id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2101.10480 | Symmetric Monoidal Categories with Attributes | When designing plans in engineering, it is often necessary to consider attributes associated to objects, e.g. the location of a robot. Our aim in this paper is to incorporate attributes into existing categorical formalisms for planning, namely those based on symmetric monoidal categories and string diagrams. To accompl... | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | 216,948 |
1707.03386 | DeepCodec: Adaptive Sensing and Recovery via Deep Convolutional Neural
Networks | In this paper we develop a novel computational sensing framework for sensing and recovering structured signals. When trained on a set of representative signals, our framework learns to take undersampled measurements and recover signals from them using a deep convolutional neural network. In other words, it learns a tra... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 76,859 |
1203.6122 | Diffusion of Real-Time Information in Social-Physical Networks | We study the diffusion behavior of real-time information. Typically, real-time information is valuable only for a limited time duration, and hence needs to be delivered before its "deadline." Therefore, real-time information is much easier to spread among a group of people with frequent interactions than between isolat... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 15,148 |
2406.04690 | Higher-order Structure Based Anomaly Detection on Attributed Networks | Anomaly detection (such as telecom fraud detection and medical image detection) has attracted the increasing attention of people. The complex interaction between multiple entities widely exists in the network, which can reflect specific human behavior patterns. Such patterns can be modeled by higher-order network struc... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 461,797 |
2403.03305 | Best of Both Worlds: A Pliable and Generalizable Neuro-Symbolic Approach
for Relation Classification | This paper introduces a novel neuro-symbolic architecture for relation classification (RC) that combines rule-based methods with contemporary deep learning techniques. This approach capitalizes on the strengths of both paradigms: the adaptability of rule-based systems and the generalization power of neural networks. Ou... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 435,139 |
2403.15601 | From Guidelines to Governance: A Study of AI Policies in Education | Emerging technologies like generative AI tools, including ChatGPT, are increasingly utilized in educational settings, offering innovative approaches to learning while simultaneously posing new challenges. This study employs a survey methodology to examine the policy landscape concerning these technologies, drawing insi... | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | false | false | 440,654 |
2409.02281 | K-Origins: Better Colour Quantification for Neural Networks | K-Origins is a neural network layer designed to improve image-based network performances when learning colour, or intensities, is beneficial. Over 250 encoder-decoder convolutional networks are trained and tested on 16-bit synthetic data, demonstrating that K-Origins improves semantic segmentation accuracy in two scena... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 485,635 |
2308.05404 | Enhancing Low-light Light Field Images with A Deep Compensation
Unfolding Network | This paper presents a novel and interpretable end-to-end learning framework, called the deep compensation unfolding network (DCUNet), for restoring light field (LF) images captured under low-light conditions. DCUNet is designed with a multi-stage architecture that mimics the optimization process of solving an inverse i... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 384,781 |
2407.09837 | Impedance Measurement of Rolling Bearings Using an unbalanced AC
Wheatstone Bridge | Industry 4.0 drives the demand for cost-efficient and reliable process data and condition monitoring. Therefore, visualizing the state of tribological contacts becomes important, as they are regularly found in the center of many applications. Utilizing rolling element bearings as sensors and monitoring their health by ... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 472,740 |
1609.05296 | Development of a Fuzzy Expert System based Liveliness Detection Scheme
for Biometric Authentication | Liveliness detection acts as a safe guard against spoofing attacks. Most of the researchers used vision based techniques to detect liveliness of the user, but they are highly sensitive to illumination effects. Therefore it is very hard to design a system, which will work robustly under all circumstances. Literature sho... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 61,117 |
2304.02099 | Coarse Grained FLS-based Processor with Prognostic Malfunction Feature
for UAM Drones using FPGA | Many overall safety factors need to be considered in the next generation of Urban Air Mobility (UAM) systems and addressing these can become the anchor point for such technology to reach consent for worldwide application. On the other hand, fulfilling the safety requirements from an exponential increase of prolific UAM... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 356,319 |
2301.04647 | EXIF as Language: Learning Cross-Modal Associations Between Images and
Camera Metadata | We learn a visual representation that captures information about the camera that recorded a given photo. To do this, we train a multimodal embedding between image patches and the EXIF metadata that cameras automatically insert into image files. Our model represents this metadata by simply converting it to text and then... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 340,130 |
2007.15652 | Canopy Density Estimation in Perennial Horticulture Crops Using 3D
Spinning Lidar SLAM | We propose a novel, canopy density estimation solution using a 3D ray cloud representation for perennial horticultural crops at the field scale. To attain high spatial and temporal fidelity in field conditions, we propose the application of continuous-time 3D SLAM (Simultaneous Localisation and Mapping) to a spinning l... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 189,724 |
1706.09076 | A Pig, an Angel and a Cactus Walk Into a Blender: A Descriptive Approach
to Visual Blending | A descriptive approach for automatic generation of visual blends is presented. The implemented system, the Blender, is composed of two components: the Mapper and the Visual Blender. The approach uses structured visual representations along with sets of visual relations which describe how the elements (in which the visu... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 76,084 |
0810.0532 | Three New Complexity Results for Resource Allocation Problems | We prove the following results for task allocation of indivisible resources: - The problem of finding a leximin-maximal resource allocation is in P if the agents have max-utility functions and atomic demands. - Deciding whether a resource allocation is Pareto-optimal is coNP-complete for agents with (1-)additive ut... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | true | 2,444 |
2210.11374 | Meeting Decision Tracker: Making Meeting Minutes with De-Contextualized
Utterances | Meetings are a universal process to make decisions in business and project collaboration. The capability to automatically itemize the decisions in daily meetings allows for extensive tracking of past discussions. To that end, we developed Meeting Decision Tracker, a prototype system to construct decision items comprisi... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 325,285 |
2401.03221 | MirrorDiffusion: Stabilizing Diffusion Process in Zero-shot Image
Translation by Prompts Redescription and Beyond | Recently, text-to-image diffusion models become a new paradigm in image processing fields, including content generation, image restoration and image-to-image translation. Given a target prompt, Denoising Diffusion Probabilistic Models (DDPM) are able to generate realistic yet eligible images. With this appealing proper... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 420,026 |
2111.10570 | Improving Spectral Efficiency of Wireless Networks through Democratic
Spectrum Sharing | Wireless devices need spectrum to communicate. With the increase in the number of devices competing for the same spectrum, it has become nearly impossible to support the throughput requirements of all the devices through current spectrum sharing methods. In this work, we look at the problem of spectrum resource content... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | false | true | 267,366 |
2008.10753 | Evaluating Nonlinear Decision Trees for Binary Classification Tasks with
Other Existing Methods | Classification of datasets into two or more distinct classes is an important machine learning task. Many methods are able to classify binary classification tasks with a very high accuracy on test data, but cannot provide any easily interpretable explanation for users to have a deeper understanding of reasons for the sp... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 193,077 |
2312.05519 | Isomorphic-Consistent Variational Graph Auto-Encoders for Multi-Level
Graph Representation Learning | Graph representation learning is a fundamental research theme and can be generalized to benefit multiple downstream tasks from the node and link levels to the higher graph level. In practice, it is desirable to develop task-agnostic general graph representation learning methods that are typically trained in an unsuperv... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 414,121 |
2010.16344 | Marginalised Gaussian Processes with Nested Sampling | Gaussian Process (GPs) models are a rich distribution over functions with inductive biases controlled by a kernel function. Learning occurs through the optimisation of kernel hyperparameters using the marginal likelihood as the objective. This classical approach known as Type-II maximum likelihood (ML-II) yields point ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 204,043 |
1506.07424 | Simulating the Effects of Various Road Infrastructure Improvements to
Vehicular Traffic in a Busy Three-road Fork | Using microsimulations of vehicular dynamics, we studied the effects of several proposed infrastructure developments to the mean travel delay time~$\Delta$ and mean speed~$\Sigma$ of vehicles passing a busy three-road fork, particularly in the non-signalized roundabout junction of Lower Bicutan, Taguig City, Metro Mani... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 44,517 |
2106.14577 | Privacy-Preserving Image Acquisition Using Trainable Optical Kernel | Preserving privacy is a growing concern in our society where sensors and cameras are ubiquitous. In this work, for the first time, we propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor. The method benefits from ... | false | false | false | false | false | false | true | false | false | false | false | true | true | false | false | false | false | false | 243,451 |
2106.03614 | Adversarial Attack and Defense in Deep Ranking | Deep Neural Network classifiers are vulnerable to adversarial attack, where an imperceptible perturbation could result in misclassification. However, the vulnerability of DNN-based image ranking systems remains under-explored. In this paper, we propose two attacks against deep ranking systems, i.e., Candidate Attack an... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 239,381 |
1410.5894 | Vehicle Detection and Tracking Techniques: A Concise Review | Vehicle detection and tracking applications play an important role for civilian and military applications such as in highway traffic surveillance control, management and urban traffic planning. Vehicle detection process on road are used for vehicle tracking, counts, average speed of each individual vehicle, traffic ana... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 36,950 |
2302.03549 | An Achievable and Analytic Solution to Information Bottleneck for
Gaussian Mixtures | In this paper, we study a remote source coding scenario in which binary phase shift keying (BPSK) modulation sources are corrupted by additive white Gaussian noise (AWGN). An intermediate node, such as a relay, receives these observations and performs additional compression to balance complexity and relevance. This pro... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 344,381 |
2411.00462 | Target-Guided Adversarial Point Cloud Transformer Towards Recognition
Against Real-world Corruptions | Achieving robust 3D perception in the face of corrupted data presents an challenging hurdle within 3D vision research. Contemporary transformer-based point cloud recognition models, albeit advanced, tend to overfit to specific patterns, consequently undermining their robustness against corruption. In this work, we intr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 504,608 |
1711.04068 | Reuters Tracer: Toward Automated News Production Using Large Scale
Social Media Data | To deal with the sheer volume of information and gain competitive advantage, the news industry has started to explore and invest in news automation. In this paper, we present Reuters Tracer, a system that automates end-to-end news production using Twitter data. It is capable of detecting, classifying, annotating, and d... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 84,324 |
2501.17963 | Physics-Grounded Differentiable Simulation for Soft Growing Robots | Soft-growing robots (i.e., vine robots) are a promising class of soft robots that allow for navigation and growth in tightly confined environments. However, these robots remain challenging to model and control due to the complex interplay of the inflated structure and inextensible materials, which leads to obstacles fo... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 528,516 |
2404.08433 | MSSTNet: A Multi-Scale Spatio-Temporal CNN-Transformer Network for
Dynamic Facial Expression Recognition | Unlike typical video action recognition, Dynamic Facial Expression Recognition (DFER) does not involve distinct moving targets but relies on localized changes in facial muscles. Addressing this distinctive attribute, we propose a Multi-Scale Spatio-temporal CNN-Transformer network (MSSTNet). Our approach takes spatial ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 446,239 |
1005.0063 | Large Margin Multiclass Gaussian Classification with Differential
Privacy | As increasing amounts of sensitive personal information is aggregated into data repositories, it has become important to develop mechanisms for processing the data without revealing information about individual data instances. The differential privacy model provides a framework for the development and theoretical analy... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 6,362 |
2407.18472 | FedUD: Exploiting Unaligned Data for Cross-Platform Federated
Click-Through Rate Prediction | Click-through rate (CTR) prediction plays an important role in online advertising platforms. Most existing methods use data from the advertising platform itself for CTR prediction. As user behaviors also exist on many other platforms, e.g., media platforms, it is beneficial to further exploit such complementary informa... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 476,385 |
2303.04092 | CroCoSum: A Benchmark Dataset for Cross-Lingual Code-Switched
Summarization | Cross-lingual summarization (CLS) has attracted increasing interest in recent years due to the availability of large-scale web-mined datasets and the advancements of multilingual language models. However, given the rareness of naturally occurring CLS resources, the majority of datasets are forced to rely on translation... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 349,955 |
2010.01274 | Assisting the Adversary to Improve GAN Training | Some of the most popular methods for improving the stability and performance of GANs involve constraining or regularizing the discriminator. In this paper we consider a largely overlooked regularization technique which we refer to as the Adversary's Assistant (AdvAs). We motivate this using a different perspective to t... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 198,590 |
2401.15476 | To Burst or Not to Burst: Generating and Quantifying Improbable Text | While large language models (LLMs) are extremely capable at text generation, their outputs are still distinguishable from human-authored text. We explore this separation across many metrics over text, many sampling techniques, many types of text data, and across two popular LLMs, LLaMA and Vicuna. Along the way, we int... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 424,460 |
2105.01136 | Learning Good State and Action Representations via Tensor Decomposition | The transition kernel of a continuous-state-action Markov decision process (MDP) admits a natural tensor structure. This paper proposes a tensor-inspired unsupervised learning method to identify meaningful low-dimensional state and action representations from empirical trajectories. The method exploits the MDP's tensor... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 233,436 |
1905.06184 | Extensions to Justification Theory | Justification theory is a unifying framework for semantics of non-monotonic logics. It is built on the notion of a justification, which intuitively is a graph that explains the truth value of certain facts in a structure. Knowledge representation languages covered by justification theory include logic programs, argumen... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 130,917 |
2205.13976 | Hybrid Offline-Online Design for Reconfigurable Intelligent Surface
Aided UAV Communication | This letter considers the reconfigurable intelligent surface (RIS)-aided unmanned aerial vehicle (UAV) communication systems in urban areas under the general Rician fading channel. A hybrid offline-online design is proposed to improve the system performance by leveraging both the statistical channel state information (... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 299,167 |
2004.13537 | Correlated randomly growing graphs | We introduce a new model of correlated randomly growing graphs and study the fundamental questions of detecting correlation and estimating aspects of the correlated structure. The model is simple and starts with any model of randomly growing graphs, such as uniform attachment (UA) or preferential attachment (PA). Given... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 174,581 |
1910.13445 | G2SAT: Learning to Generate SAT Formulas | The Boolean Satisfiability (SAT) problem is the canonical NP-complete problem and is fundamental to computer science, with a wide array of applications in planning, verification, and theorem proving. Developing and evaluating practical SAT solvers relies on extensive empirical testing on a set of real-world benchmark f... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 151,393 |
1203.0160 | Scaling Datalog for Machine Learning on Big Data | In this paper, we present the case for a declarative foundation for data-intensive machine learning systems. Instead of creating a new system for each specific flavor of machine learning task, or hardcoding new optimizations, we argue for the use of recursive queries to program a variety of machine learning systems. By... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | true | 14,678 |
1406.3387 | The Interplay Between Dynamics and Networks: Centrality, Communities,
and Cheeger Inequality | We study the interplay between a dynamic process and the structure of the network on which it is defined. Specifically, we examine the impact of this interaction on the quality-measure of network clusters and node centrality. This enables us to effectively identify network communities and important nodes participating ... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 33,840 |
2402.07937 | A Physiological Sensor-Based Android Application Synchronized with a
Driving Simulator for Driver Monitoring | In this paper, we present an Android application to control and monitor the physiological sensors from the Shimmer platform and its synchronized working with a driving simulator. The Android app can monitor drivers and their parameters can be used to analyze the relation between their physiological states and driving p... | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 428,905 |
2010.05103 | On the Importance of Adaptive Data Collection for Extremely Imbalanced
Pairwise Tasks | Many pairwise classification tasks, such as paraphrase detection and open-domain question answering, naturally have extreme label imbalance (e.g., $99.99\%$ of examples are negatives). In contrast, many recent datasets heuristically choose examples to ensure label balance. We show that these heuristics lead to trained ... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 199,986 |
2001.06959 | Non-Orthogonal Multiple Access with Wireless Caching for 5G-Enabled
Vehicular Networks | The proliferation of connected vehicles along with the high demand for rich multimedia services constitute key challenges for the emerging 5G-enabled vehicular networks. These challenges include, but are not limited to, high spectral efficiency and low latency requirements. Recently, the integration of cache-enabled ne... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 160,937 |
2103.08469 | Developing an Underwater Network of Ocean Observation Systems with
Digital Twin Prototypes -- A Field Report from the Baltic Sea | During the research cruise AL547 with RV ALKOR (October 20-31, 2020), a collaborative underwater network of ocean observation systems was deployed in Boknis Eck (SW Baltic Sea, German exclusive economic zone (EEZ)) in the context of the project ARCHES (Autonomous Robotic Networks to Help Modern Societies). This network... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | 224,913 |
1507.04437 | A Deep Hashing Learning Network | Hashing-based methods seek compact and efficient binary codes that preserve the neighborhood structure in the original data space. For most existing hashing methods, an image is first encoded as a vector of hand-crafted visual feature, followed by a hash projection and quantization step to get the compact binary vector... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 45,173 |
2412.19215 | Optimizing Fantasy Sports Team Selection with Deep Reinforcement
Learning | Fantasy sports, particularly fantasy cricket, have garnered immense popularity in India in recent years, offering enthusiasts the opportunity to engage in strategic team-building and compete based on the real-world performance of professional athletes. In this paper, we address the challenge of optimizing fantasy crick... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 520,761 |
2306.15260 | Linear One-Bit Precoding in Massive MIMO: Asymptotic SEP Analysis and
Optimization | This paper focuses on the analysis and optimization of a class of linear one-bit precoding schemes for a downlink massive MIMO system under Rayleigh fading channels. The considered class of linear one-bit precoding is fairly general, including the well-known matched filter (MF) and zero-forcing (ZF) precoding schemes a... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 375,965 |
2302.08727 | Building Shortcuts between Distant Nodes with Biaffine Mapping for Graph
Convolutional Networks | Multiple recent studies show a paradox in graph convolutional networks (GCNs), that is, shallow architectures limit the capability of learning information from high-order neighbors, while deep architectures suffer from over-smoothing or over-squashing. To enjoy the simplicity of shallow architectures and overcome their... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 346,161 |
1911.07013 | Understanding and Improving Layer Normalization | Layer normalization (LayerNorm) is a technique to normalize the distributions of intermediate layers. It enables smoother gradients, faster training, and better generalization accuracy. However, it is still unclear where the effectiveness stems from. In this paper, our main contribution is to take a step further in und... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 153,697 |
2203.10375 | Design and Development of a Research Oriented Low Cost Robotics Platform
with a Novel Dynamic Global Path Planning Approach | Autonomous navigation systems based on computer vision sensors often require sophisticated robotics platforms which are very expensive. This poses a barrier for the implementation and testing of complex localization, mapping, and navigation algorithms that are vital in robotics applications. Addressing this issue, in t... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 286,512 |
2209.12866 | SAPA: Similarity-Aware Point Affiliation for Feature Upsampling | We introduce point affiliation into feature upsampling, a notion that describes the affiliation of each upsampled point to a semantic cluster formed by local decoder feature points with semantic similarity. By rethinking point affiliation, we present a generic formulation for generating upsampling kernels. The kernels ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 319,688 |
2405.05831 | Common information in well-mixing graphs and applications to
information-theoretic cryptography | We study the connection between mixing properties for bipartite graphs and materialization of the mutual information in one-shot settings. We show that mixing properties of a graph imply impossibility to extract the mutual information shared by the ends of an edge randomly sampled in the graph. We apply these impossibi... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 453,081 |
2412.16202 | Aspect-Based Few-Shot Learning | We generalize the formulation of few-shot learning by introducing the concept of an aspect. In the traditional formulation of few-shot learning, there is an underlying assumption that a single "true" label defines the content of each data point. This label serves as a basis for the comparison between the query object a... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 519,408 |
2402.15960 | Budget-Constrained Tool Learning with Planning | Despite intensive efforts devoted to tool learning, the problem of budget-constrained tool learning, which focuses on resolving user queries within a specific budget constraint, has been widely overlooked. This paper proposes a novel method for budget-constrained tool learning. Our approach involves creating a preferab... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 432,354 |
1603.04026 | A comprehensive study of sparse codes on abnormality detection | Sparse representation has been applied successfully in abnormal event detection, in which the baseline is to learn a dictionary accompanied by sparse codes. While much emphasis is put on discriminative dictionary construction, there are no comparative studies of sparse codes regarding abnormality detection. We comprehe... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 53,182 |
2408.14991 | Speech Recognition Transformers: Topological-lingualism Perspective | Transformers have evolved with great success in various artificial intelligence tasks. Thanks to our recent prevalence of self-attention mechanisms, which capture long-term dependency, phenomenal outcomes in speech processing and recognition tasks have been produced. The paper presents a comprehensive survey of transfo... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 483,758 |
2003.05864 | Random NOMA With Cross-Slot Successive Interference Cancellation Packet
Recovery | Conventional power-domain non-orthogonal multiple access (NOMA) relies on precise power control, which requires real-time channel state information at transmitters. This requirement severely limits its application to future wireless communication systems. To address this problem, we consider NOMA without power allocati... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 167,969 |
2303.12997 | FER-former: Multi-modal Transformer for Facial Expression Recognition | The ever-increasing demands for intuitive interactions in Virtual Reality has triggered a boom in the realm of Facial Expression Recognition (FER). To address the limitations in existing approaches (e.g., narrow receptive fields and homogenous supervisory signals) and further cement the capacity of FER tools, a novel m... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 353,492 |
2105.06229 | Reciprocal Feature Learning via Explicit and Implicit Tasks in Scene
Text Recognition | Text recognition is a popular topic for its broad applications. In this work, we excavate the implicit task, character counting within the traditional text recognition, without additional labor annotation cost. The implicit task plays as an auxiliary branch for complementing the sequential recognition. We design a two-... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 235,060 |
2411.00965 | SPOT: SE(3) Pose Trajectory Diffusion for Object-Centric Manipulation | We introduce SPOT, an object-centric imitation learning framework. The key idea is to capture each task by an object-centric representation, specifically the SE(3) object pose trajectory relative to the target. This approach decouples embodiment actions from sensory inputs, facilitating learning from various demonstrat... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 504,851 |
1807.08089 | Phonetic-and-Semantic Embedding of Spoken Words with Applications in
Spoken Content Retrieval | Word embedding or Word2Vec has been successful in offering semantics for text words learned from the context of words. Audio Word2Vec was shown to offer phonetic structures for spoken words (signal segments for words) learned from signals within spoken words. This paper proposes a two-stage framework to perform phoneti... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 103,452 |
1911.13218 | ModelHub.AI: Dissemination Platform for Deep Learning Models | Recent advances in artificial intelligence research have led to a profusion of studies that apply deep learning to problems in image analysis and natural language processing among others. Additionally, the availability of open-source computational frameworks has lowered the barriers to implementing state-of-the-art met... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 155,613 |
2402.17535 | Multimodal Learned Sparse Retrieval with Probabilistic Expansion Control | Learned sparse retrieval (LSR) is a family of neural methods that encode queries and documents into sparse lexical vectors that can be indexed and retrieved efficiently with an inverted index. We explore the application of LSR to the multi-modal domain, with a focus on text-image retrieval. While LSR has seen success i... | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | 433,040 |
2010.10453 | Modeling Content and Context with Deep Relational Learning | Building models for realistic natural language tasks requires dealing with long texts and accounting for complicated structural dependencies. Neural-symbolic representations have emerged as a way to combine the reasoning capabilities of symbolic methods, with the expressiveness of neural networks. However, most of the ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 201,885 |
1909.12931 | Revenue allocation in Formula One: a pairwise comparison approach | A model is proposed to allocate Formula One World Championship prize money among the constructors. The methodology is based on pairwise comparison matrices, allows for the use of any weighting method, and makes possible to tune the level of inequality. We introduce an axiom called scale invariance, which requires the r... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 147,257 |
1703.07872 | Random Features for Compositional Kernels | We describe and analyze a simple random feature scheme (RFS) from prescribed compositional kernels. The compositional kernels we use are inspired by the structure of convolutional neural networks and kernels. The resulting scheme yields sparse and efficiently computable features. Each random feature can be represented ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 70,468 |
2210.12587 | Model ensemble instead of prompt fusion: a sample-specific knowledge
transfer method for few-shot prompt tuning | Prompt tuning approaches, which learn task-specific soft prompts for a downstream task conditioning on frozen pre-trained models, have attracted growing interest due to its parameter efficiency. With large language models and sufficient training data, prompt tuning performs comparably to full-model tuning. However, wit... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 325,809 |
2403.02803 | Towards Robust Federated Learning via Logits Calibration on Non-IID Data | Federated learning (FL) is a privacy-preserving distributed management framework based on collaborative model training of distributed devices in edge networks. However, recent studies have shown that FL is vulnerable to adversarial examples (AEs), leading to a significant drop in its performance. Meanwhile, the non-ind... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 434,953 |
2108.12105 | Full Attention Bidirectional Deep Learning Structure for Single Channel
Speech Enhancement | As the cornerstone of other important technologies, such as speech recognition and speech synthesis, speech enhancement is a critical area in audio signal processing. In this paper, a new deep learning structure for speech enhancement is demonstrated. The model introduces a "full" attention mechanism to a bidirectional... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 252,389 |
1705.03386 | Cell Tracking via Proposal Generation and Selection | Microscopy imaging plays a vital role in understanding many biological processes in development and disease. The recent advances in automation of microscopes and development of methods and markers for live cell imaging has led to rapid growth in the amount of image data being captured. To efficiently and reliably extra... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 73,173 |
2501.15063 | Cross-modal Context Fusion and Adaptive Graph Convolutional Network for
Multimodal Conversational Emotion Recognition | Emotion recognition has a wide range of applications in human-computer interaction, marketing, healthcare, and other fields. In recent years, the development of deep learning technology has provided new methods for emotion recognition. Prior to this, many emotion recognition methods have been proposed, including multim... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 527,385 |
2306.16255 | Theory and applications of the Sum-Of-Squares technique | The Sum-of-Squares (SOS) approximation method is a technique used in optimization problems to derive lower bounds on the optimal value of an objective function. By representing the objective function as a sum of squares in a feature space, the SOS method transforms non-convex global optimization problems into solvable ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 376,320 |
2211.02162 | Time-aware Prompting for Text Generation | In this paper, we study the effects of incorporating timestamps, such as document creation dates, into generation systems. Two types of time-aware prompts are investigated: (1) textual prompts that encode document timestamps in natural language sentences; and (2) linear prompts that convert timestamps into continuous v... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 328,491 |
2104.13946 | Motion-guided Non-local Spatial-Temporal Network for Video Crowd
Counting | We study video crowd counting, which is to estimate the number of objects (people in this paper) in all the frames of a video sequence. Previous work on crowd counting is mostly on still images. There has been little work on how to properly extract and take advantage of the spatial-temporal correlation between neighbor... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 232,660 |
2401.03197 | Decision Making in Non-Stationary Environments with Policy-Augmented
Search | Sequential decision-making under uncertainty is present in many important problems. Two popular approaches for tackling such problems are reinforcement learning and online search (e.g., Monte Carlo tree search). While the former learns a policy by interacting with the environment (typically done before execution), the ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 420,015 |
2201.08174 | Knowledge Graph Question Answering Leaderboard: A Community Resource to
Prevent a Replication Crisis | Data-driven systems need to be evaluated to establish trust in the scientific approach and its applicability. In particular, this is true for Knowledge Graph (KG) Question Answering (QA), where complex data structures are made accessible via natural-language interfaces. Evaluating the capabilities of these systems has ... | false | false | false | false | true | true | false | false | true | false | false | false | false | false | false | false | false | false | 276,256 |
2101.11251 | e-ACJ: Accurate Junction Extraction For Event Cameras | Junctions reflect the important geometrical structure information of the image, and are of primary significance to applications such as image matching and motion analysis. Previous event-based feature extraction methods are mainly focused on corners, which mainly find their locations, however, ignoring the geometrical ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 217,210 |
1404.7789 | Phase transitions in semisupervised clustering of sparse networks | Predicting labels of nodes in a network, such as community memberships or demographic variables, is an important problem with applications in social and biological networks. A recently-discovered phase transition puts fundamental limits on the accuracy of these predictions if we have access only to the network topology... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 32,724 |
0904.0300 | Design, development and implementation of a tool for construction of
declarative functional descriptions of semantic web services based on WSMO
methodology | Semantic web services (SWS) are self-contained, self-describing, semantically marked-up software resources that can be published, discovered, composed and executed across the Web in a semi-automatic way. They are a key component of the future Semantic Web, in which networked computer programs become providers and users... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 3,465 |
2410.03645 | GenSim2: Scaling Robot Data Generation with Multi-modal and Reasoning
LLMs | Robotic simulation today remains challenging to scale up due to the human efforts required to create diverse simulation tasks and scenes. Simulation-trained policies also face scalability issues as many sim-to-real methods focus on a single task. To address these challenges, this work proposes GenSim2, a scalable frame... | false | false | false | false | true | false | true | true | false | false | false | true | false | false | false | false | false | false | 494,886 |
2211.10724 | Deep Smart Contract Intent Detection | In recent years, research in software security has concentrated on identifying vulnerabilities in smart contracts to prevent significant losses of crypto assets on blockchains. Despite early successes in this area, detecting developers' intents in smart contracts has become a more pressing issue, as malicious intents h... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 331,415 |
2303.10056 | GlueGen: Plug and Play Multi-modal Encoders for X-to-image Generation | Text-to-image (T2I) models based on diffusion processes have achieved remarkable success in controllable image generation using user-provided captions. However, the tight coupling between the current text encoder and image decoder in T2I models makes it challenging to replace or upgrade. Such changes often require mass... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 352,288 |
2104.13665 | Robust Face-Swap Detection Based on 3D Facial Shape Information | Maliciously-manipulated images or videos - so-called deep fakes - especially face-swap images and videos have attracted more and more malicious attackers to discredit some key figures. Previous pixel-level artifacts based detection techniques always focus on some unclear patterns but ignore some available semantic clue... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 232,576 |
1801.04973 | Two-Stage LASSO ADMM Signal Detection Algorithm For Large Scale MIMO | This paper explores the benefit of using some of the machine learning techniques and Big data optimization tools in approximating maximum likelihood (ML) detection of Large Scale MIMO systems. First, large scale MIMO detection problem is formulated as a LASSO (Least Absolute Shrinkage and Selection Operator) optimizati... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 88,368 |
1309.7697 | Semi-structured data extraction and modelling: the WIA Project | Over the last decades, the amount of data of all kinds available electronically has increased dramatically. Data are accessible through a range of interfaces including Web browsers, database query languages, application-specific interfaces, built on top of a number of different data exchange formats. All these data spa... | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | true | false | true | 27,413 |
1908.05902 | MFA is a Waste of Time! Understanding Negative Connotation Towards MFA
Applications via User Generated Content | Traditional single-factor authentication possesses several critical security vulnerabilities due to single-point failure feature. Multi-factor authentication (MFA), intends to enhance security by providing additional verification steps. However, in practical deployment, users often experience dissatisfaction while usin... | true | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 141,856 |
1610.03759 | Language Models with Pre-Trained (GloVe) Word Embeddings | In this work we implement a training of a Language Model (LM), using Recurrent Neural Network (RNN) and GloVe word embeddings, introduced by Pennigton et al. in [1]. The implementation is following the general idea of training RNNs for LM tasks presented in [2], but is rather using Gated Recurrent Unit (GRU) [3] for a ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 62,295 |
2410.16451 | Susu Box or Piggy Bank: Assessing Cultural Commonsense Knowledge between
Ghana and the U.S | Recent work has highlighted the culturally-contingent nature of commonsense knowledge. We introduce AMAMMER${\epsilon}$, a test set of 525 multiple-choice questions designed to evaluate the commonsense knowledge of English LLMs, relative to the cultural contexts of Ghana and the United States. To create AMAMMER${\epsil... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 501,031 |
1211.2459 | Measures of Entropy from Data Using Infinitely Divisible Kernels | Information theory provides principled ways to analyze different inference and learning problems such as hypothesis testing, clustering, dimensionality reduction, classification, among others. However, the use of information theoretic quantities as test statistics, that is, as quantities obtained from empirical data, p... | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | 19,680 |
2208.01453 | Mitigating Smart Jammers in Multi-User MIMO | Wireless systems must be resilient to jamming attacks. Existing mitigation methods based on multi-antenna processing require knowledge of the jammer's transmit characteristics that may be difficult to acquire, especially for smart jammers that evade mitigation by transmitting only at specific instants. We propose a nov... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 311,170 |
2402.08126 | Contextual Multinomial Logit Bandits with General Value Functions | Contextual multinomial logit (MNL) bandits capture many real-world assortment recommendation problems such as online retailing/advertising. However, prior work has only considered (generalized) linear value functions, which greatly limits its applicability. Motivated by this fact, in this work, we consider contextual M... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 428,971 |
1805.01947 | Circuit designs for superconducting optoelectronic loop neurons | Optical communication achieves high fanout and short delay advantageous for information integration in neural systems. Superconducting detectors enable signaling with single photons for maximal energy efficiency. We present designs of superconducting optoelectronic neurons based on superconducting single-photon detecto... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | true | 96,734 |
2006.06664 | Quasi-Dense Similarity Learning for Multiple Object Tracking | Similarity learning has been recognized as a crucial step for object tracking. However, existing multiple object tracking methods only use sparse ground truth matching as the training objective, while ignoring the majority of the informative regions on the images. In this paper, we present Quasi-Dense Similarity Learni... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 181,515 |
2412.00139 | EFSA: Episodic Few-Shot Adaptation for Text-to-Image Retrieval | Text-to-image retrieval is a critical task for managing diverse visual content, but common benchmarks for the task rely on small, single-domain datasets that fail to capture real-world complexity. Pre-trained vision-language models tend to perform well with easy negatives but struggle with hard negatives--visually simi... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 512,526 |
2406.08488 | ICE-G: Image Conditional Editing of 3D Gaussian Splats | Recently many techniques have emerged to create high quality 3D assets and scenes. When it comes to editing of these objects, however, existing approaches are either slow, compromise on quality, or do not provide enough customization. We introduce a novel approach to quickly edit a 3D model from a single reference view... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 463,517 |
2104.08623 | Learning Fuzzy Clustering for SPECT/CT Segmentation via Convolutional
Neural Networks | Quantitative bone single-photon emission computed tomography (QBSPECT) has the potential to provide a better quantitative assessment of bone metastasis than planar bone scintigraphy due to its ability to better quantify activity in overlapping structures. An important element of assessing response of bone metastasis is... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 230,879 |
1811.11728 | Attributed Network Embedding for Incomplete Attributed Networks | Attributed networks are ubiquitous since a network often comes with auxiliary attribute information e.g. a social network with user profiles. Attributed Network Embedding (ANE) has recently attracted considerable attention, which aims to learn unified low dimensional node embeddings while preserving both structural and... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 114,842 |
2306.04498 | Fair Multi-Agent Bandits | In this paper, we study the problem of fair multi-agent multi-arm bandit learning when agents do not communicate with each other, except collision information, provided to agents accessing the same arm simultaneously. We provide an algorithm with regret $O\left(N^3 \log \frac{B}{\Delta} f(\log T) \log T \right)$ (assum... | false | false | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | true | 371,767 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.