id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1510.01135 | Feedback and Time are Essential for the Optimal Control of Computing
Systems | The performance, reliability, cost, size and energy usage of computing systems can be improved by one or more orders of magnitude by the systematic use of modern control and optimization methods. Computing systems rely on the use of feedback algorithms to schedule tasks, data and resources, but the models that are used... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 47,585 |
2405.15083 | MuDreamer: Learning Predictive World Models without Reconstruction | The DreamerV3 agent recently demonstrated state-of-the-art performance in diverse domains, learning powerful world models in latent space using a pixel reconstruction loss. However, while the reconstruction loss is essential to Dreamer's performance, it also necessitates modeling unnecessary information. Consequently, ... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 456,734 |
1711.02198 | Regret Bounds and Regimes of Optimality for User-User and Item-Item
Collaborative Filtering | We consider an online model for recommendation systems, with each user being recommended an item at each time-step and providing 'like' or 'dislike' feedback. Each user may be recommended a given item at most once. A latent variable model specifies the user preferences: both users and items are clustered into types. Al... | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | 84,017 |
1812.06110 | Dopamine: A Research Framework for Deep Reinforcement Learning | Deep reinforcement learning (deep RL) research has grown significantly in recent years. A number of software offerings now exist that provide stable, comprehensive implementations for benchmarking. At the same time, recent deep RL research has become more diverse in its goals. In this paper we introduce Dopamine, a new... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 116,541 |
1902.04208 | MaCow: Masked Convolutional Generative Flow | Flow-based generative models, conceptually attractive due to tractability of both the exact log-likelihood computation and latent-variable inference, and efficiency of both training and sampling, has led to a number of impressive empirical successes and spawned many advanced variants and theoretical investigations. Des... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 121,287 |
2408.15916 | Multi-modal Adversarial Training for Zero-Shot Voice Cloning | A text-to-speech (TTS) model trained to reconstruct speech given text tends towards predictions that are close to the average characteristics of a dataset, failing to model the variations that make human speech sound natural. This problem is magnified for zero-shot voice cloning, a task that requires training data with... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 484,126 |
2104.14072 | Nonlinear Level Set Learning for Function Approximation on Sparse Data
with Applications to Parametric Differential Equations | A dimension reduction method based on the "Nonlinear Level set Learning" (NLL) approach is presented for the pointwise prediction of functions which have been sparsely sampled. Leveraging geometric information provided by the Implicit Function Theorem, the proposed algorithm effectively reduces the input dimension to t... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 232,698 |
2305.19889 | Evaluating Machine Learning Models with NERO: Non-Equivariance Revealed
on Orbits | Proper evaluations are crucial for better understanding, troubleshooting, interpreting model behaviors and further improving model performance. While using scalar-based error metrics provides a fast way to overview model performance, they are often too abstract to display certain weak spots and lack information regardi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 369,721 |
2408.12466 | WCEbleedGen: A wireless capsule endoscopy dataset and its benchmarking
for automatic bleeding classification, detection, and segmentation | Computer-based analysis of Wireless Capsule Endoscopy (WCE) is crucial. However, a medically annotated WCE dataset for training and evaluation of automatic classification, detection, and segmentation of bleeding and non-bleeding frames is currently lacking. The present work focused on development of a medically annotat... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 482,746 |
2103.13762 | Mining Energy-Related Practices in Robotics Software | Robots are becoming more and more commonplace in many industry settings. This successful adoption can be partly attributed to (1) their increasingly affordable cost and (2) the possibility of developing intelligent, software-driven robots. Unfortunately, robotics software consumes significant amounts of energy. Moreove... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | 226,602 |
1103.5535 | A Lattice Compress-and-Forward Scheme | We present a nested lattice-code-based strategy that achieves the random-coding based Compress-and-Forward (CF) rate for the three node Gaussian relay channel. To do so, we first outline a lattice-based strategy for the $(X+Z_1,X+Z_2)$ Wyner-Ziv lossy source-coding with side-information problem in Gaussian noise, a re-... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 9,792 |
1611.08946 | Exponential Separation of Quantum Communication and Classical
Information | We exhibit a Boolean function for which the quantum communication complexity is exponentially larger than the classical information complexity. An exponential separation in the other direction was already known from the work of Kerenidis et. al. [SICOMP 44, pp. 1550-1572], hence our work implies that these two complexi... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 64,591 |
1910.09763 | Stochastic Feedforward Neural Networks: Universal Approximation | In this chapter we take a look at the universal approximation question for stochastic feedforward neural networks. In contrast to deterministic networks, which represent mappings from a set of inputs to a set of outputs, stochastic networks represent mappings from a set of inputs to a set of probability distributions o... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | 150,299 |
2405.14270 | Sparse $L^1$-Autoencoders for Scientific Data Compression | Scientific datasets present unique challenges for machine learning-driven compression methods, including more stringent requirements on accuracy and mitigation of potential invalidating artifacts. Drawing on results from compressed sensing and rate-distortion theory, we introduce effective data compression methods by d... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 456,344 |
2406.07694 | A PRISMA Driven Systematic Review of Publicly Available Datasets for
Benchmark and Model Developments for Industrial Defect Detection | Recent advancements in quality control across various industries have increasingly utilized the integration of video cameras and image processing for effective defect detection. A critical barrier to progress is the scarcity of comprehensive datasets featuring annotated defects, which are essential for developing and r... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 463,165 |
2308.14969 | Uncovering the Hidden Cost of Model Compression | In an age dominated by resource-intensive foundation models, the ability to efficiently adapt to downstream tasks is crucial. Visual Prompting (VP), drawing inspiration from the prompting techniques employed in Large Language Models (LLMs), has emerged as a pivotal method for transfer learning in the realm of computer ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 388,512 |
2208.09104 | A Causality-Based Learning Approach for Discovering the Underlying
Dynamics of Complex Systems from Partial Observations with Stochastic
Parameterization | Discovering the underlying dynamics of complex systems from data is an important practical topic. Constrained optimization algorithms are widely utilized and lead to many successes. Yet, such purely data-driven methods may bring about incorrect physics in the presence of random noise and cannot easily handle the situat... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 313,587 |
1810.09401 | Alternating Linear Bandits for Online Matrix-Factorization
Recommendation | We consider the problem of online collaborative filtering in the online setting, where items are recommended to the users over time. At each time step, the user (selected by the environment) consumes an item (selected by the agent) and provides a rating of the selected item. In this paper, we propose a novel algorithm ... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 111,051 |
1910.12795 | Learning Data Manipulation for Augmentation and Weighting | Manipulating data, such as weighting data examples or augmenting with new instances, has been increasingly used to improve model training. Previous work has studied various rule- or learning-based approaches designed for specific types of data manipulation. In this work, we propose a new method that supports learning d... | false | false | false | false | false | false | true | false | true | false | false | true | false | false | false | false | false | false | 151,200 |
1807.09077 | Optional Stopping with Bayes Factors: a categorization and extension of
folklore results, with an application to invariant situations | It is often claimed that Bayesian methods, in particular Bayes factor methods for hypothesis testing, can deal with optional stopping. We first give an overview, using elementary probability theory, of three different mathematical meanings that various authors give to this claim: (1) stopping rule independence, (2) pos... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 103,653 |
1702.05952 | Interplay between social influence and competitive strategical games in
multiplex networks | We present a model that takes into account the coupling between evolutionary game dynamics and social influence. Importantly, social influence and game dynamics take place in different domains, which we model as different layers of a multiplex network. We show that the coupling between these dynamical processes can lea... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 68,504 |
2210.12158 | Graph Coloring via Neural Networks for Haplotype Assembly and Viral
Quasispecies Reconstruction | Understanding genetic variation, e.g., through mutations, in organisms is crucial to unravel their effects on the environment and human health. A fundamental characterization can be obtained by solving the haplotype assembly problem, which yields the variation across multiple copies of chromosomes. Variations among fas... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 325,609 |
2307.01390 | Adversarial Learning in Real-World Fraud Detection: Challenges and
Perspectives | Data economy relies on data-driven systems and complex machine learning applications are fueled by them. Unfortunately, however, machine learning models are exposed to fraudulent activities and adversarial attacks, which threaten their security and trustworthiness. In the last decade or so, the research interest on adv... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 377,331 |
1803.03849 | Learning to Localize Sound Source in Visual Scenes | Visual events are usually accompanied by sounds in our daily lives. We pose the question: Can the machine learn the correspondence between visual scene and the sound, and localize the sound source only by observing sound and visual scene pairs like human? In this paper, we propose a novel unsupervised algorithm to addr... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | true | 92,333 |
2311.08883 | Distilling Rule-based Knowledge into Large Language Models | Large language models (LLMs) have shown incredible performance in completing various real-world tasks. The current paradigm of knowledge learning for LLMs is mainly based on learning from examples, in which LLMs learn the internal rule implicitly from a certain number of supervised examples. However, this learning para... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 407,904 |
2312.10421 | On the Use of Walsh Domain Equalizer for Performance Enhancement of
MIMO-OFDM Communication Systems | The purpose of this article is to investigate the viability of Multi-Carrier Modulation (MCM) systems based on the Fast Walsh Hadamard Transform (FWHT). In addition, a nonlinear Joint Low-Complexity Optimized Zero Forcing Successive Interference Cancellation (JLCOZF-SIC) equalizer is proposed. To that end, general equa... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 416,160 |
2409.06192 | NOVI : Chatbot System for University Novice with BERT and LLMs | To mitigate the difficulties of university freshmen in adapting to university life, we developed NOVI, a chatbot system based on GPT-4o. This system utilizes post and comment data from SKKU 'Everytime', a university community site. Developed using LangChain, NOVI's performance has been evaluated with a BLEU score, Perp... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 487,033 |
2307.06484 | Single-Class Target-Specific Attack against Interpretable Deep Learning
Systems | In this paper, we present a novel Single-class target-specific Adversarial attack called SingleADV. The goal of SingleADV is to generate a universal perturbation that deceives the target model into confusing a specific category of objects with a target category while ensuring highly relevant and accurate interpretation... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 379,080 |
2404.11577 | Towards Reliable Empirical Machine Unlearning Evaluation: A
Cryptographic Game Perspective | Machine unlearning updates machine learning models to remove information from specific training samples, complying with data protection regulations that allow individuals to request the removal of their personal data. Despite the recent development of numerous unlearning algorithms, reliable evaluation of these algorit... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 447,544 |
2412.01348 | Hierarchical Object-Oriented POMDP Planning for Object Rearrangement | We present an online planning framework for solving multi-object rearrangement problems in partially observable, multi-room environments. Current object rearrangement solutions, primarily based on Reinforcement Learning or hand-coded planning methods, often lack adaptability to diverse challenges. To address this limit... | false | false | false | false | true | false | true | true | false | false | false | false | false | false | false | false | false | false | 513,075 |
1806.10556 | Every Pixel Counts: Unsupervised Geometry Learning with Holistic 3D
Motion Understanding | Learning to estimate 3D geometry in a single image by watching unlabeled videos via deep convolutional network has made significant process recently. Current state-of-the-art (SOTA) methods, are based on the learning framework of rigid structure-from-motion, where only 3D camera ego motion is modeled for geometry estim... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 101,561 |
2102.11176 | Deep Reinforcement Learning for Dynamic Spectrum Sharing of LTE and NR | In this paper, a proactive dynamic spectrum sharing scheme between 4G and 5G systems is proposed. In particular, a controller decides on the resource split between NR and LTE every subframe while accounting for future network states such as high interference subframes and multimedia broadcast single frequency network (... | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | false | true | 221,348 |
1611.08358 | Kannada Spell Checker with Sandhi Splitter | Spelling errors are introduced in text either during typing, or when the user does not know the correct phoneme or grapheme. If a language contains complex words like sandhi where two or more morphemes join based on some rules, spell checking becomes very tedious. In such situations, having a spell checker with sandhi ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 64,492 |
2406.16490 | eagerlearners at SemEval2024 Task 5: The Legal Argument Reasoning Task
in Civil Procedure | This study investigates the performance of the zero-shot method in classifying data using three large language models, alongside two models with large input token sizes and the two pre-trained models on legal data. Our main dataset comes from the domain of U.S. civil procedure. It includes summaries of legal cases, spe... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 467,150 |
2201.12048 | The FreshPRINCE: A Simple Transformation Based Pipeline Time Series
Classifier | There have recently been significant advances in the accuracy of algorithms proposed for time series classification (TSC). However, a commonly asked question by real world practitioners and data scientists less familiar with the research topic, is whether the complexity of the algorithms considered state of the art is ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 277,506 |
2303.02839 | Single-shot phase retrieval: a holography-driven problem in Sobolev
space | The phase-shifting digital holography (PSDH) is a widely used approach for recovering signals by their interference (with reference waves) intensity measurements. Such measurements are traditionally from multiple shots (corresponding to multiple reference waves). However, the imaging of dynamic signals requires a singl... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 349,498 |
1506.01186 | Cyclical Learning Rates for Training Neural Networks | It is known that the learning rate is the most important hyper-parameter to tune for training deep neural networks. This paper describes a new method for setting the learning rate, named cyclical learning rates, which practically eliminates the need to experimentally find the best values and schedule for the global lea... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | true | false | false | 43,776 |
2208.03496 | Smart Explorer: Recognizing Objects in Dense Clutter via Interactive
Exploration | Recognizing objects in dense clutter accurately plays an important role to a wide variety of robotic manipulation tasks including grasping, packing, rearranging and many others. However, conventional visual recognition models usually miss objects because of the significant occlusion among instances and causes incorrect... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 311,800 |
1505.07717 | Exploring multimodal data fusion through joint decompositions with
flexible couplings | A Bayesian framework is proposed to define flexible coupling models for joint tensor decompositions of multiple data sets. Under this framework, a natural formulation of the data fusion problem is to cast it in terms of a joint maximum a posteriori (MAP) estimator. Data driven scenarios of joint posterior distributions... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 43,565 |
2403.01663 | PillarGen: Enhancing Radar Point Cloud Density and Quality via
Pillar-based Point Generation Network | In this paper, we present a novel point generation model, referred to as Pillar-based Point Generation Network (PillarGen), which facilitates the transformation of point clouds from one domain into another. PillarGen can produce synthetic point clouds with enhanced density and quality based on the provided input point ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 434,526 |
cmp-lg/9702001 | SCREEN: Learning a Flat Syntactic and Semantic Spoken Language Analysis
Using Artificial Neural Networks | In this paper, we describe a so-called screening approach for learning robust processing of spontaneously spoken language. A screening approach is a flat analysis which uses shallow sequences of category representations for analyzing an utterance at various syntactic, semantic and dialog levels. Rather than using a dee... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 536,688 |
2212.06397 | Style-Label-Free: Cross-Speaker Style Transfer by Quantized VAE and
Speaker-wise Normalization in Speech Synthesis | Cross-speaker style transfer in speech synthesis aims at transferring a style from source speaker to synthesised speech of a target speaker's timbre. Most previous approaches rely on data with style labels, but manually-annotated labels are expensive and not always reliable. In response to this problem, we propose Styl... | false | false | true | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 336,104 |
1812.10308 | Hierarchical Genetic Algorithms with evolving objective functions | We propose a framework of genetic algorithms which use multi-level hierarchies to solve an optimization problem by searching over the space of simpler objective functions. We solve a variant of Travelling Salesman Problem called \texttt{soft-TSP} and show that when the constraints on the overall objective function are ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 117,334 |
1905.00256 | Entanglement Access Control for the Quantum Internet | Quantum entanglement is a crucial element of establishing the entangled network structure of the quantum Internet. Here we define a method to achieve controlled entanglement access in the quantum Internet. The proposed model defines different levels of entanglement accessibility for the users of the quantum network. Th... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 129,427 |
2003.10477 | Distilling Knowledge from Graph Convolutional Networks | Existing knowledge distillation methods focus on convolutional neural networks (CNNs), where the input samples like images lie in a grid domain, and have largely overlooked graph convolutional networks (GCN) that handle non-grid data. In this paper, we propose to our best knowledge the first dedicated approach to disti... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 169,345 |
2206.02094 | Using Connectome Features to Constrain Echo State Networks | We report an improvement to the conventional Echo State Network (ESN) across three benchmark chaotic time-series prediction tasks using fruit fly connectome data alone. We also investigate the impact of key connectome-derived structural features on prediction performance -- uniquely bridging neurobiological structure a... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | 300,743 |
2211.03757 | Discrete Distribution Estimation under User-level Local Differential
Privacy | We study discrete distribution estimation under user-level local differential privacy (LDP). In user-level $\varepsilon$-LDP, each user has $m\ge1$ samples and the privacy of all $m$ samples must be preserved simultaneously. We resolve the following dilemma: While on the one hand having more samples per user should pro... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 329,029 |
1702.05911 | Efficient Large-scale Approximate Nearest Neighbor Search on the GPU | We present a new approach for efficient approximate nearest neighbor (ANN) search in high dimensional spaces, extending the idea of Product Quantization. We propose a two-level product and vector quantization tree that reduces the number of vector comparisons required during tree traversal. Our approach also includes a... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 68,498 |
2501.10841 | Practical and Ready-to-Use Methodology to Assess the re-identification
Risk in Anonymized Datasets | To prove that a dataset is sufficiently anonymized, many privacy policies suggest that a re-identification risk assessment be performed, but do not provide a precise methodology for doing so, leaving the industry alone with the problem. This paper proposes a practical and ready-to-use methodology for re-identification ... | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | true | false | 525,682 |
2409.00147 | MultiMath: Bridging Visual and Mathematical Reasoning for Large Language
Models | The rapid development of large language models (LLMs) has spurred extensive research into their domain-specific capabilities, particularly mathematical reasoning. However, most open-source LLMs focus solely on mathematical reasoning, neglecting the integration with visual injection, despite the fact that many mathemati... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 484,809 |
2412.01262 | Do Large Language Models with Reasoning and Acting Meet the Needs of
Task-Oriented Dialogue? | Large language models (LLMs) gained immense popularity due to their impressive capabilities in unstructured conversations. However, they underperform compared to previous approaches in task-oriented dialogue (TOD), wherein reasoning and accessing external information are crucial. Empowering LLMs with advanced prompting... | true | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 513,034 |
2106.10978 | Attribute Selection using Contranominal Scales | Formal Concept Analysis (FCA) allows to analyze binary data by deriving concepts and ordering them in lattices. One of the main goals of FCA is to enable humans to comprehend the information that is encapsulated in the data; however, the large size of concept lattices is a limiting factor for the feasibility of underst... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 242,236 |
1611.00709 | A Novel Hybrid Beamforming Algorithm with Unified Analog Beamforming by
Subspace Construction Based on Partial CSI for Massive MIMO-OFDM Systems | Hybrid beamforming (HB) has been widely studied for reducing the number of costly radio frequency (RF) chains in massive multiple-input multiple-output (MIMO) systems. However, previous works on HB are limited to a single user equipment (UE) or a single group of UEs, employing the frequency-flat first-level analog beam... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 63,270 |
1909.09227 | An Introduction to Quaternion-Valued Recurrent Projection Neural
Networks | Hypercomplex-valued neural networks, including quaternion-valued neural networks, can treat multi-dimensional data as a single entity. In this paper, we introduce the quaternion-valued recurrent projection neural networks (QRPNNs). Briefly, QRPNNs are obtained by combining the non-local projection learning with the qua... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 146,190 |
1803.09211 | Bernoulli Embeddings for Graphs | Just as semantic hashing can accelerate information retrieval, binary valued embeddings can significantly reduce latency in the retrieval of graphical data. We introduce a simple but effective model for learning such binary vectors for nodes in a graph. By imagining the embeddings as independent coin flips of varying b... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 93,455 |
2409.17167 | StressPrompt: Does Stress Impact Large Language Models and Human
Performance Similarly? | Human beings often experience stress, which can significantly influence their performance. This study explores whether Large Language Models (LLMs) exhibit stress responses similar to those of humans and whether their performance fluctuates under different stress-inducing prompts. To investigate this, we developed a no... | true | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 491,688 |
1808.08926 | Opportunistic Treating Interference as Noise | We consider a $K$-user interference network with $M$ states, where each transmitter has $M$ messages and over State $m$, Receiver $k$ wishes to decode the first $\pi_k(m) \in \{1,2,\cdots,M\}$ messages from its desired transmitter. This problem of channel with states models opportunistic communications, where more mess... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 106,064 |
2410.17834 | Non-intrusive Speech Quality Assessment with Diffusion Models Trained on
Clean Speech | Diffusion models have found great success in generating high quality, natural samples of speech, but their potential for density estimation for speech has so far remained largely unexplored. In this work, we leverage an unconditional diffusion model trained only on clean speech for the assessment of speech quality. We ... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 501,635 |
2205.08459 | Dynamic Recognition of Speakers for Consent Management by Contrastive
Embedding Replay | Voice assistants overhear conversations and a consent management mechanism is required. Consent management can be implemented using speaker recognition. Users that do not give consent enrol their voice and all their further recordings are discarded. Building speaker recognition-based consent management is challenging a... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 296,950 |
2109.07296 | Predicting Anti-Asian Hateful Users on Twitter during COVID-19 | We investigate predictors of anti-Asian hate among Twitter users throughout COVID-19. With the rise of xenophobia and polarization that has accompanied widespread social media usage in many nations, online hate has become a major social issue, attracting many researchers. Here, we apply natural language processing tech... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | false | 255,470 |
2010.12619 | Learning Implicitly with Noisy Data in Linear Arithmetic | Robust learning in expressive languages with real-world data continues to be a challenging task. Numerous conventional methods appeal to heuristics without any assurances of robustness. While probably approximately correct (PAC) Semantics offers strong guarantees, learning explicit representations is not tractable, eve... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 202,760 |
1704.07179 | A Simple Proof of Fast Polarization | Fast polarization is an important and useful property of polar codes. It was proved for the binary polarizing $2 \times 2$ kernel by Arikan and Telatar. The proof was later generalized by Sasoglu. We give a simplified proof. | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 72,316 |
1604.03626 | Privacy & Social Media in the Context of the Arab Gulf | Theories of privacy and how it relates to the use of Information Communication Technology (ICT) have been a topic of research for decades. However, little attention has been paid to the perception of privacy from the perspective of technology users in the Middle East. In this paper, we delve into interpretations of pri... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | false | 54,538 |
2110.05078 | State Estimation Using a Network of Distributed Observers With Unknown
Inputs | State estimation for a class of linear time-invariant systems with distributed output measurements (distributed sensors) and unknown inputs is addressed in this paper. The objective is to design a network of observers such that the state vector of the entire system can be estimated, while each observer (or node) has ac... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 260,157 |
1511.06438 | Joint Word Representation Learning using a Corpus and a Semantic Lexicon | Methods for learning word representations using large text corpora have received much attention lately due to their impressive performance in numerous natural language processing (NLP) tasks such as, semantic similarity measurement, and word analogy detection. Despite their success, these data-driven word representatio... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 49,251 |
2405.09582 | AD-Aligning: Emulating Human-like Generalization for Cognitive Domain
Adaptation in Deep Learning | Domain adaptation is pivotal for enabling deep learning models to generalize across diverse domains, a task complicated by variations in presentation and cognitive nuances. In this paper, we introduce AD-Aligning, a novel approach that combines adversarial training with source-target domain alignment to enhance general... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 454,465 |
1105.2214 | An improved mathematical model of social group competition | An improved mathematical model of social group competition is proposed. The utility obtained by a member of a certain group from each other member is assumed to be group size-dependent. Obtained results are close to available census data. It is shown that a significant fraction of population can be affiliated in a grou... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 10,326 |
2111.06057 | Characterization of Frequent Online Shoppers using Statistical Learning
with Sparsity | Developing shopping experiences that delight the customer requires businesses to understand customer taste. This work reports a method to learn the shopping preferences of frequent shoppers to an online gift store by combining ideas from retail analytics and statistical learning with sparsity. Shopping activity is repr... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 265,973 |
2410.12577 | On the Utility of Domain Modeling Assistance with Large Language Models | Model-driven engineering (MDE) simplifies software development through abstraction, yet challenges such as time constraints, incomplete domain understanding, and adherence to syntactic constraints hinder the design process. This paper presents a study to evaluate the usefulness of a novel approach utilizing large langu... | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 499,093 |
2310.06155 | CoQuest: Exploring Research Question Co-Creation with an LLM-based Agent | Developing novel research questions (RQs) often requires extensive literature reviews, especially in interdisciplinary fields. To support RQ development through human-AI co-creation, we leveraged Large Language Models (LLMs) to build an LLM-based agent system named CoQuest. We conducted an experiment with 20 HCI resear... | true | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 398,443 |
2212.01959 | INGeo: Accelerating Instant Neural Scene Reconstruction with Noisy
Geometry Priors | We present a method that accelerates reconstruction of 3D scenes and objects, aiming to enable instant reconstruction on edge devices such as mobile phones and AR/VR headsets. While recent works have accelerated scene reconstruction training to minute/second-level on high-end GPUs, there is still a large gap to the goa... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 334,630 |
2207.09372 | On Decentralizing Federated Reinforcement Learning in Multi-Robot
Scenarios | Federated Learning (FL) allows for collaboratively aggregating learned information across several computing devices and sharing the same amongst them, thereby tackling issues of privacy and the need of huge bandwidth. FL techniques generally use a central server or cloud for aggregating the models received from the dev... | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | 308,882 |
2208.10165 | Exploring Task-oriented Communication in Multi-agent System: A Deep
Reinforcement Learning Approach | The multi-agent system (MAS) enables the sharing of capabilities among agents, such that collaborative tasks can be accomplished with high scalability and efficiency. MAS is increasingly widely applied in various fields. Meanwhile, the large-scale and time-sensitive data transmission between agents brings challenges to... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | 313,957 |
2109.01182 | COVID-19 Vaccine Hesitancy and Information Diffusion: An Agent-based
Modeling Approach | Despite the unprecedented success in the rapid development of several effective vaccines against the Cov-SARS-2, global vaccination rollout efforts suffer from vaccine distribution inequality and vaccine acceptance, leading to insufficient public immunity provided by the vaccine products. While a major current focus in... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | false | false | false | 253,360 |
2206.07150 | Attacks on Perception-Based Control Systems: Modeling and Fundamental
Limits | We study the performance of perception-based control systems in the presence of attacks, and provide methods for modeling and analysis of their resiliency to stealthy attacks on both physical and perception-based sensing. Specifically, we consider a general setup with a nonlinear affine physical plant controlled with a... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 302,615 |
2207.09089 | Balancing the trade-off between cost and reliability for wireless sensor
networks: a multi-objective optimized deployment method | The deployment of the sensor nodes (SNs) always plays a decisive role in the system performance of wireless sensor networks (WSNs). In this work, we propose an optimal deployment method for practical heterogeneous WSNs which gives a deep insight into the trade-off between the reliability and deployment cost. Specifical... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | true | 308,794 |
1606.04232 | DCNNs on a Diet: Sampling Strategies for Reducing the Training Set Size | Large-scale supervised classification algorithms, especially those based on deep convolutional neural networks (DCNNs), require vast amounts of training data to achieve state-of-the-art performance. Decreasing this data requirement would significantly speed up the training process and possibly improve generalization. M... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 57,219 |
2010.10962 | World impact of kernel European Union 9 countries from Google matrix
analysis of the world trade network | We use the United Nations COMTRADE database for analysis of the multiproduct world trade network. With this data, considered for years 2012-2018, we determined the world trade impact of the Kernel of EU 9 countries (KEU9), being Austria, Belgium, France, Germany, Italy, Luxembourg, Netherlands, Portugal, Spain, conside... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 202,068 |
1708.05279 | Designing and building the mlpack open-source machine learning library | mlpack is an open-source C++ machine learning library with an emphasis on speed and flexibility. Since its original inception in 2007, it has grown to be a large project implementing a wide variety of machine learning algorithms, from standard techniques such as decision trees and logistic regression to modern techniqu... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 79,104 |
1306.5609 | Partial Spreads in Random Network Coding | Following the approach by R. K\"otter and F. R. Kschischang, we study network codes as families of k-dimensional linear subspaces of a vector space F_q^n, q being a prime power and F_q the finite field with q elements. In particular, following an idea in finite projective geometry, we introduce a class of network codes... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 25,423 |
2412.04244 | GigaHands: A Massive Annotated Dataset of Bimanual Hand Activities | Understanding bimanual human hand activities is a critical problem in AI and robotics. We cannot build large models of bimanual activities because existing datasets lack the scale, coverage of diverse hand activities, and detailed annotations. We introduce GigaHands, a massive annotated dataset capturing 34 hours of bi... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 514,321 |
1608.01017 | Automated X-ray Image Analysis for Cargo Security: Critical Review and
Future Promise | We review the relatively immature field of automated image analysis for X-ray cargo imagery. There is increasing demand for automated analysis methods that can assist in the inspection and selection of containers, due to the ever-growing volumes of traded cargo and the increasing concerns that customs- and security-rel... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 59,370 |
2102.02000 | A generalised feature for low level vision | This papers presents a novel quantised transform (the Sinclair-Town or ST transform for short) that subsumes the rolls of both edge-detector, MSER style region detector and corner detector. The transform is similar to the $unsharp$ transform but the difference from the local mean is quantised to 3 values (dark-neutral-... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 218,296 |
1207.1425 | Qualitative Decision Making Under Possibilistic Uncertainty: Toward more
discriminating criteria | The aim of this paper is to propose a generalization of previous approaches in qualitative decision making. Our work is based on the binary possibilistic utility (PU), which is a possibilistic counterpart of Expected Utility (EU).We first provide a new axiomatization of PU and study its relation with the lexicographic ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 17,304 |
2401.07923 | Word Boundary Information Isn't Useful for Encoder Language Models | All existing transformer-based approaches to NLP using subword tokenisation algorithms encode whitespace (word boundary information) through the use of special space symbols (such as \#\# or \_) forming part of tokens. These symbols have been shown to a) lead to reduced morphological validity of tokenisations, and b) g... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 421,696 |
1804.08049 | Semi-supervised User Geolocation via Graph Convolutional Networks | Social media user geolocation is vital to many applications such as event detection. In this paper, we propose GCN, a multiview geolocation model based on Graph Convolutional Networks, that uses both text and network context. We compare GCN to the state-of-the-art, and to two baselines we propose, and show that our mod... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 95,674 |
2403.00665 | Complex-Valued Neural Network based Federated Learning for Multi-user
Indoor Positioning Performance Optimization | In this article, the use of channel state information (CSI) for indoor positioning is studied. In the considered model, a server equipped with several antennas sends pilot signals to users, while each user uses the received pilot signals to estimate channel states for user positioning. To this end, we formulate the pos... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 434,058 |
2502.06727 | Application of Artificial Intelligence (AI) in Civil Engineering | Hard computing generally deals with precise data, which provides ideal solutions to problems. However, in the civil engineering field, amongst other disciplines, that is not always the case as real-world systems are continuously changing. Here lies the need to explore soft computing methods and artificial intelligence ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 532,204 |
2308.02632 | Generation of Realistic Synthetic Raw Radar Data for Automated Driving
Applications using Generative Adversarial Networks | The main approaches for simulating FMCW radar are based on ray tracing, which is usually computationally intensive and do not account for background noise. This work proposes a faster method for FMCW radar simulation capable of generating synthetic raw radar data using generative adversarial networks (GAN). The code an... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 383,718 |
2402.09124 | Finding Densest Subgraphs with Edge-Color Constraints | We consider a variant of the densest subgraph problem in networks with single or multiple edge attributes. For example, in a social network, the edge attributes may describe the type of relationship between users, such as friends, family, or acquaintances, or different types of communication. For conceptual simplicity,... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 429,378 |
2406.03216 | Choice of PEFT Technique in Continual Learning: Prompt Tuning is Not All
You Need | Recent Continual Learning (CL) methods have combined pretrained Transformers with prompt tuning, a parameter-efficient fine-tuning (PEFT) technique. We argue that the choice of prompt tuning in prior works was an undefended and unablated decision, which has been uncritically adopted by subsequent research, but warrants... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 461,146 |
2411.03556 | VQ-ACE: Efficient Policy Search for Dexterous Robotic Manipulation via
Action Chunking Embedding | Dexterous robotic manipulation remains a significant challenge due to the high dimensionality and complexity of hand movements required for tasks like in-hand manipulation and object grasping. This paper addresses this issue by introducing Vector Quantized Action Chunking Embedding (VQ-ACE), a novel framework that comp... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 505,945 |
2310.01022 | Subtractor-Based CNN Inference Accelerator | This paper presents a novel method to boost the performance of CNN inference accelerators by utilizing subtractors. The proposed CNN preprocessing accelerator relies on sorting, grouping, and rounding the weights to create combinations that allow for the replacement of one multiplication operation and addition operatio... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 396,245 |
2406.07314 | Rethinking the impact of noisy labels in graph classification: A utility
and privacy perspective | Graph neural networks based on message-passing mechanisms have achieved advanced results in graph classification tasks. However, their generalization performance degrades when noisy labels are present in the training data. Most existing noisy labeling approaches focus on the visual domain or graph node classification t... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 462,993 |
2403.16464 | Training Generative Adversarial Network-Based Vocoder with Limited Data
Using Augmentation-Conditional Discriminator | A generative adversarial network (GAN)-based vocoder trained with an adversarial discriminator is commonly used for speech synthesis because of its fast, lightweight, and high-quality characteristics. However, this data-driven model requires a large amount of training data incurring high data-collection costs. This fac... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 441,056 |
2402.03978 | Reconfigurable Power Converters with Increased Utilization for
Unbalanced Power Distribution System Applications | A low-cost reconfiguration stage connected at the output of balanced three-phase, multi-terminal ac/dc/ac converters can increase the feasible set of power injections substantially, increasing converter utilization and therefore achieving a lower system cost. However, the approach has yet to be explored for phase unbal... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 427,278 |
2112.06307 | Image-to-Height Domain Translation for Synthetic Aperture Sonar | Observations of seabed texture with synthetic aperture sonar are dependent upon several factors. In this work, we focus on collection geometry with respect to isotropic and anisotropic textures. The low grazing angle of the collection geometry, combined with orientation of the sonar path relative to anisotropic texture... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 271,124 |
1710.00132 | Dense RGB-D semantic mapping with Pixel-Voxel neural network | For intelligent robotics applications, extending 3D mapping to 3D semantic mapping enables robots to, not only localize themselves with respect to the scene's geometrical features but also simultaneously understand the higher level meaning of the scene contexts. Most previous methods focus on geometric 3D reconstructio... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 81,811 |
2212.02936 | M-VADER: A Model for Diffusion with Multimodal Context | We introduce M-VADER: a diffusion model (DM) for image generation where the output can be specified using arbitrary combinations of images and text. We show how M-VADER enables the generation of images specified using combinations of image and text, and combinations of multiple images. Previously, a number of successfu... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 334,941 |
2209.10369 | Approximating the full-field temperature evolution in 3D electronic
systems from randomized "Minecraft" systems | Neural Networks as fast physics simulators have a large potential for many engineering design tasks. Prerequisites for a wide-spread application are an easy-to-use workflow for generating training datasets in a reasonable time, and the capability of the network to generalize to unseen systems. In contrast to most previ... | false | true | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 318,840 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.