id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2408.11469 | The Self-Contained Negation Test Set | Several methodologies have recently been proposed to evaluate the ability of Pretrained Language Models (PLMs) to interpret negation. In this article, we build on Gubelmann and Handschuh (2022), which studies the modification of PLMs' predictions as a function of the polarity of inputs, in English. Crucially, this test... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 482,309 |
2204.00172 | A Unified Framework for Domain Adaptive Pose Estimation | While pose estimation is an important computer vision task, it requires expensive annotation and suffers from domain shift. In this paper, we investigate the problem of domain adaptive 2D pose estimation that transfers knowledge learned on a synthetic source domain to a target domain without supervision. While several ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 289,165 |
2309.03154 | Optimal transmission switching and grid reconfiguration for transmission
systems via convex relaxations | In this paper, we formulate optimization problems to perform optimal transmission switching (OTS) in order to operate power transmission grids most efficiently. In any given electrical network, several of the transmission lines are generally equipped with switches, circuit breakers, and/or reclosers. The conventional p... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 390,285 |
1702.05564 | The Ciona17 Dataset for Semantic Segmentation of Invasive Species in a
Marine Aquaculture Environment | An original dataset for semantic segmentation, Ciona17, is introduced, which to the best of the authors' knowledge, is the first dataset of its kind with pixel-level annotations pertaining to invasive species in a marine environment. Diverse outdoor illumination, a range of object shapes, colour, and severe occlusion p... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 68,425 |
2007.00171 | A General Control Framework for Boolean Networks | This paper focuses on proposing a general control framework for large-scale Boolean networks (\texttt{BNs}). Only by the network structure, the concept of structural controllability for \texttt{BNs} is formalized. A necessary and sufficient criterion is derived for the structural controllability of \texttt{BNs}; it can... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 185,032 |
2006.07841 | Classify and Generate Reciprocally: Simultaneous Positive-Unlabelled
Learning and Conditional Generation with Extra Data | The scarcity of class-labeled data is a ubiquitous bottleneck in many machine learning problems. While abundant unlabeled data typically exist and provide a potential solution, it is highly challenging to exploit them. In this paper, we address this problem by leveraging Positive-Unlabeled~(PU) classification and the c... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 181,972 |
2206.10075 | Counting Varying Density Crowds Through Density Guided Adaptive
Selection CNN and Transformer Estimation | In real-world crowd counting applications, the crowd densities in an image vary greatly. When facing density variation, humans tend to locate and count the targets in low-density regions, and reason the number in high-density regions. We observe that CNN focus on the local information correlation using a fixed-size con... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 303,782 |
1608.02893 | Syntactically Informed Text Compression with Recurrent Neural Networks | We present a self-contained system for constructing natural language models for use in text compression. Our system improves upon previous neural network based models by utilizing recent advances in syntactic parsing -- Google's SyntaxNet -- to augment character-level recurrent neural networks. RNNs have proven excepti... | false | false | false | false | false | false | true | false | true | true | false | false | false | false | false | false | false | false | 59,613 |
2406.17119 | Accelerating Phase Field Simulations Through a Hybrid Adaptive Fourier
Neural Operator with U-Net Backbone | Prolonged contact between a corrosive liquid and metal alloys can cause progressive dealloying. For such liquid-metal dealloying (LMD) process, phase field models have been developed. However, the governing equations often involve coupled non-linear partial differential equations (PDE), which are challenging to solve n... | false | true | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | true | 467,428 |
2308.14654 | Joint Multiple Intent Detection and Slot Filling with Supervised
Contrastive Learning and Self-Distillation | Multiple intent detection and slot filling are two fundamental and crucial tasks in spoken language understanding. Motivated by the fact that the two tasks are closely related, joint models that can detect intents and extract slots simultaneously are preferred to individual models that perform each task independently. ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 388,407 |
2104.02415 | Multi-Robot Pickup and Delivery via Distributed Resource Allocation | In this paper, we consider a large-scale instance of the classical Pickup-and-Delivery Vehicle Routing Problem (PDVRP) that must be solved by a network of mobile cooperating robots. Robots must self-coordinate and self-allocate a set of pickup/delivery tasks while minimizing a given cost figure. This results in a large... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 228,713 |
1906.09088 | Meta-Model Framework for Surrogate-Based Parameter Estimation in
Dynamical Systems | The central task in modeling complex dynamical systems is parameter estimation. This task involves numerous evaluations of a computationally expensive objective function. Surrogate-based optimization introduces a computationally efficient predictive model that approximates the value of the objective function. The stand... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 136,061 |
2211.09929 | Contrastive Credibility Propagation for Reliable Semi-Supervised
Learning | Producing labels for unlabeled data is error-prone, making semi-supervised learning (SSL) troublesome. Often, little is known about when and why an algorithm fails to outperform a supervised baseline. Using benchmark datasets, we craft five common real-world SSL data scenarios: few-label, open-set, noisy-label, and cla... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 331,148 |
1903.10536 | Gene Expression based Survival Prediction for Cancer Patients: A Topic
Modeling Approach | Cancer is one of the leading cause of death, worldwide. Many believe that genomic data will enable us to better predict the survival time of these patients, which will lead to better, more personalized treatment options and patient care. As standard survival prediction models have a hard time coping with the high-dimen... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 125,292 |
2308.10401 | Model-Free Large-Scale Cloth Spreading With Mobile Manipulation: Initial
Feasibility Study | Cloth manipulation is common in domestic and service tasks, and most studies use fixed-base manipulators to manipulate objects whose sizes are relatively small with respect to the manipulators' workspace, such as towels, shirts, and rags. In contrast, manipulation of large-scale cloth, such as bed making and tablecloth... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 386,709 |
0705.0081 | Constructions of q-Ary Constant-Weight Codes | This paper introduces a new combinatorial construction for q-ary constant-weight codes which yields several families of optimal codes and asymptotically optimal codes. The construction reveals intimate connection between q-ary constant-weight codes and sets of pairwise disjoint combinatorial designs of various types. | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 128 |
1009.0906 | Near-Oracle Performance of Greedy Block-Sparse Estimation Techniques
from Noisy Measurements | This paper examines the ability of greedy algorithms to estimate a block sparse parameter vector from noisy measurements. In particular, block sparse versions of the orthogonal matching pursuit and thresholding algorithms are analyzed under both adversarial and Gaussian noise models. In the adversarial setting, it is s... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 7,483 |
2404.18208 | ROS 2 on a Chip, Achieving Brain-Like Speeds and Efficiency in Robotic
Networking | The Robot Operating System (ROS) pubsub model played a pivotal role in developing sophisticated robotic applications. However, the complexities and real-time demands of modern robotics necessitate more efficient communication solutions that are deterministic and isochronous. This article introduces a groundbreaking app... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 450,168 |
1106.0346 | Entropy-based Classification of 'Retweeting' Activity on Twitter | Twitter is used for a variety of reasons, including information dissemination, marketing, political organizing and to spread propaganda, spamming, promotion, conversations, and so on. Characterizing these activities and categorizing associated user generated content is a challenging task. We present a information-theor... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | false | 10,675 |
2209.01028 | MIMO-ISAC: Performance Analysis and Rate Region Characterization | This article analyzes the performance of sensing and communications (S\&C) achieved by a multiple-input multiple-output downlink integrated S\&C (ISAC) system. Three ISAC scenarios are analyzed, including the sensing-centric design, communications-centric design, and Pareto optimal design. For each scenario, diversity ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 315,760 |
2102.02155 | Polar Codes for Channels with Insertions, Deletions, and Substitutions | This paper presents a coding scheme for an insertion deletion substitution channel. We extend a previous scheme for the deletion channel where polar codes are modified by adding "guard bands" between segments. In the new scheme, each guard band is comprised of a middle segment of '1' symbols, and left and right segment... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 218,340 |
2312.04825 | Weighted Combinatorial Laplacian and its Application to Coverage Repair
in Sensor Networks | We define the weighted combinatorial Laplacian operators on a simplicial complex and investigate their spectral properties. Eigenvalues close to zero and the corresponding eigenvectors of them are especially of our interest, and we show that they can detect almost $n$-dimensional holes in the given complex. Real-valued... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 413,846 |
2310.10274 | No Compromise in Solution Quality: Speeding Up Belief-dependent
Continuous POMDPs via Adaptive Multilevel Simplification | Continuous POMDPs with general belief-dependent rewards are notoriously difficult to solve online. In this paper, we present a complete provable theory of adaptive multilevel simplification for the setting of a given externally constructed belief tree and MCTS that constructs the belief tree on the fly using an explora... | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | 400,156 |
2304.07305 | 1-D Residual Convolutional Neural Network coupled with Data Augmentation
and Regularization for the ICPHM 2023 Data Challenge | In this article, we present our contribution to the ICPHM 2023 Data Challenge on Industrial Systems' Health Monitoring using Vibration Analysis. For the task of classifying sun gear faults in a gearbox, we propose a residual Convolutional Neural Network that operates on raw three-channel time-domain vibration signals. ... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 358,302 |
1011.2809 | Multipath Parameter Estimation from OFDM Signals in Mobile Channels | We study multipath parameter estimation from orthogonal frequency division multiplex signals transmitted over doubly dispersive mobile radio channels. We are interested in cases where the transmission is long enough to suffer time selectivity, but short enough such that the time variation can be accurately modeled as d... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 8,210 |
1102.4873 | Weighted Radial Variation for Node Feature Classification | Connections created from a node-edge matrix have been traditionally difficult to visualize and analyze because of the number of flows to be rendered in a limited feature or cartographic space. Because analyzing connectivity patterns is useful for understanding the complex dynamics of human and information flow that con... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 9,338 |
2501.12703 | HEPPO: Hardware-Efficient Proximal Policy Optimization -- A Universal
Pipelined Architecture for Generalized Advantage Estimation | This paper introduces HEPPO, an FPGA-based accelerator designed to optimize the Generalized Advantage Estimation (GAE) stage in Proximal Policy Optimization (PPO). Unlike previous approaches that focused on trajectory collection and actor-critic updates, HEPPO addresses GAE's computational demands with a parallel, pipe... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 526,409 |
2312.13377 | SADA: Semantic adversarial unsupervised domain adaptation for Temporal
Action Localization | Temporal Action Localization (TAL) is a complex task that poses relevant challenges, particularly when attempting to generalize on new -- unseen -- domains in real-world applications. These scenarios, despite realistic, are often neglected in the literature, exposing these solutions to important performance degradation... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 417,287 |
1906.07488 | A One-step Pruning-recovery Framework for Acceleration of Convolutional
Neural Networks | Acceleration of convolutional neural network has received increasing attention during the past several years. Among various acceleration techniques, filter pruning has its inherent merit by effectively reducing the number of convolution filters. However, most filter pruning methods resort to tedious and time-consuming ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 135,606 |
1911.02104 | Perceived Intensities of Normal and Shear Skin Stimuli using a Wearable
Haptic Bracelet | Our aim is to provide effective interaction with virtual objects, despite the lack of co-location of virtual and real-world contacts, while taking advantage of relatively large skin area and ease of mounting on the forearm. We performed two human participant studies to determine the effects of haptic feedback in the no... | true | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 152,276 |
1908.10198 | Robust Tensor Recovery with Fiber Outliers for Traffic Events | Event detection is gaining increasing attention in smart cities research. Large-scale mobility data serves as an important tool to uncover the dynamics of urban transportation systems, and more often than not the dataset is incomplete. In this article, we develop a method to detect extreme events in large traffic datas... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 143,051 |
2108.00981 | PSA-GAN: Progressive Self Attention GANs for Synthetic Time Series | Realistic synthetic time series data of sufficient length enables practical applications in time series modeling tasks, such as forecasting, but remains a challenge. In this paper we present PSA-GAN, a generative adversarial network (GAN) that generates long time series samples of high quality using progressive growing... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 248,891 |
2309.02333 | Resilient VAE: Unsupervised Anomaly Detection at the SLAC Linac Coherent
Light Source | Significant advances in utilizing deep learning for anomaly detection have been made in recent years. However, these methods largely assume the existence of a normal training set (i.e., uncontaminated by anomalies) or even a completely labeled training set. In many complex engineering systems, such as particle accelera... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 390,011 |
cs/9904003 | The Structure of Weighting Coefficient Matrices of Harmonic Differential
Quadrature and Its Applications | The structure of weighting coefficient matrices of Harmonic Differential Quadrature (HDQ) is found to be either centrosymmetric or skew centrosymmetric depending on the order of the corresponding derivatives. The properties of both matrices are briefly discussed in this paper. It is noted that the computational effort ... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 540,492 |
2308.16085 | State Estimation over Broadcast and Multi-Access Channels in an
Unreliable Regime | This article examines the problem of state estimation over multi-terminal channels in an unreliable regime. More specifically, we consider two canonical settings. In the first setting, measurements of a common stochastic source need to be transmitted to two distinct remote monitors over a packet-erasure broadcast chann... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 388,896 |
2412.08562 | An End-to-End Collaborative Learning Approach for Connected Autonomous
Vehicles in Occluded Scenarios | Collaborative navigation becomes essential in situations of occluded scenarios in autonomous driving where independent driving policies are likely to lead to collisions. One promising approach to address this issue is through the use of Vehicle-to-Vehicle (V2V) networks that allow for the sharing of perception informat... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | 516,141 |
1711.03243 | Selecting Representative Examples for Program Synthesis | Program synthesis is a class of regression problems where one seeks a solution, in the form of a source-code program, mapping the inputs to their corresponding outputs exactly. Due to its precise and combinatorial nature, program synthesis is commonly formulated as a constraint satisfaction problem, where input-output ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 84,180 |
1004.1743 | An Analytical Study on Behavior of Clusters Using K Means, EM and K*
Means Algorithm | Clustering is an unsupervised learning method that constitutes a cornerstone of an intelligent data analysis process. It is used for the exploration of inter-relationships among a collection of patterns, by organizing them into homogeneous clusters. Clustering has been dynamically applied to a variety of tasks in the f... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 6,130 |
2010.05337 | DistDGL: Distributed Graph Neural Network Training for Billion-Scale
Graphs | Graph neural networks (GNN) have shown great success in learning from graph-structured data. They are widely used in various applications, such as recommendation, fraud detection, and search. In these domains, the graphs are typically large, containing hundreds of millions of nodes and several billions of edges. To tac... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 200,080 |
2308.12747 | An Information-Theoretic Approach for Detecting Edits in AI-Generated
Text | We propose a method to determine whether a given article was written entirely by a generative language model or perhaps contains edits by a different author, possibly a human. Our process involves multiple tests for the origin of individual sentences or other pieces of text and combining these tests using a method that... | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | false | false | 387,663 |
2310.02246 | Learning to Relax: Setting Solver Parameters Across a Sequence of Linear
System Instances | Solving a linear system $Ax=b$ is a fundamental scientific computing primitive for which numerous solvers and preconditioners have been developed. These come with parameters whose optimal values depend on the system being solved and are often impossible or too expensive to identify; thus in practice sub-optimal heurist... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 396,766 |
2008.07560 | Modeling of Natural Disasters and Extreme Events in Power System
Resilience Enhancement and Evaluation Methods | The frequency of disruptive and newly emerging threats (e.g. man-made attacks--cyber and physical attacks; extreme natural events--hurricanes, earthquakes, and floods) has escalated dramatically in the last decade. Impacts of these events are very severe ranging from long power outage duration, major power system equip... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 192,141 |
2501.15754 | Weight-based Analysis of Detokenization in Language Models:
Understanding the First Stage of Inference Without Inference | According to the stages-of-inference hypothesis, early layers of language models map their subword-tokenized input, which does not necessarily correspond to a linguistically meaningful segmentation, to more meaningful representations that form the model's "inner vocabulary". Prior analysis of this detokenization stage ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 527,696 |
2012.00425 | Edge-assisted Democratized Learning Towards Federated Analytics | A recent take towards Federated Analytics (FA), which allows analytical insights of distributed datasets, reuses the Federated Learning (FL) infrastructure to evaluate the summary of model performances across the training devices. However, the current realization of FL adopts single server-multiple client architecture ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 209,133 |
2012.14672 | Tips and Tricks for Webly-Supervised Fine-Grained Recognition: Learning
from the WebFG 2020 Challenge | WebFG 2020 is an international challenge hosted by Nanjing University of Science and Technology, University of Edinburgh, Nanjing University, The University of Adelaide, Waseda University, etc. This challenge mainly pays attention to the webly-supervised fine-grained recognition problem. In the literature, existing dee... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 213,579 |
1709.07114 | Cost Adaptation for Robust Decentralized Swarm Behaviour | Decentralized receding horizon control (D-RHC) provides a mechanism for coordination in multi-agent settings without a centralized command center. However, combining a set of different goals, costs, and constraints to form an efficient optimization objective for D-RHC can be difficult. To allay this problem, we use a m... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 81,225 |
2403.20020 | Nonparametric Bellman Mappings for Reinforcement Learning: Application
to Robust Adaptive Filtering | This paper designs novel nonparametric Bellman mappings in reproducing kernel Hilbert spaces (RKHSs) for reinforcement learning (RL). The proposed mappings benefit from the rich approximating properties of RKHSs, adopt no assumptions on the statistics of the data owing to their nonparametric nature, require no knowledg... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 442,581 |
2012.03033 | Branching Process with Attack: Viral Competing Markets | The marked increase in advertisements over online social networks (OSNs) necessitates the study of content propagation. We analyse the viral markets with content providers competing for the propagation of similar posts over OSNs. Towards this, we required a new variant of the branching process (BP), which we named as "... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 209,961 |
1904.08721 | Societal Controversies in Wikipedia Articles | Collaborative content creation inevitably reaches situations where different points of view lead to conflict. We focus on Wikipedia, the free encyclopedia anyone may edit, where disputes about content in controversial articles often reflect larger societal debates. While Wikipedia has a public edit history and discussi... | false | false | false | true | false | false | false | false | true | false | false | false | false | true | false | false | false | false | 128,161 |
1906.10155 | Machine Learning Phase Transitions with a Quantum Processor | Machine learning has emerged as a promising approach to study the properties of many-body systems. Recently proposed as a tool to classify phases of matter, the approach relies on classical simulation methods$-$such as Monte Carlo$-$which are known to experience an exponential slowdown when simulating certain quantum s... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 136,367 |
1911.03852 | HAWQ-V2: Hessian Aware trace-Weighted Quantization of Neural Networks | Quantization is an effective method for reducing memory footprint and inference time of Neural Networks, e.g., for efficient inference in the cloud, especially at the edge. However, ultra low precision quantization could lead to significant degradation in model generalization. A promising method to address this is to p... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 152,789 |
1911.01143 | Application of Gaussian Process Regression to Koopman Mode Decomposition
for Noisy Dynamic Data | Koopman Mode Decomposition (KMD) is a technique of nonlinear time-series analysis that originates from point spectrum of the Koopman operator defined for an underlying nonlinear dynamical system. We present a numerical algorithm of KMD based on Gaussian process regression that is capable of handling noisy finite-time d... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 152,024 |
2108.05523 | Fair Decision-Making for Food Inspections | Data and algorithms are essential and complementary parts of a large-scale decision-making process. However, their injudicious use can lead to unforeseen consequences, as has been observed by researchers and activists alike in the recent past. In this paper, we revisit the application of predictive models by the Chicag... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 250,321 |
2210.00834 | Merging Classification Predictions with Sequential Information for
Lightweight Visual Place Recognition in Changing Environments | Low-overhead visual place recognition (VPR) is a highly active research topic. Mobile robotics applications often operate under low-end hardware, and even more hardware capable systems can still benefit from freeing up onboard system resources for other navigation tasks. This work addresses lightweight VPR by proposing... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 321,019 |
1907.06607 | Agglomerative Attention | Neural networks using transformer-based architectures have recently demonstrated great power and flexibility in modeling sequences of many types. One of the core components of transformer networks is the attention layer, which allows contextual information to be exchanged among sequence elements. While many of the prev... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 138,666 |
2406.08045 | A novel approach to graph distinction through GENEOs and permutants | The theory of Group Equivariant Non-Expansive Operators (GENEOs) was initially developed in Topological Data Analysis for the geometric approximation of data observers, including their invariances and symmetries. This paper departs from that line of research and explores the use of GENEOs for distinguishing $r$-regular... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 463,329 |
2306.01753 | Preconditioned Visual Language Inference with Weak Supervision | Humans can infer the affordance of objects by extracting related contextual preconditions for each scenario. For example, upon seeing an image of a broken cup, we can infer that this precondition prevents the cup from being used for drinking. Reasoning with preconditions of commonsense is studied in NLP where the model... | false | false | false | false | true | false | false | false | true | false | false | true | false | false | false | false | false | false | 370,585 |
2407.10062 | SpikeGS: 3D Gaussian Splatting from Spike Streams with High-Speed Camera
Motion | Novel View Synthesis plays a crucial role by generating new 2D renderings from multi-view images of 3D scenes. However, capturing high-speed scenes with conventional cameras often leads to motion blur, hindering the effectiveness of 3D reconstruction. To address this challenge, high-frame-rate dense 3D reconstruction e... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 472,824 |
2012.09421 | Learning Fair Policies in Decentralized Cooperative Multi-Agent
Reinforcement Learning | We consider the problem of learning fair policies in (deep) cooperative multi-agent reinforcement learning (MARL). We formalize it in a principled way as the problem of optimizing a welfare function that explicitly encodes two important aspects of fairness: efficiency and equity. As a solution method, we propose a nove... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | true | false | false | false | 212,071 |
1911.04759 | Prediction of Missing Semantic Relations in Lexical-Semantic Network
using Random Forest Classifier | This study focuses on the prediction of missing six semantic relations (such as is_a and has_part) between two given nodes in RezoJDM a French lexical-semantic network. The output of this prediction is a set of pairs in which the first entries are semantic relations and the second entries are the probabilities of exist... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 153,074 |
2406.14066 | Optimizing Speculative Decoding for Serving Large Language Models Using
Goodput | Reducing the inference latency of large language models (LLMs) is crucial, and speculative decoding (SD) stands out as one of the most effective techniques. Rather than letting the LLM generate all tokens directly, speculative decoding employs effective proxies to predict potential outputs, which are then verified by t... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 466,136 |
1403.2360 | Matching theory for priority-based cell association in the downlink of
wireless small cell networks | The deployment of small cells, overlaid on existing cellular infrastructure, is seen as a key feature in next-generation cellular systems. In this paper, the problem of user association in the downlink of small cell networks (SCNs) is considered. The problem is formulated as a many-to-one matching game in which the use... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 31,478 |
2304.12949 | eFAT: Improving the Effectiveness of Fault-Aware Training for Mitigating
Permanent Faults in DNN Hardware Accelerators | Fault-Aware Training (FAT) has emerged as a highly effective technique for addressing permanent faults in DNN accelerators, as it offers fault mitigation without significant performance or accuracy loss, specifically at low and moderate fault rates. However, it leads to very high retraining overheads, especially when u... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 360,398 |
2006.07869 | Benchmarking Multi-Agent Deep Reinforcement Learning Algorithms in
Cooperative Tasks | Multi-agent deep reinforcement learning (MARL) suffers from a lack of commonly-used evaluation tasks and criteria, making comparisons between approaches difficult. In this work, we provide a systematic evaluation and comparison of three different classes of MARL algorithms (independent learning, centralised multi-agent... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | true | false | false | false | 181,984 |
2412.17109 | Similarity Trajectories: Linking Sampling Process to Artifacts in
Diffusion-Generated Images | Artifact detection algorithms are crucial to correcting the output generated by diffusion models. However, because of the variety of artifact forms, existing methods require substantial annotated data for training. This requirement limits their scalability and efficiency, which restricts their wide application. This pa... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 519,832 |
2405.03351 | Modality Prompts for Arbitrary Modality Salient Object Detection | This paper delves into the task of arbitrary modality salient object detection (AM SOD), aiming to detect salient objects from arbitrary modalities, eg RGB images, RGB-D images, and RGB-D-T images. A novel modality-adaptive Transformer (MAT) will be proposed to investigate two fundamental challenges of AM SOD, ie more ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 452,151 |
2410.05982 | DeMo: Decoupling Motion Forecasting into Directional Intentions and
Dynamic States | Accurate motion forecasting for traffic agents is crucial for ensuring the safety and efficiency of autonomous driving systems in dynamically changing environments. Mainstream methods adopt a one-query-one-trajectory paradigm, where each query corresponds to a unique trajectory for predicting multi-modal trajectories. ... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 495,997 |
2203.11987 | PaCa-ViT: Learning Patch-to-Cluster Attention in Vision Transformers | Vision Transformers (ViTs) are built on the assumption of treating image patches as ``visual tokens" and learn patch-to-patch attention. The patch embedding based tokenizer has a semantic gap with respect to its counterpart, the textual tokenizer. The patch-to-patch attention suffers from the quadratic complexity issue... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 287,102 |
2406.06455 | A Large Language Model Pipeline for Breast Cancer Oncology | Large language models (LLMs) have demonstrated potential in the innovation of many disciplines. However, how they can best be developed for oncology remains underdeveloped. State-of-the-art OpenAI models were fine-tuned on a clinical dataset and clinical guidelines text corpus for two important cancer treatment factors... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 462,583 |
2106.07387 | An SMT Based Compositional Algorithm to Solve a Conflict-Free Electric
Vehicle Routing Problem | The Vehicle Routing Problem (VRP) is the combinatorial optimization problem of designing routes for vehicles to visit customers in such a fashion that a cost function, typically the number of vehicles, or the total travelled distance is minimized. The problem finds applications in industrial scenarios, for example wher... | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | 240,910 |
0711.1038 | Am\'elioration des Performances des Syst\`emes Automatiques de
Reconnaissance de la Parole pour la Parole Non Native | In this article, we present an approach for non native automatic speech recognition (ASR). We propose two methods to adapt existing ASR systems to the non-native accents. The first method is based on the modification of acoustic models through integration of acoustic models from the mother tong. The phonemes of the tar... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 875 |
2107.00769 | Enhancing Multi-Robot Perception via Learned Data Association | In this paper, we address the multi-robot collaborative perception problem, specifically in the context of multi-view infilling for distributed semantic segmentation. This setting entails several real-world challenges, especially those relating to unregistered multi-agent image data. Solutions must effectively leverage... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | true | false | false | false | 244,262 |
2209.12309 | Feature Encodings for Gradient Boosting with Automunge | Automunge is a tabular preprocessing library that encodes dataframes for supervised learning. When selecting a default feature encoding strategy for gradient boosted learning, one may consider metrics of training duration and achieved predictive performance associated with the feature representations. Automunge offers ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 319,488 |
2312.04764 | First Attempt at Building Parallel Corpora for Machine Translation of
Northeast India's Very Low-Resource Languages | This paper presents the creation of initial bilingual corpora for thirteen very low-resource languages of India, all from Northeast India. It also presents the results of initial translation efforts in these languages. It creates the first-ever parallel corpora for these languages and provides initial benchmark neural ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 413,815 |
1608.09010 | Statistical physics of vaccination | Historically, infectious diseases caused considerable damage to human societies, and they continue to do so today. To help reduce their impact, mathematical models of disease transmission have been studied to help understand disease dynamics and inform prevention strategies. Vaccination - one of the most important prev... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 60,421 |
2406.11256 | Dynamic Data Mixing Maximizes Instruction Tuning for Mixture-of-Experts | Mixture-of-Experts (MoE) models have shown remarkable capability in instruction tuning, especially when the number of tasks scales. However, previous methods simply merge all training tasks (e.g. creative writing, coding, and mathematics) and apply fixed sampling weights, without considering the importance of different... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 464,801 |
1702.03812 | Reservoir Computing Using Non-Uniform Binary Cellular Automata | The Reservoir Computing (RC) paradigm utilizes a dynamical system, i.e., a reservoir, and a linear classifier, i.e., a read-out layer, to process data from sequential classification tasks. In this paper the usage of Cellular Automata (CA) as a reservoir is investigated. The use of CA in RC has been showing promising re... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 68,186 |
2203.00461 | JOINED : Prior Guided Multi-task Learning for Joint Optic Disc/Cup
Segmentation and Fovea Detection | Fundus photography has been routinely used to document the presence and severity of various retinal degenerative diseases such as age-related macula degeneration, glaucoma, and diabetic retinopathy, for which the fovea, optic disc (OD), and optic cup (OC) are important anatomical landmarks. Identification of those anat... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 283,009 |
1506.06343 | Mining Mid-level Visual Patterns with Deep CNN Activations | The purpose of mid-level visual element discovery is to find clusters of image patches that are both representative and discriminative. Here we study this problem from the prospective of pattern mining while relying on the recently popularized Convolutional Neural Networks (CNNs). We observe that a fully-connected CNN ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 44,410 |
1609.00081 | All Fingers are not Equal: Intensity of References in Scientific
Articles | Research accomplishment is usually measured by considering all citations with equal importance, thus ignoring the wide variety of purposes an article is being cited for. Here, we posit that measuring the intensity of a reference is crucial not only to perceive better understanding of research endeavor, but also to impr... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | 60,435 |
2112.03350 | Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural
Networks | Backdoor (Trojan) attacks are emerging threats against deep neural networks (DNN). A DNN being attacked will predict to an attacker-desired target class whenever a test sample from any source class is embedded with a backdoor pattern; while correctly classifying clean (attack-free) test samples. Existing backdoor defen... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 270,166 |
2312.04333 | Is Bigger and Deeper Always Better? Probing LLaMA Across Scales and
Layers | This paper presents an in-depth analysis of Large Language Models (LLMs), focusing on LLaMA, a prominent open-source foundational model in natural language processing. Instead of assessing LLaMA through its generative output, we design multiple-choice tasks to probe its intrinsic understanding in high-order tasks such ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 413,640 |
2210.04887 | In-Hand Object Rotation via Rapid Motor Adaptation | Generalized in-hand manipulation has long been an unsolved challenge of robotics. As a small step towards this grand goal, we demonstrate how to design and learn a simple adaptive controller to achieve in-hand object rotation using only fingertips. The controller is trained entirely in simulation on only cylindrical ob... | false | false | false | false | true | false | true | true | false | false | false | true | false | false | false | false | false | false | 322,617 |
2303.11428 | Lamarr: LHCb ultra-fast simulation based on machine learning models
deployed within Gauss | About 90% of the computing resources available to the LHCb experiment has been spent to produce simulated data samples for Run 2 of the Large Hadron Collider at CERN. The upgraded LHCb detector will be able to collect larger data samples, requiring many more simulated events to analyze the data to be collected in Run 3... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 352,844 |
2409.14702 | Rate-Splitting for Cell-Free Massive MIMO: Performance Analysis and
Generative AI Approach | Cell-free (CF) massive multiple-input multipleoutput (MIMO) provides a ubiquitous coverage to user equipments (UEs) but it is also susceptible to interference. Ratesplitting (RS) effectively extracts data by decoding interference, yet its effectiveness is limited by the weakest UE. In this paper, we investigate an RS-b... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 490,591 |
2105.12457 | ReStore -- Neural Data Completion for Relational Databases | Classical approaches for OLAP assume that the data of all tables is complete. However, in case of incomplete tables with missing tuples, classical approaches fail since the result of a SQL aggregate query might significantly differ from the results computed on the full dataset. Today, the only way to deal with missing ... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 237,017 |
2107.01982 | The DCU-EPFL Enhanced Dependency Parser at the IWPT 2021 Shared Task | We describe the DCU-EPFL submission to the IWPT 2021 Shared Task on Parsing into Enhanced Universal Dependencies. The task involves parsing Enhanced UD graphs, which are an extension of the basic dependency trees designed to be more facilitative towards representing semantic structure. Evaluation is carried out on 29 t... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 244,661 |
1710.02437 | Learning Word Embeddings for Hyponymy with Entailment-Based
Distributional Semantics | Lexical entailment, such as hyponymy, is a fundamental issue in the semantics of natural language. This paper proposes distributional semantic models which efficiently learn word embeddings for entailment, using a recently-proposed framework for modelling entailment in a vector-space. These models postulate a latent ve... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 82,171 |
1907.04483 | Copula Representations and Error Surface Projections for the Exclusive
Or Problem | The exclusive or (xor) function is one of the simplest examples that illustrate why nonlinear feedforward networks are superior to linear regression for machine learning applications. We review the xor representation and approximation problems and discuss their solutions in terms of probabilistic logic and associative ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 138,119 |
1705.07877 | Block building programming for symbolic regression | Symbolic regression that aims to detect underlying data-driven models has become increasingly important for industrial data analysis. For most existing algorithms such as genetic programming (GP), the convergence speed might be too slow for large-scale problems with a large number of variables. This situation may becom... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 73,912 |
2002.08679 | Neural Network Compression Framework for fast model inference | In this work we present a new framework for neural networks compression with fine-tuning, which we called Neural Network Compression Framework (NNCF). It leverages recent advances of various network compression methods and implements some of them, such as sparsity, quantization, and binarization. These methods allow ge... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 164,836 |
2405.06278 | Exploring the Interplay of Interpretability and Robustness in Deep
Neural Networks: A Saliency-guided Approach | Adversarial attacks pose a significant challenge to deploying deep learning models in safety-critical applications. Maintaining model robustness while ensuring interpretability is vital for fostering trust and comprehension in these models. This study investigates the impact of Saliency-guided Training (SGT) on model r... | false | false | false | false | false | false | false | false | false | false | false | true | true | false | false | false | false | false | 453,239 |
2408.14008 | LMM-VQA: Advancing Video Quality Assessment with Large Multimodal Models | The explosive growth of videos on streaming media platforms has underscored the urgent need for effective video quality assessment (VQA) algorithms to monitor and perceptually optimize the quality of streaming videos. However, VQA remains an extremely challenging task due to the diverse video content and the complex sp... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 483,382 |
2406.04737 | Fast-Fading Channel and Power Optimization of the Magnetic Inductive
Cellular Network | The cellular network of magnetic Induction (MI) communication holds promise in long-distance underground environments. In the traditional MI communication, there is no fast-fading channel since the MI channel is treated as a quasi-static channel. However, for the vehicle (mobile) MI (VMI) communication, the unpredictab... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 461,817 |
0910.3275 | Degrees of Freedom of Multi-Source Relay Networks | We study a multi-source Gaussian relay network consisting of $K$ source--destination pairs having $K$ unicast sessions. We assume $M$ layers of relays between the sources and the destinations. We find achievable degrees of freedom of the network. Our schemes are based on interference alignment at the transmitters and s... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 4,751 |
2406.06106 | Testably Learning Polynomial Threshold Functions | Rubinfeld & Vasilyan recently introduced the framework of testable learning as an extension of the classical agnostic model. It relaxes distributional assumptions which are difficult to verify by conditions that can be checked efficiently by a tester. The tester has to accept whenever the data truly satisfies the origi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 462,442 |
2404.15269 | Aligning LLM Agents by Learning Latent Preference from User Edits | We study interactive learning of LLM-based language agents based on user edits made to the agent's output. In a typical setting such as writing assistants, the user interacts with a language agent to generate a response given a context, and may optionally edit the agent response to personalize it based on their latent ... | false | false | false | false | true | true | true | false | true | false | false | false | false | false | false | false | false | false | 449,017 |
2007.07222 | Collaborative Unsupervised Domain Adaptation for Medical Image Diagnosis | Deep learning based medical image diagnosis has shown great potential in clinical medicine. However, it often suffers two major difficulties in real-world applications: 1) only limited labels are available for model training, due to expensive annotation costs over medical images; 2) labeled images may contain considera... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 187,269 |
2501.19125 | Upper Bounds on the Minimum Distance of Structured LDPC Codes | We investigate the minimum distance of structured binary Low-Density Parity-Check (LDPC) codes whose parity-check matrices are of the form $[\mathbf{C} \vert \mathbf{M}]$ where $\mathbf{C}$ is circulant and of column weight $2$, and $\mathbf{M}$ has fixed column weight $r \geq 3$ and row weight at least $1$. These code... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 529,023 |
2312.07252 | Identifying Drivers of Predictive Aleatoric Uncertainty | Explainability and uncertainty quantification are two pillars of trustable artificial intelligence. However, the reasoning behind uncertainty estimates is generally left unexplained. Identifying the drivers of uncertainty complements explanations of point predictions in recognizing model limitations and enhances trust ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 414,853 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.