id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1911.01697 | Learning to flock through reinforcement | Flocks of birds, schools of fish, insects swarms are examples of coordinated motion of a group that arises spontaneously from the action of many individuals. Here, we study flocking behavior from the viewpoint of multi-agent reinforcement learning. In this setting, a learning agent tries to keep contact with the group ... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | 152,178 |
2307.11748 | BandRe: Rethinking Band-Pass Filters for Scale-Wise Object Detection
Evaluation | Scale-wise evaluation of object detectors is important for real-world applications. However, existing metrics are either coarse or not sufficiently reliable. In this paper, we propose novel scale-wise metrics that strike a balance between fineness and reliability, using a filter bank consisting of triangular and trapez... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 381,006 |
0806.0837 | Upper and Lower Bounds on Black-Box Steganography | We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negative side, we show that the number of samples the sender must obtain from the channel is exponential in the rate of the stegosystem. On the pos... | false | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | true | 1,871 |
2403.02736 | Bootstrapping Rare Object Detection in High-Resolution Satellite Imagery | Rare object detection is a fundamental task in applied geospatial machine learning, however is often challenging due to large amounts of high-resolution satellite or aerial imagery and few or no labeled positive samples to start with. This paper addresses the problem of bootstrapping such a rare object detection task a... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 434,922 |
2311.14758 | Point2RBox: Combine Knowledge from Synthetic Visual Patterns for
End-to-end Oriented Object Detection with Single Point Supervision | With the rapidly increasing demand for oriented object detection (OOD), recent research involving weakly-supervised detectors for learning rotated box (RBox) from the horizontal box (HBox) has attracted more and more attention. In this paper, we explore a more challenging yet label-efficient setting, namely single poin... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 410,245 |
2501.11299 | MIFNet: Learning Modality-Invariant Features for Generalizable
Multimodal Image Matching | Many keypoint detection and description methods have been proposed for image matching or registration. While these methods demonstrate promising performance for single-modality image matching, they often struggle with multimodal data because the descriptors trained on single-modality data tend to lack robustness agains... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 525,874 |
2411.17922 | Exploring Superpixel Segmentation Methods in the Context of Citizen
Science and Deforestation Detection | Tropical forests play an essential role in the planet's ecosystem, making the conservation of these biomes a worldwide priority. However, ongoing deforestation and degradation pose a significant threat to their existence, necessitating effective monitoring and the proposal of actions to mitigate the damage caused by th... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 511,655 |
2002.01504 | Joint Power Allocation and Load Balancing Optimization for
Energy-Efficient Cell-Free Massive MIMO Networks | Large-scale distributed antenna systems with many access points (APs) that serve the users by coherent joint transmission is being considered for 5G-and-beyond networks. The technology is called Cell-free Massive MIMO and can provide a more uniform service level to the users than a conventional cellular topology. For a... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 162,663 |
2107.03345 | Post-Metering Value-Added Services for Low Voltage Electricity Users:
Lessons Learned From the Italian Experience of CHAIN 2 | Electrical energy consumption data accessibility for low voltage end users is one of the pillars of smart grids. In some countries, despite the presence of smart meters, a fragmentary data availability and/or the lack of standardization hinders the creation of post-metering value-added services and confines such innova... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 245,133 |
2004.10641 | Automatic Detection of Coronavirus Disease (COVID-19) in X-ray and CT
Images: A Machine Learning-Based Approach | The newly identified Coronavirus pneumonia, subsequently termed COVID-19, is highly transmittable and pathogenic with no clinically approved antiviral drug or vaccine available for treatment. The most common symptoms of COVID-19 are dry cough, sore throat, and fever. Symptoms can progress to a severe form of pneumonia ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 173,691 |
2010.02125 | Invertible DenseNets | We introduce Invertible Dense Networks (i-DenseNets), a more parameter efficient alternative to Residual Flows. The method relies on an analysis of the Lipschitz continuity of the concatenation in DenseNets, where we enforce the invertibility of the network by satisfying the Lipschitz constraint. Additionally, we exten... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 198,911 |
2210.03526 | A Unified Hard-Constraint Framework for Solving Geometrically Complex
PDEs | We present a unified hard-constraint framework for solving geometrically complex PDEs with neural networks, where the most commonly used Dirichlet, Neumann, and Robin boundary conditions (BCs) are considered. Specifically, we first introduce the "extra fields" from the mixed finite element method to reformulate the PDE... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 322,073 |
2302.03994 | Fully-Dynamic Approximate Decision Trees With Worst-Case Update Time
Guarantees | We give the first algorithm that maintains an approximate decision tree over an arbitrary sequence of insertions and deletions of labeled examples, with strong guarantees on the worst-case running time per update request. For instance, we show how to maintain a decision tree where every vertex has Gini gain within an a... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 344,549 |
2207.02512 | Identifying and Mitigating Flaws of Deep Perceptual Similarity Metrics | Measuring the similarity of images is a fundamental problem to computer vision for which no universal solution exists. While simple metrics such as the pixel-wise L2-norm have been shown to have significant flaws, they remain popular. One group of recent state-of-the-art metrics that mitigates some of those flaws are D... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 306,537 |
2412.02081 | Let's Think Var-by-Var: Large Language Models Enable Ad Hoc
Probabilistic Reasoning | A hallmark of intelligence is the ability to flesh out underspecified situations using "common sense." We propose to extract that common sense from large language models (LLMs), in a form that can feed into probabilistic inference. We focus our investigation on $\textit{guesstimation}$ questions such as "How much are A... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 513,371 |
2409.12839 | Social impact of CAVs -- coexistence of machines and humans in the
context of route choice | Suppose in a stable urban traffic system populated only by human driven vehicles (HDVs), a given proportion (e.g. 10%) is replaced by a fleet of Connected and Autonomous Vehicles (CAVs), which share information and pursue a collective goal. Suppose these vehicles are centrally coordinated and differ from HDVs only by t... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | 489,738 |
2104.03356 | Universal Spectral Adversarial Attacks for Deformable Shapes | Machine learning models are known to be vulnerable to adversarial attacks, namely perturbations of the data that lead to wrong predictions despite being imperceptible. However, the existence of "universal" attacks (i.e., unique perturbations that transfer across different data points) has only been demonstrated for ima... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 229,041 |
2407.11404 | Mapping savannah woody vegetation at the species level with multispecral
drone and hyperspectral EnMAP data | Savannahs are vital ecosystems whose sustainability is endangered by the spread of woody plants. This research targets the accurate mapping of fractional woody cover (FWC) at the species level in a South African savannah, using EnMAP hyperspectral data. Field annotations were combined with very high-resolution multispe... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 473,437 |
1712.02262 | A New Coding/Decoding Algorithm using Fibonacci Numbers | In this paper we present a new method of coding/decoding algorithms using Fibonacci $Q$-matrices. This method is based on the blocked message matrices. The main advantage of our model is the encryption of each message matrix with different keys. Our approach will not only increase the security of information but also h... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 86,266 |
1811.05408 | Multi-task learning for Joint Language Understanding and Dialogue State
Tracking | This paper presents a novel approach for multi-task learning of language understanding (LU) and dialogue state tracking (DST) in task-oriented dialogue systems. Multi-task training enables the sharing of the neural network layers responsible for encoding the user utterance for both LU and DST and improves performance w... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 113,309 |
1910.00100 | Deep Cooking: Predicting Relative Food Ingredient Amounts from Images | In this paper, we study the novel problem of not only predicting ingredients from a food image, but also predicting the relative amounts of the detected ingredients. We propose two prediction-based models using deep learning that output sparse and dense predictions, coupled with important semi-automatic multi-database ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 147,573 |
1901.02693 | Model-based Stochastic Fault Detection and Diagnosis for Lithium-ion
Batteries | Lithium-ion battery (Li-ion) is becoming the dominant energy storage solution in many applications such as hybrid electric and electric vehicles, due to its higher energy density and longer life cycle. For these applications, the battery should perform reliably and pose no safety threats. However, the performance of Li... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 118,261 |
1303.5134 | Bounds on the Number of Huffman and Binary-Ternary Trees | Huffman coding is a widely used method for lossless data compression because it optimally stores data based on how often the characters occur in Huffman trees. An $n$-ary Huffman tree is a connected, cycle-lacking graph where each vertex can have either $n$ "children" vertices connecting to it, or 0 children. Vertices ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 23,058 |
2110.09111 | Analyzing Wikipedia Membership Dataset and PredictingUnconnected Nodes
in the Signed Networks | In the age of digital interaction, person-to-person relationships existing on social media may be different from the very same interactions that exist offline. Examining potential or spurious relationships between members in a social network is a fertile area of research for computer scientists -- here we examine how r... | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 261,683 |
2307.05095 | ATWM: Defense against adversarial malware based on adversarial training | Deep learning technology has made great achievements in the field of image. In order to defend against malware attacks, researchers have proposed many Windows malware detection models based on deep learning. However, deep learning models are vulnerable to adversarial example attacks. Malware can generate adversarial ma... | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | false | 378,622 |
1908.09895 | Index Network | We show that existing upsampling operators can be unified using the notion of the index function. This notion is inspired by an observation in the decoding process of deep image matting where indices-guided unpooling can often recover boundary details considerably better than other upsampling operators such as bilinear... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 142,959 |
2106.02711 | SketchGen: Generating Constrained CAD Sketches | Computer-aided design (CAD) is the most widely used modeling approach for technical design. The typical starting point in these designs is 2D sketches which can later be extruded and combined to obtain complex three-dimensional assemblies. Such sketches are typically composed of parametric primitives, such as points, l... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | true | 238,986 |
2204.00495 | Physics Informed Shallow Machine Learning for Wind Speed Prediction | The ability to predict wind is crucial for both energy production and weather forecasting. Mechanistic models that form the basis of traditional forecasting perform poorly near the ground. In this paper, we take an alternative data-driven approach based on supervised learning. We analyze a massive dataset of wind measu... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 289,280 |
0711.4809 | Local independence of fractional Brownian motion | Let S(t,t') be the sigma-algebra generated by the differences X(s)-X(s) with s,s' in the interval(t,t'), where (X_t) is the fractional Brownian motion process with Hurst index H between 0 and 1. We prove that for any two distinct t and t' the sigma-algebras S(t-a,t+a) and S(t'-a,t'+a) are asymptotically independent as ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 976 |
2003.10350 | Weakly Supervised 3D Human Pose and Shape Reconstruction with
Normalizing Flows | Monocular 3D human pose and shape estimation is challenging due to the many degrees of freedom of the human body and thedifficulty to acquire training data for large-scale supervised learning in complex visual scenes. In this paper we present practical semi-supervised and self-supervised models that support training an... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 169,309 |
2202.09006 | KINet: Unsupervised Forward Models for Robotic Pushing Manipulation | Object-centric representation is an essential abstraction for forward prediction. Most existing forward models learn this representation through extensive supervision (e.g., object class and bounding box) although such ground-truth information is not readily accessible in reality. To address this, we introduce KINet (K... | false | false | false | false | false | false | true | true | false | false | false | true | false | false | false | false | false | false | 281,064 |
2010.08961 | Rethinking Document-level Neural Machine Translation | This paper does not aim at introducing a novel model for document-level neural machine translation. Instead, we head back to the original Transformer model and hope to answer the following question: Is the capacity of current models strong enough for document-level translation? Interestingly, we observe that the origin... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 201,362 |
2410.12845 | Toward Relieving Clinician Burden by Automatically Generating Progress
Notes using Interim Hospital Data | Regular documentation of progress notes is one of the main contributors to clinician burden. The abundance of structured chart information in medical records further exacerbates the burden, however, it also presents an opportunity to automate the generation of progress notes. In this paper, we propose a task to automat... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 499,233 |
2312.16693 | I2V-Adapter: A General Image-to-Video Adapter for Diffusion Models | Text-guided image-to-video (I2V) generation aims to generate a coherent video that preserves the identity of the input image and semantically aligns with the input prompt. Existing methods typically augment pretrained text-to-video (T2V) models by either concatenating the image with noised video frames channel-wise bef... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 418,470 |
1306.6295 | Tight Lower Bound for Linear Sketches of Moments | The problem of estimating frequency moments of a data stream has attracted a lot of attention since the onset of streaming algorithms [AMS99]. While the space complexity for approximately computing the $p^{\rm th}$ moment, for $p\in(0,2]$ has been settled [KNW10], for $p>2$ the exact complexity remains open. For $p>2$ ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 25,476 |
1803.08069 | 3D Soil Compaction Mapping through Kriging-based Exploration with a
Mobile Robot | This paper presents an automated method for creating spatial maps of soil condition with an outdoor mobile robot. Effective soil mapping on farms can enhance yields, reduce inputs and help protect the environment. Traditionally, data are collected manually at an arbitrary set of locations, then soil maps are constructe... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 93,187 |
1809.04232 | Safe Exploration in Markov Decision Processes with Time-Variant Safety
using Spatio-Temporal Gaussian Process | In many real-world applications (e.g., planetary exploration, robot navigation), an autonomous agent must be able to explore a space with guaranteed safety. Most safe exploration algorithms in the field of reinforcement learning and robotics have been based on the assumption that the safety features are a priori known ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 107,511 |
2407.11399 | Multi-Goal Motion Memory | Autonomous mobile robots (e.g., warehouse logistics robots) often need to traverse complex, obstacle-rich, and changing environments to reach multiple fixed goals (e.g., warehouse shelves). Traditional motion planners need to calculate the entire multi-goal path from scratch in response to changes in the environment, w... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 473,434 |
1910.05527 | Regularizing Model-Based Planning with Energy-Based Models | Model-based reinforcement learning could enable sample-efficient learning by quickly acquiring rich knowledge about the world and using it to improve behaviour without additional data. Learned dynamics models can be directly used for planning actions but this has been challenging because of inaccuracies in the learned ... | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | 149,090 |
2201.10859 | Visualizing the Diversity of Representations Learned by Bayesian Neural
Networks | Explainable Artificial Intelligence (XAI) aims to make learning machines less opaque, and offers researchers and practitioners various tools to reveal the decision-making strategies of neural networks. In this work, we investigate how XAI methods can be used for exploring and visualizing the diversity of feature repres... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 277,122 |
1411.7612 | A Parallel Genetic Algorithm for Generalized Vertex Cover Problem | This paper presents a parallel genetic algorithm for generalised vertex cover problem (GVCP) using Hadoop Map-Reduce framework. The proposed Map-Reduce implementation helps to run the genetic algorithm for generalized vertex cover problem (GVCP) on multiple machines parallely and computes the solution in relatively sho... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | true | 37,943 |
2308.15703 | Fragment and Integrate Network (FIN): A Novel Spatial-Temporal Modeling
Based on Long Sequential Behavior for Online Food Ordering Click-Through Rate
Prediction | Spatial-temporal information has been proven to be of great significance for click-through rate prediction tasks in online Location-Based Services (LBS), especially in mainstream food ordering platforms such as DoorDash, Uber Eats, Meituan, and Ele.me. Modeling user spatial-temporal preferences with sequential behavior... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 388,759 |
1609.05078 | Hybrid Beamforming for Massive MIMO - A Survey | Hybrid multiple-antenna transceivers, which combine large-dimensional analog pre/postprocessing with lower-dimensional digital processing, are the most promising approach for reducing the hardware cost and training overhead in massive MIMO systems. This paper provides a comprehensive survey of the various incarnations ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 61,066 |
2110.08590 | Automated Remote Sensing Forest Inventory Using Satellite Imagery | For many countries like Russia, Canada, or the USA, a robust and detailed tree species inventory is essential to manage their forests sustainably. Since one can not apply unmanned aerial vehicle (UAV) imagery-based approaches to large-scale forest inventory applications, the utilization of machine learning algorithms o... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 261,474 |
2312.06820 | Extracting Self-Consistent Causal Insights from Users Feedback with LLMs
and In-context Learning | Microsoft Windows Feedback Hub is designed to receive customer feedback on a wide variety of subjects including critical topics such as power and battery. Feedback is one of the most effective ways to have a grasp of users' experience with Windows and its ecosystem. However, the sheer volume of feedback received by Fee... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 414,682 |
2002.02693 | Ready Policy One: World Building Through Active Learning | Model-Based Reinforcement Learning (MBRL) offers a promising direction for sample efficient learning, often achieving state of the art results for continuous control tasks. However, many existing MBRL methods rely on combining greedy policies with exploration heuristics, and even those which utilize principled explorat... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 162,998 |
2007.14658 | Meta-Learning with Context-Agnostic Initialisations | Meta-learning approaches have addressed few-shot problems by finding initialisations suited for fine-tuning to target tasks. Often there are additional properties within training data (which we refer to as context), not relevant to the target task, which act as a distractor to meta-learning, particularly when the targe... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 189,467 |
2302.01842 | A Case Study for Compliance as Code with Graphs and Language Models:
Public release of the Regulatory Knowledge Graph | The paper presents a study on using language models to automate the construction of executable Knowledge Graph (KG) for compliance. The paper focuses on Abu Dhabi Global Market regulations and taxonomy, involves manual tagging a portion of the regulations, training BERT-based models, which are then applied to the rest ... | false | false | false | false | true | true | true | false | true | false | false | false | false | false | false | false | false | false | 343,761 |
2209.02981 | VGStore: A Multimodal Extension to SPARQL for Querying RDF Scene Graph | Semantic Web technology has successfully facilitated many RDF models with rich data representation methods. It also has the potential ability to represent and store multimodal knowledge bases such as multimodal scene graphs. However, most existing query languages, especially SPARQL, barely explore the implicit multimod... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | false | 316,361 |
2109.12925 | HarrisZ$^+$: Harris Corner Selection for Next-Gen Image Matching
Pipelines | Due to its role in many computer vision tasks, image matching has been subjected to an active investigation by researchers, which has lead to better and more discriminant feature descriptors and to more robust matching strategies, also thanks to the advent of the deep learning and the increased computational power of t... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 257,461 |
1410.2324 | Recommendation Scheme Based on Converging Properties for Contents
Broadcasting | Popular videos are often clicked by a mount of users in a short period. With content recommendation, the popular contents could be broadcast to the potential users in wireless network, to save huge transmitting resource. In this paper, the contents propagation model is analyzed due to users' historical behavior, locati... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | true | 36,608 |
1603.09194 | Iterated Ontology Revision by Reinterpretation | Iterated applications of belief change operators are essential for different scenarios such as that of ontology evolution where new information is not presented at once but only in piecemeal fashion within a sequence. I discuss iterated applications of so called reinterpretation operators that trace conflicts between o... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 53,890 |
2009.07173 | Graph Convolution Networks Using Message Passing and Multi-Source
Similarity Features for Predicting circRNA-Disease Association | Graphs can be used to effectively represent complex data structures. Learning these irregular data in graphs is challenging and still suffers from shallow learning. Applying deep learning on graphs has recently showed good performance in many applications in social analysis, bioinformatics etc. A message passing graph ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 195,853 |
2404.00018 | Can AI Outperform Human Experts in Creating Social Media Creatives? | Artificial Intelligence has outperformed human experts in functional tasks such as chess and baduk. How about creative tasks? This paper evaluates AI's capability in the creative domain compared to human experts, which little research has been conducted so far. We propose a novel Prompt-for-Prompt to generate social me... | true | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 442,723 |
1909.11899 | Dynamic Parameter Estimation of Brain Mechanisms | Demystifying effective connectivity among neuronal populations has become the trend to understand the brain mechanisms of Parkinson's disease, schizophrenia, mild traumatic brain injury, and many other unlisted neurological diseases. Dynamic modeling is a state-of-the-art approach to explore various connectivities amon... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 146,962 |
1711.04735 | Resurrecting the sigmoid in deep learning through dynamical isometry:
theory and practice | It is well known that the initialization of weights in deep neural networks can have a dramatic impact on learning speed. For example, ensuring the mean squared singular value of a network's input-output Jacobian is $O(1)$ is essential for avoiding the exponential vanishing or explosion of gradients. The stronger condi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 84,434 |
2104.13315 | Inductive Program Synthesis over Noisy Datasets using Abstraction
Refinement Based Optimization | We present a new synthesis algorithm to solve program synthesis over noisy datasets, i.e., data that may contain incorrect/corrupted input-output examples. Our algorithm uses an abstraction refinement based optimization process to synthesize programs which optimize the tradeoff between the loss over the noisy dataset a... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 232,468 |
2309.03748 | Enhancing Pipeline-Based Conversational Agents with Large Language
Models | The latest advancements in AI and deep learning have led to a breakthrough in large language model (LLM)-based agents such as GPT-4. However, many commercial conversational agent development tools are pipeline-based and have limitations in holding a human-like conversation. This paper investigates the capabilities of L... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 390,491 |
1809.01633 | Efficient Egocentric Visual Perception Combining Eye-tracking, a
Software Retina and Deep Learning | We present ongoing work to harness biological approaches to achieving highly efficient egocentric perception by combining the space-variant imaging architecture of the mammalian retina with Deep Learning methods. By pre-processing images collected by means of eye-tracking glasses to control the fixation locations of a ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 106,857 |
2309.09378 | Dynamics of Fisheries in the Azores Islands: A Network Analysis Approach | In the context of the global seafood industry, the Azores archipelago (Portugal) plays a pivotal role due to its vast maritime domain. This study employs complex network analysis techniques to investigate the dynamics of Azores fisheries, using time series data converted into networks. We uncover associations between T... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 392,582 |
2306.02261 | Online estimation of the hand-eye transformation from surgical scenes | Hand-eye calibration algorithms are mature and provide accurate transformation estimations for an effective camera-robot link but rely on a sufficiently wide range of calibration data to avoid errors and degenerate configurations. To solve the hand-eye problem in robotic-assisted minimally invasive surgery and also sim... | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | 370,823 |
1809.10541 | Novel Sparse Recovery Algorithms for 3D Debris Localization using
Rotating Point Spread Function Imagery | An optical imager that exploits off-center image rotation to encode both the lateral and depth coordinates of point sources in a single snapshot can perform 3D localization and tracking of space debris. When actively illuminated, unresolved space debris, which can be regarded as a swarm of point sources, can scatter a ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 108,932 |
2107.01651 | Hidden dependence of spreading vulnerability on topological complexity | Many dynamical phenomena in complex systems concern spreading that plays out on top of networks with changing architecture over time -- commonly known as temporal networks. A complex system's proneness to facilitate spreading phenomena, which we abbreviate as its `spreading vulnerability', is often surmised to be relat... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 244,551 |
2408.10360 | HaSPeR: An Image Repository for Hand Shadow Puppet Recognition | Hand shadow puppetry, also known as shadowgraphy or ombromanie, is a form of theatrical art and storytelling where hand shadows are projected onto flat surfaces to create illusions of living creatures. The skilled performers create these silhouettes by hand positioning, finger movements, and dexterous gestures to resem... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 481,819 |
1711.10402 | An Adversarial Neuro-Tensorial Approach For Learning Disentangled
Representations | Several factors contribute to the appearance of an object in a visual scene, including pose, illumination, and deformation, among others. Each factor accounts for a source of variability in the data, while the multiplicative interactions of these factors emulate the entangled variability, giving rise to the rich struct... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 85,596 |
2106.09086 | Learned Belief Search: Efficiently Improving Policies in Partially
Observable Settings | Search is an important tool for computing effective policies in single- and multi-agent environments, and has been crucial for achieving superhuman performance in several benchmark fully and partially observable games. However, one major limitation of prior search approaches for partially observable environments is tha... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 241,536 |
2010.02275 | Short-term prediction of photovoltaic power generation using Gaussian
process regression | Photovoltaic (PV) power is affected by weather conditions, making the power generated from the PV systems uncertain. Solving this problem would help improve the reliability and cost effectiveness of the grid, and could help reduce reliance on fossil fuel plants. The present paper focuses on evaluating predictions of th... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 198,947 |
2412.07114 | TT-MPD: Test Time Model Pruning and Distillation | Pruning can be an effective method of compressing large pre-trained models for inference speed acceleration. Previous pruning approaches rely on access to the original training dataset for both pruning and subsequent fine-tuning. However, access to the training data can be limited due to concerns such as data privacy a... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 515,512 |
1909.10005 | Incremental Fairness in Two-Sided Market Platforms: On Smoothly Updating
Recommendations | Major online platforms today can be thought of as two-sided markets with producers and customers of goods and services. There have been concerns that over-emphasis on customer satisfaction by the platforms may affect the well-being of the producers. To counter such issues, few recent works have attempted to incorporate... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | false | 146,425 |
1410.4550 | Universal compression of Gaussian sources with unknown parameters | For a collection of distributions over a countable support set, the worst case universal compression formulation by Shtarkov attempts to assign a universal distribution over the support set. The formulation aims to ensure that the universal distribution does not underestimate the probability of any element in the suppo... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 36,818 |
2309.00464 | A Theoretical and Practical Framework for Evaluating Uncertainty
Calibration in Object Detection | The proliferation of Deep Neural Networks has resulted in machine learning systems becoming increasingly more present in various real-world applications. Consequently, there is a growing demand for highly reliable models in many domains, making the problem of uncertainty calibration pivotal when considering the future ... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 389,313 |
2310.16255 | UAV-Sim: NeRF-based Synthetic Data Generation for UAV-based Perception | Tremendous variations coupled with large degrees of freedom in UAV-based imaging conditions lead to a significant lack of data in adequately learning UAV-based perception models. Using various synthetic renderers in conjunction with perception models is prevalent to create synthetic data to augment the learning in the ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 402,643 |
1612.03108 | Low-rank matrix recovery via rank one tight frame measurements | The task of reconstructing a low rank matrix from incomplete linear measurements arises in areas such as machine learning, quantum state tomography and in the phase retrieval problem. In this note, we study the particular setup that the measurements are taken with respect to rank one matrices constructed from the eleme... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 65,319 |
2411.08144 | Visual Tracking with Intermittent Visibility: Switched Control Design
and Implementation | This paper addresses the problem of visual target tracking in scenarios where a pursuer may experience intermittent loss of visibility of the target. The design of a Switched Visual Tracker (SVT) is presented which aims to meet the competing requirements of maintaining both proximity and visibility. SVT alternates betw... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 507,780 |
2110.10545 | Ranking and Tuning Pre-trained Models: A New Paradigm for Exploiting
Model Hubs | Model hubs with many pre-trained models (PTMs) have become a cornerstone of deep learning. Although built at a high cost, they remain \emph{under-exploited} -- practitioners usually pick one PTM from the provided model hub by popularity and then fine-tune the PTM to solve the target task. This na\"ive but common practi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 262,189 |
2408.00096 | From Attributes to Natural Language: A Survey and Foresight on
Text-based Person Re-identification | Text-based person re-identification (Re-ID) is a challenging topic in the field of complex multimodal analysis, its ultimate aim is to recognize specific pedestrians by scrutinizing attributes/natural language descriptions. Despite the wide range of applicable areas such as security surveillance, video retrieval, perso... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 477,701 |
2301.10972 | On the Importance of Noise Scheduling for Diffusion Models | We empirically study the effect of noise scheduling strategies for denoising diffusion generative models. There are three findings: (1) the noise scheduling is crucial for the performance, and the optimal one depends on the task (e.g., image sizes), (2) when increasing the image size, the optimal noise scheduling shift... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | true | 341,984 |
1505.01257 | A Deeper Look at Dataset Bias | The presence of a bias in each image data collection has recently attracted a lot of attention in the computer vision community showing the limits in generalization of any learning method trained on a specific dataset. At the same time, with the rapid development of deep learning architectures, the activation values of... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 42,823 |
2211.14498 | The Impact of Racial Distribution in Training Data on Face Recognition
Bias: A Closer Look | Face recognition algorithms, when used in the real world, can be very useful, but they can also be dangerous when biased toward certain demographics. So, it is essential to understand how these algorithms are trained and what factors affect their accuracy and fairness to build better ones. In this study, we shed some l... | false | false | false | false | false | false | true | false | false | false | false | true | false | true | false | false | false | false | 332,863 |
1103.3420 | Extraction of handwritten areas from colored image of bank checks by an
hybrid method | One of the first step in the realization of an automatic system of check recognition is the extraction of the handwritten area. We propose in this paper an hybrid method to extract these areas. This method is based on digit recognition by Fourier descriptors and different steps of colored image processing . It requires... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 9,652 |
1606.04163 | Intracellular regulatory control of gene expression process | This paper presents an intracellular feedback control strategy, to regulate the gene expression process dynamics. For this purpose, two types of genetic circuits are designed in order to compare concentrations of the input transcription factor (the desired input) and the protein produced by the expression of target gen... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 57,199 |
1905.05162 | Locally Weighted Regression Pseudo-Rehearsal for Online Learning of
Vehicle Dynamics | We consider the problem of online adaptation of a neural network designed to represent vehicle dynamics. The neural network model is intended to be used by an MPC control law to autonomously control the vehicle. This problem is challenging because both the input and target distributions are non-stationary, and naive ap... | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | 130,645 |
2407.19144 | Collaborative Adaptation for Recovery from Unforeseen Malfunctions in
Discrete and Continuous MARL Domains | Cooperative multi-agent learning plays a crucial role for developing effective strategies to achieve individual or shared objectives in multi-agent teams. In real-world settings, agents may face unexpected failures, such as a robot's leg malfunctioning or a teammate's battery running out. These malfunctions decrease th... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | 476,660 |
2303.11501 | Convolutions, Transformers, and their Ensembles for the Segmentation of
Organs at Risk in Radiation Treatment of Cervical Cancer | Segmentation of regions of interest in images of patients, is a crucial step in many medical procedures. Deep neural networks have proven to be particularly adept at this task. However, a key question is what type of deep neural network to choose, and whether making a certain choice makes a difference. In this work, we... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 352,872 |
2302.02176 | An analysis of the technology acceptance model in understanding
university students behavioral intention to use metaverse technologies | Metaverse can be applied in several aspects of life such as the Economy, finance, social life, working environment, healthcare, real estate, and education. In the last 2 and a half years, during the COVID-19 pandemic, universities made immediate use of learning technologies, providing students with access to online lea... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 343,891 |
2102.06128 | Sequence-based Machine Learning Models in Jet Physics | Sequence-based modeling broadly refers to algorithms that act on data that is represented as an ordered set of input elements. In particular, Machine Learning algorithms with sequences as inputs have seen successfull applications to important problems, such as Natural Language Processing (NLP) and speech signal modelin... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 219,646 |
2111.11899 | Results of improved fractional/integer order PDE-based binarization
model | In this report, we present and compare the results of an improved fractional and integer order partial differential equation (PDE)-based binarization scheme. The improved model incorporates a diffusion term in addition to the edge and binary source terms from the previous formulation. Furthermore, logarithmic local con... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 267,816 |
1511.03570 | Dimension of Marginals of Kronecker Product Models | A Kronecker product model is the set of visible marginal probability distributions of an exponential family whose sufficient statistics matrix factorizes as a Kronecker product of two matrices, one for the visible variables and one for the hidden variables. We estimate the dimension of these models by the maximum rank ... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 48,769 |
1111.0654 | Distributed Lossy Source Coding Using Real-Number Codes | We show how real-number codes can be used to compress correlated sources, and establish a new framework for lossy distributed source coding, in which we quantize compressed sources instead of compressing quantized sources. This change in the order of binning and quantization blocks makes it possible to model correlatio... | false | false | false | false | false | false | false | false | false | true | false | true | false | false | false | false | false | true | 12,884 |
2010.11032 | Classifying Syntactic Errors in Learner Language | We present a method for classifying syntactic errors in learner language, namely errors whose correction alters the morphosyntactic structure of a sentence. The methodology builds on the established Universal Dependencies syntactic representation scheme, and provides complementary information to other error-classific... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 202,097 |
2011.13436 | A Hierarchical Self-attentive Convolution Network for Review Modeling in
Recommendation Systems | Using reviews to learn user and item representations is important for recommender system. Current review based methods can be divided into two categories: (1) the Convolution Neural Network (CNN) based models that extract n-gram features from user/item reviews; (2) the Recurrent Neural Network (RNN) based models that l... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 208,472 |
2208.02724 | Disentangled Representation Learning for RF Fingerprint Extraction under
Unknown Channel Statistics | Deep learning (DL) applied to a device's radio-frequency fingerprint~(RFF) has attracted significant attention in physical-layer authentication due to its extraordinary classification performance. Conventional DL-RFF techniques are trained by adopting maximum likelihood estimation~(MLE). Although their discriminability... | false | false | false | false | false | false | true | false | false | true | false | false | true | false | false | false | false | false | 311,552 |
2410.02714 | AlzhiNet: Traversing from 2DCNN to 3DCNN, Towards Early Detection and
Diagnosis of Alzheimer's Disease | Alzheimer's disease (AD) is a progressive neurodegenerative disorder with increasing prevalence among the aging population, necessitating early and accurate diagnosis for effective disease management. In this study, we present a novel hybrid deep learning framework that integrates both 2D Convolutional Neural Networks ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 494,409 |
2308.15005 | Few-Shot Object Detection via Synthetic Features with Optimal Transport | Few-shot object detection aims to simultaneously localize and classify the objects in an image with limited training samples. However, most existing few-shot object detection methods focus on extracting the features of a few samples of novel classes that lack diversity. Hence, they may not be sufficient to capture the ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 388,529 |
2201.06219 | An Empirical Study on the Overlapping Problem of Open-Domain Dialogue
Datasets | Open-domain dialogue systems aim to converse with humans through text, and dialogue research has heavily relied on benchmark datasets. In this work, we observe the overlapping problem in DailyDialog and OpenSubtitles, two popular open-domain dialogue benchmark datasets. Our systematic analysis then shows that such over... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 275,649 |
2301.04134 | Analogical Relevance Index | Focusing on the most significant features of a dataset is useful both in machine learning (ML) and data mining. In ML, it can lead to a higher accuracy, a faster learning process, and ultimately a simpler and more understandable model. In data mining, identifying significant features is essential not only for gaining a... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 339,980 |
2010.01996 | Evaluation of company investment value based on machine learning | In this paper, company investment value evaluation models are established based on comprehensive company information. After data mining and extracting a set of 436 feature parameters, an optimal subset of features is obtained by dimension reduction through tree-based feature selection, followed by the 5-fold cross-vali... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 198,869 |
0906.0964 | On Sparse Channel Estimation | Channel Estimation is an essential component in applications such as radar and data communication. In multi path time varying environments, it is necessary to estimate time-shifts, scale-shifts (the wideband equivalent of Doppler-shifts), and the gains/phases of each of the multiple paths. With recent advances in spars... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 3,833 |
2211.04772 | Efficient Large-scale Audio Tagging via Transformer-to-CNN Knowledge
Distillation | Audio Spectrogram Transformer models rule the field of Audio Tagging, outrunning previously dominating Convolutional Neural Networks (CNNs). Their superiority is based on the ability to scale up and exploit large-scale datasets such as AudioSet. However, Transformers are demanding in terms of model size and computation... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 329,346 |
2501.04697 | Grokking at the Edge of Numerical Stability | Grokking, the sudden generalization that occurs after prolonged overfitting, is a surprising phenomenon challenging our understanding of deep learning. Although significant progress has been made in understanding grokking, the reasons behind the delayed generalization and its dependence on regularization remain unclear... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 523,311 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.