id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2010.03370 | A study on using image based machine learning methods to develop the
surrogate models of stamp forming simulations | In the design optimization of metal forming, it is increasingly significant to use surrogate models to analyse the finite element analysis (FEA) simulations. However, traditional surrogate models using scalar based machine learning methods (SBMLMs) fall in short of accuracy and generalizability. This is because SBMLMs ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 199,385 |
2012.07403 | One-Shot Learning with Triplet Loss for Vegetation Classification Tasks | Triplet loss function is one of the options that can significantly improve the accuracy of the One-shot Learning tasks. Starting from 2015, many projects use Siamese networks and this kind of loss for face recognition and object classification. In our research, we focused on two tasks related to vegetation. The first o... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 211,444 |
2104.02330 | Visual Alignment Constraint for Continuous Sign Language Recognition | Vision-based Continuous Sign Language Recognition (CSLR) aims to recognize unsegmented signs from image streams. Overfitting is one of the most critical problems in CSLR training, and previous works show that the iterative training scheme can partially solve this problem while also costing more training time. In this s... | true | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 228,689 |
1708.03209 | Tosca: Operationalizing Commitments Over Information Protocols | The notion of commitment is widely studied as a high-level abstraction for modeling multiagent interaction. An important challenge is supporting flexible decentralized enactments of commitment specifications. In this paper, we combine recent advances on specifying commitments and information protocols. Specifically, we... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 78,729 |
2005.03642 | On Exposure Bias, Hallucination and Domain Shift in Neural Machine
Translation | The standard training algorithm in neural machine translation (NMT) suffers from exposure bias, and alternative algorithms have been proposed to mitigate this. However, the practical impact of exposure bias is under debate. In this paper, we link exposure bias to another well-known problem in NMT, namely the tendency t... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 176,215 |
1908.06449 | RefNet: A Reference-aware Network for Background Based Conversation | Existing conversational systems tend to generate generic responses. Recently, Background Based Conversations (BBCs) have been introduced to address this issue. Here, the generated responses are grounded in some background information. The proposed methods for BBCs are able to generate more informative responses, they e... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 142,021 |
2403.19647 | Sparse Feature Circuits: Discovering and Editing Interpretable Causal
Graphs in Language Models | We introduce methods for discovering and applying sparse feature circuits. These are causally implicated subnetworks of human-interpretable features for explaining language model behaviors. Circuits identified in prior work consist of polysemantic and difficult-to-interpret units like attention heads or neurons, render... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 442,430 |
2501.00747 | DIVE: Diversified Iterative Self-Improvement | Recent advances in large language models (LLMs) have demonstrated the effectiveness of Iterative Self-Improvement (ISI) techniques. However, continuous training on self-generated data leads to reduced output diversity, a limitation particularly critical in reasoning tasks where diverse solution paths are essential. We ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 521,784 |
2502.12518 | New Constant Dimension Codes From the Inserting Mixed Dimension
Construction and Multilevel Construction | Constant dimension codes (CDCs) are essential for error correction in random network coding. A fundamental problem of CDCs is to determine their maximal possible size for given parameters. Inserting construction and multilevel construction are two effective techniques for constructing CDCs. We first provide a sufficien... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 534,911 |
2212.06965 | Error-Aware B-PINNs: Improving Uncertainty Quantification in Bayesian
Physics-Informed Neural Networks | Physics-Informed Neural Networks (PINNs) are gaining popularity as a method for solving differential equations. While being more feasible in some contexts than the classical numerical techniques, PINNs still lack credibility. A remedy for that can be found in Uncertainty Quantification (UQ) which is just beginning to e... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 336,256 |
1701.04005 | Geographic Space as a Living Structure for Predicting Human Activities
Using Big Data | Inspired by Christopher Alexanders conception of the world - space is not lifeless or neutral but a living structure involving far more small things than large ones a topological representation has been previously developed to characterize the living structure or the wholeness of geographic space. This paper further de... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 66,793 |
2408.05614 | ICGMM: CXL-enabled Memory Expansion with Intelligent Caching Using
Gaussian Mixture Model | Compute Express Link (CXL) emerges as a solution for wide gap between computational speed and data communication rates among host and multiple devices. It fosters a unified and coherent memory space between host and CXL storage devices such as such as Solid-state drive (SSD) for memory expansion, with a corresponding D... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 479,861 |
1403.7335 | Emotion Analysis Platform on Chinese Microblog | Weibo, as the largest social media service in China, has billions of messages generated every day. The huge number of messages contain rich sentimental information. In order to analyze the emotional changes in accordance with time and space, this paper presents an Emotion Analysis Platform (EAP), which explores the emo... | false | false | false | false | false | true | false | false | true | false | false | false | false | true | false | false | false | false | 31,894 |
2306.05677 | A fast reduced order method for linear parabolic inverse source problems | In this paper, we propose a novel, computationally efficient reduced order method to solve linear parabolic inverse source problems. Our approach provides accurate numerical solutions without relying on specific training data. The forward solution is constructed using a Krylov sequence, while the source term is recover... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 372,288 |
1907.04613 | Neural Networks as Explicit Word-Based Rules | Filters of convolutional networks used in computer vision are often visualized as image patches that maximize the response of the filter. We use the same approach to interpret weight matrices in simple architectures for natural language processing tasks. We interpret a convolutional network for sentiment classification... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 138,149 |
0803.0954 | Selective association rule generation | Mining association rules is a popular and well researched method for discovering interesting relations between variables in large databases. A practical problem is that at medium to low support values often a large number of frequent itemsets and an even larger number of association rules are found in a database. A wid... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | true | 1,398 |
2205.02220 | Chasing Streams with Existential Rules | We study reasoning with existential rules to perform query answering over streams of data. On static databases, this problem has been widely studied, but its extension to rapidly changing data has not yet been considered. To bridge this gap, we extend LARS, a well-known framework for rule-based stream reasoning, to sup... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | true | false | 294,876 |
2110.01778 | Version Reconciliation for Collaborative Databases | We propose MindPalace, a prototype of a versioned database for efficient collaborative data management. MindPalace supports offline collaboration, where users work independently without real-time correspondence. The core of MindPalace is a critical step of offline collaboration: reconciling divergent branches made by s... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 258,889 |
1803.04249 | SO-Net: Self-Organizing Network for Point Cloud Analysis | This paper presents SO-Net, a permutation invariant architecture for deep learning with orderless point clouds. The SO-Net models the spatial distribution of point cloud by building a Self-Organizing Map (SOM). Based on the SOM, SO-Net performs hierarchical feature extraction on individual points and SOM nodes, and ult... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 92,417 |
2107.11433 | A general sample complexity analysis of vanilla policy gradient | We adapt recent tools developed for the analysis of Stochastic Gradient Descent (SGD) in non-convex optimization to obtain convergence and sample complexity guarantees for the vanilla policy gradient (PG). Our only assumptions are that the expected return is smooth w.r.t. the policy parameters, that its $H$-step trunca... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 247,585 |
2404.17875 | Noisy Node Classification by Bi-level Optimization based Multi-teacher
Distillation | Previous graph neural networks (GNNs) usually assume that the graph data is with clean labels for representation learning, but it is not true in real applications. In this paper, we propose a new multi-teacher distillation method based on bi-level optimization (namely BO-NNC), to conduct noisy node classification on th... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 450,038 |
2404.11483 | AgentKit: Structured LLM Reasoning with Dynamic Graphs | We propose an intuitive LLM prompting framework (AgentKit) for multifunctional agents. AgentKit offers a unified framework for explicitly constructing a complex "thought process" from simple natural language prompts. The basic building block in AgentKit is a node, containing a natural language prompt for a specific sub... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 447,515 |
2407.13170 | Unified-EGformer: Exposure Guided Lightweight Transformer for
Mixed-Exposure Image Enhancement | Despite recent strides made by AI in image processing, the issue of mixed exposure, pivotal in many real-world scenarios like surveillance and photography, remains inadequately addressed. Traditional image enhancement techniques and current transformer models are limited with primary focus on either overexposure or und... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 474,266 |
2402.09008 | Multi-Query Focused Disaster Summarization via Instruction-Based
Prompting | Automatic summarization of mass-emergency events plays a critical role in disaster management. The second edition of CrisisFACTS aims to advance disaster summarization based on multi-stream fact-finding with a focus on web sources such as Twitter, Reddit, Facebook, and Webnews. Here, participants are asked to develop s... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 429,331 |
2010.13544 | Meta-Learning for Neural Relation Classification with Distant
Supervision | Distant supervision provides a means to create a large number of weakly labeled data at low cost for relation classification. However, the resulting labeled instances are very noisy, containing data with wrong labels. Many approaches have been proposed to select a subset of reliable instances for neural model training,... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 203,170 |
2309.10238 | PolicyGPT: Automated Analysis of Privacy Policies with Large Language
Models | Privacy policies serve as the primary conduit through which online service providers inform users about their data collection and usage procedures. However, in a bid to be comprehensive and mitigate legal risks, these policy documents are often quite verbose. In practical use, users tend to click the Agree button direc... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 392,920 |
1911.11314 | Calibrated Domain-Invariant Learning for Highly Generalizable Large
Scale Re-Identification | Many real-world applications, such as city-scale traffic monitoring and control, requires large-scale re-identification. However, previous ReID methods often failed to address two limitations in existing ReID benchmarks, i.e., low spatiotemporal coverage and sample imbalance. Notwithstanding their demonstrated success ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 155,079 |
2111.10617 | Extracting Deformation-Aware Local Features by Learning to Deform | Despite the advances in extracting local features achieved by handcrafted and learning-based descriptors, they are still limited by the lack of invariance to non-rigid transformations. In this paper, we present a new approach to compute features from still images that are robust to non-rigid deformations to circumvent ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 267,385 |
1410.3015 | Heuristic Monte Carlo Method Applied to Cooperative Motion Algorithm for
Binary Lattice Fluid | The Cooperative Motion Algorithm is an efficient lattice method to simulate dense polymer systems and is often used with two different criteria to generate a Markov chain in the configuration space. While the first method is the well-established Metropolis algorithm, the other one is an heuristic algorithm which needs ... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 36,674 |
2403.07951 | SAMDA: Leveraging SAM on Few-Shot Domain Adaptation for Electronic
Microscopy Segmentation | It has been shown that traditional deep learning methods for electronic microscopy segmentation usually suffer from low transferability when samples and annotations are limited, while large-scale vision foundation models are more robust when transferring between different domains but facing sub-optimal improvement unde... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 437,113 |
2005.14381 | Bayesian network structure learning with causal effects in the presence
of latent variables | Latent variables may lead to spurious relationships that can be misinterpreted as causal relationships. In Bayesian Networks (BNs), this challenge is known as learning under causal insufficiency. Structure learning algorithms that assume causal insufficiency tend to reconstruct the ancestral graph of a BN, where bi-dir... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 179,250 |
2308.15003 | Generative Model for Models: Rapid DNN Customization for Diverse Tasks
and Resource Constraints | Unlike cloud-based deep learning models that are often large and uniform, edge-deployed models usually demand customization for domain-specific tasks and resource-limited environments. Such customization processes can be costly and time-consuming due to the diversity of edge scenarios and the training load for each sce... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 388,527 |
1307.1890 | Solution of Rectangular Fuzzy Games by Principle of Dominance Using
LR-type Trapezoidal Fuzzy Numbers | Fuzzy Set Theory has been applied in many fields such as Operations Research, Control Theory, and Management Sciences etc. In particular, an application of this theory in Managerial Decision Making Problems has a remarkable significance. In this Paper, we consider a solution of Rectangular Fuzzy game with pay-off as im... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 25,670 |
2408.02767 | 4D-Var using Hessian approximation and backpropagation applied to
automatically-differentiable numerical and machine learning models | Constraining a numerical weather prediction (NWP) model with observations via 4D variational (4D-Var) data assimilation is often difficult to implement in practice due to the need to develop and maintain a software-based tangent linear model and adjoint model. One of the most common 4D-Var algorithms uses an incrementa... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 478,754 |
2102.07851 | Dynamics and Control of a Flapping Wing UAV with Abdomen Undulation
Inspired by Monarch Butterfly | This paper presents a dynamic model and a control system for a flapping-wing unmanned aerial vehicle. Inspired by flight characteristics captured from live Monarch butterflies, a new dynamic model is presented to account the effects of low-frequency flapping and abdomen undulation. We developed it according to Lagrangi... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 220,251 |
1810.12401 | Application of Clustering Methods to Anomaly Detection in Fibrous Media | The paper considers the problem of anomaly detection in 3D images of fibre materials. The spatial Stochastic Expectation Maximisation algorithm and Adaptive Weights Clustering are applied to solve this problem. The initial 3D grey scale image was divided into small cubes subject to clustering. For each cube clustering ... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 111,752 |
1306.2735 | On the Impact of Relay-side Channel State Information on Opportunistic
Relaying | In this paper, outage performance of network topology-aware distributed opportunistic relay selection strategies is studied with focus on the impact of different levels of channel state information (CSI) available at relays. Specifically, two scenarios with (a) exact instantaneous and (b) only statistical CSI are compa... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 25,153 |
2010.10935 | An Eager Splitting Strategy for Online Decision Trees | Decision tree ensembles are widely used in practice. In this work, we study in ensemble settings the effectiveness of replacing the split strategy for the state-of-the-art online tree learner, Hoeffding Tree, with a rigorous but more eager splitting strategy that we had previously published as Hoeffding AnyTime Tree. H... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 202,061 |
2212.01816 | Joint graph learning from Gaussian observations in the presence of
hidden nodes | Graph learning problems are typically approached by focusing on learning the topology of a single graph when signals from all nodes are available. However, many contemporary setups involve multiple related networks and, moreover, it is often the case that only a subset of nodes is observed while the rest remain hidden.... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 334,586 |
1901.08456 | Semantic Classification of Tabular Datasets via Character-Level
Convolutional Neural Networks | A character-level convolutional neural network (CNN) motivated by applications in "automated machine learning" (AutoML) is proposed to semantically classify columns in tabular data. Simulated data containing a set of base classes is first used to learn an initial set of weights. Hand-labeled data from the CKAN reposito... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 119,479 |
2304.11215 | ChatGPT: More than a Weapon of Mass Deception, Ethical challenges and
responses from the Human-Centered Artificial Intelligence (HCAI) perspective | This article explores the ethical problems arising from the use of ChatGPT as a kind of generative AI and suggests responses based on the Human-Centered Artificial Intelligence (HCAI) framework. The HCAI framework is appropriate because it understands technology above all as a tool to empower, augment, and enhance huma... | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | false | false | 359,721 |
2103.03939 | NF-GNN: Network Flow Graph Neural Networks for Malware Detection and
Classification | Malicious software (malware) poses an increasing threat to the security of communication systems as the number of interconnected mobile devices increases exponentially. While some existing malware detection and classification approaches successfully leverage network traffic data, they treat network flows between pairs ... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 223,463 |
1611.06474 | Nazr-CNN: Fine-Grained Classification of UAV Imagery for Damage
Assessment | We propose Nazr-CNN1, a deep learning pipeline for object detection and fine-grained classification in images acquired from Unmanned Aerial Vehicles (UAVs) for damage assessment and monitoring. Nazr-CNN consists of two components. The function of the first component is to localize objects (e.g. houses or infrastructure... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 64,198 |
2204.11447 | Evaluating Interpolation and Extrapolation Performance of Neural
Retrieval Models | A retrieval model should not only interpolate the training data but also extrapolate well to the queries that are different from the training data. While neural retrieval models have demonstrated impressive performance on ad-hoc search benchmarks, we still know little about how they perform in terms of interpolation an... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 293,155 |
1405.4945 | Distributed Resource Allocation in Device-to-Device Enhanced Cellular
Networks | Cellular network performance can significantly benefit from direct device-to-device (D2D) communication, but interference from cochannel D2D communication limits the performance gain. In hybrid networks consisting of D2D and cellular links, finding the optimal interference management is challenging. In particular, we s... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 33,222 |
2212.00724 | SWL-Adapt: An Unsupervised Domain Adaptation Model with Sample Weight
Learning for Cross-User Wearable Human Activity Recognition | In practice, Wearable Human Activity Recognition (WHAR) models usually face performance degradation on the new user due to user variance. Unsupervised domain adaptation (UDA) becomes the natural solution to cross-user WHAR under annotation scarcity. Existing UDA models usually align samples across domains without diffe... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 334,162 |
2407.21794 | Generalized Out-of-Distribution Detection and Beyond in Vision Language
Model Era: A Survey | Detecting out-of-distribution (OOD) samples is crucial for ensuring the safety of machine learning systems and has shaped the field of OOD detection. Meanwhile, several other problems are closely related to OOD detection, including anomaly detection (AD), novelty detection (ND), open set recognition (OSR), and outlier ... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 477,675 |
1901.00959 | QFlow: A Learning Approach to High QoE Video Streaming at the Wireless
Edge | The predominant use of wireless access networks is for media streaming applications, which are only gaining popularity as ever more devices become available for this purpose. However, current access networks treat all packets identically, and lack the agility to determine which clients are most in need of service at a ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 117,887 |
2102.07838 | A Comparison of Deep-Learning Methods for Analysing and Predicting
Business Processes | Deep-learning models such as Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) have been successfully used for process-mining tasks. They have achieved better performance for different predictive tasks than traditional approaches. We extend the existing body of research by testing four different var... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 220,243 |
cs/0604064 | Quantum Fuzzy Sets: Blending Fuzzy Set Theory and Quantum Computation | In this article we investigate a way in which quantum computing can be used to extend the class of fuzzy sets. The core idea is to see states of a quantum register as characteristic functions of quantum fuzzy subsets of a given set. As the real unit interval is embedded in the Bloch sphere, every fuzzy set is automatic... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 539,391 |
2105.05126 | Continuous User Authentication using IoT Wearable Sensors | Over the past several years, the electrocardiogram (ECG) has been investigated for its uniqueness and potential to discriminate between individuals. This paper discusses how this discriminatory information can help in continuous user authentication by a wearable chest strap which uses dry electrodes to obtain a single ... | false | false | false | false | false | false | false | false | false | false | true | false | true | false | false | false | false | false | 234,725 |
2301.02647 | Universal adaptive optics for microscopy through embedded neural network
control | The resolution and contrast of microscope imaging is often affected by aberrations introduced by imperfect optical systems and inhomogeneous refractive structures in specimens. Adaptive optics (AO) compensates these aberrations and restores diffraction limited performance. A wide range of AO solutions have been introdu... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 339,554 |
2412.14462 | Affordance-Aware Object Insertion via Mask-Aware Dual Diffusion | As a common image editing operation, image composition involves integrating foreground objects into background scenes. In this paper, we expand the application of the concept of Affordance from human-centered image composition tasks to a more general object-scene composition framework, addressing the complex interplay ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 518,707 |
2201.08992 | Enhancing and Dissecting Crowd Counting By Synthetic Data | In this article, we propose a simulated crowd counting dataset CrowdX, which has a large scale, accurate labeling, parameterized realization, and high fidelity. The experimental results of using this dataset as data enhancement show that the performance of the proposed streamlined and efficient benchmark network ESA-Ne... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 276,512 |
2105.08582 | Vision Transformer for Fast and Efficient Scene Text Recognition | Scene text recognition (STR) enables computers to read text in natural scenes such as object labels, road signs and instructions. STR helps machines perform informed decisions such as what object to pick, which direction to go, and what is the next step of action. In the body of work on STR, the focus has always been o... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 235,800 |
2202.03844 | EvoPruneDeepTL: An Evolutionary Pruning Model for Transfer Learning
based Deep Neural Networks | In recent years, Deep Learning models have shown a great performance in complex optimization problems. They generally require large training datasets, which is a limitation in most practical cases. Transfer learning allows importing the first layers of a pre-trained architecture and connecting them to fully-connected l... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 279,361 |
1304.7638 | Lobby index as a network centrality measure | We study the lobby index (l-index for short) as a local node centrality measure for complex networks. The l-inde is compared with degree (a local measure), betweenness and Eigenvector centralities (two global measures) in the case of biological network (Yeast interaction protein-protein network) and a linguistic networ... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 24,278 |
2312.00289 | Robust Generalized Proportional Integral Control for Trajectory Tracking
of Soft Actuators in a Pediatric Wearable Assistive Device | Soft robotics hold promise in the development of safe yet powered assistive wearable devices for infants. Key to this is the development of closed-loop controllers that can help regulate pneumatic pressure in the device's actuators in an effort to induce controlled motion at the user's limbs and be able to track differ... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 411,987 |
2304.01553 | Heating and dynamics of the Solar atmosphere | The solar atmosphere shows anomalous variation in temperature, starting from the 5500 K photosphere to the million-degree Kelvin corona. The corona itself expands into the interstellar medium as the free streaming solar wind, which modulates and impacts the near-Earth space weather. The precise source regions of differ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 356,126 |
2409.12031 | PhysMamba: Efficient Remote Physiological Measurement with SlowFast
Temporal Difference Mamba | Facial-video based Remote photoplethysmography (rPPG) aims at measuring physiological signals and monitoring heart activity without any contact, showing significant potential in various applications. Previous deep learning based rPPG measurement are primarily based on CNNs and Transformers. However, the limited recepti... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 489,408 |
2210.14226 | FedClassAvg: Local Representation Learning for Personalized Federated
Learning on Heterogeneous Neural Networks | Personalized federated learning is aimed at allowing numerous clients to train personalized models while participating in collaborative training in a communication-efficient manner without exchanging private data. However, many personalized federated learning algorithms assume that clients have the same neural network ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 326,466 |
2007.05785 | Incorporating Learnable Membrane Time Constant to Enhance Learning of
Spiking Neural Networks | Spiking Neural Networks (SNNs) have attracted enormous research interest due to temporal information processing capability, low power consumption, and high biological plausibility. However, the formulation of efficient and high-performance learning algorithms for SNNs is still challenging. Most existing learning method... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | true | false | false | 186,785 |
1605.05365 | Dynamic Frame skip Deep Q Network | Deep Reinforcement Learning methods have achieved state of the art performance in learning control policies for the games in the Atari 2600 domain. One of the important parameters in the Arcade Learning Environment (ALE) is the frame skip rate. It decides the granularity at which agents can control game play. A frame s... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 55,992 |
2305.16092 | AI Techniques in the Microservices Life-Cycle: A Systematic Mapping
Study | The use of AI in microservices (MSs) is an emerging field as indicated by a substantial number of surveys. However these surveys focus on a specific problem using specific AI techniques, therefore not fully capturing the growth of research and the rise and disappearance of trends. In our systematic mapping study, we ta... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 367,909 |
1606.08651 | Two-way relay beamforming optimization for full-duplex SWIPT systems | In this paper, we investigate the problem of two-way relay beamforming optimization to maximize the achievable sum-rate of a simultaneous wireless information and power transfer (SWIPT) system with a full-duplex (FD) multiple-input multiple-output (MIMO) amplify-and-forward (AF) relay. In particular, we address the opt... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 57,892 |
1805.09799 | Prediction of Autism Treatment Response from Baseline fMRI using Random
Forests and Tree Bagging | Treating children with autism spectrum disorders (ASD) with behavioral interventions, such as Pivotal Response Treatment (PRT), has shown promise in recent studies. However, deciding which therapy is best for a given patient is largely by trial and error, and choosing an ineffective intervention results in loss of valu... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 98,502 |
2206.12571 | CV 3315 Is All You Need : Semantic Segmentation Competition | This competition focus on Urban-Sense Segmentation based on the vehicle camera view. Class highly unbalanced Urban-Sense images dataset challenge the existing solutions and further studies. Deep Conventional neural network-based semantic segmentation methods such as encoder-decoder architecture and multi-scale and pyra... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 304,653 |
2412.11318 | Generics are puzzling. Can language models find the missing piece? | Generic sentences express generalisations about the world without explicit quantification. Although generics are central to everyday communication, building a precise semantic framework has proven difficult, in part because speakers use generics to generalise properties with widely different statistical prevalence. In ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 517,355 |
1309.1524 | Guided Self-Organization of Input-Driven Recurrent Neural Networks | We review attempts that have been made towards understanding the computational properties and mechanisms of input-driven dynamical systems like RNNs, and reservoir computing networks in particular. We provide details on methods that have been developed to give quantitative answers to the questions above. Following this... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | false | false | 26,870 |
2109.11320 | Nine Challenges in Artificial Intelligence and Wireless Communications
for 6G | In recent years, techniques developed in artificial intelligence (AI), especially those in machine learning (ML), have been successfully applied in various areas, leading to a widespread belief that AI will collectively play an important role in future wireless communications. To accomplish the aspiration, we present n... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 256,906 |
2002.03069 | Adaptive Approximate Policy Iteration | Model-free reinforcement learning algorithms combined with value function approximation have recently achieved impressive performance in a variety of application domains. However, the theoretical understanding of such algorithms is limited, and existing results are largely focused on episodic or discounted Markov decis... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 163,124 |
1608.04079 | Twisted Centralizer Codes | Given an $n\times n$ matrix $A$ over a field $F$ and a scalar $a\in F$, we consider the linear codes $C(A,a):=\{B\in F^{n\times n}\mid \,AB=aBA\}$ of length $n^2$. We call $C(A,a)$ a twisted centralizer code. We investigate properties of these codes including their dimensions, minimum distances, parity-check matrices, ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 59,774 |
2212.05051 | VindLU: A Recipe for Effective Video-and-Language Pretraining | The last several years have witnessed remarkable progress in video-and-language (VidL) understanding. However, most modern VidL approaches use complex and specialized model architectures and sophisticated pretraining protocols, making the reproducibility, analysis and comparisons of these frameworks difficult. Hence, i... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 335,662 |
1707.05390 | TensorLog: Deep Learning Meets Probabilistic DBs | We present an implementation of a probabilistic first-order logic called TensorLog, in which classes of logical queries are compiled into differentiable functions in a neural-network infrastructure such as Tensorflow or Theano. This leads to a close integration of probabilistic logical reasoning with deep-learning infr... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 77,215 |
1502.02733 | Bandwidth Efficient and Rate-Matched Low-Density Parity-Check Coded
Modulation | A new coded modulation scheme is proposed. At the transmitter, the concatenation of a distribution matcher and a systematic binary encoder performs probabilistic signal shaping and channel coding. At the receiver, the output of a bitwise demapper is fed to a binary decoder. No iterative demapping is performed. Rate ada... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 40,075 |
2206.14421 | Cyclical Kernel Adaptive Metropolis | We propose cKAM, cyclical Kernel Adaptive Metropolis, which incorporates a cyclical stepsize scheme to allow control for exploration and sampling. We show that on a crafted bimodal distribution, existing Adaptive Metropolis type algorithms would fail to converge to the true posterior distribution. We point out that thi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 305,282 |
1308.5546 | Sparse and Non-Negative BSS for Noisy Data | Non-negative blind source separation (BSS) has raised interest in various fields of research, as testified by the wide literature on the topic of non-negative matrix factorization (NMF). In this context, it is fundamental that the sources to be estimated present some diversity in order to be efficiently retrieved. Spar... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 26,647 |
2012.08588 | FoggySight: A Scheme for Facial Lookup Privacy | Advances in deep learning algorithms have enabled better-than-human performance on face recognition tasks. In parallel, private companies have been scraping social media and other public websites that tie photos to identities and have built up large databases of labeled face images. Searches in these databases are now ... | false | false | false | false | false | false | true | false | false | false | false | true | true | false | false | false | false | false | 211,800 |
1703.09068 | Make Hawkes Processes Explainable by Decomposing Self-Triggering Kernels | Hawkes Processes capture self-excitation and mutual-excitation between events when the arrival of an event makes future events more likely to happen. Identification of such temporal covariance can reveal the underlying structure to better predict future events. In this paper, we present a new framework to decompose dis... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 70,696 |
1211.4081 | Network Equivalence in the Presence of an Eavesdropper | We consider networks of noisy degraded wiretap channels in the presence of an eavesdropper. For the case where the eavesdropper can wiretap at most one channel at a time, we show that the secrecy capacity region, for a broad class of channels and any given network topology and communication demands, is equivalent to th... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 19,773 |
2104.05477 | Stochastic Stability of Discrete-time Phase-coupled Oscillators over
Uncertain and Random Networks | This article studies stochastic relative phase stability, i.e., stochastic phase-cohesiveness, of discrete-time phase-coupled oscillators. Stochastic phase-cohesiveness in two types of networks is studied. First, we consider oscillators coupled with 2{\pi}-periodic odd functions over underlying undirected graphs subjec... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 229,741 |
2311.14542 | ToddlerDiffusion: Interactive Structured Image Generation with Cascaded
Schr\"odinger Bridge | Diffusion models break down the challenging task of generating data from high-dimensional distributions into a series of easier denoising steps. Inspired by this paradigm, we propose a novel approach that extends the diffusion framework into modality space, decomposing the complex task of RGB image generation into simp... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 410,146 |
1607.03296 | Implicit Negative Feedback in Clinical Information Retrieval | In this paper, we reflect on ways to improve the quality of bio-medical information retrieval by drawing implicit negative feedback from negated information in noisy natural language search queries. We begin by studying the extent to which negations occur in clinical texts and quantify their detrimental effect on retri... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 58,490 |
2408.13248 | Foundational Model for Electron Micrograph Analysis: Instruction-Tuning
Small-Scale Language-and-Vision Assistant for Enterprise Adoption | Semiconductor imaging and analysis are critical yet understudied in deep learning, limiting our ability for precise control and optimization in semiconductor manufacturing. We introduce a small-scale multimodal framework for analyzing semiconductor electron microscopy images (MAEMI) through vision-language instruction ... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 483,070 |
2411.16189 | Enhancing Multi-Agent Consensus through Third-Party LLM Integration:
Analyzing Uncertainty and Mitigating Hallucinations in Large Language Models | Large Language Models (LLMs) still face challenges when dealing with complex reasoning tasks, often resulting in hallucinations, which limit the practical application of LLMs. To alleviate this issue, this paper proposes a new method that integrates different LLMs to expand the knowledge boundary, reduce dependence on ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | true | false | false | false | 510,938 |
2305.17369 | Modularized Zero-shot VQA with Pre-trained Models | Large-scale pre-trained models (PTMs) show great zero-shot capabilities. In this paper, we study how to leverage them for zero-shot visual question answering (VQA). Our approach is motivated by a few observations. First, VQA questions often require multiple steps of reasoning, which is still a capability that most PTMs... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 368,552 |
2109.04762 | Dual-State Capsule Networks for Text Classification | Text classification systems based on contextual embeddings are not viable options for many of the low resource languages. On the other hand, recently introduced capsule networks have shown performance in par with these text classification models. Thus, they could be considered as a viable alternative for text classific... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 254,532 |
2111.05457 | Optimizing Number, Placement, and Backhaul Connectivity of Multi-UAV
Networks | Multi-Unmanned Aerial Vehicle (UAV) Networks is a promising solution to providing wireless coverage to ground users in challenging rural areas (such as Internet of Things (IoT) devices in farmlands), where the traditional cellular networks are sparse or unavailable. A key challenge in such networks is the 3D placement ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 265,797 |
2305.15304 | Towards Biomechanics-Aware Design of a Steerable Drilling Robot for
Spinal Fixation Procedures with Flexible Pedicle Screws | Towards reducing the failure rate of spinal fixation surgical procedures in osteoporotic patients, we propose a unique biomechanically-aware framework for the design of a novel concentric tube steerable drilling robot (CT-SDR). The proposed framework leverages a patient-specific finite element (FE) biomechanics model d... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 367,559 |
2110.15252 | Federated Learning with Heterogeneous Differential Privacy | Federated learning (FL) takes a first step towards privacy-preserving machine learning by training models while keeping client data local. Models trained using FL may still leak private client information through model updates during training. Differential privacy (DP) may be employed on model updates to provide privac... | false | false | false | false | true | false | true | false | false | false | false | false | true | false | false | false | false | false | 263,821 |
2412.00152 | Dynamic Neural Curiosity Enhances Learning Flexibility for Autonomous
Goal Discovery | The autonomous learning of new goals in robotics remains a complex issue to address. Here, we propose a model where curiosity influence learning flexibility. To do so, this paper proposes to root curiosity and attention together by taking inspiration from the Locus Coeruleus-Norepinephrine system along with various cog... | false | false | false | false | true | false | true | true | false | false | false | false | false | false | false | false | false | false | 512,537 |
2112.01317 | Monolith to Microservices: Representing Application Software through
Heterogeneous Graph Neural Network | Monolithic software encapsulates all functional capabilities into a single deployable unit. But managing it becomes harder as the demand for new functionalities grow. Microservice architecture is seen as an alternate as it advocates building an application through a set of loosely coupled small services wherein each se... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 269,440 |
1803.00210 | A Hybrid Artificial-Noise and Secret-Key Scheme for Securing OFDM
Transmissions in V2G Networks | We propose a new scheme to enhance the physical-layer security of wireless single-input single-output orthogonal-frequency division-multiplexing (OFDM) transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the presence of an eavesdropper, Eve. To prevent information leakage to Eve, Alice exploits th... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 91,626 |
2212.11702 | Robust Meta-Representation Learning via Global Label Inference and
Classification | Few-shot learning (FSL) is a central problem in meta-learning, where learners must efficiently learn from few labeled examples. Within FSL, feature pre-training has recently become an increasingly popular strategy to significantly improve generalization performance. However, the contribution of pre-training is often ov... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 337,856 |
2001.11279 | Goal-directed graph construction using reinforcement learning | Graphs can be used to represent and reason about systems and a variety of metrics have been devised to quantify their global characteristics. However, little is currently known about how to construct a graph or improve an existing one given a target objective. In this work, we formulate the construction of a graph as a... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 162,031 |
2105.04888 | Hierarchical RNNs-Based Transformers MADDPG for Mixed
Cooperative-Competitive Environments | At present, attention mechanism has been widely applied to the fields of deep learning models. Structural models that based on attention mechanism can not only record the relationships between features position, but also can measure the importance of different features based on their weights. By establishing dynamicall... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | 234,652 |
2304.01611 | Q2ATransformer: Improving Medical VQA via an Answer Querying Decoder | Medical Visual Question Answering (VQA) systems play a supporting role to understand clinic-relevant information carried by medical images. The questions to a medical image include two categories: close-end (such as Yes/No question) and open-end. To obtain answers, the majority of the existing medical VQA methods relie... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 356,148 |
2410.09097 | Recent advancements in LLM Red-Teaming: Techniques, Defenses, and
Ethical Considerations | Large Language Models (LLMs) have demonstrated remarkable capabilities in natural language processing tasks, but their vulnerability to jailbreak attacks poses significant security risks. This survey paper presents a comprehensive analysis of recent advancements in attack strategies and defense mechanisms within the fi... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 497,431 |
0707.2229 | The Computation of All 4R Serial Spherical Wrists With an Isotropic
Architecture | A spherical wrist of the serial type with n revolute (R) joints is said to be isotropic if it can attain a posture whereby the singular values of its Jacobian matrix are all equal to sqrt(n/3). What isotropy brings about is robustness to manufacturing, assembly, and measurement errors, thereby guaranteeing a maximum or... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 438 |
cs/0305041 | Factorization of Language Models through Backing-Off Lattices | Factorization of statistical language models is the task that we resolve the most discriminative model into factored models and determine a new model by combining them so as to provide better estimate. Most of previous works mainly focus on factorizing models of sequential events, each of which allows only one factoriz... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 537,853 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.