id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2112.07513 | CORE-Text: Improving Scene Text Detection with Contrastive Relational
Reasoning | Localizing text instances in natural scenes is regarded as a fundamental challenge in computer vision. Nevertheless, owing to the extremely varied aspect ratios and scales of text instances in real scenes, most conventional text detectors suffer from the sub-text problem that only localizes the fragments of text instan... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | true | 271,503 |
2404.17183 | Prevalent Frequency of Emotional and Physical Symptoms in Social Anxiety
using Zero Shot Classification: An Observational Study | Social anxiety represents a prevalent challenge in modern society, affecting individuals across personal and professional spheres. Left unaddressed, this condition can yield substantial negative consequences, impacting social interactions and performance. Further understanding its diverse physical and emotional symptom... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 449,768 |
2103.09656 | Set-to-Sequence Methods in Machine Learning: a Review | Machine learning on sets towards sequential output is an important and ubiquitous task, with applications ranging from language modeling and meta-learning to multi-agent strategy games and power grid optimization. Combining elements of representation learning and structured prediction, its two primary challenges includ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 225,223 |
2410.02234 | GORAM: Graph-oriented ORAM for Efficient Ego-centric Queries on
Federated Graphs | Ego-centric queries, focusing on a target vertex and its direct neighbors, are essential for various applications. Enabling such queries on graphs owned by mutually distrustful data providers, without breaching privacy, holds promise for more comprehensive results. In this paper, we propose GORAM, a graph-oriented da... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | true | 494,183 |
2007.03274 | Multi-Tones' Phase Coding (MTPC) of Interaural Time Difference by
Spiking Neural Network | Inspired by the mammal's auditory localization pathway, in this paper we propose a pure spiking neural network (SNN) based computational model for precise sound localization in the noisy real-world environment, and implement this algorithm in a real-time robotic system with a microphone array. The key of this model rel... | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 186,011 |
1609.02450 | HashTag Erasure Codes: From Theory to Practice | Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 60,732 |
2206.11061 | An Ontological Approach to Analysing Social Service Provisioning | This paper introduces ontological concepts required to evaluate and manage the coverage of social services in a Smart City context. Here, we focus on the perspective of key stakeholders, namely social purpose organizations and the clients they serve. The Compass ontology presented here extends the Common Impact Data St... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | true | true | 304,140 |
2003.13532 | Re-purposing Heterogeneous Generative Ensembles with Evolutionary
Computation | Generative Adversarial Networks (GANs) are popular tools for generative modeling. The dynamics of their adversarial learning give rise to convergence pathologies during training such as mode and discriminator collapse. In machine learning, ensembles of predictors demonstrate better results than a single predictor for m... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 170,234 |
2008.09985 | Detecting signal from science:The structure of research communities and
prior knowledge improves prediction of genetic regulatory experiments | The explosive growth of scientists, scientific journals, articles and findings in recent years exponentially increases the difficulty scientists face in navigating prior knowledge. This challenge is exacerbated by uncertainty about the reproducibility of published findings. The availability of massive digital archives,... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 192,873 |
1208.0077 | Keyword-aware Optimal Route Search | Identifying a preferable route is an important problem that finds applications in map services. When a user plans a trip within a city, the user may want to find "a most popular route such that it passes by shopping mall, restaurant, and pub, and the travel time to and from his hotel is within 4 hours." However, none o... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 17,854 |
2405.17039 | BWArea Model: Learning World Model, Inverse Dynamics, and Policy for
Controllable Language Generation | Large language models (LLMs) have catalyzed a paradigm shift in natural language processing, yet their limited controllability poses a significant challenge for downstream applications. We aim to address this by drawing inspiration from the neural mechanisms of the human brain, specifically Broca's and Wernicke's areas... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 457,731 |
2409.06754 | Scaling Law Hypothesis for Multimodal Model | We propose a scaling law hypothesis for multimodal models processing text, audio, images, and video within a shared token and embedding space. Our framework predicts model performance based on modality-specific compression and tokenization efficiency, extending established scaling laws from text-based decoder models to... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 487,267 |
1112.1831 | Finding Overlapping Communities in Social Networks: Toward a Rigorous
Approach | A "community" in a social network is usually understood to be a group of nodes more densely connected with each other than with the rest of the network. This is an important concept in most domains where networks arise: social, technological, biological, etc. For many years algorithms for finding communities implicitly... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 13,370 |
1612.03864 | Effector Detection in Social Networks | In a social network, influence diffusion is the process of spreading innovations from user to user. An activation state identifies who are the active users who have adopted the target innovation. Given an activation state of a certain diffusion, effector detection aims to reveal the active users who are able to best ex... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 65,432 |
2209.13217 | Improving Primal Heuristics for Mixed Integer Programming Problems based
on Problem Reduction: A Learning-based Approach | In this paper, we propose a Bi-layer Predictionbased Reduction Branch (BP-RB) framework to speed up the process of finding a high-quality feasible solution for Mixed Integer Programming (MIP) problems. A graph convolutional network (GCN) is employed to predict binary variables' values. After that, a subset of binary va... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 319,813 |
2404.11136 | On the Performance of RIS-assisted Networks with HQAM | In this paper, we investigate the application of hexagonal quadrature amplitude modulation (HQAM) in reconfigurable intelligent surface (RIS)-assisted networks, specifically focusing on its efficiency in reducing the number of required reflecting elements. Specifically, we present analytical expressions for the average... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 447,396 |
1109.1093 | Multi Agent Communication System for Online Auction with Decision
Support System by JADE and TRACE | The success of online auctions has given buyers access to greater product diversity with potentially lower prices. It has provided sellers with access to large numbers of potential buyers and reduced transaction costs by enabling auctions to take place without regard to time or place. However it is difficult to spend m... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | 11,993 |
2202.03590 | Moral Emotions Shape the Virality of COVID-19 Misinformation on Social
Media | While false rumors pose a threat to the successful overcoming of the COVID-19 pandemic, an understanding of how rumors diffuse in online social networks is - even for non-crisis situations - still in its infancy. Here we analyze a large sample consisting of COVID-19 rumor cascades from Twitter that have been fact-check... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | false | 279,262 |
2101.09162 | A Robust Blockchain Readiness Index Model | As the blockchain ecosystem gets more mature many businesses, investors, and entrepreneurs are seeking opportunities on working with blockchain systems and cryptocurrencies. A critical challenge for these actors is to identify the most suitable environment to start or evolve their businesses. In general, the question i... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 216,520 |
2204.05682 | A Robust Learning Rule for Soft-Bounded Memristive Synapses Competitive
with Supervised Learning in Standard Spiking Neural Networks | Memristive devices are a class of circuit elements that shows great promise as future building block for brain-inspired computing. One influential view in theoretical neuroscience sees the brain as a function-computing device: given input signals, the brain applies a function in order to generate new internal states an... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | true | 291,111 |
2209.13355 | Algorithms for Large-scale Network Analysis and the NetworKit Toolkit | The abundance of massive network data in a plethora of applications makes scalable analysis algorithms and software tools necessary to generate knowledge from such data in reasonable time. Addressing scalability as well as other requirements such as good usability and a rich feature set, the open-source software Networ... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 319,861 |
2405.17768 | Revisiting the Message Passing in Heterophilous Graph Neural Networks | Graph Neural Networks (GNNs) have demonstrated strong performance in graph mining tasks due to their message-passing mechanism, which is aligned with the homophily assumption that adjacent nodes exhibit similar behaviors. However, in many real-world graphs, connected nodes may display contrasting behaviors, termed as h... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 458,106 |
2307.07125 | CeRF: Convolutional Neural Radiance Fields for New View Synthesis with
Derivatives of Ray Modeling | In recent years, novel view synthesis has gained popularity in generating high-fidelity images. While demonstrating superior performance in the task of synthesizing novel views, the majority of these methods are still based on the conventional multi-layer perceptron for scene embedding. Furthermore, light field models ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 379,290 |
2411.07763 | Spider 2.0: Evaluating Language Models on Real-World Enterprise
Text-to-SQL Workflows | Real-world enterprise text-to-SQL workflows often involve complex cloud or local data across various database systems, multiple SQL queries in various dialects, and diverse operations from data transformation to analytics. We introduce Spider 2.0, an evaluation framework comprising 632 real-world text-to-SQL workflow p... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | true | false | 507,670 |
2409.15687 | A Comprehensive Evaluation of Large Language Models on Mental Illnesses | Large language models have shown promise in various domains, including healthcare. In this study, we conduct a comprehensive evaluation of LLMs in the context of mental health tasks using social media data. We explore the zero-shot (ZS) and few-shot (FS) capabilities of various LLMs, including GPT-4, Llama 3, Gemini, a... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 491,011 |
2409.04415 | Improved Parallel Algorithm for Non-Monotone Submodular Maximization
under Knapsack Constraint | This work proposes an efficient parallel algorithm for non-monotone submodular maximization under a knapsack constraint problem over the ground set of size $n$. Our algorithm improves the best approximation factor of the existing parallel one from $8+\epsilon$ to $7+\epsilon$ with $O(\log n)$ adaptive complexity. The... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 486,384 |
2412.15004 | Large Language Models and Code Security: A Systematic Literature Review | Large Language Models (LLMs) have emerged as powerful tools for automating various programming tasks, including security-related ones, such as detecting and fixing vulnerabilities. Despite their promising capabilities, when required to produce or modify pre-existing code, LLMs could introduce vulnerabilities unbeknown ... | false | false | false | false | true | false | false | false | true | false | false | false | true | false | false | false | false | false | 518,920 |
2307.15150 | R-Block: Regularized Block of Dropout for convolutional networks | Dropout as a regularization technique is widely used in fully connected layers while is less effective in convolutional layers. Therefore more structured forms of dropout have been proposed to regularize convolutional networks. The disadvantage of these methods is that the randomness introduced causes inconsistency bet... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 382,171 |
2112.10727 | Learning Physics Properties of Fabrics and Garments with a Physics
Similarity Neural Network | In this paper, we propose to predict the physics parameters of real fabrics and garments by learning their physics similarities between simulated fabrics via a Physics Similarity Network (PhySNet). For this, we estimate wind speeds generated by an electric fan and the area weight to predict bending stiffness of simulat... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 272,511 |
2110.11281 | Fusion of complementary 2D and 3D mesostructural datasets using
generative adversarial networks | Modelling the impact of a material's mesostructure on device level performance typically requires access to 3D image data containing all the relevant information to define the geometry of the simulation domain. This image data must include sufficient contrast between phases to distinguish each material, be of high enou... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 262,424 |
1903.10420 | Development and verification of a simulation for leveraging results of a
human subjects programming experiment | Quantitatively evaluating and comparing the performance of robotic solutions that are designed to work under a variety of conditions is inherently challenging because they need to be evaluated under numerous precisely repeatable conditions Manually acquiring this data is time consuming and imprecise. A deterministic si... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 125,268 |
2407.08023 | Hybrid Structure-from-Motion and Camera Relocalization for Enhanced
Egocentric Localization | We built our pipeline EgoLoc-v1, mainly inspired by EgoLoc. We propose a model ensemble strategy to improve the camera pose estimation part of the VQ3D task, which has been proven to be essential in previous work. The core idea is not only to do SfM for egocentric videos but also to do 2D-3D matching between existing 3... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 471,976 |
2004.08346 | An integrated light management system with real-time light measurement
and human perception | Illumination is important for well-being, productivity and safety across several environments, including offices, retail shops and industrial warehouses. Current techniques for setting up lighting require extensive and expert support and need to be repeated if the scene changes. Here we propose the first fully-automate... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 173,039 |
1911.08895 | Demystifying TasNet: A Dissecting Approach | In recent years time domain speech separation has excelled over frequency domain separation in single channel scenarios and noise-free environments. In this paper we dissect the gains of the time-domain audio separation network (TasNet) approach by gradually replacing components of an utterance-level permutation invari... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 154,343 |
2006.00345 | Semi-Supervised Fine-Tuning for Deep Learning Models in Remote Sensing
Applications | A combinatory approach of two well-known fields: deep learning and semi supervised learning is presented, to tackle the land cover identification problem. The proposed methodology demonstrates the impact on the performance of deep learning models, when SSL approaches are used as performance functions during training. O... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 179,443 |
2307.13008 | Adaptation of Whisper models to child speech recognition | Automatic Speech Recognition (ASR) systems often struggle with transcribing child speech due to the lack of large child speech datasets required to accurately train child-friendly ASR models. However, there are huge amounts of annotated adult speech datasets which were used to create multilingual ASR models, such as Wh... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 381,457 |
1910.09998 | Learning Resilient Behaviors for Navigation Under Uncertainty | Deep reinforcement learning has great potential to acquire complex, adaptive behaviors for autonomous agents automatically. However, the underlying neural network polices have not been widely deployed in real-world applications, especially in these safety-critical tasks (e.g., autonomous driving). One of the reasons is... | false | false | false | false | true | false | true | true | false | false | false | false | false | false | false | false | false | false | 150,361 |
2212.14427 | Efficient Movie Scene Detection using State-Space Transformers | The ability to distinguish between different movie scenes is critical for understanding the storyline of a movie. However, accurately detecting movie scenes is often challenging as it requires the ability to reason over very long movie segments. This is in contrast to most existing video recognition models, which are t... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 338,611 |
2104.11520 | Modeling long-term interactions to enhance action recognition | In this paper, we propose a new approach to under-stand actions in egocentric videos that exploits the semantics of object interactions at both frame and temporal levels. At the frame level, we use a region-based approach that takes as input a primary region roughly corresponding to the user hands and a set of secondar... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 231,933 |
2308.02525 | Can Self-Supervised Representation Learning Methods Withstand
Distribution Shifts and Corruptions? | Self-supervised learning in computer vision aims to leverage the inherent structure and relationships within data to learn meaningful representations without explicit human annotation, enabling a holistic understanding of visual scenes. Robustness in vision machine learning ensures reliable and consistent performance, ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 383,662 |
2410.17527 | Adaptive coupling of peridynamic and classical continuum mechanical
models driven by broken bond/strength criteria for structural dynamic failure | Peridynamics (PD) is widely used to simulate structural failure. However, PD models are time-consuming. To improve the computational efficiency, we developed an adaptive coupling model between PD and classical continuum mechanics (PD-CCM) based on the Morphing method [1], driven by the broken bond or strength criteria.... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 501,506 |
2412.17580 | Quantum Time-Series Learning with Evolutionary Algorithms | Variational quantum circuits have arisen as an important method in quantum computing. A crucial step of it is parameter optimization, which is typically tackled through gradient-descent techniques. We advantageously explore instead the use of evolutionary algorithms for such optimization, specifically for time-series f... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 520,035 |
1601.00955 | Optimally Pruning Decision Tree Ensembles With Feature Cost | We consider the problem of learning decision rules for prediction with feature budget constraint. In particular, we are interested in pruning an ensemble of decision trees to reduce expected feature cost while maintaining high prediction accuracy for any test example. We propose a novel 0-1 integer program formulation ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 50,695 |
2109.00310 | Analytic estimation of the MMC sub-module capacitor voltage ripple for
balanced and unbalanced AC grid conditions | In this paper, a mathematical expression to define the maximum and minimum voltage ripples of the modular multilevel converter (MMC) sub-module (SM) capacitors is proposed. Using the arm averaged model of the MMC, the instantaneous power for the upper and lower arms of the converter is obtained, giving the basis to des... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 253,071 |
2406.02557 | EVAN: Evolutional Video Streaming Adaptation via Neural Representation | Adaptive bitrate (ABR) using conventional codecs cannot further modify the bitrate once a decision has been made, exhibiting limited adaptation capability. This may result in either overly conservative or overly aggressive bitrate selection, which could cause either inefficient utilization of the network bandwidth or f... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | true | 460,827 |
2409.11156 | On Performance of Distributed RIS-aided Communication in Random Networks | This paper evaluates the geometrically averaged performance of a wireless communication network assisted by a multitude of distributed reconfigurable intelligent surfaces (RISs), where the RIS locations are randomly dropped obeying a homogeneous Poisson point process. By exploiting stochastic geometry and then averagin... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 489,033 |
2301.09125 | Selecting a suitable Parallel Label-propagation based algorithm for
Disjoint Community Detection | Community detection is an essential task in network analysis as it helps identify groups and patterns within a network. High-speed community detection algorithms are necessary to analyze large-scale networks in a reasonable amount of time. Researchers have made significant contributions in the development of high-speed... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 341,410 |
2311.18064 | GELDA: A generative language annotation framework to reveal visual
biases in datasets | Bias analysis is a crucial step in the process of creating fair datasets for training and evaluating computer vision models. The bottleneck in dataset analysis is annotation, which typically requires: (1) specifying a list of attributes relevant to the dataset domain, and (2) classifying each image-attribute pair. Whil... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 411,541 |
1802.06214 | A New De-blurring Technique for License Plate Images with Robust Length
Estimation | Recognizing a license plate clearly while seeing a surveillance camera snapshot is often important in cases where the troublemaker vehicle(s) have to be identified. In many real world situations, these images are blurred due to fast motion of the vehicle and cannot be recognized by the human eye. For this kind of blurr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 90,617 |
2212.05061 | Estimating Chicago's tree cover and canopy height using multi-spectral
satellite imagery | Information on urban tree canopies is fundamental to mitigating climate change [1] as well as improving quality of life [2]. Urban tree planting initiatives face a lack of up-to-date data about the horizontal and vertical dimensions of the tree canopy in cities. We present a pipeline that utilizes LiDAR data as ground-... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 335,666 |
1811.09271 | Distributed Gradient Descent with Coded Partial Gradient Computations | Coded computation techniques provide robustness against straggling servers in distributed computing, with the following limitations: First, they increase decoding complexity. Second, they ignore computations carried out by straggling servers; and they are typically designed to recover the full gradient, and thus, canno... | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | true | 114,216 |
2407.16092 | Faster Optimal Coalition Structure Generation via Offline Coalition
Selection and Graph-Based Search | Coalition formation is a key capability in multi-agent systems. An important problem in coalition formation is coalition structure generation: partitioning agents into coalitions to optimize the social welfare. This is a challenging problem that has been the subject of active research for the past three decades. In thi... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | true | 475,449 |
2305.15313 | Greedy Poisson Rejection Sampling | One-shot channel simulation is a fundamental data compression problem concerned with encoding a single sample from a target distribution $Q$ using a coding distribution $P$ using as few bits as possible on average. Algorithms that solve this problem find applications in neural data compression and differential privacy ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 367,561 |
2311.10026 | Guaranteeing Control Requirements via Reward Shaping in Reinforcement
Learning | In addressing control problems such as regulation and tracking through reinforcement learning, it is often required to guarantee that the acquired policy meets essential performance and stability criteria such as a desired settling time and steady-state error prior to deployment. Motivated by this necessity, we present... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 408,390 |
2401.17732 | High-performance Racing on Unmapped Tracks using Local Maps | Map-based methods for autonomous racing estimate the vehicle's location, which is used to follow a high-level plan. While map-based optimisation methods demonstrate high-performance results, they are limited by requiring a map of the environment. In contrast, mapless methods can operate in unmapped contexts since they ... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 425,301 |
2307.12280 | Downstream-agnostic Adversarial Examples | Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning operations to enjoy the benefit of "large model". Despite this promising prospect, the security of pre-trai... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 381,208 |
2306.09996 | Investigating Prompting Techniques for Zero- and Few-Shot Visual
Question Answering | In this paper, we explore effective prompting techniques to enhance zero- and few-shot Visual Question Answering (VQA) performance in contemporary Vision-Language Models (VLMs). Central to our investigation is the role of question templates in guiding VLMs to generate accurate answers. We identify that specific templat... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 374,048 |
2408.16707 | Enhanced forecasting of stock prices based on variational mode
decomposition, PatchTST, and adaptive scale-weighted layer | The significant fluctuations in stock index prices in recent years highlight the critical need for accurate forecasting to guide investment and financial strategies. This study introduces a novel composite forecasting framework that integrates variational mode decomposition (VMD), PatchTST, and adaptive scale-weighted ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 484,422 |
2210.15865 | Completely Heterogeneous Federated Learning | Federated learning (FL) faces three major difficulties: cross-domain, heterogeneous models, and non-i.i.d. labels scenarios. Existing FL methods fail to handle the above three constraints at the same time, and the level of privacy protection needs to be lowered (e.g., the model architecture and data category distributi... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | true | 327,115 |
2411.00656 | Identification of Analytic Nonlinear Dynamical Systems with
Non-asymptotic Guarantees | This paper focuses on the system identification of an important class of nonlinear systems: linearly parameterized nonlinear systems, which enjoys wide applications in robotics and other mechanical systems. We consider two system identification methods: least-squares estimation (LSE), which is a point estimation method... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 504,687 |
2003.03666 | Multi-task Learning Based Neural Bridging Reference Resolution | We propose a multi task learning-based neural model for resolving bridging references tackling two key challenges. The first challenge is the lack of large corpora annotated with bridging references. To address this, we use multi-task learning to help bridging reference resolution with coreference resolution. We show t... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 167,308 |
2003.05626 | Understanding Crowd Flow Movements Using Active-Langevin Model | Crowd flow describes the elementary group behavior of crowds. Understanding the dynamics behind these movements can help to identify various abnormalities in crowds. However, developing a crowd model describing these flows is a challenging task. In this paper, a physics-based model is proposed to describe the movements... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 167,905 |
1706.09249 | Logics and practices of transparency and opacity in real-world
applications of public sector machine learning | Machine learning systems are increasingly used to support public sector decision-making across a variety of sectors. Given concerns around accountability in these domains, and amidst accusations of intentional or unintentional bias, there have been increased calls for transparency of these technologies. Few, however, h... | false | false | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | 76,108 |
2310.02391 | SE(3)-Stochastic Flow Matching for Protein Backbone Generation | The computational design of novel protein structures has the potential to impact numerous scientific disciplines greatly. Toward this goal, we introduce FoldFlow, a series of novel generative models of increasing modeling power based on the flow-matching paradigm over $3\mathrm{D}$ rigid motions -- i.e. the group $\tex... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 396,825 |
cs/0610153 | Most Programs Stop Quickly or Never Halt | Since many real-world problems arising in the fields of compiler optimisation, automated software engineering, formal proof systems, and so forth are equivalent to the Halting Problem--the most notorious undecidable problem--there is a growing interest, not only academically, in understanding the problem better and in ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 539,828 |
2003.13561 | On Biased Random Walks, Corrupted Intervals, and Learning Under
Adversarial Design | We tackle some fundamental problems in probability theory on corrupted random processes on the integer line. We analyze when a biased random walk is expected to reach its bottommost point and when intervals of integer points can be detected under a natural model of noise. We apply these results to problems in learning ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 170,243 |
2007.05086 | Boundary thickness and robustness in learning models | Robustness of machine learning models to various adversarial and non-adversarial corruptions continues to be of interest. In this paper, we introduce the notion of the boundary thickness of a classifier, and we describe its connection with and usefulness for model robustness. Thick decision boundaries lead to improved ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 186,560 |
2404.18598 | Anywhere: A Multi-Agent Framework for Reliable and Diverse
Foreground-Conditioned Image Inpainting | Recent advancements in image inpainting, particularly through diffusion modeling, have yielded promising outcomes. However, when tested in scenarios involving the completion of images based on the foreground objects, current methods that aim to inpaint an image in an end-to-end manner encounter challenges such as "over... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 450,326 |
2103.02892 | Data-Based System Analysis and Control of Flat Nonlinear Systems | Willems et al. showed that all input-output trajectories of a discrete-time linear time-invariant system can be obtained using linear combinations of time shifts of a single, persistently exciting, input-output trajectory of that system. In this paper, we extend this result to the class of discrete-time single-input si... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 223,100 |
2301.08606 | Data Augmentation for Modeling Human Personality: The Dexter Machine | Modeling human personality is important for several AI challenges, from the engineering of artificial psychotherapists to the design of persona bots. However, the field of computational personality analysis heavily relies on labeled data, which may be expensive, difficult or impossible to get. This problem is amplified... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 341,243 |
2410.08469 | Semantic Token Reweighting for Interpretable and Controllable Text
Embeddings in CLIP | A text encoder within Vision-Language Models (VLMs) like CLIP plays a crucial role in translating textual input into an embedding space shared with images, thereby facilitating the interpretative analysis of vision tasks through natural language. Despite the varying significance of different textual elements within a s... | false | false | false | false | false | false | true | false | true | false | false | true | false | false | false | false | false | false | 497,130 |
1904.02749 | Learning to Cluster Faces on an Affinity Graph | Face recognition sees remarkable progress in recent years, and its performance has reached a very high level. Taking it to a next level requires substantially larger data, which would involve prohibitive annotation cost. Hence, exploiting unlabeled data becomes an appealing alternative. Recent works have shown that clu... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 126,510 |
1104.0553 | Determining Relevance of Accesses at Runtime (Extended Version) | Consider the situation where a query is to be answered using Web sources that restrict the accesses that can be made on backend relational data by requiring some attributes to be given as input of the service. The accesses provide lookups on the collection of attributes values that match the binding. They can differ in... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 9,858 |
2208.09830 | Representation Learning with Graph Neural Networks for Speech Emotion
Recognition | Learning expressive representation is crucial in deep learning. In speech emotion recognition (SER), vacuum regions or noises in the speech interfere with expressive representation learning. However, traditional RNN-based models are susceptible to such noise. Recently, Graph Neural Network (GNN) has demonstrated its ef... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 313,852 |
1807.00050 | Determination of Friendship Intensity between Online Social Network
Users Based on Their Interaction | Online social networks (OSN) are one of the most popular forms of modern communication and among the best known is Facebook. Information about the connection between users on the OSN is often very scarce. It's only known if users are connected, while the intensity of the connection is unknown. The aim of the research d... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 101,752 |
2408.01570 | On Validation of Search & Retrieval of Tissue Images in Digital
Pathology | Medical images play a crucial role in modern healthcare by providing vital information for diagnosis, treatment planning, and disease monitoring. Fields such as radiology and pathology rely heavily on accurate image interpretation, with radiologists examining X-rays, CT scans, and MRIs to diagnose conditions from fract... | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | 478,279 |
2412.15664 | SCENIC: Scene-aware Semantic Navigation with Instruction-guided Control | Synthesizing natural human motion that adapts to complex environments while allowing creative control remains a fundamental challenge in motion synthesis. Existing models often fall short, either by assuming flat terrain or lacking the ability to control motion semantics through text. To address these limitations, we i... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 519,224 |
2103.13262 | FastMoE: A Fast Mixture-of-Expert Training System | Mixture-of-Expert (MoE) presents a strong potential in enlarging the size of language model to trillions of parameters. However, training trillion-scale MoE requires algorithm and system co-design for a well-tuned high performance distributed training system. Unfortunately, the only existing platform that meets the req... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | 226,436 |
1706.04156 | Gradient descent GAN optimization is locally stable | Despite the growing prominence of generative adversarial networks (GANs), optimization in GANs is still a poorly understood topic. In this paper, we analyze the "gradient descent" form of GAN optimization i.e., the natural setting where we simultaneously take small gradient steps in both generator and discriminator par... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 75,289 |
2012.13546 | Distributional Ground Truth: Non-Redundant Crowdsourcing Data Quality
Control in UI Labeling Tasks | HCI increasingly employs Machine Learning and Image Recognition, in particular for visual analysis of user interfaces (UIs). A popular way for obtaining human-labeled training data is Crowdsourcing, typically using the quality control methods ground truth and majority consensus, which necessitate redundancy in the outc... | true | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 213,246 |
2403.08377 | Learning to Describe for Predicting Zero-shot Drug-Drug Interactions | Adverse drug-drug interactions~(DDIs) can compromise the effectiveness of concurrent drug administration, posing a significant challenge in healthcare. As the development of new drugs continues, the potential for unknown adverse effects resulting from DDIs becomes a growing concern. Traditional computational methods fo... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 437,318 |
2405.10302 | Optimal Aggregation of Prediction Intervals under Unsupervised Domain
Shift | As machine learning models are increasingly deployed in dynamic environments, it becomes paramount to assess and quantify uncertainties associated with distribution shifts. A distribution shift occurs when the underlying data-generating process changes, leading to a deviation in the model's performance. The prediction ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 454,712 |
cs/0508023 | Software Libraries and Their Reuse: Entropy, Kolmogorov Complexity, and
Zipf's Law | We analyze software reuse from the perspective of information theory and Kolmogorov complexity, assessing our ability to ``compress'' programs by expressing them in terms of software components reused from libraries. A common theme in the software reuse literature is that if we can only get the right environment in pla... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 538,859 |
2012.00143 | Task Allocation for Asynchronous Mobile Edge Learning with Delay and
Energy Constraints | This paper extends the paradigm of "mobile edge learning (MEL)" by designing an optimal task allocation scheme for training a machine learning model in an asynchronous manner across mutiple edge nodes or learners connected via a resource-constrained wireless edge network. The optimization is done such that the portion ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 209,035 |
1605.00251 | A vector-contraction inequality for Rademacher complexities | The contraction inequality for Rademacher averages is extended to Lipschitz functions with vector-valued domains, and it is also shown that in the bounding expression the Rademacher variables can be replaced by arbitrary iid symmetric and sub-gaussian variables. Example applications are given for multi-category learnin... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 55,317 |
2402.07875 | Implicit Bias of Policy Gradient in Linear Quadratic Control:
Extrapolation to Unseen Initial States | In modern machine learning, models can often fit training data in numerous ways, some of which perform well on unseen (test) data, while others do not. Remarkably, in such cases gradient descent frequently exhibits an implicit bias that leads to excellent performance on unseen data. This implicit bias was extensively s... | false | false | false | false | true | false | true | false | false | false | true | false | false | false | false | false | false | false | 428,878 |
1307.3581 | Image color transfer to evoke different emotions based on color
combinations | In this paper, a color transfer framework to evoke different emotions for images based on color combinations is proposed. The purpose of this color transfer is to change the "look and feel" of images, i.e., evoking different emotions. Colors are confirmed as the most attractive factor in images. In addition, various st... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 25,812 |
2303.17569 | Iterative Prompt Learning for Unsupervised Backlit Image Enhancement | We propose a novel unsupervised backlit image enhancement method, abbreviated as CLIP-LIT, by exploring the potential of Contrastive Language-Image Pre-Training (CLIP) for pixel-level image enhancement. We show that the open-world CLIP prior not only aids in distinguishing between backlit and well-lit images, but also ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 355,253 |
2201.11620 | Domain generalization in deep learning-based mass detection in
mammography: A large-scale multi-center study | Computer-aided detection systems based on deep learning have shown great potential in breast cancer detection. However, the lack of domain generalization of artificial neural networks is an important obstacle to their deployment in changing clinical environments. In this work, we explore the domain generalization of de... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 277,344 |
1712.01328 | Learning User Intent from Action Sequences on Interactive Systems | Interactive systems have taken over the web and mobile space with increasing participation from users. Applications across every marketing domain can now be accessed through mobile or web where users can directly perform certain actions and reach a desired outcome. Actions of user on a system, though, can be representa... | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 86,082 |
1612.00686 | Identifying and Categorizing Anomalies in Retinal Imaging Data | The identification and quantification of markers in medical images is critical for diagnosis, prognosis and management of patients in clinical practice. Supervised- or weakly supervised training enables the detection of findings that are known a priori. It does not scale well, and a priori definition limits the vocabul... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 64,934 |
2111.05008 | Misspecified Gaussian Process Bandit Optimization | We consider the problem of optimizing a black-box function based on noisy bandit feedback. Kernelized bandit algorithms have shown strong empirical and theoretical performance for this problem. They heavily rely on the assumption that the model is well-specified, however, and can fail without it. Instead, we introduce ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 265,673 |
2407.06688 | Universal Multi-view Black-box Attack against Object Detectors via
Layout Optimization | Object detectors have demonstrated vulnerability to adversarial examples crafted by small perturbations that can deceive the object detector. Existing adversarial attacks mainly focus on white-box attacks and are merely valid at a specific viewpoint, while the universal multi-view black-box attack is less explored, lim... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 471,497 |
2009.05252 | Novel and Effective CNN-Based Binarization for Historically Degraded
As-built Drawing Maps | Binarizing historically degraded as-built drawing (HDAD) maps is a new challenging job, especially in terms of removing the three artifacts, namely noise, the yellowing areas, and the folded lines, while preserving the foreground components well. In this paper, we first propose a semi-automatic labeling method to creat... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 195,272 |
1306.6375 | Metaheuristics in Flood Disaster Management and Risk Assessment | A conceptual area is divided into units or barangays, each was allowed to evolve under a physical constraint. A risk assessment method was then used to identify the flood risk in each community using the following risk factors: the area's urbanized area ratio, literacy rate, mortality rate, poverty incidence, radio/TV ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 25,480 |
2207.05685 | PAC-Bayesian Domain Adaptation Bounds for Multiclass Learners | Multiclass neural networks are a common tool in modern unsupervised domain adaptation, yet an appropriate theoretical description for their non-uniform sample complexity is lacking in the adaptation literature. To fill this gap, we propose the first PAC-Bayesian adaptation bounds for multiclass learners. We facilitate ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 307,625 |
2004.03287 | A Corpus Study and Annotation Schema for Named Entity Recognition and
Relation Extraction of Business Products | Recognizing non-standard entity types and relations, such as B2B products, product classes and their producers, in news and forum texts is important in application areas such as supply chain monitoring and market research. However, there is a decided lack of annotated corpora and annotation guidelines in this domain. I... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 171,505 |
1606.05491 | Sequence-to-Sequence Generation for Spoken Dialogue via Deep Syntax
Trees and Strings | We present a natural language generator based on the sequence-to-sequence approach that can be trained to produce natural language strings as well as deep syntax dependency trees from input dialogue acts, and we use it to directly compare two-step generation with separate sentence planning and surface realization stage... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 57,416 |
2108.12144 | Lyra: A Benchmark for Turducken-Style Code Generation | Recently, neural techniques have been used to generate source code automatically. While promising for declarative languages, these approaches achieve much poorer performance on datasets for imperative languages. Since a declarative language is typically embedded in an imperative language (i.e., the turducken-style prog... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 252,407 |
2409.12376 | Prediction of Brent crude oil price based on LSTM model under the
background of low-carbon transition | In the field of global energy and environment, crude oil is an important strategic resource, and its price fluctuation has a far-reaching impact on the global economy, financial market and the process of low-carbon development. In recent years, with the gradual promotion of green energy transformation and low-carbon de... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 489,552 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.