id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2407.04503 | When LLMs Play the Telephone Game: Cumulative Changes and Attractors in
Iterated Cultural Transmissions | As large language models (LLMs) start interacting with each other and generating an increasing amount of text online, it becomes crucial to better understand how information is transformed as it passes from one LLM to the next. While significant research has examined individual LLM behaviors, existing studies have larg... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | 470,584 |
2301.00984 | Protein-Ligand Complex Generator & Drug Screening via Tiered Tensor
Transform | The generation of small molecule candidate (ligand) binding poses in its target protein pocket is important for computer-aided drug discovery. Typical rigid-body docking methods ignore the pocket flexibility of protein, while the more accurate pose generation using molecular dynamics is hindered by slow protein dynamic... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 339,095 |
2307.12659 | A Model for Every User and Budget: Label-Free and Personalized
Mixed-Precision Quantization | Recent advancement in Automatic Speech Recognition (ASR) has produced large AI models, which become impractical for deployment in mobile devices. Model quantization is effective to produce compressed general-purpose models, however such models may only be deployed to a restricted sub-domain of interest. We show that AS... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 381,337 |
1904.02021 | Unsupervised Progressive Learning and the STAM Architecture | We first pose the Unsupervised Progressive Learning (UPL) problem: an online representation learning problem in which the learner observes a non-stationary and unlabeled data stream, learning a growing number of features that persist over time even though the data is not stored or replayed. To solve the UPL problem we ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 126,305 |
1401.3444 | On the Qualitative Comparison of Decisions Having Positive and Negative
Features | Making a decision is often a matter of listing and comparing positive and negative arguments. In such cases, the evaluation scale for decisions should be considered bipolar, that is, negative and positive values should be explicitly distinguished. That is what is done, for example, in Cumulative Prospect Theory. Howeve... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 29,855 |
2408.08185 | Data-driven identification of latent port-Hamiltonian systems | Conventional physics-based modeling techniques involve high effort, e.g., time and expert knowledge, while data-driven methods often lack interpretability, structure, and sometimes reliability. To mitigate this, we present a data-driven system identification framework that derives models in the port-Hamiltonian (pH) fo... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 480,889 |
2403.19014 | Thelxino\"e: Recognizing Human Emotions Using Pupillometry and Machine
Learning | In this study, we present a method for emotion recognition in Virtual Reality (VR) using pupillometry. We analyze pupil diameter responses to both visual and auditory stimuli via a VR headset and focus on extracting key features in the time-domain, frequency-domain, and time-frequency domain from VR generated data. Our... | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 442,165 |
2410.00343 | RRT-CBF Based Motion Planning | Control barrier functions (CBF) are widely explored to enforce the safety-critical constraints on nonlinear systems recently. There are many researchers incorporating the control barrier functions into path planning algorithms to find a safe path, but these methods involve huge computational complexity or unidirectiona... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 493,326 |
2410.22392 | CBAM-EfficientNetV2 for Histopathology Image Classification using
Transfer Learning and Dual Attention Mechanisms | Breast cancer histopathology image classification is critical for early detection and improved patient outcomes. 1 This study introduces a novel approach leveraging EfficientNetV2 models, to improve feature extraction and focus on relevant tissue regions. The proposed models were evaluated on the BreakHis dataset acros... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 503,626 |
1705.10500 | Exploiting Restricted Boltzmann Machines and Deep Belief Networks in
Compressed Sensing | This paper proposes a CS scheme that exploits the representational power of restricted Boltzmann machines and deep learning architectures to model the prior distribution of the sparsity pattern of signals belonging to the same class. The determined probability distribution is then used in a maximum a posteriori (MAP) a... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 74,413 |
2307.16694 | Investigating and Improving Latent Density Segmentation Models for
Aleatoric Uncertainty Quantification in Medical Imaging | Data uncertainties, such as sensor noise, occlusions or limitations in the acquisition method can introduce irreducible ambiguities in images, which result in varying, yet plausible, semantic hypotheses. In Machine Learning, this ambiguity is commonly referred to as aleatoric uncertainty. In image segmentation, latent ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 382,700 |
1706.05814 | Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design | In this paper we analyze LT and Raptor codes under inactivation decoding. A first order analysis is introduced, which provides the expected number of inactivations for an LT code, as a function of the output distribution, the number of input symbols and the decoding overhead. The analysis is then extended to the calcul... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 75,581 |
1707.09916 | Robust Private Information Retrieval on Coded Data | We consider the problem of designing PIR scheme on coded data when certain nodes are unresponsive. We provide the construction of $\nu$-robust PIR schemes that can tolerate up to $\nu$ unresponsive nodes. These schemes are adaptive and universally optimal in the sense of achieving (asymptotically) optimal download cost... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 78,110 |
1604.04660 | Why Artificial Intelligence Needs a Task Theory --- And What It Might
Look Like | The concept of "task" is at the core of artificial intelligence (AI): Tasks are used for training and evaluating AI systems, which are built in order to perform and automatize tasks we deem useful. In other fields of engineering theoretical foundations allow thorough evaluation of designs by methodical manipulation of ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 54,679 |
2203.04236 | A Complete Characterization of Linear Estimators for Offline Policy
Evaluation | Offline policy evaluation is a fundamental statistical problem in reinforcement learning that involves estimating the value function of some decision-making policy given data collected by a potentially different policy. In order to tackle problems with complex, high-dimensional observations, there has been significant ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 284,396 |
2410.18301 | LEO-based Positioning: Foundations, Signal Design, and Receiver
Enhancements for 6G NTN | The integration of non-terrestrial networks (NTN) into 5G new radio (NR) has opened up the possibility of developing a new positioning infrastructure using NR signals from Low-Earth Orbit (LEO) satellites. LEO-based cellular positioning offers several advantages, such as a superior link budget, higher operating bandwid... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 501,827 |
2409.13083 | FedAT: Federated Adversarial Training for Distributed Insider Threat
Detection | Insider threats usually occur from within the workplace, where the attacker is an entity closely associated with the organization. The sequence of actions the entities take on the resources to which they have access rights allows us to identify the insiders. Insider Threat Detection (ITD) using Machine Learning (ML)-ba... | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | true | 489,840 |
2402.09246 | Who Plays First? Optimizing the Order of Play in Stackelberg Games with
Many Robots | We consider the multi-agent spatial navigation problem of computing the socially optimal order of play, i.e., the sequence in which the agents commit to their decisions, and its associated equilibrium in an N-player Stackelberg trajectory game. We model this problem as a mixed-integer optimization problem over the spac... | false | false | false | false | true | false | false | true | false | false | true | false | false | false | false | false | false | false | 429,433 |
1808.03550 | Atmospheric turbulence mitigation for sequences with moving objects
using recursive image fusion | This paper describes a new method for mitigating the effects of atmospheric distortion on observed sequences that include large moving objects. In order to provide accurate detail from objects behind the distorting layer, we solve the space-variant distortion problem using recursive image fusion based on the Dual Tree ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 104,951 |
1612.08333 | Text Summarization using Deep Learning and Ridge Regression | We develop models and extract relevant features for automatic text summarization and investigate the performance of different models on the DUC 2001 dataset. Two different models were developed, one being a ridge regressor and the other one was a multi-layer perceptron. The hyperparameters were varied and their perform... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 66,058 |
2412.07883 | On Faster Marginalization with Squared Circuits via Orthonormalization | Squared tensor networks (TNs) and their generalization as parameterized computational graphs -- squared circuits -- have been recently used as expressive distribution estimators in high dimensions. However, the squaring operation introduces additional complexity when marginalizing variables or computing the partition f... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 515,842 |
2203.12138 | A Search-Based Framework for Automatic Generation of Testing
Environments for Cyber-Physical Systems | Many modern cyber physical systems incorporate computer vision technologies, complex sensors and advanced control software, allowing them to interact with the environment autonomously. Testing such systems poses numerous challenges: not only should the system inputs be varied, but also the surrounding environment shoul... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 287,155 |
2105.11657 | Dynamic Dual Sampling Module for Fine-Grained Semantic Segmentation | Representation of semantic context and local details is the essential issue for building modern semantic segmentation models. However, the interrelationship between semantic context and local details is not well explored in previous works. In this paper, we propose a Dynamic Dual Sampling Module (DDSM) to conduct dynam... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 236,778 |
2205.10955 | Investigating classification learning curves for automatically generated
and labelled plant images | In the context of supervised machine learning a learning curve describes how a model's performance on unseen data relates to the amount of samples used to train the model. In this paper we present a dataset of plant images with representatives of crops and weeds common to the Manitoba prairies at different growth stage... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 297,940 |
2409.11257 | To What Extent do Open-loop and Feedback Nash Equilibria Diverge in
General-Sum Linear Quadratic Dynamic Games? | Dynamic games offer a versatile framework for modeling the evolving interactions of strategic agents, whose steady-state behavior can be captured by the Nash equilibria of the games. Nash equilibria are often computed in feedback, with policies depending on the state at each time, or in open-loop, with policies dependi... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 489,078 |
2404.05447 | Pansharpening of PRISMA products for archaeological prospection | Hyperspectral data recorded from satellite platforms are often ill-suited for geo-archaeological prospection due to low spatial resolution. The established potential of hyperspectral data from airborne sensors in identifying archaeological features has, on the other side, generated increased interest in enhancing hyper... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 445,090 |
2006.05575 | Deep Learning-based Aerial Image Segmentation with Open Data for
Disaster Impact Assessment | Satellite images are an extremely valuable resource in the aftermath of natural disasters such as hurricanes and tsunamis where they can be used for risk assessment and disaster management. In order to provide timely and actionable information for disaster response, in this paper a framework utilising segmentation neur... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 181,115 |
2411.13506 | Bezier Reachable Polytopes: Efficient Certificates for Robust Motion
Planning with Layered Architectures | Control architectures are often implemented in a layered fashion, combining independently designed blocks to achieve complex tasks. Providing guarantees for such hierarchical frameworks requires considering the capabilities and limitations of each layer and their interconnections at design time. To address this holisti... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 509,803 |
2408.02683 | Improving Machine Learning Based Sepsis Diagnosis Using Heart Rate
Variability | The early and accurate diagnosis of sepsis is critical for enhancing patient outcomes. This study aims to use heart rate variability (HRV) features to develop an effective predictive model for sepsis detection. Critical HRV features are identified through feature engineering methods, including statistical bootstrapping... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 478,718 |
1210.4905 | Latent Composite Likelihood Learning for the Structured Canonical
Correlation Model | Latent variable models are used to estimate variables of interest quantities which are observable only up to some measurement error. In many studies, such variables are known but not precisely quantifiable (such as "job satisfaction" in social sciences and marketing, "analytical ability" in educational testing, or "inf... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 19,229 |
2203.05174 | Assessing Phenotype Definitions for Algorithmic Fairness | Disease identification is a core, routine activity in observational health research. Cohorts impact downstream analyses, such as how a condition is characterized, how patient risk is defined, and what treatments are studied. It is thus critical to ensure that selected cohorts are representative of all patients, indepen... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 284,730 |
1705.00969 | The Problem of Coincidence in A Theory of Temporal Multiple Recurrence | Logical theories have been developed which have allowed temporal reasoning about eventualities (a la Galton) such as states, processes, actions, events, processes and complex eventualities such as sequences and recurrences of other eventualities. This paper presents the problem of coincidence within the framework of a ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 72,775 |
1907.02824 | Visual Appearance Analysis of Forest Scenes for Monocular SLAM | Monocular simultaneous localisation and mapping (SLAM) is a cheap and energy efficient way to enable Unmanned Aerial Vehicles (UAVs) to safely navigate managed forests and gather data crucial for monitoring tree health. SLAM research, however, has mostly been conducted in structured human environments, and as such is p... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 137,695 |
1205.0326 | Performance Analysis of Decode-and-Forward Relaying in Gamma-Gamma
Fading Channels | Decode-and-forward (DF) cooperative communication based on free space optical (FSO) links is studied in this letter. We analyze performance of the DF protocol in the FSO links following the Gamma-Gamma distribution. The cumulative distribution function (CDF) and probability density function (PDF) of a random variable c... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 15,761 |
2406.13725 | Tree-Sliced Wasserstein Distance on a System of Lines | Sliced Wasserstein (SW) distance in Optimal Transport (OT) is widely used in various applications thanks to its statistical effectiveness and computational efficiency. On the other hand, Tree Wassenstein (TW) and Tree-sliced Wassenstein (TSW) are instances of OT for probability measures where its ground cost is a tree ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 465,975 |
2108.06866 | Receding Horizon Iterative Learning Control for Continuously Operated
Systems | This paper presents an iterative learning control (ILC) scheme for continuously operated repetitive systems for which no initial condition reset exists. To accomplish this, we develop a lifted system representation that accounts for the effect of the initial conditions on dynamics and projects the dynamics over multipl... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 250,753 |
1907.02633 | On the Convergence of Model Free Learning in Mean Field Games | Learning by experience in Multi-Agent Systems (MAS) is a difficult and exciting task, due to the lack of stationarity of the environment, whose dynamics evolves as the population learns. In order to design scalable algorithms for systems with a large population of interacting agents (e.g. swarms), this paper focuses on... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 137,646 |
2205.05015 | Robust Optimization for Local Differential Privacy | We consider the setting of publishing data without leaking sensitive information. We do so in the framework of Robust Local Differential Privacy (RLDP). This ensures privacy for all distributions of the data in an uncertainty set. We formulate the problem of finding the optimal data release protocol as a robust optimiz... | false | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | 295,813 |
2303.09645 | Development of a Voice Controlled Robotic Arm | This paper describes a robotic arm with 5 degrees-of-freedom (DOF) which is controlled by human voice and has been developed in the Mechatronics Laboratory, CUET. This robotic arm is interfaced with a PC by serial communication (RS-232). Users' voice command is captured by a microphone, and this voice is processed by s... | false | false | true | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 352,125 |
2311.04664 | Speech language models lack important brain-relevant semantics | Despite known differences between reading and listening in the brain, recent work has shown that text-based language models predict both text-evoked and speech-evoked brain activity to an impressive degree. This poses the question of what types of information language models truly predict in the brain. We investigate t... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 406,309 |
2207.01584 | Classification of Alzheimer's Disease Using the Convolutional Neural
Network (CNN) with Transfer Learning and Weighted Loss | Alzheimer's disease is a progressive neurodegenerative disorder that gradually deprives the patient of cognitive function and can end in death. With the advancement of technology today, it is possible to detect Alzheimer's disease through Magnetic Resonance Imaging (MRI) scans. So that MRI is the technique most often u... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 306,234 |
2303.06068 | EEG Synthetic Data Generation Using Probabilistic Diffusion Models | Electroencephalography (EEG) plays a significant role in the Brain Computer Interface (BCI) domain, due to its non-invasive nature, low cost, and ease of use, making it a highly desirable option for widespread adoption by the general public. This technology is commonly used in conjunction with deep learning techniques,... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 350,687 |
2410.10409 | SMART-TRACK: A Novel Kalman Filter-Guided Sensor Fusion For Robust UAV
Object Tracking in Dynamic Environments | In the field of sensor fusion and state estimation for object detection and localization, ensuring accurate tracking in dynamic environments poses significant challenges. Traditional methods like the Kalman Filter (KF) often fail when measurements are intermittent, leading to rapid divergence in state estimations. To a... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 498,064 |
1910.06799 | Federated Learning for Coalition Operations | Machine Learning in coalition settings requires combining insights available from data assets and knowledge repositories distributed across multiple coalition partners. In tactical environments, this requires sharing the assets, knowledge and models in a bandwidth-constrained environment, while staying in conformance w... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 149,449 |
1606.00313 | Improved Regret Bounds for Oracle-Based Adversarial Contextual Bandits | We give an oracle-based algorithm for the adversarial contextual bandit problem, where either contexts are drawn i.i.d. or the sequence of contexts is known a priori, but where the losses are picked adversarially. Our algorithm is computationally efficient, assuming access to an offline optimization oracle, and enjoys ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 56,656 |
2412.04832 | WRF-GS: Wireless Radiation Field Reconstruction with 3D Gaussian
Splatting | Wireless channel modeling plays a pivotal role in designing, analyzing, and optimizing wireless communication systems. Nevertheless, developing an effective channel modeling approach has been a longstanding challenge. This issue has been escalated due to the denser network deployment, larger antenna arrays, and wider b... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 514,588 |
1608.02060 | Weighted diffusion LMP algorithm for distributed estimation in
non-uniform noise conditions | This letter presents an improved version of diffusion least mean ppower (LMP) algorithm for distributed estimation. Instead of sum of mean square errors, a weighted sum of mean square error is defined as the cost function for global and local cost functions of a network of sensors. The weight coefficients are updated b... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 59,505 |
2301.01764 | UniHD at TSAR-2022 Shared Task: Is Compute All We Need for Lexical
Simplification? | Previous state-of-the-art models for lexical simplification consist of complex pipelines with several components, each of which requires deep technical knowledge and fine-tuned interaction to achieve its full potential. As an alternative, we describe a frustratingly simple pipeline based on prompted GPT-3 responses, be... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 339,314 |
2008.03673 | Feature Space Augmentation for Long-Tailed Data | Real-world data often follow a long-tailed distribution as the frequency of each class is typically different. For example, a dataset can have a large number of under-represented classes and a few classes with more than sufficient data. However, a model to represent the dataset is usually expected to have reasonably ho... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 190,990 |
2408.09583 | Convolutional Conditional Neural Processes | Neural processes are a family of models which use neural networks to directly parametrise a map from data sets to predictions. Directly parametrising this map enables the use of expressive neural networks in small-data problems where neural networks would traditionally overfit. Neural processes can produce well-calibra... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 481,501 |
1902.07906 | Wasserstein Adversarial Examples via Projected Sinkhorn Iterations | A rapidly growing area of work has studied the existence of adversarial examples, datapoints which have been perturbed to fool a classifier, but the vast majority of these works have focused primarily on threat models defined by $\ell_p$ norm-bounded perturbations. In this paper, we propose a new threat model for adver... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 122,090 |
2109.14213 | On the One-sided Convergence of Adam-type Algorithms in Non-convex
Non-concave Min-max Optimization | Adam-type methods, the extension of adaptive gradient methods, have shown great performance in the training of both supervised and unsupervised machine learning models. In particular, Adam-type optimizers have been widely used empirically as the default tool for training generative adversarial networks (GANs). On the t... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 257,900 |
1705.01721 | Evolutionary learning of fire fighting strategies | The dynamic problem of enclosing an expanding fire can be modelled by a discrete variant in a grid graph. While the fire expands to all neighbouring cells in any time step, the fire fighter is allowed to block $c$ cells in the average outside the fire in the same time interval. It was shown that the success of the fire... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 72,879 |
2102.03551 | Jointly Improving Language Understanding and Generation with
Quality-Weighted Weak Supervision of Automatic Labeling | Neural natural language generation (NLG) and understanding (NLU) models are data-hungry and require massive amounts of annotated data to be competitive. Recent frameworks address this bottleneck with generative models that synthesize weak labels at scale, where a small amount of training labels are expert-curated and t... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 218,790 |
1704.03503 | UC Merced Submission to the ActivityNet Challenge 2016 | This notebook paper describes our system for the untrimmed classification task in the ActivityNet challenge 2016. We investigate multiple state-of-the-art approaches for action recognition in long, untrimmed videos. We exploit hand-crafted motion boundary histogram features as well feature activations from deep network... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 71,638 |
2212.12327 | Linear features segmentation from aerial images | The rapid development of remote sensing technologies have gained significant attention due to their ability to accurately localize, classify, and segment objects from aerial images. These technologies are commonly used in unmanned aerial vehicles (UAVs) equipped with high-resolution cameras or sensors to capture data o... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 338,017 |
2202.10542 | Cell-Free Massive MIMO with Finite Fronthaul Capacity: A Stochastic
Geometry Perspective | In this work, we analyze the downlink performance of a cell-free massive multiple-input-multiple-output system with finite capacity fronthaul links between the centralized baseband units and the access point (APs). Conditioned on the user and AP locations, we first derive an achievable rate for a randomly selected user... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 281,553 |
2201.07289 | Sparsification of Decomposable Submodular Functions | Submodular functions are at the core of many machine learning and data mining tasks. The underlying submodular functions for many of these tasks are decomposable, i.e., they are sum of several simple submodular functions. In many data intensive applications, however, the number of underlying submodular functions in the... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 275,983 |
2401.12873 | Improving Machine Translation with Human Feedback: An Exploration of
Quality Estimation as a Reward Model | Insufficient modeling of human preferences within the reward model is a major obstacle for leveraging human feedback to improve translation quality. Fortunately, quality estimation (QE), which predicts the quality of a given translation without reference, has achieved impressive alignment with human evaluations in the ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 423,525 |
2012.11797 | Time Series Domain Adaptation via Sparse Associative Structure Alignment | Domain adaptation on time series data is an important but challenging task. Most of the existing works in this area are based on the learning of the domain-invariant representation of the data with the help of restrictions like MMD. However, such extraction of the domain-invariant representation is a non-trivial task f... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 212,734 |
1903.04081 | Redditors in Recovery: Text Mining Reddit to Investigate Transitions
into Drug Addiction | Increasing rates of opioid drug abuse and heightened prevalence of online support communities underscore the necessity of employing data mining techniques to better understand drug addiction using these rapidly developing online resources. In this work, we obtain data from Reddit, an online collection of forums, to gat... | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 123,894 |
1709.02589 | A geometric approach for learning compliant motions from demonstration | This paper proposes a method to learn from human demonstration compliant contact motions, which take advantage of interaction forces between workpieces to align them, even when contact force may occur from different directions on different instances of reproduction. To manage the uncertainty in unstructured conditions,... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 80,302 |
2201.05629 | Zero-Shot Machine Unlearning | Modern privacy regulations grant citizens the right to be forgotten by products, services and companies. In case of machine learning (ML) applications, this necessitates deletion of data not only from storage archives but also from ML models. Due to an increasing need for regulatory compliance required for ML applicati... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 275,439 |
1607.02317 | Power-Availability-Aware Cell Association for Energy-Harvesting
Small-Cell Base Stations | Energy harvesting brings a key solution to the increasing energy bill and environmental concerns but, at the same time, the network availability may be deteriorated due to potential energy shortage. In this paper, we analyze the performance of off-grid small-cell base stations (scBS) with finite battery capacity and de... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 58,331 |
2410.09699 | Honest AI: Fine-Tuning "Small" Language Models to Say "I Don't Know",
and Reducing Hallucination in RAG | Hallucination is a key roadblock for applications of Large Language Models (LLMs), particularly for enterprise applications that are sensitive to information accuracy. To address this issue, two general approaches have been explored: Retrieval-Augmented Generation (RAG) to supply LLMs with updated information as contex... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 497,729 |
2206.03487 | Formalization of the principles of brain Programming (Brain Principles
Programming) | In the monograph "Strong artificial intelligence. On the Approaches to Superintelligence" contains an overview of general artificial intelligence (AGI). As an anthropomorphic research area, it includes Brain Principles Programming (BPP) -- the formalization of universal mechanisms (principles) of the brain work with in... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 301,305 |
1812.02335 | Layer Flexible Adaptive Computational Time | Deep recurrent neural networks perform well on sequence data and are the model of choice. However, it is a daunting task to decide the structure of the networks, i.e. the number of layers, especially considering different computational needs of a sequence. We propose a layer flexible recurrent neural network with adapt... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 115,733 |
2009.12517 | QuatRE: Relation-Aware Quaternions for Knowledge Graph Embeddings | We propose a simple yet effective embedding model to learn quaternion embeddings for entities and relations in knowledge graphs. Our model aims to enhance correlations between head and tail entities given a relation within the Quaternion space with Hamilton product. The model achieves this goal by further associating e... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 197,448 |
2406.13281 | ECAFormer: Low-light Image Enhancement using Cross Attention | Low-light image enhancement (LLIE) is critical in computer vision. Existing LLIE methods often fail to discover the underlying relationships between different sub-components, causing the loss of complementary information between multiple modules and network layers, ultimately resulting in the loss of image details. To ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 465,786 |
2401.04345 | RomniStereo: Recurrent Omnidirectional Stereo Matching | Omnidirectional stereo matching (OSM) is an essential and reliable means for $360^{\circ}$ depth sensing. However, following earlier works on conventional stereo matching, prior state-of-the-art (SOTA) methods rely on a 3D encoder-decoder block to regularize the cost volume, causing the whole system complicated and sub... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 420,400 |
1406.1224 | XTQ: A Declarative Functional XML Query Language | Various query languages have been proposed to extract and restructure information in XML documents. These languages, usually claiming to be declarative, mainly consider the conjunctive relationships among data elements. In order to present the operations where the hierarchical and the disjunctive relationships need to ... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | true | 33,612 |
2211.15328 | A Survey on Conversational Search and Applications in Biomedicine | This paper aims to provide a radical rundown on Conversation Search (ConvSearch), an approach to enhance the information retrieval method where users engage in a dialogue for the information-seeking tasks. In this survey, we predominantly focused on the human interactive characteristics of the ConvSearch systems, highl... | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | 333,203 |
2502.00003 | Defending Compute Thresholds Against Legal Loopholes | Existing legal frameworks on AI rely on training compute thresholds as a proxy to identify potentially-dangerous AI models and trigger increased regulatory attention. In the United States, Section 4.2(a) of Executive Order 14110 instructs the Secretary of Commerce to require extensive reporting from developers of AI mo... | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | false | false | 529,156 |
2308.00715 | Automated COVID-19 CT Image Classification using Multi-head Channel
Attention in Deep CNN | The rapid spread of COVID-19 has necessitated efficient and accurate diagnostic methods. Computed Tomography (CT) scan images have emerged as a valuable tool for detecting the disease. In this article, we present a novel deep learning approach for automated COVID-19 CT scan classification where a modified Xception mode... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 383,027 |
2305.16935 | Gender Lost In Translation: How Bridging The Gap Between Languages
Affects Gender Bias in Zero-Shot Multilingual Translation | Neural machine translation (NMT) models often suffer from gender biases that harm users and society at large. In this work, we explore how bridging the gap between languages for which parallel data is not available affects gender bias in multilingual NMT, specifically for zero-shot directions. We evaluate translation b... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 368,329 |
2012.09349 | Dynamic Modeling and Real-time Management of a System of EV
Fast-charging Stations | Demand for electric vehicles (EVs), and thus EV charging, has steadily increased over the last decade. However, there is limited fast-charging infrastructure in most parts of the world to support EV travel, especially long-distance trips. The goal of this study is to develop a stochastic dynamic simulation modeling fra... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 212,039 |
1801.07132 | SecSens: Secure State Estimation with Application to Localization and
Time Synchronization | Research evidence in Cyber-Physical Systems (CPS) shows that the introduced tight coupling of information technology with physical sensing and actuation leads to more vulnerability and security weaknesses. But, the traditional security protection mechanisms of CPS focus on data encryption while neglecting the sensors w... | false | false | false | false | false | false | false | true | false | false | true | false | true | false | false | false | false | false | 88,727 |
2311.17126 | Reason out Your Layout: Evoking the Layout Master from Large Language
Models for Text-to-Image Synthesis | Recent advancements in text-to-image (T2I) generative models have shown remarkable capabilities in producing diverse and imaginative visuals based on text prompts. Despite the advancement, these diffusion models sometimes struggle to translate the semantic content from the text into images entirely. While conditioning ... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 411,186 |
1912.11165 | High Utility Interval-Based Sequences | Sequential pattern mining is an interesting research area with broad range of applications. Most prior research on sequential pattern mining has considered point-based data where events occur instantaneously. However, in many application domains, events persist over intervals of time of varying lengths. Furthermore, tr... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 158,494 |
2306.02841 | CTRL: Connect Collaborative and Language Model for CTR Prediction | Traditional click-through rate (CTR) prediction models convert the tabular data into one-hot vectors and leverage the collaborative relations among features for inferring the user's preference over items. This modeling paradigm discards essential semantic information. Though some works like P5 and CTR-BERT have explore... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 371,076 |
2002.08907 | Second-order Conditional Gradient Sliding | Constrained second-order convex optimization algorithms are the method of choice when a high accuracy solution to a problem is needed, due to their local quadratic convergence. These algorithms require the solution of a constrained quadratic subproblem at every iteration. We present the \emph{Second-Order Conditional G... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 164,897 |
2305.00767 | RViDeformer: Efficient Raw Video Denoising Transformer with a Larger
Benchmark Dataset | In recent years, raw video denoising has garnered increased attention due to the consistency with the imaging process and well-studied noise modeling in the raw domain. However, two problems still hinder the denoising performance. Firstly, there is no large dataset with realistic motions for supervised raw video denois... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 361,445 |
2103.16654 | A Systematic Literature Review on Process-Aware Recommender Systems | Considering processes of a business in a recommender system is highly advantageous. Although most studies in the business process analysis domain are of descriptive and predictive nature, the feasibility of constructing a process-aware recommender system is assessed in a few works. One reason can be the lack of knowled... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 227,654 |
2205.12923 | Domain Adaptation for Object Detection using SE Adaptors and Center Loss | Despite growing interest in object detection, very few works address the extremely practical problem of cross-domain robustness especially for automative applications. In order to prevent drops in performance due to domain shift, we introduce an unsupervised domain adaptation method built on the foundation of faster-RC... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 298,750 |
1303.6088 | Graphical Analysis of Social Group Dynamics | Identifying communities in social networks becomes an increasingly important research problem. Several methods for identifying such groups have been developed, however, qualitative analysis (taking into account the scale of the problem) still poses serious problems. This paper describes a tool for facilitating such an ... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 23,242 |
1905.01035 | Secure Integration of Electric Vehicles with the Power Grid | This paper focuses on the secure integration of distributed energy resources (DERs), especially pluggable electric vehicles (EVs), with the power grid. We consider the vehicle-to-grid (V2G) system where EVs are connected to the power grid through an aggregator. In this paper, we propose a novel Cyber-Physical Anomaly D... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 129,626 |
2105.01755 | Reinforcement Learning for Scalable Logic Optimization with Graph Neural
Networks | Logic optimization is an NP-hard problem commonly approached through hand-engineered heuristics. We propose to combine graph convolutional networks with reinforcement learning and a novel, scalable node embedding method to learn which local transforms should be applied to the logic graph. We show that this method achie... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 233,611 |
1810.08747 | Temporal Proximity induces Attributes Similarity | Users consume their favorite content in temporal proximity of consumption bundles according to their preferences and tastes. Thus, the underlying attributes of items implicitly match user preferences, however, current recommender systems largely ignore this fundamental driver in identifying matching items. In this work... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 110,904 |
2310.16368 | Transformer-based Live Update Generation for Soccer Matches from
Microblog Posts | It has been known to be difficult to generate adequate sports updates from a sequence of vast amounts of diverse live tweets, although the live sports viewing experience with tweets is gaining the popularity. In this paper, we focus on soccer matches and work on building a system to generate live updates for soccer mat... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 402,698 |
2110.09829 | Towards Social Situation Awareness in Support Agents | Artificial agents that support people in their daily activities (e.g., virtual coaches and personal assistants) are increasingly prevalent. Since many daily activities are social in nature, support agents should understand a user's social situation to offer comprehensive support. However, there are no systematic approa... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 261,945 |
1509.06921 | End-to-end delay in two hop relay MANETs with limited buffer | Despite lots of literature has been dedicated to researching the delay performance in two-hop relay (2HR) mobile ad hoc networks (MANETs), however, they usually assume the buffer size of each node is infinite, so these studies are not applicable to and thus may not reflect the real delay performance of a practical MANE... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 47,207 |
2412.06205 | Applying Machine Learning Tools for Urban Resilience Against Floods | Floods are among the most prevalent and destructive natural disasters, often leading to severe social and economic impacts in urban areas due to the high concentration of assets and population density. In Iran, particularly in Tehran, recurring flood events underscore the urgent need for robust urban resilience strateg... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 515,148 |
2312.13327 | In-Context Reinforcement Learning for Variable Action Spaces | Recently, it has been shown that transformers pre-trained on diverse datasets with multi-episode contexts can generalize to new reinforcement learning tasks in-context. A key limitation of previously proposed models is their reliance on a predefined action space size and structure. The introduction of a new action spac... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 417,282 |
2005.05957 | Flowtron: an Autoregressive Flow-based Generative Network for
Text-to-Speech Synthesis | In this paper we propose Flowtron: an autoregressive flow-based generative network for text-to-speech synthesis with control over speech variation and style transfer. Flowtron borrows insights from IAF and revamps Tacotron in order to provide high-quality and expressive mel-spectrogram synthesis. Flowtron is optimized ... | false | false | true | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 176,879 |
1809.09925 | Every Node Counts: Self-Ensembling Graph Convolutional Networks for
Semi-Supervised Learning | Graph convolutional network (GCN) provides a powerful means for graph-based semi-supervised tasks. However, as a localized first-order approximation of spectral graph convolution, the classic GCN can not take full advantage of unlabeled data, especially when the unlabeled node is far from labeled ones. To capitalize on... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 108,792 |
2112.10101 | ArcFace Knows the Gender, Too! | The main idea of this paper is that if a model can recognize a person, of course, it must be able to know the gender of that person, too. Therefore, instead of defining a new model for gender classification, this paper uses ArcFace features to determine gender, based on the facial features. A face image is given to Arc... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 272,346 |
2110.12925 | CoProtector: Protect Open-Source Code against Unauthorized Training
Usage with Data Poisoning | Github Copilot, trained on billions of lines of public code, has recently become the buzzword in the computer science research and practice community. Although it is designed to help developers implement safe and effective code with powerful intelligence, practitioners and researchers raise concerns about its ethical a... | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | true | 263,015 |
2407.10683 | Addressing Image Hallucination in Text-to-Image Generation through
Factual Image Retrieval | Text-to-image generation has shown remarkable progress with the emergence of diffusion models. However, these models often generate factually inconsistent images, failing to accurately reflect the factual information and common sense conveyed by the input text prompts. We refer to this issue as Image hallucination. Dra... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 473,078 |
2311.01138 | AeroPath: An airway segmentation benchmark dataset with challenging
pathology | To improve the prognosis of patients suffering from pulmonary diseases, such as lung cancer, early diagnosis and treatment are crucial. The analysis of CT images is invaluable for diagnosis, whereas high quality segmentation of the airway tree are required for intervention planning and live guidance during bronchoscopy... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 404,928 |
1911.04250 | Methods for Stabilizing Models across Large Samples of Projects (with
case studies on Predicting Defect and Project Health) | Despite decades of research, SE lacks widely accepted models (that offer precise quantitative stable predictions) about what factors most influence software quality. This paper provides a promising result showing such stable models can be generated using a new transfer learning framework called "STABILIZER". Given a tr... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 152,940 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.