id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1812.06423 | Classifier and Exemplar Synthesis for Zero-Shot Learning | Zero-shot learning (ZSL) enables solving a task without the need to see its examples. In this paper, we propose two ZSL frameworks that learn to synthesize parameters for novel unseen classes. First, we propose to cast the problem of ZSL as learning manifold embeddings from graphs composed of object classes, leading to... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 116,616 |
1105.1033 | Adaptively Learning the Crowd Kernel | We introduce an algorithm that, given n objects, learns a similarity matrix over all n^2 pairs, from crowdsourced data alone. The algorithm samples responses to adaptively chosen triplet-based relative-similarity queries. Each query has the form "is object 'a' more similar to 'b' or to 'c'?" and is chosen to be maximal... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 10,259 |
2001.06882 | Peer-to-Peer Trading in Electricity Networks: An Overview | Peer-to-peer trading is a next-generation energy management technique that economically benefits proactive consumers (prosumers) transacting their energy as goods and services. At the same time, peer-to-peer energy trading is also expected to help the grid by reducing peak demand, lowering reserve requirements, and cur... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | 160,911 |
2008.13642 | Radar+RGB Attentive Fusion for Robust Object Detection in Autonomous
Vehicles | This paper presents two variations of architecture referred to as RANet and BIRANet. The proposed architecture aims to use radar signal data along with RGB camera images to form a robust detection network that works efficiently, even in variable lighting and weather conditions such as rain, dust, fog, and others. First... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 193,903 |
2404.04522 | Q-PEFT: Query-dependent Parameter Efficient Fine-tuning for Text
Reranking with Large Language Models | Parameter Efficient Fine-Tuning (PEFT) methods have been extensively utilized in Large Language Models (LLMs) to improve the down-streaming tasks without the cost of fine-tuing the whole LLMs. Recent studies have shown how to effectively use PEFT for fine-tuning LLMs in ranking tasks with convincing performance; there ... | false | false | false | false | true | true | true | false | true | false | false | false | false | false | false | false | false | false | 444,681 |
2207.03422 | AsNER -- Annotated Dataset and Baseline for Assamese Named Entity
recognition | We present the AsNER, a named entity annotation dataset for low resource Assamese language with a baseline Assamese NER model. The dataset contains about 99k tokens comprised of text from the speech of the Prime Minister of India and Assamese play. It also contains person names, location names and addresses. The propos... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 306,837 |
2405.10658 | Cost-Effective Fault Tolerance for CNNs Using Parameter Vulnerability
Based Hardening and Pruning | Convolutional Neural Networks (CNNs) have become integral in safety-critical applications, thus raising concerns about their fault tolerance. Conventional hardware-dependent fault tolerance methods, such as Triple Modular Redundancy (TMR), are computationally expensive, imposing a remarkable overhead on CNNs. Whereas f... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 454,847 |
1911.04060 | Invariant Representations through Adversarial Forgetting | We propose a novel approach to achieving invariance for deep neural networks in the form of inducing amnesia to unwanted factors of data through a new adversarial forgetting mechanism. We show that the forgetting mechanism serves as an information-bottleneck, which is manipulated by the adversarial training to learn in... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 152,873 |
2309.09975 | GEDepth: Ground Embedding for Monocular Depth Estimation | Monocular depth estimation is an ill-posed problem as the same 2D image can be projected from infinite 3D scenes. Although the leading algorithms in this field have reported significant improvement, they are essentially geared to the particular compound of pictorial observations and camera parameters (i.e., intrinsics ... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 392,813 |
2002.03862 | Cross-modal variational inference for bijective signal-symbol
translation | Extraction of symbolic information from signals is an active field of research enabling numerous applications especially in the Musical Information Retrieval domain. This complex task, that is also related to other topics such as pitch extraction or instrument recognition, is a demanding subject that gave birth to nume... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 163,434 |
1911.02621 | The Threat of Adversarial Attacks on Machine Learning in Network
Security -- A Survey | Machine learning models have made many decision support systems to be faster, more accurate, and more efficient. However, applications of machine learning in network security face a more disproportionate threat of active adversarial attacks compared to other domains. This is because machine learning applications in net... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | true | 152,402 |
2203.02458 | Continuous Rating as Reliable Human Evaluation of Simultaneous Speech
Translation | Simultaneous speech translation (SST) can be evaluated on simulated online events where human evaluators watch subtitled videos and continuously express their satisfaction by pressing buttons (so called Continuous Rating). Continuous Rating is easy to collect, but little is known about its reliability, or relation to c... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 283,749 |
2304.10808 | Downstream Task-Oriented Neural Tokenizer Optimization with Vocabulary
Restriction as Post Processing | This paper proposes a method to optimize tokenization for the performance improvement of already trained downstream models. Our method generates tokenization results attaining lower loss values of a given downstream model on the training data for restricting vocabularies and trains a tokenizer reproducing the tokenizat... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 359,565 |
1103.3742 | The key exchange cryptosystem used with higher order Diophantine
equations | One-way functions are widely used for encrypting the secret in public key cryptography, although they are regarded as plausibly one-way but have not been proven so. Here we discuss the public key cryptosystem based on the system of higher order Diophantine equations. In this system those Diophantine equations are used ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 9,671 |
2006.03617 | A combined XFEM phase-field computational model for crack growth without
remeshing | This paper presents an adaptive strategy for phase-field simulations with transition to fracture. The phase-field equations are solved only in small subdomains around crack tips to determine propagation, while an XFEM discretization is used in the rest of the domain to represent sharp cracks, enabling to use a coarser ... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 180,364 |
2307.10247 | Automated Action Model Acquisition from Narrative Texts | Action models, which take the form of precondition/effect axioms, facilitate causal and motivational connections between actions for AI agents. Action model acquisition has been identified as a bottleneck in the application of planning technology, especially within narrative planning. Acquiring action models from narra... | false | false | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | 380,487 |
2302.10747 | Clustered Data Sharing for Non-IID Federated Learning over Wireless
Networks | Federated Learning (FL) is a novel distributed machine learning approach to leverage data from Internet of Things (IoT) devices while maintaining data privacy. However, the current FL algorithms face the challenges of non-independent and identically distributed (non-IID) data, which causes high communication costs and ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 346,924 |
2406.18512 | "Is ChatGPT a Better Explainer than My Professor?": Evaluating the
Explanation Capabilities of LLMs in Conversation Compared to a Human Baseline | Explanations form the foundation of knowledge sharing and build upon communication principles, social dynamics, and learning theories. We focus specifically on conversational approaches for explanations because the context is highly adaptive and interactive. Our research leverages previous work on explanatory acts, a f... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 468,031 |
1206.0418 | De-randomizing Shannon: The Design and Analysis of a Capacity-Achieving
Rateless Code | This paper presents an analysis of spinal codes, a class of rateless codes proposed recently. We prove that spinal codes achieve Shannon capacity for the binary symmetric channel (BSC) and the additive white Gaussian noise (AWGN) channel with an efficient polynomial-time encoder and decoder. They are the first rateless... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 16,298 |
2207.13191 | GCN-WP -- Semi-Supervised Graph Convolutional Networks for Win
Prediction in Esports | Win prediction is crucial to understanding skill modeling, teamwork and matchmaking in esports. In this paper we propose GCN-WP, a semi-supervised win prediction model for esports based on graph convolutional networks. This model learns the structure of an esports league over the course of a season (1 year) and makes p... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 310,222 |
2404.00327 | YNetr: Dual-Encoder architecture on Plain Scan Liver Tumors (PSLT) | Background: Liver tumors are abnormal growths in the liver that can be either benign or malignant, with liver cancer being a significant health concern worldwide. However, there is no dataset for plain scan segmentation of liver tumors, nor any related algorithms. To fill this gap, we propose Plain Scan Liver Tumors(PS... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 442,868 |
2301.11546 | Adapting Step-size: A Unified Perspective to Analyze and Improve
Gradient-based Methods for Adversarial Attacks | Learning adversarial examples can be formulated as an optimization problem of maximizing the loss function with some box-constraints. However, for solving this induced optimization problem, the state-of-the-art gradient-based methods such as FGSM, I-FGSM and MI-FGSM look different from their original methods especially... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 342,189 |
2209.14829 | Lightweight Monocular Depth Estimation with an Edge Guided Network | Monocular depth estimation is an important task that can be applied to many robotic applications. Existing methods focus on improving depth estimation accuracy via training increasingly deeper and wider networks, however these suffer from large computational complexity. Recent studies found that edge information are im... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 320,366 |
1808.06470 | predictSLUMS: A new model for identifying and predicting informal
settlements and slums in cities from street intersections using machine
learning | Identifying current and future informal regions within cities remains a crucial issue for policymakers and governments in developing countries. The delineation process of identifying such regions in cities requires a lot of resources. While there are various studies that identify informal settlements based on satellite... | false | false | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | 105,538 |
2312.06395 | Threshold Decision-Making Dynamics Adaptive to Physical Constraints and
Changing Environment | We propose a threshold decision-making framework for controlling the physical dynamics of an agent switching between two spatial tasks. Our framework couples a nonlinear opinion dynamics model that represents the evolution of an agent's preference for a particular task with the physical dynamics of the agent. We prove ... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 414,500 |
2009.07024 | Decision-based Universal Adversarial Attack | A single perturbation can pose the most natural images to be misclassified by classifiers. In black-box setting, current universal adversarial attack methods utilize substitute models to generate the perturbation, then apply the perturbation to the attacked model. However, this transfer often produces inferior results.... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 195,813 |
2303.12980 | GMP-Featurizer: A parallelized Python package for efficiently computing
the Gaussian Multipole features of atomic systems | GMP-Featurizer is a lightweight, accurate, efficient, and scalable software package for calculating the Gaussian Multipole (GMP) features \cite{GMP} for a variety of atomic systems with elements across the periodic table. Starting from the GMP feature computation module from AmpTorch \cite{amptorch}, the capability of ... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 353,484 |
2305.05378 | PLM-GNN: A Webpage Classification Method based on Joint Pre-trained
Language Model and Graph Neural Network | The number of web pages is growing at an exponential rate, accumulating massive amounts of data on the web. It is one of the key processes to classify webpages in web information mining. Some classical methods are based on manually building features of web pages and training classifiers based on machine learning or dee... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 363,126 |
1908.00751 | Merging variables: one technique of search in pseudo-Boolean
optimization | In the present paper we describe new heuristic technique, which can be applied to the optimization of pseudo-Boolean functions including Black-Box functions. This technique is based on a simple procedure which consists in transition from the optimization problem over Boolean hypercube to the optimization problem of aux... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 140,590 |
2501.07764 | Deep Learning for Disease Outbreak Prediction: A Robust Early Warning
Signal for Transcritical Bifurcations | Early Warning Signals (EWSs) are vital for implementing preventive measures before a disease turns into a pandemic. While new diseases exhibit unique behaviors, they often share fundamental characteristics from a dynamical systems perspective. Moreover, measurements during disease outbreaks are often corrupted by diffe... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 524,502 |
1902.06667 | Hierarchical Graph Convolutional Networks for Semi-supervised Node
Classification | Graph convolutional networks (GCNs) have been successfully applied in node classification tasks of network mining. However, most of these models based on neighborhood aggregation are usually shallow and lack the "graph pooling" mechanism, which prevents the model from obtaining adequate global information. In order to ... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 121,808 |
1110.0061 | Learning image transformations without training examples | The use of image transformations is essential for efficient modeling and learning of visual data. But the class of relevant transformations is large: affine transformations, projective transformations, elastic deformations, ... the list goes on. Therefore, learning these transformations, rather than hand coding them, i... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 12,433 |
2207.07484 | Multi-AGV's Temporal Memory-based RRT Exploration in Unknown Environment | With the increasing need for multi-robot for exploring the unknown region in a challenging environment, efficient collaborative exploration strategies are needed for achieving such feat. A frontier-based Rapidly-Exploring Random Tree (RRT) exploration can be deployed to explore an unknown environment. However, its' gre... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | 308,214 |
1709.00621 | Cognitive Connectivity Resilience in Multi-layer Remotely Deployed
Mobile Internet of Things | Enabling the Internet of things in remote areas without traditional communication infrastructure requires a multi-layer network architecture. The devices in the overlay network are required to provide coverage to the underlay devices as well as to remain connected to other overlay devices. The coordination, planning, a... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 79,936 |
2312.07831 | Abusive Span Detection for Vietnamese Narrative Texts | Abuse in its various forms, including physical, psychological, verbal, sexual, financial, and cultural, has a negative impact on mental health. However, there are limited studies on applying natural language processing (NLP) in this field in Vietnam. Therefore, we aim to contribute by building a human-annotated Vietnam... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 415,071 |
2411.07490 | $\textit{Dirigo}$: A Method to Extract Event Logs for Object-Centric
Processes | Real-world processes involve multiple object types with intricate interrelationships. Traditional event logs (in XES format), which record process execution centred around the case notion, are restricted to a single-object perspective, making it difficult to capture the behaviour of multiple objects and their interacti... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 507,549 |
2310.04681 | VoiceExtender: Short-utterance Text-independent Speaker Verification
with Guided Diffusion Model | Speaker verification (SV) performance deteriorates as utterances become shorter. To this end, we propose a new architecture called VoiceExtender which provides a promising solution for improving SV performance when handling short-duration speech signals. We use two guided diffusion models, the built-in and the external... | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 397,763 |
1706.07094 | Constrained Bayesian Optimization with Noisy Experiments | Randomized experiments are the gold standard for evaluating the effects of changes to real-world systems. Data in these tests may be difficult to collect and outcomes may have high variance, resulting in potentially large measurement error. Bayesian optimization is a promising technique for efficiently optimizing multi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 75,792 |
2211.05773 | Scaling Neural Face Synthesis to High FPS and Low Latency by Neural
Caching | Recent neural rendering approaches greatly improve image quality, reaching near photorealism. However, the underlying neural networks have high runtime, precluding telepresence and virtual reality applications that require high resolution at low latency. The sequential dependency of layers in deep networks makes their ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 329,672 |
2105.03037 | ConCAD: Contrastive Learning-based Cross Attention for Sleep Apnea
Detection | With recent advancements in deep learning methods, automatically learning deep features from the original data is becoming an effective and widespread approach. However, the hand-crafted expert knowledge-based features are still insightful. These expert-curated features can increase the model's generalization and remin... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 234,010 |
2403.01270 | A comprehensive cross-language framework for harmful content detection
with the aid of sentiment analysis | In today's digital world, social media plays a significant role in facilitating communication and content sharing. However, the exponential rise in user-generated content has led to challenges in maintaining a respectful online environment. In some cases, users have taken advantage of anonymity in order to use harmful ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 434,339 |
2004.09056 | Colonoscope tracking method based on shape estimation network | This paper presents a colonoscope tracking method utilizing a colon shape estimation method. CT colonography is used as a less-invasive colon diagnosis method. If colonic polyps or early-stage cancers are found, they are removed in a colonoscopic examination. In the colonoscopic examination, understanding where the col... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 173,244 |
2405.13166 | FairLENS: Assessing Fairness in Law Enforcement Speech Recognition | Automatic speech recognition (ASR) techniques have become powerful tools, enhancing efficiency in law enforcement scenarios. To ensure fairness for demographic groups in different acoustic environments, ASR engines must be tested across a variety of speakers in realistic settings. However, describing the fairness discr... | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | false | false | 455,829 |
2402.01076 | DoseGNN: Improving the Performance of Deep Learning Models in Adaptive
Dose-Volume Histogram Prediction through Graph Neural Networks | Dose-Volume Histogram (DVH) prediction is fundamental in radiation therapy that facilitate treatment planning, dose evaluation, plan comparison and etc. It helps to increase the ability to deliver precise and effective radiation treatments while managing potential toxicities to healthy tissues as needed to reduce the r... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 425,844 |
2312.04966 | NewMove: Customizing text-to-video models with novel motions | We introduce an approach for augmenting text-to-video generation models with customized motions, extending their capabilities beyond the motions depicted in the original training data. By leveraging a few video samples demonstrating specific movements as input, our method learns and generalizes the input motion pattern... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 413,906 |
2412.09686 | The Cost of Replicability in Active Learning | Active learning aims to reduce the required number of labeled data for machine learning algorithms by selectively querying the labels of initially unlabeled data points. Ensuring the replicability of results, where an algorithm consistently produces the same outcome across different runs, is essential for the reliabili... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 516,597 |
2105.09232 | Diffusion Approximations for Thompson Sampling | We study the behavior of Thompson sampling from the perspective of weak convergence. In the regime where the gaps between arm means scale as $1/\sqrt{n}$ with the time horizon $n$, we show that the dynamics of Thompson sampling evolve according to discrete versions of SDE's and stochastic ODE's. As $n \to \infty$, we s... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 236,006 |
2108.05792 | From market-ready ROVs to low-cost AUVs | Autonomous Underwater Vehicles (AUVs) are becoming increasingly important for different types of industrial applications. The generally high cost of (AUVs) restricts the access to them and therefore advances in research and technological development. However, recent advances have led to lower cost commercially availabl... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 250,410 |
1807.02842 | Auto-Context R-CNN | Region-based convolutional neural networks (R-CNN)~\cite{fast_rcnn,faster_rcnn,mask_rcnn} have largely dominated object detection. Operators defined on RoIs (Region of Interests) play an important role in R-CNNs such as RoIPooling~\cite{fast_rcnn} and RoIAlign~\cite{mask_rcnn}. They all only utilize information inside ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 102,355 |
1603.01113 | A Survey of the State of the Art in Data Mining and Integration Query
Languages | The major aim of this survey is to identify the strengths and weaknesses of a representative set of Data-Mining and Integration (DMI) query languages. We describe a set of properties of DMI-related languages that we use for a systematic evaluation of these languages. In addition, we introduce a scoring system that we u... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 52,858 |
2302.13186 | Construction numbers: How to build a graph? | A construction sequence for a graph is a listing of the elements of the graph (the set of vertices and edges) such that each edge follows both its endpoints. The construction number of the graph is the number of such sequences. We determine this number for various graph families. | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 347,850 |
2311.04322 | NEAT-MUSIC: Auto-calibration of DOA Estimation for Terahertz-Band
Massive MIMO Systems | Terahertz (THz) band is envisioned for the future sixth generation wireless systems thanks to its abundant bandwidth and very narrow beamwidth. These features are one of the key enabling factors for high resolution sensing with milli-degree level direction-of-arrival (DOA) estimation. Therefore, this paper investigates... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 406,182 |
2501.14615 | Single-neuron deep generative model uncovers underlying physics of
neuronal activity in Ca imaging data | Calcium imaging has become a powerful alternative to electrophysiology for studying neuronal activity, offering spatial resolution and the ability to measure large populations of neurons in a minimally invasive manner. This technique has broad applications in neuroscience, neuroengineering, and medicine, enabling resea... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 527,186 |
2310.16662 | Deep Learning Techniques for Cervical Cancer Diagnosis based on
Pathology and Colposcopy Images | Cervical cancer is a prevalent disease affecting millions of women worldwide every year. It requires significant attention, as early detection during the precancerous stage provides an opportunity for a cure. The screening and diagnosis of cervical cancer rely on cytology and colposcopy methods. Deep learning, a promis... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 402,822 |
2410.20731 | BLAPose: Enhancing 3D Human Pose Estimation with Bone Length Adjustment | Current approaches in 3D human pose estimation primarily focus on regressing 3D joint locations, often neglecting critical physical constraints such as bone length consistency and body symmetry. This work introduces a recurrent neural network architecture designed to capture holistic information across entire video seq... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 502,937 |
2211.00985 | Distributed Robotic Systems in the Edge-Cloud Continuum with ROS 2: a
Review on Novel Architectures and Technology Readiness | Robotic systems are more connected, networked, and distributed than ever. New architectures that comply with the \textit{de facto} robotics middleware standard, ROS\,2, have recently emerged to fill the gap in terms of hybrid systems deployed from edge to cloud. This paper reviews new architectures and technologies tha... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 328,073 |
2103.01428 | Botcha: Detecting Malicious Non-Human Traffic in the Wild | Malicious bots make up about a quarter of all traffic on the web, and degrade the performance of personalization and recommendation algorithms that operate on e-commerce sites. Positive-Unlabeled learning (PU learning) provides the ability to train a binary classifier using only positive (P) and unlabeled (U) instances... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 222,611 |
1206.4601 | Convex Multitask Learning with Flexible Task Clusters | Traditionally, multitask learning (MTL) assumes that all the tasks are related. This can lead to negative transfer when tasks are indeed incoherent. Recently, a number of approaches have been proposed that alleviate this problem by discovering the underlying task clusters or relationships. However, they are limited to ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 16,653 |
1507.03928 | Pseudo-Query Reformulation | Automatic query reformulation refers to rewriting a user's original query in order to improve the ranking of retrieval results compared to the original query. We present a general framework for automatic query reformulation based on discrete optimization. Our approach, referred to as pseudo-query reformulation, treats ... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 45,118 |
2209.04521 | The Space of Adversarial Strategies | Adversarial examples, inputs designed to induce worst-case behavior in machine learning models, have been extensively studied over the past decade. Yet, our understanding of this phenomenon stems from a rather fragmented pool of knowledge; at present, there are a handful of attacks, each with disparate assumptions in t... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 316,801 |
1711.09224 | CondenseNet: An Efficient DenseNet using Learned Group Convolutions | Deep neural networks are increasingly used on mobile devices, where computational resources are limited. In this paper we develop CondenseNet, a novel network architecture with unprecedented efficiency. It combines dense connectivity with a novel module called learned group convolution. The dense connectivity facilitat... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 85,358 |
1908.10522 | Intuitive Neuromyoelectric Control of a Dexterous Bionic Arm Using a
Modified Kalman Filter | Background: Multi-articulate prostheses are capable of performing dexterous hand movements. However, clinically available control strategies fail to provide users with intuitive, independent and proportional control over multiple degrees of freedom (DOFs) in real-time. New Method: We detail the use of a modified Kalman... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 143,136 |
1608.06098 | On Preambles With Low Out of Band Radiation for Channel Estimation | In this paper, we investigate preamble designs for channel estimation, that jointly address the estimation efficiency in terms of MSE of the channel estimates, and the OOB radiation of the transmit preambles. We provide two novel design techniques, based on a convex optimization problem, to obtain optimal preambles for... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 60,072 |
1901.02975 | A witness function based construction of discriminative models using
Hermite polynomials | In machine learning, we are given a dataset of the form $\{(\mathbf{x}_j,y_j)\}_{j=1}^M$, drawn as i.i.d. samples from an unknown probability distribution $\mu$; the marginal distribution for the $\mathbf{x}_j$'s being $\mu^*$. We propose that rather than using a positive kernel such as the Gaussian for estimation of t... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 118,313 |
1710.05386 | Evolution of the Global Risk Network Mean-Field Stability Point | With a steadily growing human population and rapid advancements in technology, the global human network is increasing in size and connection density. This growth exacerbates networked global threats and can lead to unexpected consequences such as global epidemics mediated by air travel, threats in cyberspace, global go... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 82,635 |
1708.05448 | On Ensuring that Intelligent Machines Are Well-Behaved | Machine learning algorithms are everywhere, ranging from simple data analysis and pattern recognition tools used across the sciences to complex systems that achieve super-human performance on various tasks. Ensuring that they are well-behaved---that they do not, for example, cause harm to humans or act in a racist or s... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 79,130 |
2202.09002 | An Active and Contrastive Learning Framework for Fine-Grained Off-Road
Semantic Segmentation | Off-road semantic segmentation with fine-grained labels is necessary for autonomous vehicles to understand driving scenes, as the coarse-grained road detection can not satisfy off-road vehicles with various mechanical properties. Fine-grained semantic segmentation in off-road scenes usually has no unified category defi... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 281,062 |
1710.04783 | Retinal Vasculature Segmentation Using Local Saliency Maps and
Generative Adversarial Networks For Image Super Resolution | We propose an image super resolution(ISR) method using generative adversarial networks (GANs) that takes a low resolution input fundus image and generates a high resolution super resolved (SR) image upto scaling factor of $16$. This facilitates more accurate automated image analysis, especially for small or blurred lan... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 82,531 |
2012.08011 | DeepGamble: Towards unlocking real-time player intelligence using
multi-layer instance segmentation and attribute detection | Annually the gaming industry spends approximately $15 billion in marketing reinvestment. However, this amount is spent without any consideration for the skill and luck of the player. For a casino, an unskilled player could fetch ~4 times more revenue than a skilled player. This paper describes a video recognition syste... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 211,626 |
1703.02854 | Multiresolution Mapping and Informative Path Planning for UAV-based
Terrain Monitoring | Unmanned aerial vehicles (UAVs) can offer timely and cost-effective delivery of high-quality sensing data. How- ever, deciding when and where to take measurements in complex environments remains an open challenge. To address this issue, we introduce a new multiresolution mapping approach for informative path planning i... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 69,629 |
2008.07372 | Maximum Customers' Satisfaction in One-way Car-sharing: Modeling, Exact
and Heuristic Solving | One-way car-sharing systems are transportation systems that allow customers to rent cars at stations scattered around the city, use them for a short journey, and return them at any station. The maximum customers' satisfaction problem concerns the task of assigning the cars, initially located at given stations, to maxim... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 192,093 |
2502.13017 | Mean of Means: Human Localization with Calibration-free and
Unconstrained Camera Settings (extended version) | Accurate human localization is crucial for various applications, especially in the Metaverse era. Existing high precision solutions rely on expensive, tag-dependent hardware, while vision-based methods offer a cheaper, tag-free alternative. However, current vision solutions based on stereo vision face limitations due t... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 535,166 |
2210.12437 | Extractive Summarization of Legal Decisions using Multi-task Learning
and Maximal Marginal Relevance | Summarizing legal decisions requires the expertise of law practitioners, which is both time- and cost-intensive. This paper presents techniques for extractive summarization of legal decisions in a low-resource setting using limited expert annotated data. We test a set of models that locate relevant content using a sequ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 325,742 |
1911.00364 | Validation of a deep learning mammography model in a population with low
screening rates | A key promise of AI applications in healthcare is in increasing access to quality medical care in under-served populations and emerging markets. However, deep learning models are often only trained on data from advantaged populations that have the infrastructure and resources required for large-scale data collection. I... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 151,802 |
1812.05484 | Unsupervised Image Decomposition in Vector Layers | Deep image generation is becoming a tool to enhance artists and designers creativity potential. In this paper, we aim at making the generation process more structured and easier to interact with. Inspired by vector graphics systems, we propose a new deep image reconstruction paradigm where the outputs are composed from... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 116,423 |
2006.00578 | "Judge me by my size (noun), do you?'' YodaLib: A Demographic-Aware
Humor Generation Framework | The subjective nature of humor makes computerized humor generation a challenging task. We propose an automatic humor generation framework for filling the blanks in Mad Libs stories, while accounting for the demographic backgrounds of the desired audience. We collect a dataset consisting of such stories, which are fille... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 179,510 |
2311.06874 | Distributed Charging Coordination of Electric Trucks with Limited
Charging Resources | Electric trucks usually need to charge their batteries during long-range delivery missions, and the charging times are often nontrivial. As charging resources are limited, waiting times for some trucks can be prolonged at certain stations. To facilitate the efficient operation of electric trucks, we propose a distribut... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 407,112 |
2410.24050 | Clustering Head: A Visual Case Study of the Training Dynamics in
Transformers | This paper introduces the sparse modular addition task and examines how transformers learn it. We focus on transformers with embeddings in $\R^2$ and introduce a visual sandbox that provides comprehensive visualizations of each layer throughout the training process. We reveal a type of circuit, called "clustering heads... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 504,308 |
2003.02321 | Approximating the Hotelling Observer with Autoencoder-Learned Efficient
Channels for Binary Signal Detection Tasks | The objective assessment of image quality (IQ) has been advocated for the analysis and optimization of medical imaging systems. One method of obtaining such IQ metrics is through a mathematical observer. The Bayesian ideal observer is optimal by definition for signal detection tasks, but is frequently both intractable ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 166,906 |
2308.03081 | Using Overlapping Methods to Counter Adversaries in Community Detection | When dealing with large graphs, community detection is a useful data triage tool that can identify subsets of the network that a data analyst should investigate. In an adversarial scenario, the graph may be manipulated to avoid scrutiny of certain nodes by the analyst. Robustness to such behavior is an important consid... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 383,890 |
2404.15592 | ImplicitAVE: An Open-Source Dataset and Multimodal LLMs Benchmark for
Implicit Attribute Value Extraction | Existing datasets for attribute value extraction (AVE) predominantly focus on explicit attribute values while neglecting the implicit ones, lack product images, are often not publicly available, and lack an in-depth human inspection across diverse domains. To address these limitations, we present ImplicitAVE, the first... | false | false | false | false | true | true | true | false | true | false | false | true | false | false | false | false | false | false | 449,149 |
2405.11998 | Learning to connect in action: Measuring and understanding the emergence
of boundary spanners in volatile times | Collective intelligence of diverse groups is key for tackling many of today's grand challenges such as fostering resilience and climate adaptation. Information exchange across such diverse groups is crucial for collective intelligence, especially in volatile environments. To facilitate inter-group information exchange,... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | 455,377 |
2411.16142 | Causal Adjacency Learning for Spatiotemporal Prediction Over Graphs | Spatiotemporal prediction over graphs (STPG) is crucial for transportation systems. In existing STPG models, an adjacency matrix is an important component that captures the relations among nodes over graphs. However, most studies calculate the adjacency matrix by directly memorizing the data, such as distance- and corr... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 510,914 |
2210.03778 | Optimal Gait Families using Lagrange Multiplier Method | The robotic locomotion community is interested in optimal gaits for control. Based on the optimization criterion, however, there could be a number of possible optimal gaits. For example, the optimal gait for maximizing displacement with respect to cost is quite different from the maximum displacement optimal gait. Beyo... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 322,168 |
2107.10161 | Evidential Deep Learning for Open Set Action Recognition | In a real-world scenario, human actions are typically out of the distribution from training data, which requires a model to both recognize the known actions and reject the unknown. Different from image data, video actions are more challenging to be recognized in an open-set setting due to the uncertain temporal dynamic... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 247,230 |
2102.02557 | Adaptive Semiparametric Language Models | We present a language model that combines a large parametric neural network (i.e., a transformer) with a non-parametric episodic memory component in an integrated architecture. Our model uses extended short-term context by caching local hidden states -- similar to transformer-XL -- and global long-term memory by retrie... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 218,450 |
2203.10929 | General and Domain Adaptive Chinese Spelling Check with Error Consistent
Pretraining | The lack of label data is one of the significant bottlenecks for Chinese Spelling Check (CSC). Existing researches use the method of automatic generation by exploiting unlabeled data to expand the supervised corpus. However, there is a big gap between the real input scenario and automatic generated corpus. Thus, we dev... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 286,737 |
2409.02632 | Evaluating Environments Using Exploratory Agents | Exploration is a key part of many video games. We investigate the using an exploratory agent to provide feedback on the design of procedurally generated game levels, 5 engaging levels and 5 unengaging levels. We expand upon a framework introduced in previous research which models motivations for exploration and introdu... | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 485,772 |
2201.02848 | Learning Sample Importance for Cross-Scenario Video Temporal Grounding | The task of temporal grounding aims to locate video moment in an untrimmed video, with a given sentence query. This paper for the first time investigates some superficial biases that are specific to the temporal grounding task, and proposes a novel targeted solution. Most alarmingly, we observe that existing temporal g... | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | 274,675 |
2210.10670 | Attaining Class-level Forgetting in Pretrained Model using Few Samples | In order to address real-world problems, deep learning models are jointly trained on many classes. However, in the future, some classes may become restricted due to privacy/ethical concerns, and the restricted class knowledge has to be removed from the models that have been trained on them. The available data may also ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 325,021 |
2502.04988 | CMamba: Learned Image Compression with State Space Models | Learned Image Compression (LIC) has explored various architectures, such as Convolutional Neural Networks (CNNs) and transformers, in modeling image content distributions in order to achieve compression effectiveness. However, achieving high rate-distortion performance while maintaining low computational complexity (\i... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 531,391 |
1809.04556 | Unsupervised Controllable Text Formalization | We propose a novel framework for controllable natural language transformation. Realizing that the requirement of parallel corpus is practically unsustainable for controllable generation tasks, an unsupervised training scheme is introduced. The crux of the framework is a deep neural encoder-decoder that is reinforced wi... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 107,598 |
1807.10268 | Premise selection with neural networks and distributed representation of
features | We present the problem of selecting relevant premises for a proof of a given statement. When stated as a binary classification task for pairs (conjecture, axiom), it can be efficiently solved using artificial neural networks. The key difference between our advance to solve this problem and previous approaches is the us... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 103,907 |
1312.1727 | On the Capacity Region of Broadcast Packet Erasure Relay Networks With
Feedback | We derive a new outer bound on the capacity region of broadcast traffic in multiple input broadcast packet erasure channels with feedback, and extend this outer bound to packet erasure relay networks with feedback. We show the tightness of the outer bound for various classes of networks. An important engineering implic... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 28,881 |
2303.11476 | Chance-Constrained Multi-Robot Motion Planning under Gaussian
Uncertainties | We consider a chance-constrained multi-robot motion planning problem in the presence of Gaussian motion and sensor noise. Our proposed algorithm, CC-K-CBS, leverages the scalability of kinodynamic conflict-based search (K-CBS) in conjunction with the efficiency of the Gaussian belief trees used in the Belief-A framewor... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 352,867 |
2407.04158 | ELCC: the Emergent Language Corpus Collection | We introduce the Emergent Language Corpus Collection (ELCC): a collection of corpora generated from open source implementations of emergent communication systems across the literature. These systems include a variety of signalling game environments as well as more complex environments like a social deduction game and e... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 470,447 |
2210.17142 | Towards Relation-centered Pooling and Convolution for Heterogeneous
Graph Learning Networks | Heterogeneous graph neural network has unleashed great potential on graph representation learning and shown superior performance on downstream tasks such as node classification and clustering. Existing heterogeneous graph learning networks are primarily designed to either rely on pre-defined meta-paths or use attention... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 327,584 |
2105.14257 | Diffusion-Based Representation Learning | Diffusion-based methods represented as stochastic differential equations on a continuous-time domain have recently proven successful as a non-adversarial generative model. Training such models relies on denoising score matching, which can be seen as multi-scale denoising autoencoders. Here, we augment the denoising sco... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 237,603 |
2403.03791 | KG-TREAT: Pre-training for Treatment Effect Estimation by Synergizing
Patient Data with Knowledge Graphs | Treatment effect estimation (TEE) is the task of determining the impact of various treatments on patient outcomes. Current TEE methods fall short due to reliance on limited labeled data and challenges posed by sparse and high-dimensional observational patient data. To address the challenges, we introduce a novel pre-tr... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 435,340 |
2209.10381 | DARTSRepair: Core-failure-set Guided DARTS for Network Robustness to
Common Corruptions | Network architecture search (NAS), in particular the differentiable architecture search (DARTS) method, has shown a great power to learn excellent model architectures on the specific dataset of interest. In contrast to using a fixed dataset, in this work, we focus on a different but important scenario for NAS: how to r... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 318,843 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.