id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2012.04382 | Using Feature Alignment Can Improve Clean Average Precision and
Adversarial Robustness in Object Detection | The 2D object detection in clean images has been a well studied topic, but its vulnerability against adversarial attack is still worrying. Existing work has improved robustness of object detectors by adversarial training, at the same time, the average precision (AP) on clean images drops significantly. In this paper, w... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 210,443 |
1205.3569 | The Simulation and Mapping of Building Performance Indicators based on
European Weather Stations | Due to the climate change debate, a lot of research and maps of external climate parameters are available. However, maps of indoor climate performance parameters are still lacking. This paper presents a methodology for obtaining maps of performances of similar buildings that are virtually spread over whole Europe. The ... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 16,033 |
1805.06597 | ARUM: Polar Coded HARQ Scheme based on Incremental Channel Polarization | A hybrid ARQ (HARQ) scheme for polar code, which is called active-bit relocation under masks (ARUM), is proposed. In each transmission, the data bits are encoded and bit-wisely XOR-masked using a binary vector before being transmitted through the channel. The masking process combines multiple transmissions together whi... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 97,645 |
2011.13163 | Being Central on the Cheap: Stability in Heterogeneous Multiagent
Centrality Games | We study strategic network formation games in which agents attempt to form (costly) links in order to maximize their network centrality. Our model derives from Jackson and Wolinsky's symmetric connection model, but allows for heterogeneity in agent utilities by replacing decay centrality (implicit in the Jackson-Wolins... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 208,396 |
1811.03423 | dAIrector: Automatic Story Beat Generation through Knowledge Synthesis | dAIrector is an automated director which collaborates with humans storytellers for live improvisational performances and writing assistance. dAIrector can be used to create short narrative arcs through contextual plot generation. In this work, we present the system architecture, a quantitative evaluation of design choi... | true | false | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | 112,836 |
2301.09790 | The Next Chapter: A Study of Large Language Models in Storytelling | To enhance the quality of generated stories, recent story generation models have been investigating the utilization of higher-level attributes like plots or commonsense knowledge. The application of prompt-based learning with large language models (LLMs), exemplified by GPT-3, has exhibited remarkable performance in di... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 341,605 |
2005.03627 | Universal Coding and Prediction on Ergodic Martin-L\"of Random Points | Suppose that we have a method which estimates the conditional probabilities of some unknown stochastic source and we use it to guess which of the outcomes will happen. We want to make a correct guess as often as it is possible. What estimators are good for this? In this work, we consider estimators given by a familiar ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 176,211 |
2109.02237 | BERT might be Overkill: A Tiny but Effective Biomedical Entity Linker
based on Residual Convolutional Neural Networks | Biomedical entity linking is the task of linking entity mentions in a biomedical document to referent entities in a knowledge base. Recently, many BERT-based models have been introduced for the task. While these models have achieved competitive results on many datasets, they are computationally expensive and contain ab... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 253,679 |
2209.09422 | Bit Allocation using Optimization | In this paper, we consider the problem of bit allocation in Neural Video Compression (NVC). First, we reveal a fundamental relationship between bit allocation in NVC and Semi-Amortized Variational Inference (SAVI). Specifically, we show that SAVI with GoP (Group-of-Picture)-level likelihood is equivalent to pixel-level... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 318,500 |
2410.03375 | SoundSignature: What Type of Music Do You Like? | SoundSignature is a music application that integrates a custom OpenAI Assistant to analyze users' favorite songs. The system incorporates state-of-the-art Music Information Retrieval (MIR) Python packages to combine extracted acoustic/musical features with the assistant's extensive knowledge of the artists and bands. C... | false | false | true | false | true | true | false | false | false | false | false | false | false | false | false | false | false | false | 494,749 |
2410.15802 | Assisted Physical Interaction: Autonomous Aerial Robots with Neural
Network Detection, Navigation, and Safety Layers | The paper introduces a novel framework for safe and autonomous aerial physical interaction in industrial settings. It comprises two main components: a neural network-based target detection system enhanced with edge computing for reduced onboard computational load, and a control barrier function (CBF)-based controller f... | false | false | false | false | false | false | false | true | false | false | true | true | false | false | false | false | false | false | 500,734 |
2003.12697 | Semantically Multi-modal Image Synthesis | In this paper, we focus on semantically multi-modal image synthesis (SMIS) task, namely, generating multi-modal images at the semantic level. Previous work seeks to use multiple class-specific generators, constraining its usage in datasets with a small number of classes. We instead propose a novel Group Decreasing Netw... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 169,983 |
2202.08486 | Energy-Efficient UAV Communications: A Generalised Propulsion Energy
Consumption Model | This paper proposes a generalised propulsion energy consumption model (PECM) for rotary-wing ummanned aerial vehicles (UAVs) under the consideration of the practical thrust-to-weight ratio (TWR) with respect to the velocity, acceleration and direction change of the UAVs. To verify the effectiveness of the proposed PECM... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 280,891 |
2501.04752 | A mathematical model for the bullying dynamics in schools | We analyze a mathematical model to understand the dynamics of bullying in schools. The model considers a population divided into four groups: susceptible individuals, bullies, individuals exposed to bullying, and violent individuals. Transitions between these states occur at rates designed to capture the complex intera... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 523,330 |
2303.06277 | SPOTR: Spatio-temporal Pose Transformers for Human Motion Prediction | 3D human motion prediction is a research area of high significance and a challenge in computer vision. It is useful for the design of many applications including robotics and autonomous driving. Traditionally, autogregressive models have been used to predict human motion. However, these models have high computation nee... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 350,772 |
1712.01511 | Successive Embedding and Classification Loss for Aerial Image
Classification | Deep neural networks can be effective means to automatically classify aerial images but is easy to overfit to the training data. It is critical for trained neural networks to be robust to variations that exist between training and test environments. To address the overfitting problem in aerial image classification, we ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 86,116 |
2406.06432 | SYM3D: Learning Symmetric Triplanes for Better 3D-Awareness of GANs | Despite the growing success of 3D-aware GANs, which can be trained on 2D images to generate high-quality 3D assets, they still rely on multi-view images with camera annotations to synthesize sufficient details from all viewing directions. However, the scarce availability of calibrated multi-view image datasets, especia... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 462,571 |
2101.11981 | Embedding Symbolic Temporal Knowledge into Deep Sequential Models | Sequences and time-series often arise in robot tasks, e.g., in activity recognition and imitation learning. In recent years, deep neural networks (DNNs) have emerged as an effective data-driven methodology for processing sequences given sufficient training data and compute resources. However, when data is limited, simp... | false | false | false | false | true | false | true | true | false | false | false | false | false | false | false | false | false | false | 217,449 |
2202.04611 | Task Modifiers for HTN Planning and Acting | The ability of an agent to change its objectives in response to unexpected events is desirable in dynamic environments. In order to provide this capability to hierarchical task network (HTN) planning, we propose an extension of the paradigm called task modifiers, which are functions that receive a task list and a state... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 279,611 |
2211.16676 | Robust Learning of Nonlinear Dynamical Systems with Safety and Stability
Properties | The paper presents a robust parameter learning methodology for identification of nonlinear dynamical system from data while satisfying safety and stability constraints in the context of learning from demonstration (LfD) methods. Extreme Learning Machines (ELM) is used to approximate the system model, whose parameters a... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 333,702 |
1705.08923 | Attention-based Natural Language Person Retrieval | Following the recent progress in image classification and captioning using deep learning, we develop a novel natural language person retrieval system based on an attention mechanism. More specifically, given the description of a person, the goal is to localize the person in an image. To this end, we first construct a b... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 74,107 |
2006.05138 | Sparse Dynamic Distribution Decomposition: Efficient Integration of
Trajectory and Snapshot Time Series Data | Dynamic Distribution Decomposition (DDD) was introduced in Taylor-King et. al. (PLOS Comp Biol, 2020) as a variation on Dynamic Mode Decomposition. In brief, by using basis functions over a continuous state space, DDD allows for the fitting of continuous-time Markov chains over these basis functions and as a result con... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 180,953 |
2202.08930 | A Distributed Algorithm for Measure-valued Optimization with Additive
Objective | We propose a distributed nonparametric algorithm for solving measure-valued optimization problems with additive objectives. Such problems arise in several contexts in stochastic learning and control including Langevin sampling from an unnormalized prior, mean field neural network learning and Wasserstein gradient flows... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 281,028 |
1612.06271 | Distributed Optimization of Hierarchical Small Cell Networks: A GNEP
Framework | Deployment of small cell base stations (SBSs) overlaying the coverage area of a macrocell BS (MBS) results in a two-tier hierarchical small cell network. Cross-tier and inter-tier interference not only jeopardize primary macrocell communication but also limit the spectral efficiency of small cell communication. This pa... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 65,798 |
2209.04779 | Scattering Model Guided Adversarial Examples for SAR Target Recognition:
Attack and Defense | Deep Neural Networks (DNNs) based Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) systems have shown to be highly vulnerable to adversarial perturbations that are deliberately designed yet almost imperceptible but can bias DNN inference when added to targeted objects. This leads to serious safety conc... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 316,880 |
2404.18534 | Evaluating and Mitigating Linguistic Discrimination in Large Language
Models | By training on text in various languages, large language models (LLMs) typically possess multilingual support and demonstrate remarkable capabilities in solving tasks described in different languages. However, LLMs can exhibit linguistic discrimination due to the uneven distribution of training data across languages. T... | false | false | false | false | true | false | false | false | true | false | false | false | true | false | false | false | false | true | 450,299 |
2109.10078 | Learning Interpretable Concept Groups in CNNs | We propose a novel training methodology -- Concept Group Learning (CGL) -- that encourages training of interpretable CNN filters by partitioning filters in each layer into concept groups, each of which is trained to learn a single visual concept. We achieve this through a novel regularization strategy that forces filte... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 256,503 |
2007.10137 | On Coresets for Fair Clustering in Metric and Euclidean Spaces and Their
Applications | Fair clustering is a constrained variant of clustering where the goal is to partition a set of colored points, such that the fraction of points of any color in every cluster is more or less equal to the fraction of points of this color in the dataset. This variant was recently introduced by Chierichetti et al. [NeurIPS... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 188,186 |
1906.06626 | REMAP: Multi-layer entropy-guided pooling of dense CNN features for
image retrieval | This paper addresses the problem of very large-scale image retrieval, focusing on improving its accuracy and robustness. We target enhanced robustness of search to factors such as variations in illumination, object appearance and scale, partial occlusions, and cluttered backgrounds - particularly important when search ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 135,364 |
2208.11294 | Collaborative Remote Control of Unmanned Ground Vehicles in Virtual
Reality | Virtual reality (VR) technology is commonly used in entertainment applications; however, it has also been deployed in practical applications in more serious aspects of our lives, such as safety. To support people working in dangerous industries, VR can ensure operators manipulate standardized tasks and work collaborati... | true | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 314,372 |
2401.02952 | Optimizing Dataflow Systems for Scalable Interactive Visualization | Supporting the interactive exploration of large datasets is a popular and challenging use case for data management systems. Traditionally, the interface and the back-end system are built and optimized separately, and interface design and system optimization require different skill sets that are difficult for one person... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 419,900 |
2302.04500 | FLAC: A Robust Failure-Aware Atomic Commit Protocol for Distributed
Transactions | In distributed transaction processing, atomic commit protocol (ACP) is used to ensure database consistency. With the use of commodity compute nodes and networks, failures such as system crashes and network partitioning are common. It is therefore important for ACP to dynamically adapt to the operating condition for eff... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | true | true | 344,730 |
2411.17993 | DRS: Deep Question Reformulation With Structured Output | Question answering represents a core capability of large language models (LLMs). However, when individuals encounter unfamiliar knowledge in texts, they often formulate questions that the text itself cannot answer due to insufficient understanding of the underlying information. Recent studies reveal that while LLMs can... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 511,684 |
1511.02506 | Towards Structured Deep Neural Network for Automatic Speech Recognition | In this paper we propose the Structured Deep Neural Network (structured DNN) as a structured and deep learning framework. This approach can learn to find the best structured object (such as a label sequence) given a structured input (such as a vector sequence) by globally considering the mapping relationships between t... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | true | false | false | 48,646 |
1803.02933 | Distributed Computation of Wasserstein Barycenters over Networks | We propose a new \cu{class-optimal} algorithm for the distributed computation of Wasserstein Barycenters over networks. Assuming that each node in a graph has a probability distribution, we prove that every node can reach the barycenter of all distributions held in the network by using local interactions compliant with... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | true | 92,158 |
2407.12599 | On Diversity in Discriminative Neural Networks | Diversity is a concept of prime importance in almost all disciplines based on information processing. In telecommunications, for example, spatial, temporal, and frequency diversity, as well as redundant coding, are fundamental concepts that have enabled the design of extremely efficient systems. In machine learning, in... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 473,995 |
2412.16635 | Task-Driven Co-Design of Mobile Manipulators | Recent interest in mobile manipulation has resulted in a wide range of new robot designs. A large family of these designs focuses on modular platforms that combine existing mobile bases with static manipulator arms. They combine these modules by mounting the arm in a tabletop configuration. However, the operating works... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 519,616 |
2401.03862 | End-to-End Crystal Structure Prediction from Powder X-Ray Diffraction | Powder X-ray diffraction (PXRD) is a prevalent technique in materials characterization. While the analysis of PXRD often requires extensive human manual intervention, and most automated method only achieved at coarse-grained level. The more difficult and important task of fine-grained crystal structure prediction from ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 420,251 |
2408.09371 | Detecting the Undetectable: Combining Kolmogorov-Arnold Networks and MLP
for AI-Generated Image Detection | As artificial intelligence progresses, the task of distinguishing between real and AI-generated images is increasingly complicated by sophisticated generative models. This paper presents a novel detection framework adept at robustly identifying images produced by cutting-edge generative AI models, such as DALL-E 3, Mid... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 481,404 |
2203.07454 | L2Explorer: A Lifelong Reinforcement Learning Assessment Environment | Despite groundbreaking progress in reinforcement learning for robotics, gameplay, and other complex domains, major challenges remain in applying reinforcement learning to the evolving, open-world problems often found in critical application spaces. Reinforcement learning solutions tend to generalize poorly when exposed... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 285,429 |
1909.13168 | Optimizing Design Verification using Machine Learning: Doing better than
Random | As integrated circuits have become progressively more complex, constrained random stimulus has become ubiquitous as a means of stimulating a designs functionality and ensuring it fully meets expectations. In theory, random stimulus allows all possible combinations to be exercised given enough time, but in practice with... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 147,351 |
2303.17564 | BloombergGPT: A Large Language Model for Finance | The use of NLP in the realm of financial technology is broad and complex, with applications ranging from sentiment analysis and named entity recognition to question answering. Large Language Models (LLMs) have been shown to be effective on a variety of tasks; however, no LLM specialized for the financial domain has bee... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 355,250 |
2303.12785 | Matryoshka Policy Gradient for Entropy-Regularized RL: Convergence and
Global Optimality | A novel Policy Gradient (PG) algorithm, called $\textit{Matryoshka Policy Gradient}$ (MPG), is introduced and studied, in the context of fixed-horizon max-entropy reinforcement learning, where an agent aims at maximizing entropy bonuses additional to its cumulative rewards. In the linear function approximation setting ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 353,398 |
2006.12376 | A Convergent and Dimension-Independent Min-Max Optimization Algorithm | We study a variant of a recently introduced min-max optimization framework where the max-player is constrained to update its parameters in a greedy manner until it reaches a first-order stationary point. Our equilibrium definition for this framework depends on a proposal distribution which the min-player uses to choose... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 183,563 |
2009.11936 | Observer-based Event-triggered Boundary Control of a Class of
Reaction-Diffusion PDEs | This paper presents an observer-based event-triggered boundary control strategy for a class of reaction-diffusion PDEs with Robin actuation. The observer only requires boundary measurements. The control approach consists of a backstepping output feedback boundary controller, derived using estimated states, and a dynami... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 197,282 |
2004.03373 | Improving BPSO-based feature selection applied to offline WI handwritten
signature verification through overfitting control | This paper investigates the presence of overfitting when using Binary Particle Swarm Optimization (BPSO) to perform the feature selection in a context of Handwritten Signature Verification (HSV). SigNet is a state of the art Deep CNN model for feature representation in the HSV context and contains 2048 dimensions. Some... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 171,537 |
1810.03654 | Joint Unsupervised Learning of Optical Flow and Depth by Watching Stereo
Videos | Learning depth and optical flow via deep neural networks by watching videos has made significant progress recently. In this paper, we jointly solve the two tasks by exploiting the underlying geometric rules within stereo videos. Specifically, given two consecutive stereo image pairs from a video, we first estimate dept... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 109,854 |
2310.14868 | Assessing Step-by-Step Reasoning against Lexical Negation: A Case Study
on Syllogism | Large language models (LLMs) take advantage of step-by-step reasoning instructions, e.g., chain-of-thought (CoT) prompting. Building on this, their ability to perform CoT-style reasoning robustly is of interest from a probing perspective. In this study, we inspect the step-by-step reasoning ability of LLMs with a focus... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 402,057 |
2107.02704 | Unsupervised learning of MRI tissue properties using MRI physics models | In neuroimaging, MRI tissue properties characterize underlying neurobiology, provide quantitative biomarkers for neurological disease detection and analysis, and can be used to synthesize arbitrary MRI contrasts. Estimating tissue properties from a single scan session using a protocol available on all clinical scanners... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 244,909 |
1507.06737 | The Degrees of Freedom of the Interference Channel with a Cognitive
Relay under Delayed Feedback | This paper studies the interference channel with a cognitive relay (ICCR) under delayed feedback. Three types of delayed feedback are studied: delayed channel state information at the transmitter (CSIT), delayed output feedback, and delayed Shannon feedback. Outer bounds are derived for the DoF region of the two-user m... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 45,410 |
2409.14744 | LINKAGE: Listwise Ranking among Varied-Quality References for
Non-Factoid QA Evaluation via LLMs | Non-Factoid (NF) Question Answering (QA) is challenging to evaluate due to diverse potential answers and no objective criterion. The commonly used automatic evaluation metrics like ROUGE or BERTScore cannot accurately measure semantic similarities or answers from different perspectives. Recently, Large Language Models ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 490,612 |
1406.4928 | Diversity Multiplexing Tradeoff of the Half-duplex Slow Fading Multiple
Access Channel based on Generalized Quantize-and-Forward Scheme | This paper investigates the Diversity Multiplexing Tradeoff (DMT) of the generalized quantize-and-forward (GQF) relaying scheme over the slow fading half-duplex multiple-access relay channel (HD-MARC). The compress-and-forward (CF) scheme has been shown to achieve the optimal DMT when the channel state information (CSI... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 33,987 |
2308.10334 | Coordinate Transformer: Achieving Single-stage Multi-person Mesh
Recovery from Videos | Multi-person 3D mesh recovery from videos is a critical first step towards automatic perception of group behavior in virtual reality, physical therapy and beyond. However, existing approaches rely on multi-stage paradigms, where the person detection and tracking stages are performed in a multi-person setting, while tem... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 386,683 |
2301.05664 | Risk Sensitive Dead-end Identification in Safety-Critical Offline
Reinforcement Learning | In safety-critical decision-making scenarios being able to identify worst-case outcomes, or dead-ends is crucial in order to develop safe and reliable policies in practice. These situations are typically rife with uncertainty due to unknown or stochastic characteristics of the environment as well as limited offline tra... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 340,417 |
2005.02811 | Hierarchical Bayesian Approach for Improving Weights for Solving
Multi-Objective Route Optimization Problem | The weighted sum method is a simple and widely used technique that scalarizes multiple conflicting objectives into a single objective function. It suffers from the problem of determining the appropriate weights corresponding to the objectives. This paper proposes a novel Hierarchical Bayesian model based on Multinomial... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | false | false | 175,979 |
1710.02380 | Active Attack on User Load Achieving Pilot Design in Massive MIMO
Networks | In this paper, we propose an active attacking strategy on a massive multiple-input multiple-output (MIMO) network, where the pilot sequences are obtained using the user load-achieving pilot sequence design. The user load-achieving design ensures that the signal-to-interference-plus-noise ratio (SINR) requirements of al... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 82,166 |
2406.00011 | DisCo: Towards Harmonious Disentanglement and Collaboration between
Tabular and Semantic Space for Recommendation | Recommender systems play important roles in various applications such as e-commerce, social media, etc. Conventional recommendation methods usually model the collaborative signals within the tabular representation space. Despite the personalization modeling and the efficiency, the latent semantic dependencies are omitt... | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | false | 459,649 |
2204.10846 | Self-Supervised Video Object Segmentation via Cutout Prediction and
Tagging | We propose a novel self-supervised Video Object Segmentation (VOS) approach that strives to achieve better object-background discriminability for accurate object segmentation. Distinct from previous self-supervised VOS methods, our approach is based on a discriminative learning loss formulation that takes into account ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 292,937 |
2305.07678 | Exploring the Rate-Distortion-Complexity Optimization in Neural Image
Compression | Despite a short history, neural image codecs have been shown to surpass classical image codecs in terms of rate-distortion performance. However, most of them suffer from significantly longer decoding times, which hinders the practical applications of neural image codecs. This issue is especially pronounced when employi... | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | 363,989 |
2201.09651 | Artefact Retrieval: Overview of NLP Models with Knowledge Base Access | Many NLP models gain performance by having access to a knowledge base. A lot of research has been devoted to devising and improving the way the knowledge base is accessed and incorporated into the model, resulting in a number of mechanisms and pipelines. Despite the diversity of proposed mechanisms, there are patterns ... | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | 276,742 |
1704.04100 | Cross-lingual and cross-domain discourse segmentation of entire
documents | Discourse segmentation is a crucial step in building end-to-end discourse parsers. However, discourse segmenters only exist for a few languages and domains. Typically they only detect intra-sentential segment boundaries, assuming gold standard sentence and token segmentation, and relying on high-quality syntactic parse... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 71,749 |
1910.05312 | Map Matching Algorithm for Large-scale Datasets | GPS receivers embedded in cell phones and connected vehicles generate a series of location measurements that can be used for various analytical purposes. A common pre-processing step of this data is the so-called map matching. The goal of map matching is to infer the trajectory that the device followed in a road networ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 149,022 |
2009.07724 | SelfAugment: Automatic Augmentation Policies for Self-Supervised
Learning | A common practice in unsupervised representation learning is to use labeled data to evaluate the quality of the learned representations. This supervised evaluation is then used to guide critical aspects of the training process such as selecting the data augmentation policy. However, guiding an unsupervised training pro... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 196,027 |
2207.01920 | Social Sensing and Human in the Loop Profiling during Pandemics: the
Vitoria application | As the number of smart devices that surround us increases, so do the opportunities to leverage them to create socially- and context-aware systems. Smart devices can be used for better understanding human behaviour and its societal implications. As an example of a scenario in which the role of socially aware systems is ... | true | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 306,346 |
2302.14490 | Estimating Head Motion from MR-Images | Head motion is an omnipresent confounder of magnetic resonance image (MRI) analyses as it systematically affects morphometric measurements, even when visual quality control is performed. In order to estimate subtle head motion, that remains undetected by experts, we introduce a deep learning method to predict in-scanne... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 348,323 |
2008.02481 | Machine Learning Based Framework for Estimation of Data Center Power
Using Acoustic Side Channel | Data centers are high power consumers and the energy consumption of data centers keeps on rising in spite of all the efforts for increasing the energy efficiency. The need for energy-awareness in data centers makes the use of power modeling and estimation to be still a big challenge due to huge amount of uncertainty in... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 190,630 |
1109.5894 | Learning Item Trees for Probabilistic Modelling of Implicit Feedback | User preferences for items can be inferred from either explicit feedback, such as item ratings, or implicit feedback, such as rental histories. Research in collaborative filtering has concentrated on explicit feedback, resulting in the development of accurate and scalable models. However, since explicit feedback is oft... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 12,353 |
1206.6859 | Propagation of Delays in the National Airspace System | The National Airspace System (NAS) is a large and complex system with thousands of interrelated components: administration, control centers, airports, airlines, aircraft, passengers, etc. The complexity of the NAS creates many difficulties in management and control. One of the most pressing problems is flight delay. De... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 17,083 |
2002.09820 | Deep Reinforcement Learning with Linear Quadratic Regulator Regions | Practitioners often rely on compute-intensive domain randomization to ensure reinforcement learning policies trained in simulation can robustly transfer to the real world. Due to unmodeled nonlinearities in the real system, however, even such simulated policies can still fail to perform stably enough to acquire experie... | false | false | false | false | true | false | true | true | false | false | true | false | false | false | false | false | false | false | 165,194 |
1806.02389 | Not All Attributes are Created Equal: $d_{\mathcal{X}}$-Private
Mechanisms for Linear Queries | Differential privacy provides strong privacy guarantees simultaneously enabling useful insights from sensitive datasets. However, it provides the same level of protection for all elements (individuals and attributes) in the data. There are practical scenarios where some data attributes need more/less protection than ot... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 99,768 |
1212.5765 | Stochastic Subspace Identification: Valid Model, Asymptotics and Model
Error Bounds | This paper investigates the ability of the stochastic subspace identification technique to return a valid model from finite measurement data, its asymptotic properties as the data set becomes large, and asymptotic error bounds of the identified model (in terms of $\mathcal{H}_2$ and $\mathcal{H}_{\infty}$ norms). First... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 20,586 |
2404.15840 | Constructive Interpolation and Concept-Based Beth Definability for
Description Logics via Sequents | We introduce a constructive method applicable to a large number of description logics (DLs) for establishing the concept-based Beth definability property (CBP) based on sequent systems. Using the highly expressive DL RIQ as a case study, we introduce novel sequent calculi for RIQ-ontologies and show how certain interpo... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | true | true | 449,262 |
2409.13291 | Localized Gaussians as Self-Attention Weights for Point Clouds
Correspondence | Current data-driven methodologies for point cloud matching demand extensive training time and computational resources, presenting significant challenges for model deployment and application. In the point cloud matching task, recent advancements with an encoder-only Transformer architecture have revealed the emergence o... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | true | 489,931 |
2001.11402 | Graph Convolution Machine for Context-aware Recommender System | The latest advance in recommendation shows that better user and item representations can be learned via performing graph convolutions on the user-item interaction graph. However, such finding is mostly restricted to the collaborative filtering (CF) scenario, where the interaction contexts are not available. In this wor... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 162,065 |
2205.09674 | Disentangling Active and Passive Cosponsorship in the U.S. Congress | In the U.S. Congress, legislators can use active and passive cosponsorship to support bills. We show that these two types of cosponsorship are driven by two different motivations: the backing of political colleagues and the backing of the bill's content. To this end, we develop an Encoder+RGCN based model that learns l... | false | false | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | 297,371 |
2404.15660 | KS-LLM: Knowledge Selection of Large Language Models with Evidence
Document for Question Answering | Large language models (LLMs) suffer from the hallucination problem and face significant challenges when applied to knowledge-intensive tasks. A promising approach is to leverage evidence documents as extra supporting knowledge, which can be obtained through retrieval or generation. However, existing methods directly le... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 449,184 |
2009.05214 | Adversarial Learning for Zero-shot Domain Adaptation | Zero-shot domain adaptation (ZSDA) is a category of domain adaptation problems where neither data sample nor label is available for parameter learning in the target domain. With the hypothesis that the shift between a given pair of domains is shared across tasks, we propose a new method for ZSDA by transferring domain ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 195,257 |
2206.02422 | Ego Network Structure in Online Social Networks and its Impact on
Information Diffusion | In the last few years, Online Social Networks (OSNs) attracted the interest of a large number of researchers, thanks to their central role in the society. Through the analysis of OSNs, many social phenomena have been studied, such as the viral diffusion of information amongst people. What is still unclear is the relati... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 300,890 |
1603.06910 | Degrees of Freedom of the Two-User MIMO Broadcast Channel with Private
and Common Messages Under Hybrid CSIT Models | We study the degrees of freedom (DoF) regions of the two-user multiple-input multiple-output (MIMO) broadcast channel with a general message set (BC-CM) - that includes private and common messages - under fast fading. Nine different channel state knowledge assumptions -collectively known as hybrid CSIT models - are con... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 53,564 |
1907.12399 | Lotka-Volterra competition mechanism embedded in a decision-making
method | Decision making is a fundamental capability of living organisms, and has recently been gaining increasing importance in many engineering applications. Here, we consider a simple decision-making principle to identify an optimal choice in multi-armed bandit (MAB) problems, which is fundamental in the context of reinforce... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 140,114 |
2410.12011 | Pixology: Probing the Linguistic and Visual Capabilities of Pixel-based
Language Models | Pixel-based language models have emerged as a compelling alternative to subword-based language modelling, particularly because they can represent virtually any script. PIXEL, a canonical example of such a model, is a vision transformer that has been pre-trained on rendered text. While PIXEL has shown promising cross-sc... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 498,810 |
1503.00164 | Analysis of Crowdsourced Sampling Strategies for HodgeRank with Sparse
Random Graphs | Crowdsourcing platforms are now extensively used for conducting subjective pairwise comparison studies. In this setting, a pairwise comparison dataset is typically gathered via random sampling, either \emph{with} or \emph{without} replacement. In this paper, we use tools from random graph theory to analyze these two ra... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 40,670 |
2107.12342 | Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations
in Privacy-Preserving Deep Learning | Privacy concerns in client-server machine learning have given rise to private inference (PI), where neural inference occurs directly on encrypted inputs. PI protects clients' personal data and the server's intellectual property. A common practice in PI is to use garbled circuits to compute nonlinear functions privately... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 247,868 |
2409.17502 | Broadcast Product: Shape-aligned Element-wise Multiplication and Beyond | We propose a new operator defined between two tensors, the broadcast product. The broadcast product calculates the Hadamard product after duplicating elements to align the shapes of the two tensors. Complex tensor operations in libraries like \texttt{numpy} can be succinctly represented as mathematical expressions usin... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 491,833 |
2208.12392 | DiVa: An Accelerator for Differentially Private Machine Learning | The widespread deployment of machine learning (ML) is raising serious concerns on protecting the privacy of users who contributed to the collection of training data. Differential privacy (DP) is rapidly gaining momentum in the industry as a practical standard for privacy protection. Despite DP's importance, however, li... | false | false | false | false | true | false | true | false | false | false | false | false | true | false | false | false | false | true | 314,708 |
1603.00400 | A Fast Randomized Algorithm for Multi-Objective Query Optimization | Query plans are compared according to multiple cost metrics in multi-objective query optimization. The goal is to find the set of Pareto plans realizing optimal cost tradeoffs for a given query. So far, only algorithms with exponential complexity in the number of query tables have been proposed for multi-objective quer... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 52,770 |
1912.12747 | Worst-Case Optimal Radix Triejoin | Relatively recently, the field of join processing has been swayed by the discovery of a new class of multi-way join algorithms. The new algorithms join multiple relations simultaneously rather than perform a series of pairwise joins. The new join algorithms satisfy stronger worst-case runtime complexity guarantees than... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | true | 158,921 |
cs/0701006 | The Trapping Redundancy of Linear Block Codes | We generalize the notion of the stopping redundancy in order to study the smallest size of a trapping set in Tanner graphs of linear block codes. In this context, we introduce the notion of the trapping redundancy of a code, which quantifies the relationship between the number of redundant rows in any parity-check matr... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 540,005 |
2212.11792 | CatlNet: Learning Communication and Coordination Policies from CaTL+
Specifications | In this paper, we propose a learning-based framework to simultaneously learn the communication and distributed control policies for a heterogeneous multi-agent system (MAS) under complex mission requirements from Capability Temporal Logic plus (CaTL+) specifications. Both policies are trained, implemented, and deployed... | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | 337,891 |
1910.07563 | Explainable AI for Intelligence Augmentation in Multi-Domain Operations | Central to the concept of multi-domain operations (MDO) is the utilization of an intelligence, surveillance, and reconnaissance (ISR) network consisting of overlapping systems of remote and autonomous sensors, and human intelligence, distributed among multiple partners. Realising this concept requires advancement in bo... | true | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | false | false | 149,648 |
1008.2750 | On BICM receivers for TCM transmission | Recent results have shown that the performance of bit-interleaved coded modulation (BICM) using convolutional codes in nonfading channels can be significantly improved when the interleaver takes a trivial form (BICM-T), i.e., when it does not interleave the bits at all. In this paper, we give a formal explanation for t... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 7,289 |
2112.03159 | UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks | UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 270,103 |
2403.15839 | TablePuppet: A Generic Framework for Relational Federated Learning | Current federated learning (FL) approaches view decentralized training data as a single table, divided among participants either horizontally (by rows) or vertically (by columns). However, these approaches are inadequate for handling distributed relational tables across databases. This scenario requires intricate SQL o... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | true | 440,770 |
0906.2511 | Robust Rate-Adaptive Wireless Communication Using ACK/NAK-Feedback | To combat the detrimental effects of the variability in wireless channels, we consider cross-layer rate adaptation based on limited feedback. In particular, based on limited feedback in the form of link-layer acknowledgements (ACK) and negative acknowledgements (NAK), we maximize the physical-layer transmission rate su... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 3,875 |
2412.17957 | ArchComplete: Autoregressive 3D Architectural Design Generation with
Hierarchical Diffusion-Based Upsampling | Recent advances in 3D generative models have shown promising results but often fall short in capturing the complexity of architectural geometries and topologies and fine geometric details at high resolutions. To tackle this, we present ArchComplete, a two-stage voxel-based 3D generative pipeline consisting of a vector-... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | true | 520,185 |
1806.00775 | Exploration in Structured Reinforcement Learning | We address reinforcement learning problems with finite state and action spaces where the underlying MDP has some known structure that could be potentially exploited to minimize the exploration rates of suboptimal (state, action) pairs. For any arbitrary structure, we derive problem-specific regret lower bounds satisfie... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 99,392 |
2304.11961 | Towards Mode Balancing of Generative Models via Diversity Weights | Large data-driven image models are extensively used to support creative and artistic work. Under the currently predominant distribution-fitting paradigm, a dataset is treated as ground truth to be approximated as closely as possible. Yet, many creative applications demand a diverse range of output, and creators often s... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 360,037 |
2410.11179 | Interpretability as Compression: Reconsidering SAE Explanations of
Neural Activations with MDL-SAEs | Sparse Autoencoders (SAEs) have emerged as a useful tool for interpreting the internal representations of neural networks. However, naively optimising SAEs for reconstruction loss and sparsity results in a preference for SAEs that are extremely wide and sparse. We present an information-theoretic framework for interpre... | false | false | false | false | true | false | true | false | false | true | false | false | false | false | false | false | false | false | 498,421 |
2303.15349 | Information Maximizing Curriculum: A Curriculum-Based Approach for
Imitating Diverse Skills | Imitation learning uses data for training policies to solve complex tasks. However, when the training data is collected from human demonstrators, it often leads to multimodal distributions because of the variability in human actions. Most imitation learning methods rely on a maximum likelihood (ML) objective to learn a... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 354,456 |
1607.00421 | From Migration Corridors to Clusters: The Value of Google+ Data for
Migration Studies | Recently, there have been considerable efforts to use online data to investigate international migration. These efforts show that Web data are valuable for estimating migration rates and are relatively easy to obtain. However, existing studies have only investigated flows of people along migration corridors, i.e. betwe... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 58,069 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.