id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2304.02942 | InterFormer: Real-time Interactive Image Segmentation | Interactive image segmentation enables annotators to efficiently perform pixel-level annotation for segmentation tasks. However, the existing interactive segmentation pipeline suffers from inefficient computations of interactive models because of the following two issues. First, annotators' later click is based on mode... | true | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 356,618 |
2012.07630 | Decoupled Self Attention for Accurate One Stage Object Detection | As the scale of object detection dataset is smaller than that of image recognition dataset ImageNet, transfer learning has become a basic training method for deep learning object detection models, which will pretrain the backbone network of object detection model on ImageNet dataset to extract features for classificati... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 211,531 |
2302.11993 | xURLLC-Aware Service Provisioning in Vehicular Networks: A Semantic
Communication Perspective | Semantic communication (SemCom), as an emerging paradigm focusing on meaning delivery, has recently been considered a promising solution for the inevitable crisis of scarce communication resources. This trend stimulates us to explore the potential of applying SemCom to wireless vehicular networks, which normally consum... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 347,395 |
1107.5469 | A small world of citations? The influence of collaboration networks on
citation practices | This paper examines the proximity of authors to those they cite using degrees of separation in a co-author network, essentially using collaboration networks to expand on the notion of self-citations. While the proportion of direct self-citations (including co-authors of both citing and cited papers) is relatively const... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 11,468 |
2110.07131 | Reverse Maximum Inner Product Search: How to efficiently find users who
would like to buy my item? | The MIPS (maximum inner product search), which finds the item with the highest inner product with a given query user, is an essential problem in the recommendation field. It is usual that e-commerce companies face situations where they want to promote and sell new or discounted items. In these situations, we have to co... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 260,872 |
2401.17766 | Fine-Grained Zero-Shot Learning: Advances, Challenges, and Prospects | Recent zero-shot learning (ZSL) approaches have integrated fine-grained analysis, i.e., fine-grained ZSL, to mitigate the commonly known seen/unseen domain bias and misaligned visual-semantics mapping problems, and have made profound progress. Notably, this paradigm differs from existing close-set fine-grained methods ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 425,315 |
2003.03676 | Towards Solving Large-scale Expensive Optimization Problems Efficiently
Using Coordinate Descent Algorithm | Many real-world problems are categorized as large-scale problems, and metaheuristic algorithms as an alternative method to solve large-scale problem; they need the evaluation of many candidate solutions to tackle them prior to their convergence, which is not affordable for practical applications since the most of them ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | false | false | 167,314 |
2003.03297 | Active Model Estimation in Markov Decision Processes | We study the problem of efficient exploration in order to learn an accurate model of an environment, modeled as a Markov decision process (MDP). Efficient exploration in this problem requires the agent to identify the regions in which estimating the model is more difficult and then exploit this knowledge to collect mor... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 167,186 |
2210.02661 | Topological Continual Learning with Wasserstein Distance and Barycenter | Continual learning in neural networks suffers from a phenomenon called catastrophic forgetting, in which a network quickly forgets what was learned in a previous task. The human brain, however, is able to continually learn new tasks and accumulate knowledge throughout life. Neuroscience findings suggest that continual ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 321,733 |
2502.03417 | From Features to Transformers: Redefining Ranking for Scalable Impact | We present LiGR, a large-scale ranking framework developed at LinkedIn that brings state-of-the-art transformer-based modeling architectures into production. We introduce a modified transformer architecture that incorporates learned normalization and simultaneous set-wise attention to user history and ranked items. Thi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 530,716 |
2109.10442 | Selecting Datasets for Evaluating an Enhanced Deep Learning Framework | A framework was developed to address limitations associated with existing techniques for analysing sequences. This work deals with the steps followed to select suitable datasets characterised by discrete irregular sequential patterns. To identify, select, explore and evaluate which datasets from various sources extract... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 256,605 |
2410.00337 | SyntheOcc: Synthesize Geometric-Controlled Street View Images through 3D
Semantic MPIs | The advancement of autonomous driving is increasingly reliant on high-quality annotated datasets, especially in the task of 3D occupancy prediction, where the occupancy labels require dense 3D annotation with significant human effort. In this paper, we propose SyntheOcc, which denotes a diffusion model that Synthesize ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 493,324 |
1311.7466 | Linear Network Error Correction Multicast/Broadcast/Dispersion/Generic
Codes | In the practical network communications, many internal nodes in the network are required to not only transmit messages but decode source messages. For different applications, four important classes of linear network codes in network coding theory, i.e., linear multicast, linear broadcast, linear dispersion, and generic... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 28,738 |
2304.04597 | Accelerated deep self-supervised ptycho-laminography for
three-dimensional nanoscale imaging of integrated circuits | Three-dimensional inspection of nanostructures such as integrated circuits is important for security and reliability assurance. Two scanning operations are required: ptychographic to recover the complex transmissivity of the specimen; and rotation of the specimen to acquire multiple projections covering the 3D spatial ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 357,280 |
2304.11359 | Detecting Adversarial Faces Using Only Real Face Self-Perturbations | Adversarial attacks aim to disturb the functionality of a target system by adding specific noise to the input samples, bringing potential threats to security and robustness when applied to facial recognition systems. Although existing defense techniques achieve high accuracy in detecting some specific adversarial faces... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 359,781 |
2204.05311 | Causal Discovery and Causal Learning for Fire Resistance Evaluation:
Incorporating Domain Knowledge | Experiments remain the gold standard to establish an understanding of fire-related phenomena. A primary goal in designing tests is to uncover the data generating process (i.e., the how and why the observations we see come to be); or simply what causes such observations. Uncovering such a process not only advances our k... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 290,991 |
1609.01044 | Classifying and sorting cluttered piles of unknown objects with robots:
a learning approach | We consider the problem of sorting a densely cluttered pile of unknown objects using a robot. This yet unsolved problem is relevant in the robotic waste sorting business. By extending previous active learning approaches to grasping, we show a system that learns the task autonomously. Instead of predicting just whethe... | false | false | false | false | false | false | true | true | false | false | false | true | false | false | false | false | false | false | 60,551 |
2004.08549 | A Survey of 6G Wireless Communications: Emerging Technologies | While fifth-generation (5G) communications are being rolled out around the world, sixth-generation (6G) communications have attracted much attention from both the industry and academia. Compared with 5G, 6G will have a wider frequency band, higher transmission rate, spectrum efficiency, greater connection capacity, sho... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 173,092 |
cs/0006003 | Exploiting Diversity in Natural Language Processing: Combining Parsers | Three state-of-the-art statistical parsers are combined to produce more accurate parses, as well as new bounds on achievable Treebank parsing accuracy. Two general approaches are presented and two combination techniques are described for each approach. Both parametric and non-parametric models are explored. The resulti... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 537,118 |
2111.06457 | Variability-Aware Training and Self-Tuning of Highly Quantized DNNs for
Analog PIM | DNNs deployed on analog processing in memory (PIM) architectures are subject to fabrication-time variability. We developed a new joint variability- and quantization-aware DNN training algorithm for highly quantized analog PIM-based models that is significantly more effective than prior work. It outperforms variability-... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 266,079 |
2404.01037 | ARAGOG: Advanced RAG Output Grading | Retrieval-Augmented Generation (RAG) is essential for integrating external knowledge into Large Language Model (LLM) outputs. While the literature on RAG is growing, it primarily focuses on systematic reviews and comparisons of new state-of-the-art (SoTA) techniques against their predecessors, with a gap in extensive e... | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | 443,223 |
2006.15454 | A Deep Reinforced Model for Zero-Shot Cross-Lingual Summarization with
Bilingual Semantic Similarity Rewards | Cross-lingual text summarization aims at generating a document summary in one language given input in another language. It is a practically important but under-explored task, primarily due to the dearth of available data. Existing methods resort to machine translation to synthesize training data, but such pipeline appr... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 184,508 |
1006.5066 | Power Allocation Strategies across N Orthogonal Channels at Both Source
and Relay | We consider a wireless relay network with one source, one relay and one destination, where communications between nodes are preformed via N orthogonal channels. This, for example, is the case when orthogonal frequency division multiplexing is employed for data communications. Since the power available at the source and... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 6,897 |
2412.15607 | Short-Term Forecasting of Thermostatic and Residential Loads Using Long
Short-Term Memory Recurrent Neural Networks | Internet of Things (IoT) devices in smart grids enable intelligent energy management for grid managers and personalized energy services for consumers. Investigating a smart grid with IoT devices requires a simulation framework with IoT devices modeling. However, there lack comprehensive study on the modeling of IoT dev... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 519,203 |
2412.15646 | CustomTTT: Motion and Appearance Customized Video Generation via
Test-Time Training | Benefiting from large-scale pre-training of text-video pairs, current text-to-video (T2V) diffusion models can generate high-quality videos from the text description. Besides, given some reference images or videos, the parameter-efficient fine-tuning method, i.e. LoRA, can generate high-quality customized concepts, e.g... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 519,217 |
1308.0365 | Hybrid Focal Stereo Networks for Pattern Analysis in Homogeneous Scenes | In this paper we address the problem of multiple camera calibration in the presence of a homogeneous scene, and without the possibility of employing calibration object based methods. The proposed solution exploits salient features present in a larger field of view, but instead of employing active vision we replace the ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 26,219 |
2107.10607 | 3D Shape Generation with Grid-based Implicit Functions | Previous approaches to generate shapes in a 3D setting train a GAN on the latent space of an autoencoder (AE). Even though this produces convincing results, it has two major shortcomings. As the GAN is limited to reproduce the dataset the AE was trained on, we cannot reuse a trained AE for novel data. Furthermore, it i... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | true | 247,344 |
2303.12670 | Correlational Image Modeling for Self-Supervised Visual Pre-Training | We introduce Correlational Image Modeling (CIM), a novel and surprisingly effective approach to self-supervised visual pre-training. Our CIM performs a simple pretext task: we randomly crop image regions (exemplars) from an input image (context) and predict correlation maps between the exemplars and the context. Three ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 353,334 |
2306.01914 | On the Sample Complexity of Imitation Learning for Smoothed Model
Predictive Control | Recent work in imitation learning has shown that having an expert controller that is both suitably smooth and stable enables stronger guarantees on the performance of the learned controller. However, constructing such smoothed expert controllers for arbitrary systems remains challenging, especially in the presence of i... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 370,668 |
1502.03296 | Statistical laws in linguistics | Zipf's law is just one out of many universal laws proposed to describe statistical regularities in language. Here we review and critically discuss how these laws can be statistically interpreted, fitted, and tested (falsified). The modern availability of large databases of written text allows for tests with an unpreced... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 40,134 |
2303.08171 | Resilient Dynamic Average Consensus based on Trusted agents | In this paper, we address the discrete-time dynamic average consensus (DAC) of a multi-agent system in the presence of adversarial attacks. The adversarial attack is considered to be of Byzantine type, which compromises the computation capabilities of the agent and sends arbitrary false data to its neighbours. We assum... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | 351,535 |
2105.07566 | Exploring Self-Supervised Representation Ensembles for COVID-19 Cough
Classification | The usage of smartphone-collected respiratory sound, trained with deep learning models, for detecting and classifying COVID-19 becomes popular recently. It removes the need for in-person testing procedures especially for rural regions where related medical supplies, experienced workers, and equipment are limited. Howev... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 235,474 |
2211.04134 | Consistent Query Answering for Primary Keys and Conjunctive Queries with
Counting | The problem of consistent query answering for primary keys and self-join-free conjunctive queries has been intensively studied in recent years and is by now well understood. In this paper, we study an extension of this problem with counting. The queries we consider count how many times each value occurs in a designated... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 329,146 |
2204.03758 | Compositional Generalization and Decomposition in Neural Program
Synthesis | When writing programs, people have the ability to tackle a new complex task by decomposing it into smaller and more familiar subtasks. While it is difficult to measure whether neural program synthesis methods have similar capabilities, what we can measure is whether they compositionally generalize, that is, whether a m... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 290,426 |
1302.1043 | The price of bandit information in multiclass online classification | We consider two scenarios of multiclass online learning of a hypothesis class $H\subseteq Y^X$. In the {\em full information} scenario, the learner is exposed to instances together with their labels. In the {\em bandit} scenario, the true label is not exposed, but rather an indication whether the learner's prediction i... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 21,776 |
2205.10864 | Federated Learning Aggregation: New Robust Algorithms with Guarantees | Federated Learning has been recently proposed for distributed model training at the edge. The principle of this approach is to aggregate models learned on distributed clients to obtain a new more general "average" model (FedAvg). The resulting model is then redistributed to clients for further training. To date, the mo... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 297,905 |
1712.04046 | Character-Based Handwritten Text Transcription with Attention Networks | The paper approaches the task of handwritten text recognition (HTR) with attentional encoder-decoder networks trained on sequences of characters, rather than words. We experiment on lines of text from popular handwriting datasets and compare different activation functions for the attention mechanism used for aligning i... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 86,535 |
1501.03952 | Mind the Gap: Subspace based Hierarchical Domain Adaptation | Domain adaptation techniques aim at adapting a classifier learnt on a source domain to work on the target domain. Exploiting the subspaces spanned by features of the source and target domains respectively is one approach that has been investigated towards solving this problem. These techniques normally assume the exist... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 39,307 |
1704.04296 | FastVentricle: Cardiac Segmentation with ENet | Cardiac Magnetic Resonance (CMR) imaging is commonly used to assess cardiac structure and function. One disadvantage of CMR is that post-processing of exams is tedious. Without automation, precise assessment of cardiac function via CMR typically requires an annotator to spend tens of minutes per case manually contourin... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 71,784 |
1303.5435 | An Algorithm for Deciding if a Set of Observed Independencies Has a
Causal Explanation | In a previous paper [Pearl and Verma, 1991] we presented an algorithm for extracting causal influences from independence information, where a causal influence was defined as the existence of a directed arc in all minimal causal models consistent with the data. In this paper we address the question of deciding whether t... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 23,123 |
2312.06575 | EasyVolcap: Accelerating Neural Volumetric Video Research | Volumetric video is a technology that digitally records dynamic events such as artistic performances, sporting events, and remote conversations. When acquired, such volumography can be viewed from any viewpoint and timestamp on flat screens, 3D displays, or VR headsets, enabling immersive viewing experiences and more f... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 414,576 |
2010.05612 | Cardiac Cohort Classification based on Morphologic and Hemodynamic
Parameters extracted from 4D PC-MRI Data | An accurate assessment of the cardiovascular system and prediction of cardiovascular diseases (CVDs) are crucial. Measured cardiac blood flow data provide insights about patient-specific hemodynamics, where many specialized techniques have been developed for the visual exploration of such data sets to better understand... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 200,200 |
0812.1843 | Identification of parameters underlying emotions and a classification of
emotions | The standard classification of emotions involves categorizing the expression of emotions. In this paper, parameters underlying some emotions are identified and a new classification based on these parameters is suggested. | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 2,773 |
2005.09997 | Learning Semantic Program Embeddings with Graph Interval Neural Network | Learning distributed representations of source code has been a challenging task for machine learning models. Earlier works treated programs as text so that natural language methods can be readily applied. Unfortunately, such approaches do not capitalize on the rich structural information possessed by source code. Of la... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 178,055 |
2007.02924 | INT: An Inequality Benchmark for Evaluating Generalization in Theorem
Proving | In learning-assisted theorem proving, one of the most critical challenges is to generalize to theorems unlike those seen at training time. In this paper, we introduce INT, an INequality Theorem proving benchmark, specifically designed to test agents' generalization ability. INT is based on a procedure for generating th... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 185,903 |
2401.05215 | Pre-trained Large Language Models for Financial Sentiment Analysis | Financial sentiment analysis refers to classifying financial text contents into sentiment categories (e.g. positive, negative, and neutral). In this paper, we focus on the classification of financial news title, which is a challenging task due to a lack of large amount of training samples. To overcome this difficulty, ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 420,682 |
1911.00361 | Adaptive Precision Training: Quantify Back Propagation in Neural
Networks with Fixed-point Numbers | Adaptive Precision Training: Quantify Back Propagation in Neural Networks with Fixed-point Numbers. Recent emerged quantization technique has been applied to inference of deep neural networks for fast and efficient execution. However, directly applying quantization in training can cause significant accuracy loss, thus ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 151,801 |
2410.06376 | Riemannian Optimization for Non-convex Euclidean Distance Geometry with
Global Recovery Guarantees | The problem of determining the configuration of points from partial distance information, known as the Euclidean Distance Geometry (EDG) problem, is fundamental to many tasks in the applied sciences. In this paper, we propose two algorithms grounded in the Riemannian optimization framework to address the EDG problem. O... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 496,171 |
2103.00087 | CXR-Net: An Artificial Intelligence Pipeline for Quick Covid-19
Screening of Chest X-Rays | CXR-Net is a two-module Artificial Intelligence pipeline for the quick detection of SARS-CoV-2 from chest X-rays (CXRs). Module 1 was trained on a public dataset of 6395 CXRs with radiologist annotated lung contours to generate masks of the lungs that overlap the heart and large vasa. Module 2 is a hybrid convnet in wh... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 222,142 |
2310.04074 | Automatic Aspect Extraction from Scientific Texts | Being able to extract from scientific papers their main points, key insights, and other important information, referred to here as aspects, might facilitate the process of conducting a scientific literature review. Therefore, the aim of our research is to create a tool for automatic aspect extraction from Russian-langu... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 397,528 |
2011.08449 | Deep Reinforcement Learning and Permissioned Blockchain for Content
Caching in Vehicular Edge Computing and Networks | Vehicular Edge Computing (VEC) is a promising paradigm to enable huge amount of data and multimedia content to be cached in proximity to vehicles. However, high mobility of vehicles and dynamic wireless channel condition make it challenge to design an optimal content caching policy. Further, with much sensitive persona... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 206,876 |
2206.07780 | A machine learning approach to predicting pore pressure response in
liquefiable sands under cyclic loading | Shear stress history controls the pore pressure response in liquefiable soils. The excess pore pressure does not increase under cyclic loading when shear stress amplitude is lower than the peak prior amplitude -- the shielding effect. Many sophisticated constitutive models fail to capture the shielding effect observed ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 302,881 |
2405.18536 | Data-Driven Simulator for Mechanical Circulatory Support with Domain
Adversarial Neural Process | Mechanical Circulatory Support (MCS) devices, implemented as a probabilistic deep sequence model. Existing mechanical simulators for MCS rely on oversimplifying assumptions and are insensitive to patient-specific behavior, limiting their applicability to real-world treatment scenarios. To address these shortcomings, ou... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 458,463 |
2403.15780 | A Fairness-Oriented Reinforcement Learning Approach for the Operation
and Control of Shared Micromobility Services | As Machine Learning grows in popularity across various fields, equity has become a key focus for the AI community. However, fairness-oriented approaches are still underexplored in smart mobility. Addressing this gap, our study investigates the balance between performance optimization and algorithmic fairness in shared ... | false | false | false | false | false | false | true | false | false | false | true | false | false | true | false | false | false | false | 440,744 |
1304.2340 | Summary of A New Normative Theory of Probabilistic Logic | By probabilistic logic I mean a normative theory of belief that explains how a body of evidence affects one's degree of belief in a possible hypothesis. A new axiomatization of such a theory is presented which avoids a finite additivity axiom, yet which retains many useful inference rules. Many of the examples of this ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 23,648 |
1511.08913 | Sliding-Window Optimization on an Ambiguity-Clearness Graph for
Multi-object Tracking | Multi-object tracking remains challenging due to frequent occurrence of occlusions and outliers. In order to handle this problem, we propose an Approximation-Shrink Scheme for sequential optimization. This scheme is realized by introducing an Ambiguity-Clearness Graph to avoid conflicts and maintain sequence independen... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 49,595 |
2206.04359 | Learning Non-Vacuous Generalization Bounds from Optimization | One of the fundamental challenges in the deep learning community is to theoretically understand how well a deep neural network generalizes to unseen data. However, current approaches often yield generalization bounds that are either too loose to be informative of the true generalization error or only valid to the compr... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 301,596 |
2207.06883 | RF-Photonic Deep Learning Processor with Shannon-Limited Data Movement | Edholm's Law predicts exponential growth in data rate and spectrum bandwidth for communications and is forecasted to remain true for the upcoming deployment of 6G. Compounding this issue is the exponentially increasing demand for deep neural network (DNN) compute, including DNNs for signal processing. However, the slow... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 308,026 |
0811.1260 | The Application of Fuzzy Logic to Collocation Extraction | Collocations are important for many tasks of Natural language processing such as information retrieval, machine translation, computational lexicography etc. So far many statistical methods have been used for collocation extraction. Almost all the methods form a classical crisp set of collocation. We propose a fuzzy log... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 2,649 |
2107.08622 | Provably Efficient Multi-Task Reinforcement Learning with Model Transfer | We study multi-task reinforcement learning (RL) in tabular episodic Markov decision processes (MDPs). We formulate a heterogeneous multi-player RL problem, in which a group of players concurrently face similar but not necessarily identical MDPs, with a goal of improving their collective performance through inter-player... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 246,787 |
1903.12287 | PyTorch-BigGraph: A Large-scale Graph Embedding System | Graph embedding methods produce unsupervised node features from graphs that can then be used for a variety of machine learning tasks. Modern graphs, particularly in industrial applications, contain billions of nodes and trillions of edges, which exceeds the capability of existing embedding systems. We present PyTorch-B... | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 125,681 |
2001.09186 | A tutorial on the range variant of asymmetric numeral systems | This paper is intended to be a brief and accessible introduction to the range variant of asymmetric numeral systems (ANS), a system for lossless compression of sequences which can be used as a drop in replacement for arithmetic coding (AC). Because of the relative simplicity of ANS, we are able to provide enough mathem... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 161,493 |
1906.07328 | Losing Confidence in Quality: Unspoken Evolution of Computer Vision
Services | Recent advances in artificial intelligence (AI) and machine learning (ML), such as computer vision, are now available as intelligent services and their accessibility and simplicity is compelling. Multiple vendors now offer this technology as cloud services and developers want to leverage these advances to provide value... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 135,566 |
2501.15014 | On Accelerating Edge AI: Optimizing Resource-Constrained Environments | Resource-constrained edge deployments demand AI solutions that balance high performance with stringent compute, memory, and energy limitations. In this survey, we present a comprehensive overview of the primary strategies for accelerating deep learning models under such constraints. First, we examine model compression ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 527,360 |
2002.05259 | Learning to Generate Levels From Nothing | Machine learning for procedural content generation has recently become an active area of research. Levels vary in both form and function and are mostly unrelated to each other across games. This has made it difficult to assemble suitably large datasets to bring machine learning to level design in the same way as it's b... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 163,840 |
2204.10792 | Equivalence of Decentralized Observation, Diagnosis, and Control
Problems in Discrete-event Systems | This paper demonstrates an equivalence between observation problems, control problems (with partial observation), and diagnosis problems of decentralized discrete-event systems, namely, the three classes of problems are Turing equivalent, as one class Turing reduces to another. The equivalence allows decomposition of... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 292,917 |
1606.03391 | Simple Question Answering by Attentive Convolutional Neural Network | This work focuses on answering single-relation factoid questions over Freebase. Each question can acquire the answer from a single fact of form (subject, predicate, object) in Freebase. This task, simple question answering (SimpleQA), can be addressed via a two-step pipeline: entity linking and fact selection. In fact ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 57,092 |
2305.09559 | Robust and lightweight audio fingerprint for Automatic Content
Recognition | This research paper presents a novel audio fingerprinting system for Automatic Content Recognition (ACR). By using signal processing techniques and statistical transformations, our proposed method generates compact fingerprints of audio segments that are robust to noise degradations present in real-world audio. The sys... | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 364,685 |
2109.06798 | Everything Is All It Takes: A Multipronged Strategy for Zero-Shot
Cross-Lingual Information Extraction | Zero-shot cross-lingual information extraction (IE) describes the construction of an IE model for some target language, given existing annotations exclusively in some other language, typically English. While the advance of pretrained multilingual encoders suggests an easy optimism of "train on English, run on any langu... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 255,282 |
1904.01869 | Securing State Estimation Under Sensor and Actuator Attacks: Theory and
Design | This paper discusses the problem of estimating the state of a linear time-invariant system when some of its sensors and actuators are compromised by an adversarial agent. In the model considered in this paper, the malicious agent attacks an input (output) by manipulating its value arbitrarily, i.e., we impose no constr... | false | false | false | false | false | false | false | false | false | true | true | false | true | false | false | false | false | false | 126,271 |
1810.01943 | AI Fairness 360: An Extensible Toolkit for Detecting, Understanding, and
Mitigating Unwanted Algorithmic Bias | Fairness is an increasingly important concern as machine learning models are used to support decision making in high-stakes applications such as mortgage lending, hiring, and prison sentencing. This paper introduces a new open source Python toolkit for algorithmic fairness, AI Fairness 360 (AIF360), released under an A... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 109,497 |
2405.04435 | Fast Exact Retrieval for Nearest-neighbor Lookup (FERN) | Exact nearest neighbor search is a computationally intensive process, and even its simpler sibling -- vector retrieval -- can be computationally complex. This is exacerbated when retrieving vectors which have high-dimension $d$ relative to the number of vectors, $N$, in the database. Exact nearest neighbor retrieval ha... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | 452,571 |
2107.00797 | Mitigating deep double descent by concatenating inputs | The double descent curve is one of the most intriguing properties of deep neural networks. It contrasts the classical bias-variance curve with the behavior of modern neural networks, occurring where the number of samples nears the number of parameters. In this work, we explore the connection between the double descent ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 244,272 |
1004.1997 | An optimized recursive learning algorithm for three-layer feedforward
neural networks for mimo nonlinear system identifications | Back-propagation with gradient method is the most popular learning algorithm for feed-forward neural networks. However, it is critical to determine a proper fixed learning rate for the algorithm. In this paper, an optimized recursive algorithm is presented for online learning based on matrix operation and optimization ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | true | 6,146 |
2005.01928 | Modal features for image texture classification | Feature extraction is a key step in image processing for pattern recognition and machine learning processes. Its purpose lies in reducing the dimensionality of the input data through the computing of features which accurately describe the original information. In this article, a new feature extraction method based on D... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 175,712 |
2412.09149 | Student-Informed Teacher Training | Imitation learning with a privileged teacher has proven effective for learning complex control behaviors from high-dimensional inputs, such as images. In this framework, a teacher is trained with privileged task information, while a student tries to predict the actions of the teacher with more limited observations, e.g... | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | 516,378 |
2303.02242 | TrojText: Test-time Invisible Textual Trojan Insertion | In Natural Language Processing (NLP), intelligent neuron models can be susceptible to textual Trojan attacks. Such attacks occur when Trojan models behave normally for standard inputs but generate malicious output for inputs that contain a specific trigger. Syntactic-structure triggers, which are invisible, are becomin... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 349,268 |
1811.09930 | A multi-dimensional extension of the Lightweight Temporal Compression
method | Lightweight Temporal Compression (LTC) is among the lossy stream compression methods that provide the highest compression rate for the lowest CPU and memory consumption. As such, it is well suited to compress data streams in energy-constrained systems such as connected objects. The current formulation of LTC, however, ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 114,365 |
2110.01518 | Generalization in NLI: Ways (Not) To Go Beyond Simple Heuristics | Much of recent progress in NLU was shown to be due to models' learning dataset-specific heuristics. We conduct a case study of generalization in NLI (from MNLI to the adversarially constructed HANS dataset) in a range of BERT-based architectures (adapters, Siamese Transformers, HEX debiasing), as well as with subsampli... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 258,796 |
2410.23862 | $\psi$DAG: Projected Stochastic Approximation Iteration for DAG
Structure Learning | Learning the structure of Directed Acyclic Graphs (DAGs) presents a significant challenge due to the vast combinatorial search space of possible graphs, which scales exponentially with the number of nodes. Recent advancements have redefined this problem as a continuous optimization task by incorporating differentiable ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 504,222 |
2412.19878 | YOLO-MST: Multiscale deep learning method for infrared small target
detection based on super-resolution and YOLO | With the advancement of aerospace technology and the increasing demands of military applications, the development of low false-alarm and high-precision infrared small target detection algorithms has emerged as a key focus of research globally. However, the traditional model-driven method is not robust enough when deali... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 521,012 |
2006.07521 | A Blockchain-based Decentralized Data Sharing Infrastructure for
Off-grid Networking | Off-grid networks are recently emerging as a solution to connect the unconnected or provide alternative services to networks of possibly untrusted participants. The systems currently used, however, exhibit limitations due to their centralized nature and thus prove inadequate to secure trust. Blockchain technology can b... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 181,831 |
1906.09486 | Protecting shared information in networks: a network security game with
strategic attacks | A digital security breach, by which confidential information is leaked, does not only affect the agent whose system is infiltrated, but is also detrimental to other agents socially connected to the infiltrated system. Although it has been argued that these externalities create incentives to under-invest in security, th... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 136,174 |
2408.16650 | Towards Efficient Modelling of String Dynamics: A Comparison of State
Space and Koopman based Deep Learning Methods | This paper presents an examination of State Space Models (SSM) and Koopman-based deep learning methods for modelling the dynamics of both linear and non-linear stiff strings. Through experiments with datasets generated under different initial conditions and sample rates, we assess the capacity of these models to accura... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 484,406 |
2107.07642 | Improving application performance with biased distributions of quantum
states | We consider the properties of a specific distribution of mixed quantum states of arbitrary dimension that can be biased towards a specific mean purity. In particular, we analyze mixtures of Haar-random pure states with Dirichlet-distributed coefficients. We analytically derive the concentration parameters required to m... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 246,478 |
2308.16906 | Fine-Grained Cross-View Geo-Localization Using a Correlation-Aware
Homography Estimator | In this paper, we introduce a novel approach to fine-grained cross-view geo-localization. Our method aligns a warped ground image with a corresponding GPS-tagged satellite image covering the same area using homography estimation. We first employ a differentiable spherical transform, adhering to geometric principles, to... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 389,161 |
2006.16840 | Guided Learning of Nonconvex Models through Successive Functional
Gradient Optimization | This paper presents a framework of successive functional gradient optimization for training nonconvex models such as neural networks, where training is driven by mirror descent in a function space. We provide a theoretical analysis and empirical study of the training method derived from this framework. It is shown that... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 184,924 |
2001.07194 | Recommending Themes for Ad Creative Design via Visual-Linguistic
Representations | There is a perennial need in the online advertising industry to refresh ad creatives, i.e., images and text used for enticing online users towards a brand. Such refreshes are required to reduce the likelihood of ad fatigue among online users, and to incorporate insights from other successful campaigns in related produc... | false | false | false | false | false | true | true | false | true | false | false | true | false | false | false | false | false | true | 160,986 |
2302.09920 | Two-Tier Multi-Rate Slotted ALOHA for OWC/RF-Based IoT Networks | We consider a massive Internet of Things (IoT) scenario where indoor IoT devices access the network via optical wireless communication (OWC) IoT systems that relay data via a backhaul radio frequency (RF) low-power wide-area network (LP WAN). We propose a novel two-tier multi-rate Slotted ALOHA (SA) system model to des... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 346,622 |
2307.01940 | An Adaptive Overcurrent Protection for Solar-based DC Microgrids Using
IEC 61850 | Over-Current (OC) protection is one of the pervasive protections in solar-based DC microgrids. Fast operation is a key advantage of its popularity. On the other hand, utilizing OC in DC microgrids has some challenges that are not in AC grids. Some of these challenges are related to the grounding approach of the DC micr... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 377,520 |
1906.00158 | Patch Learning | There have been different strategies to improve the performance of a machine learning model, e.g., increasing the depth, width, and/or nonlinearity of the model, and using ensemble learning to aggregate multiple base/weak learners in parallel or in series. This paper proposes a novel strategy called patch learning (PL)... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 133,287 |
1604.04377 | DARI: Distance metric And Representation Integration for Person
Verification | The past decade has witnessed the rapid development of feature representation learning and distance metric learning, whereas the two steps are often discussed separately. To explore their interaction, this work proposes an end-to-end learning framework called DARI, i.e. Distance metric And Representation Integration, a... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 54,636 |
0805.3217 | Statistical region-based active contours with exponential family
observations | In this paper, we focus on statistical region-based active contour models where image features (e.g. intensity) are random variables whose distribution belongs to some parametric family (e.g. exponential) rather than confining ourselves to the special Gaussian case. Using shape derivation tools, our effort focuses on c... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 1,800 |
2201.12632 | Towards Robust Deep Active Learning for Scientific Computing | Deep learning (DL) is revolutionizing the scientific computing community. To reduce the data gap, active learning has been identified as a promising solution for DL in the scientific computing community. However, the deep active learning (DAL) literature is dominated by image classification problems and pool-based meth... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 277,716 |
2412.11185 | Transliterated Zero-Shot Domain Adaptation for Automatic Speech
Recognition | The performance of automatic speech recognition models often degenerates on domains not covered by the training data. Domain adaptation can address this issue, assuming the availability of the target domain data in the target language. However, such assumption does not stand in many real-world applications. To make dom... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 517,300 |
2010.13900 | Incorporating Symbolic Domain Knowledge into Graph Neural Networks | Our interest is in scientific problems with the following characteristics: (1) Data are naturally represented as graphs; (2) The amount of data available is typically small; and (3) There is significant domain-knowledge, usually expressed in some symbolic form. These kinds of problems have been addressed effectively in... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 203,279 |
2308.01053 | Boundary integrated neural networks (BINNs) for 2D elastostatic and
piezoelectric problems: Theory and MATLAB code | In this paper, we make the first attempt to apply the boundary integrated neural networks (BINNs) for the numerical solution of two-dimensional (2D) elastostatic and piezoelectric problems. BINNs combine artificial neural networks with the well-established boundary integral equations (BIEs) to effectively solve partial... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 383,125 |
1603.06668 | Learning Representations for Automatic Colorization | We develop a fully automatic image colorization system. Our approach leverages recent advances in deep networks, exploiting both low-level and semantic representations. As many scene elements naturally appear according to multimodal color distributions, we train our model to predict per-pixel color histograms. This int... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 53,524 |
2501.13993 | CAPRAG: A Large Language Model Solution for Customer Service and
Automatic Reporting using Vector and Graph Retrieval-Augmented Generation | The introduction of new features and services in the banking sector often overwhelms customers, creating an opportunity for banks to enhance user experience through financial chatbots powered by large language models (LLMs). We initiated an AI agent designed to provide customers with relevant information about banking ... | false | false | false | false | true | true | false | false | true | false | false | false | false | false | false | false | false | false | 526,935 |
1707.05534 | Latent Gaussian Process Regression | We introduce Latent Gaussian Process Regression which is a latent variable extension allowing modelling of non-stationary multi-modal processes using GPs. The approach is built on extending the input space of a regression problem with a latent variable that is used to modulate the covariance function over the training ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 77,253 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.