id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2102.07028 | ThetA -- fast and robust clustering via a distance parameter | Clustering is a fundamental problem in machine learning where distance-based approaches have dominated the field for many decades. This set of problems is often tackled by partitioning the data into K clusters where the number of clusters is chosen apriori. While significant progress has been made on these lines over t... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 219,960 |
2207.00738 | Golfer: Trajectory Prediction with Masked Goal Conditioning MnM Network | Transformers have enabled breakthroughs in NLP and computer vision, and have recently began to show promising performance in trajectory prediction for Autonomous Vehicle (AV). How to efficiently model the interactive relationships between the ego agent and other road and dynamic objects remains challenging for the stan... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 305,870 |
2109.12171 | NICE: Robust Scheduling through Reinforcement Learning-Guided Integer
Programming | Integer programs provide a powerful abstraction for representing a wide range of real-world scheduling problems. Despite their ability to model general scheduling problems, solving large-scale integer programs (IP) remains a computational challenge in practice. The incorporation of more complex objectives such as robus... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 257,182 |
2201.12664 | A Deep CNN Architecture with Novel Pooling Layer Applied to Two Sudanese
Arabic Sentiment Datasets | Arabic sentiment analysis has become an important research field in recent years. Initially, work focused on Modern Standard Arabic (MSA), which is the most widely-used form. Since then, work has been carried out on several different dialects, including Egyptian, Levantine and Moroccan. Moreover, a number of datasets h... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 277,730 |
2408.00332 | Vision-based Wearable Steering Assistance for People with Impaired
Vision in Jogging | Outdoor sports pose a challenge for people with impaired vision. The demand for higher-speed mobility inspired us to develop a vision-based wearable steering assistance. To ensure broad applicability, we focused on a representative sports environment, the athletics track. Our efforts centered on improving the speed and... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 477,798 |
1906.06717 | Mo\"ET: Mixture of Expert Trees and its Application to Verifiable
Reinforcement Learning | Rapid advancements in deep learning have led to many recent breakthroughs. While deep learning models achieve superior performance, often statistically better than humans, their adoption into safety-critical settings, such as healthcare or self-driving cars is hindered by their inability to provide safety guarantees or... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 135,391 |
2003.10687 | Felix: Flexible Text Editing Through Tagging and Insertion | We present Felix --- a flexible text-editing approach for generation, designed to derive the maximum benefit from the ideas of decoding with bi-directional contexts and self-supervised pre-training. In contrast to conventional sequence-to-sequence (seq2seq) models, Felix is efficient in low-resource settings and fast a... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 169,413 |
2411.08072 | Modeling variable guide efficiency in pooled CRISPR screens with
ContrastiveVI+ | Genetic screens mediated via CRISPR-Cas9 combined with high-content readouts have emerged as powerful tools for biological discovery. However, computational analyses of these screens come with additional challenges beyond those found with standard scRNA-seq analyses. For example, perturbation-induced variations of inte... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 507,768 |
1604.00691 | Event excitation for event-driven control and optimization of
multi-agent systems | We consider event-driven methods in a general framework for the control and optimization of multi-agent systems, viewing them as stochastic hybrid systems. Such systems often have feasible realizations in which the events needed to excite an on-line event-driven controller cannot occur, rendering the use of such contro... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 54,083 |
2501.00073 | Position Information Emerges in Causal Transformers Without Positional
Encodings via Similarity of Nearby Embeddings | Transformers with causal attention can solve tasks that require positional information without using positional encodings. In this work, we propose and investigate a new hypothesis about how positional information can be stored without using explicit positional encoding. We observe that nearby embeddings are more simil... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 521,528 |
2209.13090 | EEG-based Image Feature Extraction for Visual Classification using Deep
Learning | While capable of segregating visual data, humans take time to examine a single piece, let alone thousands or millions of samples. The deep learning models efficiently process sizeable information with the help of modern-day computing. However, their questionable decision-making process has raised considerable concerns.... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 319,764 |
2004.08202 | Women worry about family, men about the economy: Gender differences in
emotional responses to COVID-19 | Among the critical challenges around the COVID-19 pandemic is dealing with the potentially detrimental effects on people's mental health. Designing appropriate interventions and identifying the concerns of those most at risk requires methods that can extract worries, concerns and emotional responses from text data. We ... | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 173,000 |
2307.00758 | Structured Network Pruning by Measuring Filter-wise Interactions | Structured network pruning is a practical approach to reduce computation cost directly while retaining the CNNs' generalization performance in real applications. However, identifying redundant filters is a core problem in structured network pruning, and current redundancy criteria only focus on individual filters' attr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 377,119 |
2101.00688 | Segmentation and genome annotation algorithms | Segmentation and genome annotation (SAGA) algorithms are widely used to understand genome activity and gene regulation. These algorithms take as input epigenomic datasets, such as chromatin immunoprecipitation-sequencing (ChIP-seq) measurements of histone modifications or transcription factor binding. They partition th... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 214,166 |
2112.00236 | VoRTX: Volumetric 3D Reconstruction With Transformers for Voxelwise View
Selection and Fusion | Recent volumetric 3D reconstruction methods can produce very accurate results, with plausible geometry even for unobserved surfaces. However, they face an undesirable trade-off when it comes to multi-view fusion. They can fuse all available view information by global averaging, thus losing fine detail, or they can heur... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 269,066 |
1207.1563 | Achievable Sum-Rates in Gaussian Multiple-Access Channels with
MIMO-AF-Relay and Direct Links | We consider a single-antenna Gaussian multiple-access channel (MAC) with a multiple-antenna amplify-and-forward (AF) relay, where, contrary to many previous works, also the direct links between transmitters and receiver are taken into account. For this channel, we investigate two transmit schemes: Sending and relaying ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 17,322 |
1811.07662 | Intention Oriented Image Captions with Guiding Objects | Although existing image caption models can produce promising results using recurrent neural networks (RNNs), it is difficult to guarantee that an object we care about is contained in generated descriptions, for example in the case that the object is inconspicuous in the image. Problems become even harder when these obj... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 113,839 |
1906.00431 | An Empirical Study on Hyperparameters and their Interdependence for RL
Generalization | Recent results in Reinforcement Learning (RL) have shown that agents with limited training environments are susceptible to a large amount of overfitting across many domains. A key challenge for RL generalization is to quantitatively explain the effects of changing parameters on testing performance. Such parameters incl... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 133,396 |
2310.06233 | Low-Rank Tensor Completion via Novel Sparsity-Inducing Regularizers | To alleviate the bias generated by the l1-norm in the low-rank tensor completion problem, nonconvex surrogates/regularizers have been suggested to replace the tensor nuclear norm, although both can achieve sparsity. However, the thresholding functions of these nonconvex regularizers may not have closed-form expressions... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 398,484 |
2210.03974 | FBNet: Feedback Network for Point Cloud Completion | The rapid development of point cloud learning has driven point cloud completion into a new era. However, the information flows of most existing completion methods are solely feedforward, and high-level information is rarely reused to improve low-level feature learning. To this end, we propose a novel Feedback Network (... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 322,255 |
1506.04897 | Parsing Natural Language Sentences by Semi-supervised Methods | We present our work on semi-supervised parsing of natural language sentences, focusing on multi-source crosslingual transfer of delexicalized dependency parsers. We first evaluate the influence of treebank annotation styles on parsing performance, focusing on adposition attachment style. Then, we present KLcpos3, an em... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 44,231 |
2011.09580 | Non-Linear Multiple Field Interactions Neural Document Ranking | Ranking tasks are usually based on the text of the main body of the page and the actions (clicks) of users on the page. There are other elements that could be leveraged to better contextualise the ranking experience (e.g. text in other fields, query made by the user, images, etc). We present one of the first in-depth a... | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | false | 207,229 |
1407.3556 | Optimal Spectrum Management in Two-User Interference Channels | In this work, we address the problem of optimal spectrum management in continuous frequency domain in multiuser interference channels. The objective is to maximize the weighted sum of user capacities. Our main results are as follows: (i) For frequency-selective channels, we prove that in an optimal solution, each user ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 34,633 |
2006.15222 | BERTology Meets Biology: Interpreting Attention in Protein Language
Models | Transformer architectures have proven to learn useful representations for protein classification and generation tasks. However, these representations present challenges in interpretability. In this work, we demonstrate a set of methods for analyzing protein Transformer models through the lens of attention. We show that... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 184,445 |
2209.01301 | Geometry of EM and related iterative algorithms | The Expectation--Maximization (EM) algorithm is a simple meta-algorithm that has been used for many years as a methodology for statistical inference when there are missing measurements in the observed data or when the data is composed of observables and unobservables. Its general properties are well studied, and also, ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 315,829 |
2406.18333 | Continuous Sign Language Recognition Using Intra-inter Gloss Attention | Many continuous sign language recognition (CSLR) studies adopt transformer-based architectures for sequence modeling due to their powerful capacity for capturing global contexts. Nevertheless, vanilla self-attention, which serves as the core module of the transformer, calculates a weighted average over all time steps; ... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 467,970 |
1903.09372 | Few-shot Adaptive Faster R-CNN | To mitigate the detection performance drop caused by domain shift, we aim to develop a novel few-shot adaptation approach that requires only a few target domain images with limited bounding box annotations. To this end, we first observe several significant challenges. First, the target domain data is highly insufficien... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 125,048 |
2210.09220 | A Saccaded Visual Transformer for General Object Spotting | This paper presents the novel combination of a visual transformer style patch classifier with saccaded local attention. A novel optimisation paradigm for training object models is also presented, rather than the optimisation function minimising class membership probability error the network is trained to estimate the n... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 324,458 |
2205.12013 | Naive Few-Shot Learning: Uncovering the fluid intelligence of machines | In this paper, we aimed to help bridge the gap between human fluid intelligence - the ability to solve novel tasks without prior training - and the performance of deep neural networks, which typically require extensive prior training. An essential cognitive component for solving intelligence tests, which in humans are ... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | true | false | false | 298,375 |
2006.04232 | Tensors over Semirings for Latent-Variable Weighted Logic Programs | Semiring parsing is an elegant framework for describing parsers by using semiring weighted logic programs. In this paper we present a generalization of this concept: latent-variable semiring parsing. With our framework, any semiring weighted logic program can be latentified by transforming weights from scalar values of... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | 180,617 |
1704.04920 | Deep Joint Entity Disambiguation with Local Neural Attention | We propose a novel deep learning model for joint document-level entity disambiguation, which leverages learned neural representations. Key components are entity embeddings, a neural attention mechanism over local context windows, and a differentiable joint inference stage for disambiguation. Our approach thereby combin... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 71,917 |
2210.03899 | Multi-Scale Wavelet Transformer for Face Forgery Detection | Currently, many face forgery detection methods aggregate spatial and frequency features to enhance the generalization ability and gain promising performance under the cross-dataset scenario. However, these methods only leverage one level frequency information which limits their expressive ability. To overcome these lim... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 322,216 |
2312.03779 | Public emotions on Internet: In case of AIGC | The proliferation of interactive AI like ChatGPT has fueled intense public discourse surrounding AI- generated content (AIGC). While some fear job displacement, others anticipate productivity gains. Social media provides a rich source of data reflecting public opinion, attitudes, and behaviors. By examining the factors... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 413,425 |
2110.13373 | EnTRPO: Trust Region Policy Optimization Method with Entropy
Regularization | Trust Region Policy Optimization (TRPO) is a popular and empirically successful policy search algorithm in reinforcement learning (RL). It iteratively solved the surrogate problem which restricts consecutive policies to be close to each other. TRPO is an on-policy algorithm. On-policy methods bring many benefits, like ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 263,153 |
2410.15794 | Habaek: High-performance water segmentation through dataset expansion
and inductive bias optimization | Water segmentation is critical to disaster response and water resource management. Authorities may employ high-resolution photography to monitor rivers, lakes, and reservoirs, allowing for more proactive management in agriculture, industry, and conservation. Deep learning has improved flood monitoring by allowing model... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 500,729 |
1709.05065 | Asian Stamps Identification and Classification System | In this paper, we address the problem of stamp recognition. The goal is to classify a given stamp to a certain country and also identify the year it is published. We propose a new approach for stamp recognition based on describing a given stamp image using color information and texture information. For color informatio... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 80,776 |
2210.10703 | AUC-based Selective Classification | Selective classification (or classification with a reject option) pairs a classifier with a selection function to determine whether or not a prediction should be accepted. This framework trades off coverage (probability of accepting a prediction) with predictive performance, typically measured by distributive loss func... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 325,032 |
1907.12430 | Learning abstract perceptual notions: the example of space | Humans are extremely swift learners. We are able to grasp highly abstract notions, whether they come from art perception or pure mathematics. Current machine learning techniques demonstrate astonishing results in extracting patterns in information. Yet the abstract notions we possess are more than just statistical patt... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 140,126 |
1911.05371 | Self-labelling via simultaneous clustering and representation learning | Combining clustering and representation learning is one of the most promising approaches for unsupervised learning of deep neural networks. However, doing so naively leads to ill posed learning problems with degenerate solutions. In this paper, we propose a novel and principled learning formulation that addresses these... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | false | 153,242 |
1902.07114 | Sequential Synthesis of Distributed Controllers for Cascade
Interconnected Systems | We consider the problem of designing distributed controllers to ensure passivity of a large-scale interconnection of linear subsystems connected in a cascade topology. The control design process needs to be carried out at the subsystem-level with no direct knowledge of the dynamics of other subsystems in the interconne... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 121,913 |
2409.17073 | Enhancing Post-Hoc Attributions in Long Document Comprehension via
Coarse Grained Answer Decomposition | Accurately attributing answer text to its source document is crucial for developing a reliable question-answering system. However, attribution for long documents remains largely unexplored. Post-hoc attribution systems are designed to map answer text back to the source document, yet the granularity of this mapping has ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 491,637 |
2212.05397 | Task modules Partitioning, Scheduling and Floorplanning for Partially
Dynamically Reconfigurable Systems Based on Modern Heterogeneous FPGAs | Modern field programmable gate array(FPGA) can be partially dynamically reconfigurable with heterogeneous resources distributed on the chip. And FPGA-based partially dynamically reconfigurable system(FPGA-PDRS) can be used to accelerate computing and improve computing flexibility. However, the traditional design of F... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 335,776 |
2401.16497 | A Bayesian Gaussian Process-Based Latent Discriminative Generative
Decoder (LDGD) Model for High-Dimensional Data | Extracting meaningful information from high-dimensional data poses a formidable modeling challenge, particularly when the data is obscured by noise or represented through different modalities. This research proposes a novel non-parametric modeling approach, leveraging the Gaussian process (GP), to characterize high-dim... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 424,856 |
1203.3536 | A Convex Formulation for Learning Task Relationships in Multi-Task
Learning | Multi-task learning is a learning paradigm which seeks to improve the generalization performance of a learning task with the help of some other related tasks. In this paper, we propose a regularization formulation for learning the relationships between tasks in multi-task learning. This formulation can be viewed as a n... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 14,984 |
1605.00286 | Multidimensional Scaling on Multiple Input Distance Matrices | Multidimensional Scaling (MDS) is a classic technique that seeks vectorial representations for data points, given the pairwise distances between them. However, in recent years, data are usually collected from diverse sources or have multiple heterogeneous representations. How to do multidimensional scaling on multiple ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 55,321 |
2002.01284 | Obstruction level detection of sewer videos using convolutional neural
networks | Worldwide, sewer networks are designed to transport wastewater to a centralized treatment plant to be treated and returned to the environment. This process is critical for the current society, preventing waterborne illnesses, providing safe drinking water and enhancing general sanitation. To keep a sewer network perfec... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 162,621 |
2309.08054 | Permutation Capacity Region of Adder Multiple-Access Channels | Point-to-point permutation channels are useful models of communication networks and biological storage mechanisms and have received theoretical attention in recent years. Propelled by relevant advances in this area, we analyze the permutation adder multiple-access channel (PAMAC) in this work. In the PAMAC network mode... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 392,020 |
2301.06047 | EvoAAA: An evolutionary methodology for automated \neural autoencoder
architecture search | Machine learning models work better when curated features are provided to them. Feature engineering methods have been usually used as a preprocessing step to obtain or build a proper feature set. In late years, autoencoders (a specific type of symmetrical neural network) have been widely used to perform representation ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 340,531 |
2108.05338 | Truncated Emphatic Temporal Difference Methods for Prediction and
Control | Emphatic Temporal Difference (TD) methods are a class of off-policy Reinforcement Learning (RL) methods involving the use of followon traces. Despite the theoretical success of emphatic TD methods in addressing the notorious deadly triad of off-policy RL, there are still two open problems. First, followon traces typica... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 250,277 |
2307.05584 | Code Generation for Machine Learning using Model-Driven Engineering and
SysML | Data-driven engineering refers to systematic data collection and processing using machine learning to improve engineering systems. Currently, the implementation of data-driven engineering relies on fundamental data science and software engineering skills. At the same time, model-based engineering is gaining relevance f... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 378,792 |
1812.04783 | Deep Air Quality Forecasting Using Hybrid Deep Learning Framework | Air quality forecasting has been regarded as the key problem of air pollution early warning and control management. In this paper, we propose a novel deep learning model for air quality (mainly PM2.5) forecasting, which learns the spatial-temporal correlation features and interdependence of multivariate air quality rel... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 116,280 |
2307.07227 | Secure Short-Packet Communications via UAV-Enabled Mobile Relaying:
Joint Resource Optimization and 3D Trajectory Design | Short-packet communication (SPC) and unmanned aerial vehicles (UAVs) are anticipated to play crucial roles in the development of 5G-and-beyond wireless networks and the Internet of Things (IoT). In this paper, we propose a secure SPC system, where a UAV serves as a mobile decode-and-forward (DF) relay, periodically rec... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 379,325 |
1109.6884 | ERA: Efficient Serial and Parallel Suffix Tree Construction for Very
Long Strings | The suffix tree is a data structure for indexing strings. It is used in a variety of applications such as bioinformatics, time series analysis, clustering, text editing and data compression. However, when the string and the resulting suffix tree are too large to fit into the main memory, most existing construction algo... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 12,423 |
2405.18498 | The Unified Balance Theory of Second-Moment Exponential Scaling
Optimizers in Visual Tasks | We have identified a potential method for unifying first-order optimizers through the use of variable Second-Moment Exponential Scaling(SMES). We begin with back propagation, addressing classic phenomena such as gradient vanishing and explosion, as well as issues related to dataset sparsity, and introduce the theory of... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 458,447 |
2202.05014 | Coverage Probability and Spectral Efficiency Analysis of Multi-Gateway
Downlink LoRa Networks | The system-level performance of multi-gateway downlink long-range (LoRa) networks is investigated in the present paper. Specifically, we first compute the active probability of a channel and the selection probability of an active end-device (ED) in the closed-form expressions. We then derive the coverage probability ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 279,743 |
2412.12656 | DriveTester: A Unified Platform for Simulation-Based Autonomous Driving
Testing | Simulation-based testing plays a critical role in evaluating the safety and reliability of autonomous driving systems (ADSs). However, one of the key challenges in ADS testing is the complexity of preparing and configuring simulation environments, particularly in terms of compatibility and stability between the simulat... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 517,970 |
1806.11311 | Guaranteed Deterministic Bounds on the Total Variation Distance between
Univariate Mixtures | The total variation distance is a core statistical distance between probability measures that satisfies the metric axioms, with value always falling in $[0,1]$. This distance plays a fundamental role in machine learning and signal processing: It is a member of the broader class of $f$-divergences, and it is related to ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 101,689 |
2407.14967 | Base and Exponent Prediction in Mathematical Expressions using
Multi-Output CNN | The use of neural networks and deep learning techniques in image processing has significantly advanced the field, enabling highly accurate recognition results. However, achieving high recognition rates often necessitates complex network models, which can be challenging to train and require substantial computational res... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 474,975 |
1704.01984 | A Delay-Aware Caching Algorithm for Wireless D2D Caching Networks | Recently, wireless caching techniques have been studied to satisfy lower delay requirements and offload traffic from peak periods. By storing parts of the popular files at the mobile users, users can locate some of their requested files in their own caches or the caches at their neighbors. In the latter case, when a us... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 71,357 |
2108.03854 | Coordination on Time-Varying Antagonistic Networks | This paper studies coordination problem for time-varying networks suffering from antagonistic information, quantified by scaling parameters. By such a manner, interacting property of the participating individuals and antagonistic information can be quantified in a fully decoupled perspective, thus benefiting from merel... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 249,801 |
2409.18832 | Classification and regression of trajectories rendered as images via 2D
Convolutional Neural Networks | Trajectories can be regarded as time-series of coordinates, typically arising from motile objects. Methods for trajectory classification are particularly important to detect different movement patterns, while methods for regression to compute motility metrics and forecasting. Recent advances in computer vision have fac... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 492,424 |
2312.14646 | Collaborative Synthesis of Patient Records through Multi-Visit Health
State Inference | Electronic health records (EHRs) have become the foundation of machine learning applications in healthcare, while the utility of real patient records is often limited by privacy and security concerns. Synthetic EHR generation provides an additional perspective to compensate for this limitation. Most existing methods sy... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 417,710 |
2206.03996 | Sharp-MAML: Sharpness-Aware Model-Agnostic Meta Learning | Model-agnostic meta learning (MAML) is currently one of the dominating approaches for few-shot meta-learning. Albeit its effectiveness, the optimization of MAML can be challenging due to the innate bilevel problem structure. Specifically, the loss landscape of MAML is much more complex with possibly more saddle points ... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 301,479 |
2208.09439 | Adapting Task-Oriented Dialogue Models for Email Conversations | Intent detection is a key part of any Natural Language Understanding (NLU) system of a conversational assistant. Detecting the correct intent is essential yet difficult for email conversations where multiple directives and intents are present. In such settings, conversation context can become a key disambiguating facto... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 313,702 |
2409.00617 | Does Knowledge Localization Hold True? Surprising Differences Between
Entity and Relation Perspectives in Language Models | Large language models encapsulate knowledge and have demonstrated superior performance on various natural language processing tasks. Recent studies have localized this knowledge to specific model parameters, such as the MLP weights in intermediate layers. This study investigates the differences between entity and relat... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 484,999 |
1911.09887 | UAV-enabled Secure Communication with Finite Blocklength | In the finite blocklength scenario, which is suitable for practical applications, a method of maximizing the average effective secrecy rate (AESR) is proposed for a UAV-enabled secure communication by optimizing the UAV's trajectory and transmit power subject to the UAV's mobility constraints and transmit power constra... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 154,659 |
2302.14383 | Linear Spaces of Meanings: Compositional Structures in Vision-Language
Models | We investigate compositional structures in data embeddings from pre-trained vision-language models (VLMs). Traditionally, compositionality has been associated with algebraic operations on embeddings of words from a pre-existing vocabulary. In contrast, we seek to approximate representations from an encoder as combinati... | false | false | false | false | true | false | true | false | true | false | false | true | false | false | false | false | false | false | 348,273 |
2402.09821 | Diffusion Models for Audio Restoration | With the development of audio playback devices and fast data transmission, the demand for high sound quality is rising for both entertainment and communications. In this quest for better sound quality, challenges emerge from distortions and interferences originating at the recording side or caused by an imperfect trans... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 429,698 |
2205.07104 | Evolutionary optimization of the Verlet closure relation for the
hard-sphere and square-well fluids | The Ornstein-Zernike equation is solved for the hard-sphere and square-well fluids using a diverse selection of closure relations; the attraction range of the square-well is chosen to be $\lambda=1.5.$ In particular, for both fluids we mainly focus on the solution based on a three-parameter version of the Verlet closur... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 296,479 |
2403.11146 | Toward Adaptive Cooperation: Model-Based Shared Control Using
LQ-Differential Games | This paper introduces a novel model-based adaptive shared control to allow for the identification and design challenge for shared-control systems, in which humans and automation share control tasks. The main challenge is the adaptive behavior of the human in such shared control interactions. Consequently, merely identi... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 438,563 |
1408.3967 | Learning Deep Representation for Face Alignment with Auxiliary
Attributes | In this study, we show that landmark detection or face alignment task is not a single and independent problem. Instead, its robustness can be greatly improved with auxiliary information. Specifically, we jointly optimize landmark detection together with the recognition of heterogeneous but subtly correlated facial attr... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 35,430 |
2401.18032 | DROP: Decouple Re-Identification and Human Parsing with Task-specific
Features for Occluded Person Re-identification | The paper introduces the Decouple Re-identificatiOn and human Parsing (DROP) method for occluded person re-identification (ReID). Unlike mainstream approaches using global features for simultaneous multi-task learning of ReID and human parsing, or relying on semantic information for attention guidance, DROP argues that... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 425,404 |
1706.04626 | Estimation and Mitigation of Channel Non-Reciprocity in Massive MIMO | Time-division duplex (TDD) based massive MIMO systems rely on the reciprocity of the wireless propagation channels when calculating the downlink precoders based on uplink pilots. However, the effective uplink and downlink channels incorporating the analog radio front-ends of the base station (BS) and user equipments (U... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 75,368 |
2307.02144 | Kolam Simulation using Angles at Lattice Points | Kolam is a ritual art form practised by people in South India and consists of rule-bound geometric patterns of dots and lines. Single loop Kolams are mathematical closed loop patterns drawn over a grid of dots and conforming to certain heuristics. In this work, we propose a novel encoding scheme where we map the angula... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 377,601 |
1508.07680 | Domain Generalization for Object Recognition with Multi-task
Autoencoders | The problem of domain generalization is to take knowledge acquired from a number of related domains where training data is available, and to then successfully apply it to previously unseen domains. We propose a new feature learning algorithm, Multi-Task Autoencoder (MTAE), that provides good generalization performance ... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 46,427 |
1804.03312 | Crafting a Toolchain for Image Restoration by Deep Reinforcement
Learning | We investigate a novel approach for image restoration by reinforcement learning. Unlike existing studies that mostly train a single large network for a specialized task, we prepare a toolbox consisting of small-scale convolutional networks of different complexities and specialized in different tasks. Our method, RL-Res... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 94,601 |
1902.01117 | Exploring Temporal Dependencies in Multimodal Referring Expressions with
Mixed Reality | In collaborative tasks, people rely both on verbal and non-verbal cues simultaneously to communicate with each other. For human-robot interaction to run smoothly and naturally, a robot should be equipped with the ability to robustly disambiguate referring expressions. In this work, we propose a model that can disambigu... | true | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 120,594 |
1901.02565 | High-Fidelity Vector Space Models of Structured Data | Machine learning systems regularly deal with structured data in real-world applications. Unfortunately, such data has been difficult to faithfully represent in a way that most machine learning techniques would expect, i.e. as a real-valued vector of a fixed, pre-specified size. In this work, we introduce a novel approa... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 118,237 |
2401.01978 | Tailor: Size Recommendations for High-End Fashion Marketplaces | In the ever-changing and dynamic realm of high-end fashion marketplaces, providing accurate and personalized size recommendations has become a critical aspect. Meeting customer expectations in this regard is not only crucial for ensuring their satisfaction but also plays a pivotal role in driving customer retention, wh... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 419,553 |
2112.00094 | Leveraging Intrinsic Gradient Information for Further Training of
Differentiable Machine Learning Models | Designing models that produce accurate predictions is the fundamental objective of machine learning (ML). This work presents methods demonstrating that when the derivatives of target variables (outputs) with respect to inputs can be extracted from processes of interest, e.g., neural networks (NN) based surrogate models... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 269,029 |
2412.07039 | Data Augmentation with Variational Autoencoder for Imbalanced Dataset | Learning from an imbalanced distribution presents a major challenge in predictive modeling, as it generally leads to a reduction in the performance of standard algorithms. Various approaches exist to address this issue, but many of them concern classification problems, with a limited focus on regression. In this paper,... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 515,482 |
2002.09023 | Audio-video Emotion Recognition in the Wild using Deep Hybrid Networks | This paper presents an audiovisual-based emotion recognition hybrid network. While most of the previous work focuses either on using deep models or hand-engineered features extracted from images, we explore multiple deep models built on both images and audio signals. Specifically, in addition to convolutional neural ne... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 164,933 |
2005.13629 | Simultaneous Diagonalization of Incomplete Matrices and Applications | We consider the problem of recovering the entries of diagonal matrices $\{U_a\}_a$ for $a = 1,\ldots,t$ from multiple "incomplete" samples $\{W_a\}_a$ of the form $W_a=PU_aQ$, where $P$ and $Q$ are unknown matrices of low rank. We devise practical algorithms for this problem depending on the ranks of $P$ and $Q$. This ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 179,057 |
1705.06530 | Fake it till you make it: Fishing for Catfishes | Many adult content websites incorporate social networking features. Although these are popular, they raise significant challenges, including the potential for users to "catfish", i.e., to create fake profiles to deceive other users. This paper takes an initial step towards automated catfish detection. We explore the ch... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 73,648 |
2208.12856 | Local Context-Aware Active Domain Adaptation | Active Domain Adaptation (ADA) queries the labels of a small number of selected target samples to help adapting a model from a source domain to a target domain. The local context of queried data is important, especially when the domain gap is large. However, this has not been fully explored by existing ADA works. In th... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 314,873 |
2402.16124 | AVI-Talking: Learning Audio-Visual Instructions for Expressive 3D
Talking Face Generation | While considerable progress has been made in achieving accurate lip synchronization for 3D speech-driven talking face generation, the task of incorporating expressive facial detail synthesis aligned with the speaker's speaking status remains challenging. Our goal is to directly leverage the inherent style information c... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 432,435 |
2410.19512 | Marked Temporal Bayesian Flow Point Processes | Marked event data captures events by recording their continuous-valued occurrence timestamps along with their corresponding discrete-valued types. They have appeared in various real-world scenarios such as social media, financial transactions, and healthcare records, and have been effectively modeled through Marked Tem... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 502,348 |
2307.05131 | Overview of BioASQ 2023: The eleventh BioASQ challenge on Large-Scale
Biomedical Semantic Indexing and Question Answering | This is an overview of the eleventh edition of the BioASQ challenge in the context of the Conference and Labs of the Evaluation Forum (CLEF) 2023. BioASQ is a series of international challenges promoting advances in large-scale biomedical semantic indexing and question answering. This year, BioASQ consisted of new edit... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 378,634 |
1806.05005 | Proactive Resource Allocation with Predictable Channel Statistics | The behavior of users in relatively predictable, both in terms of the data they request and the wireless channels they observe. In this paper, we consider the statistics of such predictable patterns of the demand and channel jointly across multiple users, and develop a novel predictive resource allocation method. This ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 100,367 |
2210.16898 | Attention Swin U-Net: Cross-Contextual Attention Mechanism for Skin
Lesion Segmentation | Melanoma is caused by the abnormal growth of melanocytes in human skin. Like other cancers, this life-threatening skin cancer can be treated with early diagnosis. To support a diagnosis by automatic skin lesion segmentation, several Fully Convolutional Network (FCN) approaches, specifically the U-Net architecture, have... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 327,492 |
2305.18623 | Alfred: A System for Prompted Weak Supervision | Alfred is the first system for programmatic weak supervision (PWS) that creates training data for machine learning by prompting. In contrast to typical PWS systems where weak supervision sources are programs coded by experts, Alfred enables users to encode their subject matter expertise via natural language prompts for... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 369,166 |
1512.04280 | Small-footprint Deep Neural Networks with Highway Connections for Speech
Recognition | For speech recognition, deep neural networks (DNNs) have significantly improved the recognition accuracy in most of benchmark datasets and application domains. However, compared to the conventional Gaussian mixture models, DNN-based acoustic models usually have much larger number of model parameters, making it challeng... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | true | false | false | 50,120 |
2012.06791 | Bayesian graph neural networks for strain-based crack localization | A common shortcoming of vibration-based damage localization techniques is that localized damages, i.e. small cracks, have a limited influence on the spectral characteristics of a structure. In contrast, even the smallest of defects, under particular loading conditions, cause localized strain concentrations with predict... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 211,227 |
1810.08878 | A Regressive Convolution Neural network and Support Vector Regression
Model for Electricity Consumption Forecasting | Electricity consumption forecasting has important implications for the mineral companies on guiding quarterly work, normal power system operation, and the management. However, electricity consumption prediction for the mineral company is different from traditional electricity load prediction since mineral company elect... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 110,934 |
1308.0586 | A note on norm-based Lyapunov functions via contraction analysis | It is well know that for globally contractive autonomous systems, there exists a unique equilibrium and the distance to the equilibrium evaluated along any trajectory decreases exponentially with time. We show that, additionally, the magnitude of the velocity evaluated along any trajectory decreases exponentially, thus... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 26,235 |
1809.07725 | Specimens as research objects: reconciliation across distributed
repositories to enable metadata propagation | Botanical specimens are shared as long-term consultable research objects in a global network of specimen repositories. Multiple specimens are generated from a shared field collection event; generated specimens are then managed individually in separate repositories and independently augmented with research and managemen... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 108,343 |
2310.13240 | Transparency challenges in policy evaluation with causal machine
learning -- improving usability and accountability | Causal machine learning tools are beginning to see use in real-world policy evaluation tasks to flexibly estimate treatment effects. One issue with these methods is that the machine learning models used are generally black boxes, i.e., there is no globally interpretable way to understand how a model makes estimates. Th... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 401,352 |
2501.13188 | Topological constraints on self-organisation in locally interacting
systems | All intelligence is collective intelligence, in the sense that it is made of parts which must align with respect to system-level goals. Understanding the dynamics which facilitate or limit navigation of problem spaces by aligned parts thus impacts many fields ranging across life sciences and engineering. To that end, c... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 526,584 |
2502.04266 | Digital Gatekeeping: An Audit of Search Engine Results shows tailoring
of queries on the Israel-Palestine Conflict | Search engines, often viewed as reliable gateways to information, tailor search results using customization algorithms based on user preferences, location, and more. While this can be useful for routine queries, it raises concerns when the topics are sensitive or contentious, possibly limiting exposure to diverse viewp... | false | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | 531,045 |
1909.11850 | Improved Lower Bounds for Pliable Index Coding using Absent Receivers | This paper studies pliable index coding, in which a sender broadcasts information to multiple receivers through a shared broadcast medium, and the receivers each have some message a priori and want any message they do not have. An approach, based on receivers that are absent from the problem, was previously proposed to... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 146,938 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.