id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2306.04288 | Revising deep learning methods in parking lot occupancy detection | Parking guidance systems have recently become a popular trend as a part of the smart cities' paradigm of development. The crucial part of such systems is the algorithm allowing drivers to search for available parking lots across regions of interest. The classic approach to this task is based on the application of neura... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 371,683 |
0803.1695 | Use of self-correlation metrics for evaluation of information properties
of binary strings | It is demonstrated that appropriately chosen computable metrics based on self-correlation properties provide a degree of determinism sufficient to segregate binary strings by level of information content. | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 1,427 |
1907.12763 | Finding Moments in Video Collections Using Natural Language | We introduce the task of retrieving relevant video moments from a large corpus of untrimmed, unsegmented videos given a natural language query. Our task poses unique challenges as a system must efficiently identify both the relevant videos and localize the relevant moments in the videos. To address these challenges, we... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 140,195 |
1901.01331 | The ISTI Rapid Response on Exploring Cloud Computing 2018 | This report describes eighteen projects that explored how commercial cloud computing services can be utilized for scientific computation at national laboratories. These demonstrations ranged from deploying proprietary software in a cloud environment to leveraging established cloud-based analytics workflows for processi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 117,947 |
1904.04989 | FAMNet: Joint Learning of Feature, Affinity and Multi-dimensional
Assignment for Online Multiple Object Tracking | Data association-based multiple object tracking (MOT) involves multiple separated modules processed or optimized differently, which results in complex method design and requires non-trivial tuning of parameters. In this paper, we present an end-to-end model, named FAMNet, where Feature extraction, Affinity estimation a... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 127,175 |
2011.13230 | Molecular representation learning with language models and
domain-relevant auxiliary tasks | We apply a Transformer architecture, specifically BERT, to learn flexible and high quality molecular representations for drug discovery problems. We study the impact of using different combinations of self-supervised tasks for pre-training, and present our results for the established Virtual Screening and QSAR benchmar... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 208,420 |
1906.00278 | Multi-dimensional Spectral Super-Resolution with Prior Knowledge via
Frequency-Selective Vandermonde Decomposition and ADMM | This paper is concerned with estimation of multiple frequencies from incomplete and/or noisy samples based on a low-CP-rank tensor data model where each CP vector is an array response vector of one frequency. Suppose that it is known a priori that the frequencies lie in some given intervals, we develop efficient super-... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 133,335 |
2206.13317 | Automatic identification of segmentation errors for radiotherapy using
geometric learning | Automatic segmentation of organs-at-risk (OARs) in CT scans using convolutional neural networks (CNNs) is being introduced into the radiotherapy workflow. However, these segmentations still require manual editing and approval by clinicians prior to clinical use, which can be time consuming. The aim of this work was to ... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 304,914 |
2010.14700 | Sparse Symmetric Tensor Regression for Functional Connectivity Analysis | Tensor regression models, such as CP regression and Tucker regression, have many successful applications in neuroimaging analysis where the covariates are of ultrahigh dimensionality and possess complex spatial structures. The high-dimensional covariate arrays, also known as tensors, can be approximated by low-rank str... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 203,539 |
2308.14296 | RecMind: Large Language Model Powered Agent For Recommendation | While the recommendation system (RS) has advanced significantly through deep learning, current RS approaches usually train and fine-tune models on task-specific datasets, limiting their generalizability to new recommendation tasks and their ability to leverage external knowledge due to model scale and data size constra... | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | false | 388,265 |
2009.07354 | Random-Sampling Monte-Carlo Tree Search Methods for Cost Approximation
in Long-Horizon Optimal Control | In this paper, we develop Monte-Carlo based heuristic approaches to approximate the objective function in long horizon optimal control problems. In these approaches, to approximate the expectation operator in the objective function, we evolve the system state over multiple trajectories into the future while sampling th... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 195,887 |
2003.11632 | Pores for thought: The use of generative adversarial networks for the
stochastic reconstruction of 3D multi-phase electrode microstructures with
periodic boundaries | The generation of multiphase porous electrode microstructures is a critical step in the optimisation of electrochemical energy storage devices. This work implements a deep convolutional generative adversarial network (DC-GAN) for generating realistic n-phase microstructural data. The same network architecture is succes... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | false | 169,667 |
1711.01467 | Attentional Pooling for Action Recognition | We introduce a simple yet surprisingly powerful model to incorporate attention in action recognition and human object interaction tasks. Our proposed attention module can be trained with or without extra supervision, and gives a sizable boost in accuracy while keeping the network size and computational cost nearly the ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 83,890 |
1807.01488 | Factored Bandits | We introduce the factored bandits model, which is a framework for learning with limited (bandit) feedback, where actions can be decomposed into a Cartesian product of atomic actions. Factored bandits incorporate rank-1 bandits as a special case, but significantly relax the assumptions on the form of the reward function... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 102,075 |
1906.00358 | Data Augmentation for Object Detection via Progressive and Selective
Instance-Switching | Collection of massive well-annotated samples is effective in improving object detection performance but is extremely laborious and costly. Instead of data collection and annotation, the recently proposed Cut-Paste methods [12, 15] show the potential to augment training dataset by cutting foreground objects and pasting ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 133,369 |
1812.00843 | Early Prediction of Course Grades: Models and Feature Selection | In this paper, we compare predictive models for students' final performance in a blended course using a set of generic features collected from the first six weeks of class. These features were extracted from students' online homework submission logs as well as other online actions. We compare the effectiveness of 5 dif... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 115,358 |
2205.08719 | $(O,G)$-granular variable precision fuzzy rough sets based on overlap
and grouping functions | Since Bustince et al. introduced the concepts of overlap and grouping functions, these two types of aggregation functions have attracted a lot of interest in both theory and applications. In this paper, the depiction of $(O,G)$-granular variable precision fuzzy rough sets ($(O,G)$-GVPFRSs for short) is first given base... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 297,034 |
1409.6981 | Unsupervised learning of regression mixture models with unknown number
of components | Regression mixture models are widely studied in statistics, machine learning and data analysis. Fitting regression mixtures is challenging and is usually performed by maximum likelihood by using the expectation-maximization (EM) algorithm. However, it is well-known that the initialization is crucial for EM. If the init... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 36,283 |
1805.06474 | Understanding Federation: An Analytical Framework for the
Interoperability of Social Networking Sites | Although social networking has become a remarkable feature in the Web, full interoperability has not arrived. This work explores the main 5 paradigms of interoperability across social networking sites, corresponding to the layers in which we an find interoperability. Building on those, a novel analytical framework for ... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 97,609 |
2308.08290 | DFedADMM: Dual Constraints Controlled Model Inconsistency for
Decentralized Federated Learning | To address the communication burden issues associated with federated learning (FL), decentralized federated learning (DFL) discards the central server and establishes a decentralized communication network, where each client communicates only with neighboring clients. However, existing DFL methods still suffer from two ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 385,846 |
2304.13517 | Leveraging Compositional Methods for Modeling and Verification of an
Autonomous Taxi System | We apply a compositional formal modeling and verification method to an autonomous aircraft taxi system. We provide insights into the modeling approach and we identify several research areas where further development is needed. Specifically, we identify the following needs: (1) semantics of composition of viewpoints exp... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 360,606 |
2303.10454 | Performance Analysis and Optimization of Multi-RIS-Aided UAV Networks | In this paper, we study the performance of multiple reconfigurable intelligent surfaces (RISs)-aided unmanned aerial vehicle (UAV) communication networks over Nakagami-$m$ fading channels. For that purpose, we used accurate closed-form approximations for the channel distributions to derive closed-form approximations fo... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 352,459 |
1909.02667 | Bandwidth Embeddings for Mixed-bandwidth Speech Recognition | In this paper, we tackle the problem of handling narrowband and wideband speech by building a single acoustic model (AM), also called mixed bandwidth AM. In the proposed approach, an auxiliary input feature is used to provide the bandwidth information to the model, and bandwidth embeddings are jointly learned as part o... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 144,252 |
2307.00411 | Applications of Binary Similarity and Distance Measures | In the recent past, binary similarity measures have been applied in solving biometric identification problems, including fingerprint, handwritten character detection, and in iris image recognition. The application of the relevant measurements has also resulted in more accurate data analysis. This paper surveys the appl... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 376,996 |
2004.02579 | Best Linear Approximation of Nonlinear Continuous-Time Systems Subject
to Process Noise and Operating in Feedback | In many engineering applications the level of nonlinear distortions in frequency response function (FRF) measurements is quantified using specially designed periodic excitation signals called random phase multisines and periodic noise. The technique is based on the concept of the best linear approximation (BLA) and it ... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 171,269 |
2304.13732 | Lane Change Intention Recognition and Vehicle Status Prediction for
Autonomous Vehicles | Accurately detecting and predicting lane change (LC)processes of human-driven vehicles can help autonomous vehicles better understand their surrounding environment, recognize potential safety hazards, and improve traffic safety. This paper focuses on LC processes, first developing a temporal convolutional network with ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 360,689 |
1111.1048 | Achievable and Crystallized Rate Regions of the Interference Channel
with Interference as Noise | The interference channel achievable rate region is presented when the interference is treated as noise. The formulation starts with the 2-user channel, and then extends the results to the n-user case. The rate region is found to be the convex hull of the union of n power control rate regions, where each power control r... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 12,906 |
2312.16724 | A pipeline for multiple orange detection and tracking with 3-D fruit
relocalization and neural-net based yield regression in commercial citrus
orchards | Traditionally, sweet orange crop forecasting has involved manually counting fruits from numerous trees, which is a labor-intensive process. Automatic systems for fruit counting, based on proximal imaging, computer vision, and machine learning, have been considered a promising alternative or complement to manual countin... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 418,484 |
1704.06836 | Sarcasm SIGN: Interpreting Sarcasm with Sentiment Based Monolingual
Machine Translation | Sarcasm is a form of speech in which speakers say the opposite of what they truly mean in order to convey a strong sentiment. In other words, "Sarcasm is the giant chasm between what I say, and the person who doesn't get it.". In this paper we present the novel task of sarcasm interpretation, defined as the generation ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 72,229 |
2407.11986 | Symbiotic Connectivity: Optimizing Rural Digital Infrastructure with
Solar-Powered Mesh Networks Using Multi-Objective Evolutionary Algorithms | I present an open-source, ecologically integrated model for rural connectivity, merging the location of nodes mesh networks with renewable energy systems. Employing evolutionary algorithms, this approach optimizes node placement for internet access and symbiotic energy distribution. This model, grounded in community co... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 473,705 |
2108.12802 | Interpretable Propaganda Detection in News Articles | Online users today are exposed to misleading and propagandistic news articles and media posts on a daily basis. To counter thus, a number of approaches have been designed aiming to achieve a healthier and safer online news and media consumption. Automatic systems are able to support humans in detecting such content; ye... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 252,612 |
1703.06109 | Generalised Reichenbachian Common Cause Systems | The principle of the common cause claims that if an improbable coincidence has occurred, there must exist a common cause. This is generally taken to mean that positive correlations between non-causally related events should disappear when conditioning on the action of some underlying common cause. The extended interpre... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 70,177 |
1711.08200 | Temporal 3D ConvNets: New Architecture and Transfer Learning for Video
Classification | The work in this paper is driven by the question how to exploit the temporal cues available in videos for their accurate classification, and for human action recognition in particular? Thus far, the vision community has focused on spatio-temporal approaches with fixed temporal convolution kernel depths. We introduce a ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 85,157 |
1710.01559 | Monitoring tool usage in surgery videos using boosted convolutional and
recurrent neural networks | This paper investigates the automatic monitoring of tool usage during a surgery, with potential applications in report generation, surgical training and real-time decision support. Two surgeries are considered: cataract surgery, the most common surgical procedure, and cholecystectomy, one of the most common digestive s... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 82,034 |
1610.07086 | Deep image mining for diabetic retinopathy screening | Deep learning is quickly becoming the leading methodology for medical image analysis. Given a large medical archive, where each image is associated with a diagnosis, efficient pathology detectors or classifiers can be trained with virtually no expert knowledge about the target pathologies. However, deep learning algori... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 62,736 |
2308.02374 | Optimal Sizing of On-site Renewable Resources for Offshore Microgrids | The offshore oil and natural gas platforms, mostly powered by diesel or gas generators, consume approximately 16TWh of electricity worldwide per year, which emits large amount of CO2. To limit their contribution to climate change, a proposed solution is to replace the traditional fossil fuel based energy resources with... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 383,596 |
2009.13291 | Physics Informed Neural Networks for Simulating Radiative Transfer | We propose a novel machine learning algorithm for simulating radiative transfer. Our algorithm is based on physics informed neural networks (PINNs), which are trained by minimizing the residual of the underlying radiative tranfer equations. We present extensive experiments and theoretical error estimates to demonstrate... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 197,700 |
1910.03268 | Integrated Optimization of Ascent Trajectory and SRM Design of
Multistage Launch Vehicles | This paper presents a methodology for the concurrent first-stage preliminary design and ascent trajectory optimization, with application to a Vega-derived Light Launch Vehicle. The reuse as first stage of an existing upper-stage (Zefiro 40) requires a propellant grain geometry redesign, in order to account for the muta... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 148,461 |
1805.11897 | Differential Properties of Sinkhorn Approximation for Learning with
Wasserstein Distance | Applications of optimal transport have recently gained remarkable attention thanks to the computational advantages of entropic regularization. However, in most situations the Sinkhorn approximation of the Wasserstein distance is replaced by a regularized version that is less accurate but easy to differentiate. In this ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 99,045 |
2012.12474 | Self-supervised self-supervision by combining deep learning and
probabilistic logic | Labeling training examples at scale is a perennial challenge in machine learning. Self-supervision methods compensate for the lack of direct supervision by leveraging prior knowledge to automatically generate noisy labeled examples. Deep probabilistic logic (DPL) is a unifying framework for self-supervised learning tha... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 212,948 |
1907.08461 | Delegative Reinforcement Learning: learning to avoid traps with a little
help | Most known regret bounds for reinforcement learning are either episodic or assume an environment without traps. We derive a regret bound without making either assumption, by allowing the algorithm to occasionally delegate an action to an external advisor. We thus arrive at a setting of active one-shot model-based reinf... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 139,108 |
1907.07677 | CU-Net: Cascaded U-Net with Loss Weighted Sampling for Brain Tumor
Segmentation | This paper proposes a novel cascaded U-Net for brain tumor segmentation. Inspired by the distinct hierarchical structure of brain tumor, we design a cascaded deep network framework, in which the whole tumor is segmented firstly and then the tumor internal substructures are further segmented. Considering that the increa... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 138,939 |
2409.13280 | Efficient Training of Deep Neural Operator Networks via Randomized
Sampling | Neural operators (NOs) employ deep neural networks to learn mappings between infinite-dimensional function spaces. Deep operator network (DeepONet), a popular NO architecture, has demonstrated success in the real-time prediction of complex dynamics across various scientific and engineering applications. In this work, w... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 489,924 |
2209.12062 | Compressing bipartite graphs with a dual reordering scheme | In order to manage massive graphs in practice, it is often necessary to resort to graph compression, which aims at reducing the memory used when storing and processing the graph. Efficient compression methods have been proposed in the literature, especially for web graphs. In most cases, they are combined with a vertex... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | true | 319,401 |
2002.03501 | Segmenting Unseen Industrial Components in a Heavy Clutter Using RGB-D
Fusion and Synthetic Data | Segmentation of unseen industrial parts is essential for autonomous industrial systems. However, industrial components are texture-less, reflective, and often found in cluttered and unstructured environments with heavy occlusion, which makes it more challenging to deal with unseen objects. To tackle this problem, we pr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 163,285 |
1507.04024 | Analyzing the activity of a person in a chat by combining network
analysis and fuzzy logic | Chat-log data that contains information about sender and receiver of the statements sent around in the chat can be readily turned into a directed temporal multi-network representation. In the resulting network, the activity of a chat member can, for example, be operationalized as his degree (number of distinct interact... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 45,126 |
2403.13870 | ExMap: Leveraging Explainability Heatmaps for Unsupervised Group
Robustness to Spurious Correlations | Group robustness strategies aim to mitigate learned biases in deep learning models that arise from spurious correlations present in their training datasets. However, most existing methods rely on the access to the label distribution of the groups, which is time-consuming and expensive to obtain. As a result, unsupervis... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 439,832 |
2107.03387 | Sleep syndromes onset detection based on automatic sleep staging
algorithm | In this paper, we propose a novel method and a practical approach to predicting early onsets of sleep syndromes, including restless leg syndrome, insomnia, based on an algorithm that is comprised of two modules. A Fast Fourier Transform is applied to 30 seconds long epochs of EEG recordings to provide localized time-fr... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 245,147 |
2201.02136 | A fixed storage distributed graph database hybrid with at-scale OLAP
expression and I/O support of a relational DB: Kinetica-Graph | A distributed graph database architecture that co-exists with the distributed relational DB for I/O and at-scale OLAP expression support with hundreds of PostGIS compatible geometry functions will be discussed in this article. The uniqueness of this implementation stems mainly from its double link topology structure fo... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 274,461 |
2012.07110 | Leaking Sensitive Financial Accounting Data in Plain Sight using Deep
Autoencoder Neural Networks | Nowadays, organizations collect vast quantities of sensitive information in `Enterprise Resource Planning' (ERP) systems, such as accounting relevant transactions, customer master data, or strategic sales price information. The leakage of such information poses a severe threat for companies as the number of incidents a... | false | false | false | false | false | false | true | false | false | false | false | true | true | false | false | false | false | false | 211,345 |
2405.07465 | Deception in Differential Games: Information Limiting Strategy to Induce
Dilemma | Can deception exist in differential games? We provide a case study for a Turret-Attacker differential game, where two Attackers seek to score points by reaching a target region while a Turret tries to minimize the score by aligning itself with the Attackers before they reach the target. In contrast to the original prob... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 453,723 |
2410.22283 | Leveraging Recurrent Neural Networks for Predicting Motor Movements from
Primate Motor Cortex Neural Recordings | This paper presents an efficient deep learning solution for decoding motor movements from neural recordings in non-human primates. An Autoencoder Gated Recurrent Unit (AEGRU) model was adopted as the model architecture for this task. The autoencoder is only used during the training stage to achieve better generalizatio... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 503,565 |
2304.08177 | Efficient and Effective Text Encoding for Chinese LLaMA and Alpaca | Large Language Models (LLMs), such as ChatGPT and GPT-4, have dramatically transformed natural language processing research and shown promising strides towards Artificial General Intelligence (AGI). Nonetheless, the high costs associated with training and deploying LLMs present substantial obstacles to transparent, acc... | true | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 358,617 |
1505.04094 | Evaluating Link Prediction Methods | Link prediction is a popular research area with important applications in a variety of disciplines, including biology, social science, security, and medicine. The fundamental requirement of link prediction is the accurate and effective prediction of new links in networks. While there are many different methods proposed... | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | false | 43,144 |
2010.10833 | KnowDis: Knowledge Enhanced Data Augmentation for Event Causality
Detection via Distant Supervision | Modern models of event causality detection (ECD) are mainly based on supervised learning from small hand-labeled corpora. However, hand-labeled training data is expensive to produce, low coverage of causal expressions and limited in size, which makes supervised methods hard to detect causal relations between events. To... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 202,019 |
1905.06159 | Deep Neural Architecture Search with Deep Graph Bayesian Optimization | Bayesian optimization (BO) is an effective method of finding the global optima of black-box functions. Recently BO has been applied to neural architecture search and shows better performance than pure evolutionary strategies. All these methods adopt Gaussian processes (GPs) as surrogate function, with the handcraft sim... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 130,912 |
2302.02343 | LExecutor: Learning-Guided Execution | Executing code is essential for various program analysis tasks, e.g., to detect bugs that manifest through exceptions or to obtain execution traces for further dynamic analysis. However, executing an arbitrary piece of code is often difficult in practice, e.g., because of missing variable definitions, missing user inpu... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 343,967 |
1803.01719 | How to Start Training: The Effect of Initialization and Architecture | We identify and study two common failure modes for early training in deep ReLU nets. For each we give a rigorous proof of when it occurs and how to avoid it, for fully connected and residual architectures. The first failure mode, exploding/vanishing mean activation length, can be avoided by initializing weights from a ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 91,932 |
2305.16023 | NaSGEC: a Multi-Domain Chinese Grammatical Error Correction Dataset from
Native Speaker Texts | We introduce NaSGEC, a new dataset to facilitate research on Chinese grammatical error correction (CGEC) for native speaker texts from multiple domains. Previous CGEC research primarily focuses on correcting texts from a single domain, especially learner essays. To broaden the target domain, we annotate multiple refere... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 367,886 |
1910.10818 | Approximate Stochastic Reachability for High Dimensional Systems | We present a method to compute the stochastic reachability safety probabilities for high-dimensional stochastic dynamical systems. Our approach takes advantage of a nonparametric learning technique known as conditional distribution embeddings to model the stochastic kernel using a data-driven approach. By embedding the... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 150,590 |
1907.07676 | Lung Nodules Detection and Segmentation Using 3D Mask-RCNN | Accurate assessment of Lung nodules is a time consuming and error prone ingredient of the radiologist interpretation work. Automating 3D volume detection and segmentation can improve workflow as well as patient care. Previous works have focused either on detecting lung nodules from a full CT scan or on segmenting them ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 138,938 |
2312.07169 | Semi-supervised Active Learning for Video Action Detection | In this work, we focus on label efficient learning for video action detection. We develop a novel semi-supervised active learning approach which utilizes both labeled as well as unlabeled data along with informative sample selection for action detection. Video action detection requires spatio-temporal localization alon... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 414,823 |
2008.10418 | INSIDE: Steering Spatial Attention with Non-Imaging Information in CNNs | We consider the problem of integrating non-imaging information into segmentation networks to improve performance. Conditioning layers such as FiLM provide the means to selectively amplify or suppress the contribution of different feature maps in a linear fashion. However, spatial dependency is difficult to learn within... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 192,989 |
2010.12640 | Avoiding Occupancy Detection from Smart Meter using Adversarial Machine
Learning | More and more conventional electromechanical meters are being replaced with smart meters because of their substantial benefits such as providing faster bi-directional communication between utility services and end users, enabling direct load control for demand response, energy saving, and so on. However, the fine-grain... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 202,775 |
1706.01671 | Compression Fractures Detection on CT | The presence of a vertebral compression fracture is highly indicative of osteoporosis and represents the single most robust predictor for development of a second osteoporotic fracture in the spine or elsewhere. Less than one third of vertebral compression fractures are diagnosed clinically. We present an automated meth... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 74,844 |
1705.00687 | Convex-constrained Sparse Additive Modeling and Its Extensions | Sparse additive modeling is a class of effective methods for performing high-dimensional nonparametric regression. In this work we show how shape constraints such as convexity/concavity and their extensions, can be integrated into additive models. The proposed sparse difference of convex additive models (SDCAM) can est... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 72,730 |
2107.09428 | Streaming End-to-End ASR based on Blockwise Non-Autoregressive Models | Non-autoregressive (NAR) modeling has gained more and more attention in speech processing. With recent state-of-the-art attention-based automatic speech recognition (ASR) structure, NAR can realize promising real-time factor (RTF) improvement with only small degradation of accuracy compared to the autoregressive (AR) m... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 247,027 |
2210.15621 | Class Based Thresholding in Early Exit Semantic Segmentation Networks | We propose Class Based Thresholding (CBT) to reduce the computational cost of early exit semantic segmentation models while preserving the mean intersection over union (mIoU) performance. A key idea of CBT is to exploit the naturally-occurring neural collapse phenomenon. Specifically, by calculating the mean prediction... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 327,024 |
1905.06576 | STAR: A Concise Deep Learning Framework for Citywide Human Mobility
Prediction | Human mobility forecasting in a city is of utmost importance to transportation and public safety, but with the process of urbanization and the generation of big data, intensive computing and determination of mobility pattern have become challenging. This study focuses on how to improve the accuracy and efficiency of pr... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 131,033 |
1306.1462 | K-Algorithm A Modified Technique for Noise Removal in Handwritten
Documents | OCR has been an active research area since last few decades. OCR performs the recognition of the text in the scanned document image and converts it into editable form. The OCR process can have several stages like pre-processing, segmentation, recognition and post processing. The pre-processing stage is a crucial stage ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 25,048 |
1909.13843 | A Darwin Time Domain Scheme for the Simulation of Transient Quasistatic
Electromagnetic Fields Including Resistive, Capacitive and Inductive Effects | The Darwin field model addresses an approximation to Maxwell's equations where radiation effects are neglected. It allows to describe general quasistatic electromagnetic field phenomena including inductive, resistive and capacitive effects. A Darwin formulation based on the Darwin-Amp\`ere equation and the implicitly i... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 147,532 |
1205.4683 | How women organize social networks different from men | Superpositions of social networks, such as communication, friendship, or trade networks, are called multiplex networks, forming the structural backbone of human societies. Novel datasets now allow quantification and exploration of multiplex networks. Here we study gender-specific differences of a multiplex network from... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 16,113 |
2008.08178 | Discovering Multi-Hardware Mobile Models via Architecture Search | Hardware-aware neural architecture designs have been predominantly focusing on optimizing model performance on single hardware and model development complexity, where another important factor, model deployment complexity, has been largely ignored. In this paper, we argue that, for applications that may be deployed on m... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 192,339 |
2408.11557 | A Quick, trustworthy spectral knowledge Q&A system leveraging
retrieval-augmented generation on LLM | Large Language Model (LLM) has demonstrated significant success in a range of natural language processing (NLP) tasks within general domain. The emergence of LLM has introduced innovative methodologies across diverse fields, including the natural sciences. Researchers aim to implement automated, concurrent process driv... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 482,342 |
1503.08155 | Learning Embedding Representations for Knowledge Inference on Imperfect
and Incomplete Repositories | This paper considers the problem of knowledge inference on large-scale imperfect repositories with incomplete coverage by means of embedding entities and relations at the first attempt. We propose IIKE (Imperfect and Incomplete Knowledge Embedding), a probabilistic model which measures the probability of each belief, i... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 41,553 |
2309.12028 | Dynamic Hypergraph Structure Learning for Traffic Flow Forecasting | This paper studies the problem of traffic flow forecasting, which aims to predict future traffic conditions on the basis of road networks and traffic conditions in the past. The problem is typically solved by modeling complex spatio-temporal correlations in traffic data using spatio-temporal graph neural networks (GNNs... | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 393,637 |
1604.02930 | Implementation of haptic communication in comanipulative tasks: a
statistical state machine model | - This paper presents an experimental evaluation of physical human-human interaction in lightweight condition using a one degree of freedom robotized setup. It explores possible origins of Physical Human-Human communication, more precisely, the hypothesis of a time based communication. To explore if the communication i... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 54,411 |
2412.06248 | Rendering-Refined Stable Diffusion for Privacy Compliant Synthetic Data | Growing privacy concerns and regulations like GDPR and CCPA necessitate pseudonymization techniques that protect identity in image datasets. However, retaining utility is also essential. Traditional methods like masking and blurring degrade quality and obscure critical context, especially in human-centric images. We in... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 515,173 |
1903.03099 | Lifted Weight Learning of Markov Logic Networks Revisited | We study lifted weight learning of Markov logic networks. We show that there is an algorithm for maximum-likelihood learning of 2-variable Markov logic networks which runs in time polynomial in the domain size. Our results are based on existing lifted-inference algorithms and recent algorithmic results on computing max... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 123,639 |
2112.12438 | Using Sequential Statistical Tests for Efficient Hyperparameter Tuning | Hyperparameter tuning is one of the the most time-consuming parts in machine learning. Despite the existence of modern optimization algorithms that minimize the number of evaluations needed, evaluations of a single setting may still be expensive. Usually a resampling technique is used, where the machine learning method... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 272,960 |
1111.0059 | Loosely Coupled Formulations for Automated Planning: An Integer
Programming Perspective | We represent planning as a set of loosely coupled network flow problems, where each network corresponds to one of the state variables in the planning domain. The network nodes correspond to the state variable values and the network arcs correspond to the value transitions. The planning problem is to find a path (a sequ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 12,853 |
2004.14593 | A Triangular Network For Density Estimation | We report a triangular neural network implementation of neural autoregressive flow (NAF). Unlike many universal autoregressive density models, our design is highly modular, parameter economy, computationally efficient, and applicable to density estimation of data with high dimensions. It achieves state-of-the-art bits-... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 174,947 |
2012.10490 | Perception-Based Temporal Logic Planning in Uncertain Semantic Maps | This paper addresses a multi-robot planning problem in environments with partially unknown semantics. The environment is assumed to have known geometric structure (e.g., walls) and to be occupied by static labeled landmarks with uncertain positions and classes. This modeling approach gives rise to an uncertain semantic... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 212,355 |
1805.08180 | Hierarchical Reinforcement Learning with Hindsight | Reinforcement Learning (RL) algorithms can suffer from poor sample efficiency when rewards are delayed and sparse. We introduce a solution that enables agents to learn temporally extended actions at multiple levels of abstraction in a sample efficient and automated fashion. Our approach combines universal value functio... | false | false | false | false | true | false | true | true | false | false | false | false | false | false | false | true | false | false | 98,068 |
2002.02712 | Discovering Mathematical Objects of Interest -- A Study of Mathematical
Notations | Mathematical notation, i.e., the writing system used to communicate concepts in mathematics, encodes valuable information for a variety of information search and retrieval systems. Yet, mathematical notations remain mostly unutilized by today's systems. In this paper, we present the first in-depth study on the distribu... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | true | 163,007 |
2411.01121 | Hedging and Pricing Structured Products Featuring Multiple Underlying
Assets | Hedging a portfolio containing autocallable notes presents unique challenges due to the complex risk profile of these financial instruments. In addition to hedging, pricing these notes, particularly when multiple underlying assets are involved, adds another layer of complexity. Pricing autocallable notes involves intri... | false | true | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 504,919 |
1806.04819 | Integral Privacy for Sampling | Differential privacy is a leading protection setting, focused by design on individual privacy. Many applications, in medical / pharmaceutical domains or social networks, rather posit privacy at a group level, a setting we call integral privacy. We aim for the strongest form of privacy: the group size is in particular n... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 100,323 |
1705.04763 | High-Precision Trajectory Tracking in Changing Environments Through
$\mathcal{L}_1$ Adaptive Feedback and Iterative Learning | As robots and other automated systems are introduced to unknown and dynamic environments, robust and adaptive control strategies are required to cope with disturbances, unmodeled dynamics and parametric uncertainties. In this paper, we propose and provide theoretical proofs of a combined $\mathcal{L}_1$ adaptive feedba... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 73,377 |
1805.05081 | Constructing Narrative Event Evolutionary Graph for Script Event
Prediction | Script event prediction requires a model to predict the subsequent event given an existing event context. Previous models based on event pairs or event chains cannot make full use of dense event connections, which may limit their capability of event prediction. To remedy this, we propose constructing an event graph to ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 97,373 |
1705.09425 | Hierarchical Cellular Automata for Visual Saliency | Saliency detection, finding the most important parts of an image, has become increasingly popular in computer vision. In this paper, we introduce Hierarchical Cellular Automata (HCA) -- a temporally evolving model to intelligently detect salient objects. HCA consists of two main components: Single-layer Cellular Automa... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 74,195 |
2409.06366 | One Policy to Run Them All: an End-to-end Learning Approach to
Multi-Embodiment Locomotion | Deep Reinforcement Learning techniques are achieving state-of-the-art results in robust legged locomotion. While there exists a wide variety of legged platforms such as quadruped, humanoids, and hexapods, the field is still missing a single learning framework that can control all these different embodiments easily and ... | false | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | 487,102 |
2410.21053 | Computable Lipschitz Bounds for Deep Neural Networks | Deriving sharp and computable upper bounds of the Lipschitz constant of deep neural networks is crucial to formally guarantee the robustness of neural-network based models. We analyse three existing upper bounds written for the $l^2$ norm. We highlight the importance of working with the $l^1$ and $l^\infty$ norms and w... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 503,071 |
2403.00794 | Getting Serious about Humor: Crafting Humor Datasets with Unfunny Large
Language Models | Humor is a fundamental facet of human cognition and interaction. Yet, despite recent advances in natural language processing, humor detection remains a challenging task that is complicated by the scarcity of datasets that pair humorous texts with similar non-humorous counterparts. In our work, we investigate whether la... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 434,106 |
1403.1486 | Lifespan and propagation of information in On-line Social Networks a
Case Study | Since 1950, information flows have been in the centre of scientific research. Up until internet penetration in the late 90s, these studies were based over traditional offline social networks. Several observations in offline information flows studies, such as two-step flow of communication and the importance of weak tie... | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 31,399 |
2303.09950 | Deep Graph-based Spatial Consistency for Robust Non-rigid Point Cloud
Registration | We study the problem of outlier correspondence pruning for non-rigid point cloud registration. In rigid registration, spatial consistency has been a commonly used criterion to discriminate outliers from inliers. It measures the compatibility of two correspondences by the discrepancy between the respective distances in ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 352,252 |
1809.02292 | A Block Coordinate Ascent Algorithm for Mean-Variance Optimization | Risk management in dynamic decision problems is a primary concern in many fields, including financial investment, autonomous driving, and healthcare. The mean-variance function is one of the most widely used objective functions in risk management due to its simplicity and interpretability. Existing algorithms for mean-... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 107,020 |
2404.09631 | Action Model Learning with Guarantees | This paper studies the problem of action model learning with full observability. Following the learning by search paradigm by Mitchell, we develop a theory for action model learning based on version spaces that interprets the task as search for hypothesis that are consistent with the learning examples. Our theoretical ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 446,769 |
2311.16093 | Visual cognition in multimodal large language models | A chief goal of artificial intelligence is to build machines that think like people. Yet it has been argued that deep neural network architectures fail to accomplish this. Researchers have asserted these models' limitations in the domains of causal reasoning, intuitive physics, and intuitive psychology. Yet recent adva... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 410,750 |
2103.11367 | ROSITA: Refined BERT cOmpreSsion with InTegrAted techniques | Pre-trained language models of the BERT family have defined the state-of-the-arts in a wide range of NLP tasks. However, the performance of BERT-based models is mainly driven by the enormous amount of parameters, which hinders their application to resource-limited scenarios. Faced with this problem, recent studies have... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 225,783 |
2412.06181 | Enhancing Adversarial Resistance in LLMs with Recursion | The increasing integration of Large Language Models (LLMs) into society necessitates robust defenses against vulnerabilities from jailbreaking and adversarial prompts. This project proposes a recursive framework for enhancing the resistance of LLMs to manipulation through the use of prompt simplification techniques. By... | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | false | 515,134 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.