Answer Feedback (EngSAF) -- a dataset of 5.8k student answers accompanied by reference answers and questions for the Automatic Short Answer Grading (ASAG) task. The EngSAF dataset is meticulously curated to cover a diverse range of subjects, questions, and answer patterns from multiple engineering domains. We leverage state-of-the-art large language models' (LLMs) generative capabilities with our Label-Aware Synthetic Feedback Generation (LASFG) strategy to include feedback in our dataset. This paper underscores the importance of enhanced feedback in practical educational settings, outlines dataset annotation and feedback generation processes, conducts a thorough EngSAF analysis, and provides different LLMs-based zero-shot and finetuned baselines for future comparison. Additionally, we demonstrate the efficiency and effectiveness of the ASAG system through its deployment in a real-world end-semester exam at the Indian Institute of Technology Bombay (IITB), showcasing its practical viability and potential for broader implementation in educational institutions.
[ { "version": "v1", "created": "Sun, 30 Jun 2024 15:42:18 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Aggarwal", "Dishank", "" ], [ "Bhattacharyya", "Pushpak", "" ], [ "Raman", "Bhaskaran", "" ] ]
2407.12819
Vlad-Andrei B\u{a}doiu
Alexandru M. Gherghescu, Vlad-Andrei B\u{a}doiu, Alexandru Agache, Mihai-Valentin Dumitru, Iuliu Vasilescu, Radu Mantu, Costin Raiciu
A Look Into Training Large Language Models on Next Generation Datacenters
null
null
null
null
cs.DC cs.CL cs.LG cs.NI
http://creativecommons.org/licenses/by/4.0/
Is it still worth doing computer networking research? What are relevant problems in this space given the supremacy of hyperscalers in deployed large networks? We take an unconventional approach to finding relevant research directions, by starting from Microsoft's plans to build a $100 billion datacenter for ML. Our goal is to understand what models could be trained in such a datacenter, as well as the high-level challenges one may encounter in doing so. We first examine the constraints imposed by cooling and power requirements for our target datacenter and find that it is infeasible to build in a single location. We use LLM scaling laws to determine that we could train models of 50T or 100T. Finally, we examine how distributed training might work for these models, and what the networking requirements are. We conclude that building the datacenter and training such models is technically possible, but this requires a novel NIC-based multipath transport along with a redesign of the entire training stack, outlining a research agenda for our community in the near future.
[ { "version": "v1", "created": "Mon, 1 Jul 2024 10:33:46 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Gherghescu", "Alexandru M.", "" ], [ "Bădoiu", "Vlad-Andrei", "" ], [ "Agache", "Alexandru", "" ], [ "Dumitru", "Mihai-Valentin", "" ], [ "Vasilescu", "Iuliu", "" ], [ "Mantu", "Radu", "" ], [ "Raiciu", "Costin", "" ] ]
2407.12820
Hailin Zhang
Hailin Zhang, Xiaodong Ji, Yilin Chen, Fangcheng Fu, Xupeng Miao, Xiaonan Nie, Weipeng Chen, Bin Cui
PQCache: Product Quantization-based KVCache for Long Context LLM Inference
null
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the field of Large Language Models (LLMs) continues to evolve, the context length in inference is steadily growing. Key-Value Cache (KVCache), a crucial component in LLM inference, has now become the primary memory bottleneck due to limited GPU memory. Current methods selectively determine suitable keys and values for self-attention computation in LLMs to address the issue. However, they either fall short in maintaining model quality or result in high serving latency. Drawing inspiration from advanced embedding retrieval techniques used in the database community, we consider the storage and searching of KVCache as a typical embedding retrieval problem. We propose PQCache, which employs Product Quantization (PQ) to manage KVCache, maintaining model quality while ensuring low serving latency. During the prefilling phase, we apply PQ to tokens' keys for each LLM layer and head. During the autoregressive decoding phase, for each newly generated token, we first identify important tokens through Maximum Inner-Product Search (MIPS) using PQ codes and centroids, then fetch the corresponding key-value pairs for self-attention computation. Through meticulous design of overlapping and caching, we minimize any additional computation and communication overhead during both phases. Extensive experiments show that PQCache achieves both effectiveness and efficiency. It maintains model quality even when only 1/5 of the tokens are involved in attention, while attaining acceptable system latency.
[ { "version": "v1", "created": "Mon, 1 Jul 2024 13:05:42 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Zhang", "Hailin", "" ], [ "Ji", "Xiaodong", "" ], [ "Chen", "Yilin", "" ], [ "Fu", "Fangcheng", "" ], [ "Miao", "Xupeng", "" ], [ "Nie", "Xiaonan", "" ], [ "Chen", "Weipeng", "" ], [ "Cui", "Bin", "" ] ]
2407.12821
Yongfeng Zhang
Zelong Li, Shuyuan Xu, Kai Mei, Wenyue Hua, Balaji Rama, Om Raheja, Hao Wang, He Zhu, Yongfeng Zhang
AutoFlow: Automated Workflow Generation for Large Language Model Agents
Open source code available at https://github.com/agiresearch/AutoFlow
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advancements in Large Language Models (LLMs) have shown significant progress in understanding complex natural language. One important application of LLM is LLM-based AI Agent, which leverages the ability of LLM as well as external tools for complex-task solving. To make sure LLM Agents follow an effective and reliable procedure to solve the given task, manually designed workflows are usually used to guide the working mechanism of agents. However, manually designing the workflows requires considerable efforts and domain knowledge, making it difficult to develop and deploy agents on massive scales. To address these issues, we propose AutoFlow, a framework designed to automatically generate workflows for agents to solve complex tasks. AutoFlow takes natural language program as the format of agent workflow and employs a workflow optimization procedure to iteratively optimize the workflow quality. Besides, this work offers two workflow generation methods: fine-tuning-based and in-context-based methods, making the AutoFlow framework applicable to both open-source and closed-source LLMs. Experimental results show that our framework can produce robust and reliable agent workflows. We believe that the automatic generation and interpretation of workflows in natural language represent a promising paradigm for solving complex tasks, particularly with the rapid development of LLMs. The source code of this work is available at https://github.com/agiresearch/AutoFlow.
[ { "version": "v1", "created": "Mon, 1 Jul 2024 21:05:02 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Li", "Zelong", "" ], [ "Xu", "Shuyuan", "" ], [ "Mei", "Kai", "" ], [ "Hua", "Wenyue", "" ], [ "Rama", "Balaji", "" ], [ "Raheja", "Om", "" ], [ "Wang", "Hao", "" ], [ "Zhu", "He", "" ], [ "Zhang", "Yongfeng", "" ] ]
2407.12822
Kabilan Elangovan
Kabilan Elangovan, Jasmine Chiat Ling Ong, Liyuan Jin, Benjamin Jun Jie Seng, Yu Heng Kwan, Lit Soo Tan, Ryan Jian Zhong, Justina Koi Li Ma, YuHe Ke, Nan Liu, Kathleen M Giacomini, Daniel Shu Wei Ting
Lightweight Large Language Model for Medication Enquiry: Med-Pal
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/publicdomain/zero/1.0/
Large Language Models (LLMs) have emerged as a potential solution to assist digital health development with patient education, commonly medication-related enquires. We trained and validated Med-Pal, a medication domain-specific LLM-chatbot fine-tuned with a fine-grained and expert curated dataset from a selection of five light-weighted open-source LLMs of smaller parameter size (7 billion or less) regarding computational constraints and prioritizing operational efficiency. A multi-disciplinary team performed a clinical evaluation of LLMs responses using the SCORE criteria, focusing on safety, accuracy, bias, reproducibility, and ease of understanding. Best performing light-weighted LLM was chosen as Med-Pal for further engineering with guard-railing using adversarial prompting. Med-Pal and existing light-weighted LLMs, including pretrained Biomistral and finetuned Meerkat, were validated on an independent dataset on a broad range of medication-related questions (231 in total), 12 different question types across 14 different medication classes. Mistral-7b emerged as the top performer among selected lightweight LLMs, achieving the highest median score of 14 and 71.9% high-quality responses in accuracy and safety domains, hence chosen as the backbone LLM for Med-Pal. When compared against Biomistral, Med-pal outperformed in generating responses appropriate for patient communication, with significant reductions bias and errors typical of general LLMs. Comparable performance was observed when comparing Med-Pal with Meerkat. Med-Pal showcases the feasibility of developing and employing fine-tuned light-weighted LLMs to enhance digital health communications.
[ { "version": "v1", "created": "Tue, 2 Jul 2024 03:32:39 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Elangovan", "Kabilan", "" ], [ "Ong", "Jasmine Chiat Ling", "" ], [ "Jin", "Liyuan", "" ], [ "Seng", "Benjamin Jun Jie", "" ], [ "Kwan", "Yu Heng", "" ], [ "Tan", "Lit Soo", "" ], [ "Zhong", "Ryan Jian", "" ], [ "Ma", "Justina Koi Li", "" ], [ "Ke", "YuHe", "" ], [ "Liu", "Nan", "" ], [ "Giacomini", "Kathleen M", "" ], [ "Ting", "Daniel Shu Wei", "" ] ]
2407.12823
Kangyun Ning
Kangyun Ning, Yisong Su, Xueqiang Lv, Yuanzhe Zhang, Jian Liu, Kang Liu and Jinan Xu
WTU-EVAL: A Whether-or-Not Tool Usage Evaluation Benchmark for Large Language Models
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
Although Large Language Models (LLMs) excel in NLP tasks, they still need external tools to extend their ability. Current research on tool learning with LLMs often assumes mandatory tool use, which does not always align with real-world situations, where the necessity for tools is uncertain, and incorrect or unnecessary use of tools can damage the general abilities of LLMs. Therefore, we propose to explore whether LLMs can discern their ability boundaries and use tools flexibly. We then introduce the Whether-or-not tool usage Evaluation benchmark (WTU-Eval) to assess LLMs with eleven datasets, where six of them are tool-usage datasets, and five are general datasets. LLMs are prompted to use tools according to their needs. The results of eight LLMs on WTU-Eval reveal that LLMs frequently struggle to determine tool use in general datasets, and LLMs' performance in tool-usage datasets improves when their ability is similar to ChatGPT. In both datasets, incorrect tool usage significantly impairs LLMs' performance. To mitigate this, we also develop the finetuning dataset to enhance tool decision-making. Fine-tuning Llama2-7B results in a 14\% average performance improvement and a 16.8\% decrease in incorrect tool usage. We will release the WTU-Eval benchmark.
[ { "version": "v1", "created": "Tue, 2 Jul 2024 12:07:38 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Ning", "Kangyun", "" ], [ "Su", "Yisong", "" ], [ "Lv", "Xueqiang", "" ], [ "Zhang", "Yuanzhe", "" ], [ "Liu", "Jian", "" ], [ "Liu", "Kang", "" ], [ "Xu", "Jinan", "" ] ]
2407.12824
Xavier Suau Cuadros
Xavier Suau, Pieter Delobelle, Katherine Metcalf, Armand Joulin, Nicholas Apostoloff, Luca Zappella, Pau Rodr\'iguez
Whispering Experts: Neural Interventions for Toxicity Mitigation in Language Models
ICML 2024, 8 pages + appendix
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
An important issue with Large Language Models (LLMs) is their undesired ability to generate toxic language. In this work, we show that the neurons responsible for toxicity can be determined by their power to discriminate toxic sentences, and that toxic language can be mitigated by reducing their activation levels proportionally to this power. We propose AUROC adaptation (AurA), an intervention that can be applied to any pre-trained LLM to mitigate toxicity. As the intervention is proportional to the ability of each neuron to discriminate toxic content, it is free of any model-dependent hyperparameters. We show that AurA can achieve up to $2.2 \times$ reduction in toxicity with only a $0.72$ perplexity increase. We also show that AurA is effective with models of different scale (from 1.5B to 40B parameters), and its effectiveness in mitigating toxic language, while preserving common-sense zero-shot abilities, holds across all scales. AurA can be combined with pre-prompting strategies, boosting its average mitigation potential from $1.28\times$ to $2.35\times$. Moreover, AurA can counteract adversarial pre-prompts that maliciously elicit toxic content, making it an effective method for deploying safer and less toxic models.
[ { "version": "v1", "created": "Tue, 2 Jul 2024 12:48:29 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Suau", "Xavier", "" ], [ "Delobelle", "Pieter", "" ], [ "Metcalf", "Katherine", "" ], [ "Joulin", "Armand", "" ], [ "Apostoloff", "Nicholas", "" ], [ "Zappella", "Luca", "" ], [ "Rodríguez", "Pau", "" ] ]
2407.12825
Shengjie Li
Shengjie Li, Yinhao Xiao
A Depression Detection Method Based on Multi-Modal Feature Fusion Using Cross-Attention
null
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Depression, a prevalent and serious mental health issue, affects approximately 3.8\% of the global population. Despite the existence of effective treatments, over 75\% of individuals in low- and middle-income countries remain untreated, partly due to the challenge in accurately diagnosing depression in its early stages. This paper introduces a novel method for detecting depression based on multi-modal feature fusion utilizing cross-attention. By employing MacBERT as a pre-training model to extract lexical features from text and incorporating an additional Transformer module to refine task-specific contextual understanding, the model's adaptability to the targeted task is enhanced. Diverging from previous practices of simply concatenating multimodal features, this approach leverages cross-attention for feature integration, significantly improving the accuracy in depression detection and enabling a more comprehensive and precise analysis of user emotions and behaviors. Furthermore, a Multi-Modal Feature Fusion Network based on Cross-Attention (MFFNC) is constructed, demonstrating exceptional performance in the task of depression identification. The experimental results indicate that our method achieves an accuracy of 0.9495 on the test dataset, marking a substantial improvement over existing approaches. Moreover, it outlines a promising methodology for other social media platforms and tasks involving multi-modal processing. Timely identification and intervention for individuals with depression are crucial for saving lives, highlighting the immense potential of technology in facilitating early intervention for mental health issues.
[ { "version": "v1", "created": "Tue, 2 Jul 2024 13:13:35 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Li", "Shengjie", "" ], [ "Xiao", "Yinhao", "" ] ]
2407.12826
Sai Koneru
Elphin Tom Joe and Sai Dileep Koneru and Christine J Kirchhoff
Assessing the Effectiveness of GPT-4o in Climate Change Evidence Synthesis and Systematic Assessments: Preliminary Insights
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
In this research short, we examine the potential of using GPT-4o, a state-of-the-art large language model (LLM) to undertake evidence synthesis and systematic assessment tasks. Traditional workflows for such tasks involve large groups of domain experts who manually review and synthesize vast amounts of literature. The exponential growth of scientific literature and recent advances in LLMs provide an opportunity to complementing these traditional workflows with new age tools. We assess the efficacy of GPT-4o to do these tasks on a sample from the dataset created by the Global Adaptation Mapping Initiative (GAMI) where we check the accuracy of climate change adaptation related feature extraction from the scientific literature across three levels of expertise. Our results indicate that while GPT-4o can achieve high accuracy in low-expertise tasks like geographic location identification, their performance in intermediate and high-expertise tasks, such as stakeholder identification and assessment of depth of the adaptation response, is less reliable. The findings motivate the need for designing assessment workflows that utilize the strengths of models like GPT-4o while also providing refinements to improve their performance on these tasks.
[ { "version": "v1", "created": "Tue, 2 Jul 2024 13:14:57 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Joe", "Elphin Tom", "" ], [ "Koneru", "Sai Dileep", "" ], [ "Kirchhoff", "Christine J", "" ] ]
2407.12827
Yang Yang
Shupeng Zhong, Xinger Li, Shushan Jin, Yang Yang
The Solution for The PST-KDD-2024 OAG-Challenge
null
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce the second-place solution in the KDD-2024 OAG-Challenge paper source tracing track. Our solution is mainly based on two methods, BERT and GCN, and combines the reasoning results of BERT and GCN in the final submission to achieve complementary performance. In the BERT solution, we focus on processing the fragments that appear in the references of the paper, and use a variety of operations to reduce the redundant interference in the fragments, so that the information received by BERT is more refined. In the GCN solution, we map information such as paper fragments, abstracts, and titles to a high-dimensional semantic space through an embedding model, and try to build edges between titles, abstracts, and fragments to integrate contextual relationships for judgment. In the end, our solution achieved a remarkable score of 0.47691 in the competition.
[ { "version": "v1", "created": "Tue, 2 Jul 2024 14:15:05 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Zhong", "Shupeng", "" ], [ "Li", "Xinger", "" ], [ "Jin", "Shushan", "" ], [ "Yang", "Yang", "" ] ]
2407.12828
Jiaxin Qin
Jiaxin Qin, Zixuan Zhang, Chi Han, Manling Li, Pengfei Yu, Heng Ji
Why Does New Knowledge Create Messy Ripple Effects in LLMs?
null
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extensive previous research has focused on post-training knowledge editing (KE) for language models (LMs) to ensure that knowledge remains accurate and up-to-date. One desired property and open question in KE is to let edited LMs correctly handle ripple effects, where LM is expected to answer its logically related knowledge accurately. In this paper, we answer the question of why most KE methods still create messy ripple effects. We conduct extensive analysis and identify a salient indicator, GradSim, that effectively reveals when and why updated knowledge ripples in LMs. GradSim is computed by the cosine similarity between gradients of the original fact and its related knowledge. We observe a strong positive correlation between ripple effect performance and GradSim across different LMs, KE methods, and evaluation metrics. Further investigations into three counter-intuitive failure cases (Negation, Over-Ripple, Multi-Lingual) of ripple effects demonstrate that these failures are often associated with very low GradSim. This finding validates that GradSim is an effective indicator of when knowledge ripples in LMs.
[ { "version": "v1", "created": "Tue, 2 Jul 2024 14:33:44 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Qin", "Jiaxin", "" ], [ "Zhang", "Zixuan", "" ], [ "Han", "Chi", "" ], [ "Li", "Manling", "" ], [ "Yu", "Pengfei", "" ], [ "Ji", "Heng", "" ] ]
2407.12829
Kaiyuan Yang
Zhiyu Chen, Ziyuan Wen, Weier Wan, Akhil Reddy Pakala, Yiwei Zou, Wei-Chen Wei, Zengyi Li, Yubei Chen, Kaiyuan Yang
PICO-RAM: A PVT-Insensitive Analog Compute-In-Memory SRAM Macro with In-Situ Multi-Bit Charge Computing and 6T Thin-Cell-Compatible Layout
This manuscript has been accepted to IEEE Journal of Solid-State Circuits (JSSC)
null
null
null
cs.AR cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analog compute-in-memory (CIM) in static random-access memory (SRAM) is promising for accelerating deep learning inference by circumventing the memory wall and exploiting ultra-efficient analog low-precision arithmetic. Latest analog CIM designs attempt bit-parallel schemes for multi-bit analog Matrix-Vector Multiplication (MVM), aiming at higher energy efficiency, throughput, and training simplicity and robustness over conventional bit-serial methods that digitally shift-and-add multiple partial analog computing results. However, bit-parallel operations require more complex analog computations and become more sensitive to well-known analog CIM challenges, including large cell areas, inefficient and inaccurate multi-bit analog operations, and vulnerability to PVT variations. This paper presents PICO-RAM, a PVT-insensitive and compact CIM SRAM macro with charge-domain bit-parallel computation. It adopts a multi-bit thin-cell Multiply-Accumulate (MAC) unit that shares the same transistor layout as the most compact 6T SRAM cell. All analog computing modules, including digital-to-analog converters (DACs), MAC units, analog shift-and-add, and analog-to-digital converters (ADCs) reuse one set of local capacitors inside the array, performing in-situ computation to save area and enhance accuracy. A compact 8.5-bit dual-threshold time-domain ADC power gates the main path most of the time, leading to a significant energy reduction. Our 65-nm prototype achieves the highest weight storage density of 559 Kb/mm${^2}$ and exceptional robustness to temperature and voltage variations (-40 to 105 $^{\circ}$C and 0.65 to 1.2 V) among SRAM-based analog CIM designs.
[ { "version": "v1", "created": "Wed, 3 Jul 2024 03:46:59 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Chen", "Zhiyu", "" ], [ "Wen", "Ziyuan", "" ], [ "Wan", "Weier", "" ], [ "Pakala", "Akhil Reddy", "" ], [ "Zou", "Yiwei", "" ], [ "Wei", "Wei-Chen", "" ], [ "Li", "Zengyi", "" ], [ "Chen", "Yubei", "" ], [ "Yang", "Kaiyuan", "" ] ]
2407.12830
Sai Sathiesh Rajan
Sai Sathiesh Rajan, Ezekiel Soremekun, Sudipta Chattopadhyay
Knowledge-based Consistency Testing of Large Language Models
14 pages, 6 figures, 14 tables, Submitted to ACL ARR (June 2024)
null
null
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by-nc-sa/4.0/
In this work, we systematically expose and measure the inconsistency and knowledge gaps of Large Language Models (LLMs). Specifically, we propose an automated testing framework (called KONTEST) which leverages a knowledge graph to construct test cases. KONTEST probes and measures the inconsistencies in the LLM's knowledge of the world via a combination of semantically-equivalent queries and test oracles (metamorphic or ontological oracle). KONTEST further mitigates knowledge gaps via a weighted LLM model ensemble. Using four state-of-the-art LLMs (Falcon, Gemini, GPT3.5, and Llama2), we show that KONTEST generates 19.2% error inducing inputs (1917 errors from 9983 test inputs). It also reveals a 16.5% knowledge gap across all tested LLMs. KONTEST's mitigation method reduces LLM knowledge gap by 32.48%. Our ablation study further shows that GPT3.5 is not suitable for knowledge-based consistency testing because it is only 60%-68% effective in knowledge construction.
[ { "version": "v1", "created": "Wed, 3 Jul 2024 11:16:54 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Rajan", "Sai Sathiesh", "" ], [ "Soremekun", "Ezekiel", "" ], [ "Chattopadhyay", "Sudipta", "" ] ]
2407.12831
Lennart B\"urger
Lennart B\"urger, Fred A. Hamprecht, Boaz Nadler
Truth is Universal: Robust Detection of Lies in LLMs
10 pages, 30 figures
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
Large Language Models (LLMs) have revolutionised natural language processing, exhibiting impressive human-like capabilities. In particular, LLMs are capable of "lying", knowingly outputting false statements. Hence, it is of interest and importance to develop methods to detect when LLMs lie. Indeed, several authors trained classifiers to detect LLM lies based on their internal model activations. However, other researchers showed that these classifiers may fail to generalise, for example to negated statements. In this work, we aim to develop a robust method to detect when an LLM is lying. To this end, we make the following key contributions: (i) We demonstrate the existence of a two-dimensional subspace, along which the activation vectors of true and false statements can be separated. Notably, this finding is universal and holds for various LLMs, including Gemma-7B, LLaMA2-13B and LLaMA3-8B. Our analysis explains the generalisation failures observed in previous studies and sets the stage for more robust lie detection; (ii) Building upon (i), we construct an accurate LLM lie detector. Empirically, our proposed classifier achieves state-of-the-art performance, distinguishing simple true and false statements with 94% accuracy and detecting more complex real-world lies with 95% accuracy.
[ { "version": "v1", "created": "Wed, 3 Jul 2024 13:01:54 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Bürger", "Lennart", "" ], [ "Hamprecht", "Fred A.", "" ], [ "Nadler", "Boaz", "" ] ]
2407.12832
Paulo Cavalin
Paulo Cavalin, Pedro Henrique Domingues, Claudio Pinhanez
Sentence-level Aggregation of Lexical Metrics Correlate Stronger with Human Judgements than Corpus-level Aggregation
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
In this paper we show that corpus-level aggregation hinders considerably the capability of lexical metrics to accurately evaluate machine translation (MT) systems. With empirical experiments we demonstrate that averaging individual segment-level scores can make metrics such as BLEU and chrF correlate much stronger with human judgements and make them behave considerably more similar to neural metrics such as COMET and BLEURT. We show that this difference exists because corpus- and segment-level aggregation differs considerably owing to the classical average of ratio versus ratio of averages Mathematical problem. Moreover, as we also show, such difference affects considerably the statistical robustness of corpus-level aggregation. Considering that neural metrics currently only cover a small set of sufficiently-resourced languages, the results in this paper can help make the evaluation of MT systems for low-resource languages more trustworthy.
[ { "version": "v1", "created": "Wed, 3 Jul 2024 13:46:24 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Cavalin", "Paulo", "" ], [ "Domingues", "Pedro Henrique", "" ], [ "Pinhanez", "Claudio", "" ] ]
2407.12833
Irina Abdullaeva Mrs
Irina Abdullaeva, Andrei Filatov, Mikhail Orlov, Ivan Karpukhin, Viacheslav Vasilev, Denis Dimitrov, Andrey Kuznetsov, Ivan Kireev, Andrey Savchenko
ESQA: Event Sequences Question Answering
25 pages, 3 figures
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by-nc-sa/4.0/
Event sequences (ESs) arise in many practical domains including finance, retail, social networks, and healthcare. In the context of machine learning, event sequences can be seen as a special type of tabular data with annotated timestamps. Despite the importance of ESs modeling and analysis, little effort was made in adapting large language models (LLMs) to the ESs domain. In this paper, we highlight the common difficulties of ESs processing and propose a novel solution capable of solving multiple downstream tasks with little or no finetuning. In particular, we solve the problem of working with long sequences and improve time and numeric features processing. The resulting method, called ESQA, effectively utilizes the power of LLMs and, according to extensive experiments, achieves state-of-the-art results in the ESs domain.
[ { "version": "v1", "created": "Wed, 3 Jul 2024 15:41:54 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Abdullaeva", "Irina", "" ], [ "Filatov", "Andrei", "" ], [ "Orlov", "Mikhail", "" ], [ "Karpukhin", "Ivan", "" ], [ "Vasilev", "Viacheslav", "" ], [ "Dimitrov", "Denis", "" ], [ "Kuznetsov", "Andrey", "" ], [ "Kireev", "Ivan", "" ], [ "Savchenko", "Andrey", "" ] ]
2407.12834
Arav Karighattam
Arav V. Karighattam
Heegner point constructions and fundamental units in cubic fields
26 pages. Feedback appreciated!
null
null
null
math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove the existence of nontrivial rational Heegner points on the elliptic curve $y^2 = x^3 + p$ when $p \equiv 5 \pmod{36}$ and $h_K$ is odd, and on the elliptic curve $y^2 = x^3 - p$ when $p \equiv 23 \pmod{36}$ and $h_K$ is odd. This follows from our expression for the fundamental unit of the non-Galois cubic extension $K=\mathbb{Q}(\sqrt[3]{p})$ in terms of the class number $h_K$ and the norm of a special value of a modular function of level $6$ for any odd prime $p \equiv 2$ or $5 \pmod{9}$, which is an analogue of a theorem of Dirichlet in 1840 expressing the fundamental unit of a real quadratic field in terms of the class number and a product of cyclotomic units.
[ { "version": "v1", "created": "Wed, 3 Jul 2024 17:46:28 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Karighattam", "Arav V.", "" ] ]
2407.12835
Mochen Yang
Jinghui Zhang, Dandan Qiao, Mochen Yang, Qiang Wei
Regurgitative Training: The Value of Real Data in Training Large Language Models
null
null
null
null
cs.CL cs.AI stat.ML
http://creativecommons.org/licenses/by/4.0/
What happens if we train a new Large Language Model (LLM) using data that are at least partially generated by other LLMs? The explosive success of LLMs means that a substantial amount of content online will be generated by LLMs rather than humans, which will inevitably enter the training datasets of next-generation LLMs. We evaluate the implications of such "regurgitative training" on LLM performance. Through fine-tuning GPT-3.5 with data generated either by itself or by other LLMs in a machine translation task, we find strong evidence that regurgitative training clearly handicaps the performance of LLMs. The same performance loss of regurgitative training is observed on transformer models that we train from scratch. We find suggestive evidence that the performance disadvantage of regurgitative training can be attributed to at least two mechanisms: (1) higher error rates and (2) lower lexical diversity in LLM-generated data as compared to real data. Based on these mechanisms, we propose and evaluate three different strategies to mitigate the performance loss of regurgitative training. First, we devise data-driven metrics to gauge the quality of each LLM-generated data instance, and then carry out an ordered training process where high-quality data are added before low-quality ones. Second, we combine data generated by multiple different LLMs (as an attempt to increase lexical diversity). Third, we train an AI detection classifier to differentiate between LLM- and human-generated data, and include LLM-generated data in the order of resemblance to human-generated data. All three strategies can improve the performance of regurgitative training to some extent but are not always able to fully close the gap from training with real data. Our results highlight the value of real, human-generated data in training LLMs, which cannot be easily substituted by synthetic, LLM-generated data.
[ { "version": "v1", "created": "Wed, 3 Jul 2024 18:42:55 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Zhang", "Jinghui", "" ], [ "Qiao", "Dandan", "" ], [ "Yang", "Mochen", "" ], [ "Wei", "Qiang", "" ] ]
2407.12836
Peter Gr\"onquist
Peter Gr\"onquist
OSPC: Artificial VLM Features for Hateful Meme Detection
null
null
10.1145/3589335.3665996
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
The digital revolution and the advent of the world wide web have transformed human communication, notably through the emergence of memes. While memes are a popular and straightforward form of expression, they can also be used to spread misinformation and hate due to their anonymity and ease of use. In response to these challenges, this paper introduces a solution developed by team 'Baseline' for the AI Singapore Online Safety Prize Challenge. Focusing on computational efficiency and feature engineering, the solution achieved an AUROC of 0.76 and an accuracy of 0.69 on the test dataset. As key features, the solution leverages the inherent probabilistic capabilities of large Vision-Language Models (VLMs) to generate task-adapted feature encodings from text, and applies a distilled quantization tailored to the specific cultural nuances present in Singapore. This type of processing and fine-tuning can be adapted to various visual and textual understanding and classification tasks, and even applied on private VLMs such as OpenAI's GPT. Finally it can eliminate the need for extensive model training on large GPUs for resource constrained applications, also offering a solution when little or no data is available.
[ { "version": "v1", "created": "Wed, 3 Jul 2024 21:35:52 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Grönquist", "Peter", "" ] ]
2407.12837
Tomohiro Uchiyama
Tomohiro Uchiyama
Keynesian chaos revisited: odd period cycles and ergodic properties
null
null
null
null
econ.GN q-fin.EC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study two standard (Keynesian) dynamic macroeconomic models (one is piecewise linear and the other is nonlinear). Our purpose is twofold: (1)~For each model, we give a complete characterisation for the existence of a topological chaos (of the GDP levels), (2)~Even if a chaos exists, using ergodic theory, we show that it is possible to predict the future GDP levels "on average". This paper gives a new application of a celebrated result in ergodic theory by A. Avila (2014 fields medalist). We believe that our method/strategy in this paper is generic enough to be used to analyse many other (seemingly untractable) chaotic economic models.
[ { "version": "v1", "created": "Thu, 4 Jul 2024 02:01:40 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Uchiyama", "Tomohiro", "" ] ]
2407.12838
Laura Manrique-G\'omez
Laura Manrique-G\'omez and Tony Montes and Rub\'en Manrique
Historical Ink: 19th Century Latin American Spanish Newspaper Corpus with LLM OCR Correction
null
null
null
null
cs.CL cs.DL
http://creativecommons.org/licenses/by/4.0/
This paper presents two significant contributions: first, a novel dataset of 19th-century Latin American press texts, which addresses the lack of specialized corpora for historical and linguistic analysis in this region. Second, it introduces a framework for OCR error correction and linguistic surface form detection in digitized corpora, utilizing a Large Language Model. This framework is adaptable to various contexts and, in this paper, is specifically applied to the newly created dataset.
[ { "version": "v1", "created": "Thu, 4 Jul 2024 02:10:18 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Manrique-Gómez", "Laura", "" ], [ "Montes", "Tony", "" ], [ "Manrique", "Rubén", "" ] ]
2407.12839
Nabarun Mondal Mr
Hemil Ruparel, Nabarun Mondal
A Formal Analysis of Iterated TDD
To be submitted to IEEE Transactions on Software Engineering
null
null
null
cs.SE cs.SY eess.SY math.DS math.OC
http://creativecommons.org/licenses/by/4.0/
In this paper we formally analyze the software methodology called (iterated) Test Driven Development (TDD). We formally define Specification, Software, Testing, Equivalence Partitions, Coupling, to argue about the nature of the software development in terms of TDD. We formalize Iterative TDD and find a context in which iterated TDD ``provably produce'' ``provably correct code'' from ``specifications'' while being stable in terms of iterated code churns. We demonstrate that outside this context iterated TDD will exhibit chaotic behavior, implying unpredictable messy amount of code churn. We argue that the research finding of ``ineffective'' iterated TDD found by earlier researches are due to missing this context, while the findings of ``effective'' iterated TDD is due to accidentally falling into the context or simply placebo.
[ { "version": "v1", "created": "Thu, 4 Jul 2024 08:07:35 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Ruparel", "Hemil", "" ], [ "Mondal", "Nabarun", "" ] ]
2407.12840
Filippo E. Nuccio Mortarino Majno di Capriglio
Dagur Asgeirsson, Riccardo Brasca (IMJ-PRG (UMR\_7586)), Nikolas Kuhn (UiO), Filippo Alberto Edoardo Nuccio Mortarino Majno Di Capriglio (ICJ, UJM, CTN), Adam Topaz
Categorical Foundations of Formalized Condensed Mathematics
null
null
null
null
math.CT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Condensed mathematics, developed by Clausen and Scholze over the last few years, proposes a generalization of topology with better categorical properties. It replaces the concept of a topological space by that of a condensed set, which can be defined as a sheaf for the coherent topology on a certain category of compact Hausdorff spaces. In this case, the sheaf condition has a fairly simple explicit description, which arises from studying the relationship between the coherent, regular and extensive topologies. In this paper, we establish this relationship under minimal assumptions on the category, going beyond the case of compact Hausdorff spaces. Along the way, we also provide a characterizations of sheaves and covering sieves for these categories. All results in this paper have been fully formalized in the Lean proof assistant.
[ { "version": "v1", "created": "Thu, 4 Jul 2024 09:05:37 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Asgeirsson", "Dagur", "", "IMJ-PRG" ], [ "Brasca", "Riccardo", "", "IMJ-PRG" ], [ "Kuhn", "Nikolas", "", "UiO" ], [ "Di Capriglio", "Filippo Alberto Edoardo Nuccio Mortarino Majno", "", "ICJ, UJM,\n CTN" ], [ "Topaz", "Adam", "" ] ]
2407.12841
Yuxi Xia
Yuxi Xia, Kilm Zaporojets, Benjamin Roth
What to do if language models disagree? Black-box model ensembling for textual and visual question answering
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
A diverse range of large language models (LLMs), e.g., ChatGPT, and visual question answering (VQA) models, e.g., BLIP, have been developed for solving textual and visual question answering tasks. However, both LLMs and VQA models encounter challenges when applied to task-specific datasets. Fine-tuning these models is either difficult, as it requires access via APIs, rendering them as black-boxes, or costly due to the need of tuning a large number of parameters. To address this, we introduce InfoSel, a data-efficient and lightweight ensemble method that learns to dynamically pick the winner from existing black-box models for predictions on both textual and multimodal visual question answering tasks. Unlike traditional ensemble models, InfoSel does not rely on prediction probabilities or confidences, which typically are not available in black-box models. Experimental results on four datasets demonstrate that our approach achieves an absolute increase of up to +5.27% in the F1-score compared to standalone LLMs. Remarkably, this improvement is achieved by utilizing only 1K training instances and 110M model parameters for training task-specific ensemble models.
[ { "version": "v1", "created": "Thu, 4 Jul 2024 12:59:10 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Xia", "Yuxi", "" ], [ "Zaporojets", "Kilm", "" ], [ "Roth", "Benjamin", "" ] ]
2407.12842
Wenguan Wang
Jian Ma, Wenguan Wang, Yi Yang, Feng Zheng
MS2SL: Multimodal Spoken Data-Driven Continuous Sign Language Production
Accepted to ACL 2024 Findings; Project Page: https://hechang25.github.io/MS2SL
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sign language understanding has made significant strides; however, there is still no viable solution for generating sign sequences directly from entire spoken content, e.g., text or speech. In this paper, we propose a unified framework for continuous sign language production, easing communication between sign and non-sign language users. In particular, a sequence diffusion model, utilizing embeddings extracted from text or speech, is crafted to generate sign predictions step by step. Moreover, by creating a joint embedding space for text, audio, and sign, we bind these modalities and leverage the semantic consistency among them to provide informative feedback for the model training. This embedding-consistency learning strategy minimizes the reliance on sign triplets and ensures continuous model refinement, even with a missing audio modality. Experiments on How2Sign and PHOENIX14T datasets demonstrate that our model achieves competitive performance in sign language production.
[ { "version": "v1", "created": "Thu, 4 Jul 2024 13:53:50 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Ma", "Jian", "" ], [ "Wang", "Wenguan", "" ], [ "Yang", "Yi", "" ], [ "Zheng", "Feng", "" ] ]
2407.12843
Andong Hua
Andong Hua, Mehak Preet Dhaliwal, Ryan Burke, Yao Qin
NutriBench: A Dataset for Evaluating Large Language Models in Carbohydrate Estimation from Meal Descriptions
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Accurate nutrition estimation helps people make informed decisions about their dietary choices and is crucial for preventing serious health issues. We present NutriBench, the first publicly available natural language meal description based nutrition benchmark. NutriBench consists of 5,000 human-verified meal descriptions with macro-nutrient labels, including carbohydrates, proteins, fats, and calories. The data is divided into 15 subsets varying in complexity based on the number, servings, and popularity of the food items in the meal and the specificity of serving size descriptions. We conducted an extensive evaluation of seven popular and state-of-the-art Large Language Models (LLMs), including GPT-3.5, Llama-3, and a medical domain-specific model with standard, Chain-of-Thought and Retrieval-Augmented Generation strategies on our benchmark for carbohydrate estimation. We also conducted a human study involving expert and non-expert participants and found that LLMs can provide more accurate and faster predictions over a range of complex queries. We present a thorough analysis and comparison of different LLMs, highlighting the opportunities and challenges of using LLMs for nutrition estimation in real-life scenarios. Our benchmark is publicly available at: https://mehak126.github.io/nutribench.html
[ { "version": "v1", "created": "Thu, 4 Jul 2024 15:10:51 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Hua", "Andong", "" ], [ "Dhaliwal", "Mehak Preet", "" ], [ "Burke", "Ryan", "" ], [ "Qin", "Yao", "" ] ]
2407.12844
Alex Kipnis
Alex Kipnis, Konstantinos Voudouris, Luca M. Schulze Buschoff, Eric Schulz
$\texttt{metabench}$ -- A Sparse Benchmark to Measure General Ability in Large Language Models
LLMs, benchmarking, IRT, information, compression
null
null
null
cs.CL cs.LG stat.ML
http://creativecommons.org/licenses/by-nc-sa/4.0/
Large Language Models (LLMs) vary in their abilities on a range of tasks. Initiatives such as the $\texttt{Open LLM Leaderboard}$ aim to quantify these differences with several large benchmarks (sets of test items to which an LLM can respond either correctly or incorrectly). However, high correlations within and between benchmark scores suggest that (1) there exists a small set of common underlying abilities that these benchmarks measure, and (2) items tap into redundant information and the benchmarks may thus be considerably compressed. We use data from $n > 5000$ LLMs to identify the most informative items of six benchmarks, ARC, GSM8K, HellaSwag, MMLU, TruthfulQA and WinoGrande (with $d=28,632$ items in total). From them we distill a sparse benchmark, $\texttt{metabench}$, that has less than $3\%$ of the original size of all six benchmarks combined. This new sparse benchmark goes beyond point scores by yielding estimators of the underlying benchmark-specific abilities. We show that these estimators (1) can be used to reconstruct each original $\textit{individual}$ benchmark score with, on average, $1.5\%$ root mean square error (RMSE), (2) reconstruct the original $\textit{total}$ score with $0.8\%$ RMSE, and (3) have a single underlying common factor whose Spearman correlation with the total score is $r = 0.93$.
[ { "version": "v1", "created": "Thu, 4 Jul 2024 17:57:38 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Kipnis", "Alex", "" ], [ "Voudouris", "Konstantinos", "" ], [ "Buschoff", "Luca M. Schulze", "" ], [ "Schulz", "Eric", "" ] ]
2407.12845
Siyao Yang
Bo Lin, Haoxuan Wang, Siyao Yang, Zhenning Cai
Time-dependent Regularized 13-Moment Equations with Onsager Boundary Conditions in the Linear Regime
30 pages, 24 figures
null
null
null
math.AP physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop the time-dependent regularized 13-moment equations for general elastic collision models under the linear regime. Detailed derivation shows the proposed equations have super-Burnett order for small Knudsen numbers, and the moment equations enjoy a symmetric structure. A new modification of Onsager boundary conditions is proposed to ensure stability as well as the removal of undesired boundary layers. Numerical examples of one-dimensional channel flows is conducted to verified our model.
[ { "version": "v1", "created": "Fri, 5 Jul 2024 07:30:11 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Lin", "Bo", "" ], [ "Wang", "Haoxuan", "" ], [ "Yang", "Siyao", "" ], [ "Cai", "Zhenning", "" ] ]
2407.12846
Bumjin Park
Bumjin Park and Jaesik Choi
Identifying the Source of Generation for Large Language Models
ICPRAI 2024
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
Large language models (LLMs) memorize text from several sources of documents. In pretraining, LLM trains to maximize the likelihood of text but neither receives the source of the text nor memorizes the source. Accordingly, LLM can not provide document information on the generated content, and users do not obtain any hint of reliability, which is crucial for factuality or privacy infringement. This work introduces token-level source identification in the decoding step, which maps the token representation to the reference document. We propose a bi-gram source identifier, a multi-layer perceptron with two successive token representations as input for better generalization. We conduct extensive experiments on Wikipedia and PG19 datasets with several LLMs, layer locations, and identifier sizes. The overall results show a possibility of token-level source identifiers for tracing the document, a crucial problem for the safe use of LLMs.
[ { "version": "v1", "created": "Fri, 5 Jul 2024 08:52:15 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Park", "Bumjin", "" ], [ "Choi", "Jaesik", "" ] ]
2407.12847
Roland Daynauth
Roland Daynauth, Jason Mars
Aligning Model Evaluations with Human Preferences: Mitigating Token Count Bias in Language Model Assessments
null
null
null
null
cs.CL cs.AI cs.HC
http://creativecommons.org/licenses/by/4.0/
The SLAM paper demonstrated that on-device Small Language Models (SLMs) are a viable and cost-effective alternative to API-based Large Language Models (LLMs), such as OpenAI's GPT-4, offering comparable performance and stability. However, SLAM also identified discrepancies between human preferences and traditional auto-evaluators. This follow-up paper explores methods to align LLM evaluator preferences with human evaluations by addressing biases, particularly toward higher token counts. We employed Bayesian statistics and a t-test to quantify this bias and developed a recalibration procedure to adjust the GPTScorer. Our findings significantly improve aligning the recalibrated LLM evaluator with human evaluations across multiple use cases. For instance, spearman's ranking correlation score in the Recommendation use case improved from -27.27 to 44.55. These results highlight the importance of accounting for biases in automated evaluations to ensure fair and accurate model assessments. The recalibration process enhances the reliability of automated evaluators, leading to better AI models that align with human values and expectations. This study provides a robust methodology for future research into bias correction and emphasizes the feasibility and benefits of developing human-aligned AI evaluation systems.
[ { "version": "v1", "created": "Fri, 5 Jul 2024 09:26:40 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Daynauth", "Roland", "" ], [ "Mars", "Jason", "" ] ]
2407.12848
Aniket Deroy
Aniket Deroy, Kripabandhu Ghosh, Saptarshi Ghosh
Applicability of Large Language Models and Generative Models for Legal Case Judgement Summarization
Accepted at Artificial Intelligence and Law, 2024
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic summarization of legal case judgements, which are known to be long and complex, has traditionally been tried via extractive summarization models. In recent years, generative models including abstractive summarization models and Large language models (LLMs) have gained huge popularity. In this paper, we explore the applicability of such models for legal case judgement summarization. We applied various domain specific abstractive summarization models and general domain LLMs as well as extractive summarization models over two sets of legal case judgements from the United Kingdom (UK) Supreme Court and the Indian (IN) Supreme Court and evaluated the quality of the generated summaries. We also perform experiments on a third dataset of legal documents of a different type, Government reports from the United States (US). Results show that abstractive summarization models and LLMs generally perform better than the extractive methods as per traditional metrics for evaluating summary quality. However, detailed investigation shows the presence of inconsistencies and hallucinations in the outputs of the generative models, and we explore ways to reduce the hallucinations and inconsistencies in the summaries. Overall, the investigation suggests that further improvements are needed to enhance the reliability of abstractive models and LLMs for legal case judgement summarization. At present, a human-in-the-loop technique is more suitable for performing manual checks to identify inconsistencies in the generated summaries.
[ { "version": "v1", "created": "Sat, 6 Jul 2024 04:49:40 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Deroy", "Aniket", "" ], [ "Ghosh", "Kripabandhu", "" ], [ "Ghosh", "Saptarshi", "" ] ]
2407.12849
Keith Kwan
Keith Kwan
Large language models are good medical coders, if provided with tools
7 pages, 1 figure, 2 tables
null
null
null
cs.IR cs.CL
http://creativecommons.org/licenses/by/4.0/
This study presents a novel two-stage Retrieve-Rank system for automated ICD-10-CM medical coding, comparing its performance against a Vanilla Large Language Model (LLM) approach. Evaluating both systems on a dataset of 100 single-term medical conditions, the Retrieve-Rank system achieved 100% accuracy in predicting correct ICD-10-CM codes, significantly outperforming the Vanilla LLM (GPT-3.5-turbo), which achieved only 6% accuracy. Our analysis demonstrates the Retrieve-Rank system's superior precision in handling various medical terms across different specialties. While these results are promising, we acknowledge the limitations of using simplified inputs and the need for further testing on more complex, realistic medical cases. This research contributes to the ongoing effort to improve the efficiency and accuracy of medical coding, highlighting the importance of retrieval-based approaches.
[ { "version": "v1", "created": "Sat, 6 Jul 2024 06:58:51 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Kwan", "Keith", "" ] ]
2407.12850
Mina Remeli
Mina Remeli, Moritz Hardt and Robert C. Williamson
Limits to Predicting Online Speech Using Large Language Models
null
null
null
null
cs.CL cs.CY cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
We study the predictability of online speech on social media, and whether predictability improves with information outside a user's own posts. Recent work suggests that the predictive information contained in posts written by a user's peers can surpass that of the user's own posts. Motivated by the success of large language models, we empirically test this hypothesis. We define unpredictability as a measure of the model's uncertainty, i.e., its negative log-likelihood on future tokens given context. As the basis of our study, we collect a corpus of 6.25M posts from more than five thousand X (previously Twitter) users and their peers. Across three large language models ranging in size from 1 billion to 70 billion parameters, we find that predicting a user's posts from their peers' posts performs poorly. Moreover, the value of the user's own posts for prediction is consistently higher than that of their peers'. Across the board, we find that the predictability of social media posts remains low, comparable to predicting financial news without context. We extend our investigation with a detailed analysis about the causes of unpredictability and the robustness of our findings. Specifically, we observe that a significant amount of predictive uncertainty comes from hashtags and @-mentions. Moreover, our results replicate if instead of prompting the model with additional context, we finetune on additional context.
[ { "version": "v1", "created": "Mon, 8 Jul 2024 09:50:49 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Remeli", "Mina", "" ], [ "Hardt", "Moritz", "" ], [ "Williamson", "Robert C.", "" ] ]
2407.12851
Zixin Shu
Zixin Shu, Rui Hua, Dengying Yan, Chenxia Lu, Ning Xu, Jun Li, Hui Zhu, Jia Zhang, Dan Zhao, Chenyang Hui, Junqiu Ye, Chu Liao, Qi Hao, Wen Ye, Cheng Luo, Xinyan Wang, Chuang Cheng, Xiaodong Li, Baoyan Liu, Xiaji Zhou, Runshun Zhang, Min Xu, Xuezhong Zhou
ISPO: An Integrated Ontology of Symptom Phenotypes for Semantic Integration of Traditional Chinese Medical Data
39 pages, 6 figures, 6 tables
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Symptom phenotypes are one of the key types of manifestations for diagnosis and treatment of various disease conditions. However, the diversity of symptom terminologies is one of the major obstacles hindering the analysis and knowledge sharing of various types of symptom-related medical data particularly in the fields of Traditional Chinese Medicine (TCM). Objective: This study aimed to construct an Integrated Ontology of symptom phenotypes (ISPO) to support the data mining of Chinese EMRs and real-world study in TCM field. Methods: To construct an integrated ontology of symptom phenotypes (ISPO), we manually annotated classical TCM textbooks and large-scale Chinese electronic medical records (EMRs) to collect symptom terms with support from a medical text annotation system. Furthermore, to facilitate the semantic interoperability between different terminologies, we incorporated public available biomedical vocabularies by manual mapping between Chinese terms and English terms with cross-references to source vocabularies. In addition, we evaluated the ISPO using independent clinical EMRs to provide a high-usable medical ontology for clinical data analysis. Results: By integrating 78,696 inpatient cases of EMRs, 5 biomedical vocabularies, 21 TCM books and dictionaries, ISPO provides 3,147 concepts, 23,475 terms, and 55,552 definition or contextual texts. Adhering to the taxonomical structure of the related anatomical systems of symptom phenotypes, ISPO provides 12 top-level categories and 79 middle-level sub-categories. The validation of data analysis showed the ISPO has a coverage rate of 95.35%, 98.53% and 92.66% for symptom terms with occurrence rates of 0.5% in additional three independent curated clinical datasets, which can demonstrate the significant value of ISPO in mapping clinical terms to ontologies.
[ { "version": "v1", "created": "Mon, 8 Jul 2024 15:23:50 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Shu", "Zixin", "" ], [ "Hua", "Rui", "" ], [ "Yan", "Dengying", "" ], [ "Lu", "Chenxia", "" ], [ "Xu", "Ning", "" ], [ "Li", "Jun", "" ], [ "Zhu", "Hui", "" ], [ "Zhang", "Jia", "" ], [ "Zhao", "Dan", "" ], [ "Hui", "Chenyang", "" ], [ "Ye", "Junqiu", "" ], [ "Liao", "Chu", "" ], [ "Hao", "Qi", "" ], [ "Ye", "Wen", "" ], [ "Luo", "Cheng", "" ], [ "Wang", "Xinyan", "" ], [ "Cheng", "Chuang", "" ], [ "Li", "Xiaodong", "" ], [ "Liu", "Baoyan", "" ], [ "Zhou", "Xiaji", "" ], [ "Zhang", "Runshun", "" ], [ "Xu", "Min", "" ], [ "Zhou", "Xuezhong", "" ] ]
2407.12852
Tony Montes
Tony Montes and Laura Manrique-G\'omez and Rub\'en Manrique
Historical Ink: Semantic Shift Detection for 19th Century Spanish
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
This paper explores the evolution of word meanings in 19th-century Spanish texts, with an emphasis on Latin American Spanish, using computational linguistics techniques. It addresses the Semantic Shift Detection (SSD) task, which is crucial for understanding linguistic evolution, particularly in historical contexts. The study focuses on analyzing a set of Spanish target words. To achieve this, a 19th-century Spanish corpus is constructed, and a customizable pipeline for SSD tasks is developed. This pipeline helps find the senses of a word and measure their semantic change between two corpora using fine-tuned BERT-like models with old Spanish texts for both Latin American and general Spanish cases. The results provide valuable insights into the cultural and societal shifts reflected in language changes over time
[ { "version": "v1", "created": "Mon, 8 Jul 2024 16:49:34 GMT" } ]
"2024-07-19T00:00:00"
[ [ "Montes", "Tony", "" ], [ "Manrique-Gómez", "Laura", "" ], [ "Manrique", "Rubén", "" ] ]