id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2306.16207 | Inferring the Goals of Communicating Agents from Actions and
Instructions | When humans cooperate, they frequently coordinate their activity through both verbal communication and non-verbal actions, using this information to infer a shared goal and plan. How can we model this inferential ability? In this paper, we introduce a model of a cooperative team where one agent, the principal, may comm... | false | false | false | false | true | false | false | true | true | false | false | false | false | false | false | false | false | false | 376,314 |
1904.03848 | Unsupervised Deep Epipolar Flow for Stationary or Dynamic Scenes | Unsupervised deep learning for optical flow computation has achieved promising results. Most existing deep-net based methods rely on image brightness consistency and local smoothness constraint to train the networks. Their performance degrades at regions where repetitive textures or occlusions occur. In this paper, we ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 126,859 |
2102.02852 | Eliciting judgements about dependent quantities of interest: The SHELF
extension and copula methods illustrated using an asthma case study | Pharmaceutical companies regularly need to make decisions about drug development programs based on the limited knowledge from early stage clinical trials. In this situation, eliciting the judgements of experts is an attractive approach for synthesising evidence on the unknown quantities of interest. When calculating th... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 218,539 |
1804.03269 | Characterising information-theoretic storage and transfer in continuous
time processes | The characterisation of information processing is an important task in complex systems science. Information dynamics is a quantitative methodology for modelling the intrinsic information processing conducted by a process represented as a time series, but to date has only been formulated in discrete time. Building on pr... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 94,584 |
1706.00457 | NMTPY: A Flexible Toolkit for Advanced Neural Machine Translation
Systems | In this paper, we present nmtpy, a flexible Python toolkit based on Theano for training Neural Machine Translation and other neural sequence-to-sequence architectures. nmtpy decouples the specification of a network from the training and inference utilities to simplify the addition of a new architecture and reduce the a... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 74,620 |
2411.08534 | Neural Topic Modeling with Large Language Models in the Loop | Topic modeling is a fundamental task in natural language processing, allowing the discovery of latent thematic structures in text corpora. While Large Language Models (LLMs) have demonstrated promising capabilities in topic discovery, their direct application to topic modeling suffers from issues such as incomplete top... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 507,923 |
1904.12400 | Attentive Adversarial Learning for Domain-Invariant Training | Adversarial domain-invariant training (ADIT) proves to be effective in suppressing the effects of domain variability in acoustic modeling and has led to improved performance in automatic speech recognition (ASR). In ADIT, an auxiliary domain classifier takes in equally-weighted deep features from a deep neural network ... | false | false | true | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 129,106 |
2408.00905 | High-Impact Innovations and Hidden Gender Disparities in
Inventor-Evaluator Networks | We study of millions of scientific, technological, and artistic innovations and find that the innovation gap faced by women is far from universal. No gap exists for conventional innovations. Rather, the gap is pervasively rooted in innovations that combine ideas in unexpected ways - innovations most critical to scienti... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | true | 478,020 |
2405.09552 | ODFormer: Semantic Fundus Image Segmentation Using Transformer for Optic
Nerve Head Detection | Optic nerve head (ONH) detection has been a crucial area of study in ophthalmology for years. However, the significant discrepancy between fundus image datasets, each generated using a single type of fundus camera, poses challenges to the generalizability of ONH detection approaches developed based on semantic segmenta... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 454,443 |
2007.04477 | Good AI for the Present of Humanity Democratizing AI Governance | What do Cyberpunk and AI Ethics have to do with each other? Cyberpunk is a sub-genre of science fiction that explores the post-human relationships between human experience and technology. One similarity between AI Ethics and Cyberpunk literature is that both seek to explore future social and ethical problems that our t... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 186,364 |
2108.11346 | Auxiliary Task Update Decomposition: The Good, The Bad and The Neutral | While deep learning has been very beneficial in data-rich settings, tasks with smaller training set often resort to pre-training or multitask learning to leverage data from other tasks. In this case, careful consideration is needed to select tasks and model parameterizations such that updates from the auxiliary tasks a... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 252,160 |
2105.05332 | The DEVIL is in the Details: A Diagnostic Evaluation Benchmark for Video
Inpainting | Quantitative evaluation has increased dramatically among recent video inpainting work, but the video and mask content used to gauge performance has received relatively little attention. Although attributes such as camera and background scene motion inherently change the difficulty of the task and affect methods differe... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 234,781 |
1711.09251 | When Do Users Change Their Profile Information on Twitter? | We can see profile information such as name, description and location in order to know the user on social media. However, this profile information is not always fixed. If there is a change in the user's life, the profile information will be changed. In this study, we focus on user's profile information changes and anal... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 85,363 |
2203.09848 | Gender classification by means of online uppercase handwriting: A
text-dependent allographic approach | This paper presents a gender classification schema based on online handwriting. Using samples acquired with a digital tablet that captures the dynamics of the writing, it classifies the writer as a male or a female. The method proposed is allographic, regarding strokes as the structural units of handwriting. Strokes pe... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 286,312 |
2308.04169 | Dual input neural networks for positional sound source localization | In many signal processing applications, metadata may be advantageously used in conjunction with a high dimensional signal to produce a desired output. In the case of classical Sound Source Localization (SSL) algorithms, information from a high dimensional, multichannel audio signals received by many distributed microph... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 384,314 |
2409.11450 | High performance Lunar landing simulations | Autonomous precision navigation to land onto the Moon relies on vision sensors. Computer vision algorithms are designed, trained and tested using synthetic simulations. High quality terrain models have been produced by Moon orbiters developed by several nations, with resolutions ranging from tens or hundreds of meters ... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | 489,166 |
2407.10026 | Conditional Entropies of k-Deletion/Insertion Channels | The channel output entropy of a transmitted sequence is the entropy of the possible channel outputs and similarly the channel input entropy of a received sequence is the entropy of all possible transmitted sequences. The goal of this work is to study these entropy values for the k-deletion, k-insertion channels, where ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 472,810 |
2010.01236 | Placement of UAV-Mounted Mobile Base Station through User Load-Feature
K-means Clustering | Temporary high traffic requests in cellular networks is a challenging problem to address. Recent advances in Unmanned Aerial Vehicles applied to cover these types of traffics. UAV -Mounted Mobile Base Stations placement is a challenging problem to achieve high performance. Different approaches have been proposed; howev... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 198,570 |
2101.02270 | Fast Parallel Newton-Raphson Power Flow Solver for Large Number of
System Calculations with CPU and GPU | To analyze large sets of grid states, e.g. when evaluating the impact from the uncertainties of the renewable generation with probabilistic Monte Carlo simulation or in stationary time series simulation, large number of power flow calculations have to be performed. For the application in real-time grid operation, grid ... | false | true | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 214,566 |
2311.13454 | Explaining high-dimensional text classifiers | Explainability has become a valuable tool in the last few years, helping humans better understand AI-guided decisions. However, the classic explainability tools are sometimes quite limited when considering high-dimensional inputs and neural network classifiers. We present a new explainability method using theoretically... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | true | false | false | 409,742 |
2410.06412 | Stochastic Sparse Sampling: A Framework for Variable-Length Medical Time
Series Classification | While the majority of time series classification research has focused on modeling fixed-length sequences, variable-length time series classification (VTSC) remains critical in healthcare, where sequence length may vary among patients and events. To address this challenge, we propose $\textbf{S}$tochastic $\textbf{S}$pa... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 496,189 |
2102.04926 | Reduction of the Beam Pointing Error for Improved Free-Space Optical
Communication Link Performance | Free-space optical communication is emerging as a low-power, low-cost, and high data rate alternative to radio-frequency communication in short-to medium-range applications. However, it requires a close-to-line-of-sight link between the transmitter and the receiver. This paper proposes a robust $\cHi$ control law for f... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 219,269 |
2004.13903 | An Auto-Encoder Strategy for Adaptive Image Segmentation | Deep neural networks are powerful tools for biomedical image segmentation. These models are often trained with heavy supervision, relying on pairs of images and corresponding voxel-level labels. However, obtaining segmentations of anatomical regions on a large number of cases can be prohibitively expensive. Thus there ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 174,709 |
1711.02271 | High-order Tensor Completion for Data Recovery via Sparse Tensor-train
Optimization | In this paper, we aim at the problem of tensor data completion. Tensor-train decomposition is adopted because of its powerful representation ability and linear scalability to tensor order. We propose an algorithm named Sparse Tensor-train Optimization (STTO) which considers incomplete data as sparse tensor and uses fir... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 84,032 |
2305.03960 | Beyond Rule-based Named Entity Recognition and Relation Extraction for
Process Model Generation from Natural Language Text | Process-aware information systems offer extensive advantages to companies, facilitating planning, operations, and optimization of day-to-day business activities. However, the time-consuming but required step of designing formal business process models often hampers the potential of these systems. To overcome this chall... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 362,580 |
2111.01395 | Training Certifiably Robust Neural Networks with Efficient Local
Lipschitz Bounds | Certified robustness is a desirable property for deep neural networks in safety-critical applications, and popular training algorithms can certify robustness of a neural network by computing a global bound on its Lipschitz constant. However, such a bound is often loose: it tends to over-regularize the neural network an... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 264,545 |
1702.06103 | An Improved Parametrization and Analysis of the EXP3++ Algorithm for
Stochastic and Adversarial Bandits | We present a new strategy for gap estimation in randomized algorithms for multiarmed bandits and combine it with the EXP3++ algorithm of Seldin and Slivkins (2014). In the stochastic regime the strategy reduces dependence of regret on a time horizon from $(\ln t)^3$ to $(\ln t)^2$ and eliminates an additive factor of o... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 68,530 |
2307.13782 | A Data-Driven Approach to Synthesizing Dynamics-Aware Trajectories for
Underactuated Robotic Systems | We consider joint trajectory generation and tracking control for under-actuated robotic systems. A common solution is to use a layered control architecture, where the top layer uses a simplified model of system dynamics for trajectory generation, and the low layer ensures approximate tracking of this trajectory via fee... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 381,700 |
2407.00918 | Robust and Reliable Early-Stage Website Fingerprinting Attacks via
Spatial-Temporal Distribution Analysis | Website Fingerprinting (WF) attacks identify the websites visited by users by performing traffic analysis, compromising user privacy. Particularly, DL-based WF attacks demonstrate impressive attack performance. However, the effectiveness of DL-based WF attacks relies on the collected complete and pure traffic during th... | false | false | false | false | true | false | true | false | false | false | false | false | true | false | false | false | false | false | 469,059 |
1903.03319 | One-Bit Sigma-Delta MIMO Precoding | Coarsely quantized MIMO signalling methods have gained popularity in the recent developments of massive MIMO as they open up opportunities for massive MIMO implementation using cheap and power-efficient radio-frequency front-ends. This paper presents a new one-bit MIMO precoding approach using spatial Sigma-Delta ($\Si... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 123,707 |
2106.00328 | Optimizing travel routes using temporal networks constructed from GPS
data | Because of the complexity of urban transportation networks and the temporal changes in traffic conditions, it is difficult to assess real-time traffic situations. However, the development of information terminals has made it easier to obtain personal mobility information. In this study, we propose methods for evaluatin... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 238,085 |
2305.02577 | Text Reading Order in Uncontrolled Conditions by Sparse Graph
Segmentation | Text reading order is a crucial aspect in the output of an OCR engine, with a large impact on downstream tasks. Its difficulty lies in the large variation of domain specific layout structures, and is further exacerbated by real-world image degradations such as perspective distortions. We propose a lightweight, scalable... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 362,095 |
2403.13812 | Quantitative Analysis of AI-Generated Texts in Academic Research: A
Study of AI Presence in Arxiv Submissions using AI Detection Tool | Many people are interested in ChatGPT since it has become a prominent AIGC model that provides high-quality responses in various contexts, such as software development and maintenance. Misuse of ChatGPT might cause significant issues, particularly in public safety and education, despite its immense potential. The major... | false | false | false | false | true | false | true | false | true | false | false | false | false | true | false | false | false | true | 439,793 |
1811.08996 | HyperAdam: A Learnable Task-Adaptive Adam for Network Training | Deep neural networks are traditionally trained using human-designed stochastic optimization algorithms, such as SGD and Adam. Recently, the approach of learning to optimize network parameters has emerged as a promising research topic. However, these learned black-box optimizers sometimes do not fully utilize the experi... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 114,167 |
1807.06976 | The Generalized Lasso for Sub-gaussian Measurements with Dithered
Quantization | In the problem of structured signal recovery from high-dimensional linear observations, it is commonly assumed that full-precision measurements are available. Under this assumption, the recovery performance of the popular Generalized Lasso (G-Lasso) is by now well-established. In this paper, we extend these types of re... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 103,238 |
2405.06355 | Switched Vector Field-based Guidance for General Reference Path
Following in Planar Environment | Reference path following is a key component in the functioning of almost all engineered autonomous agents. Among several path following guidance methods in existing literature, vector-field-based guidance approach has got wide attention because of its simplicity and guarantee of stability under a broad class of scenari... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 453,270 |
2205.06376 | KASAM: Spline Additive Models for Function Approximation | Neural networks have been criticised for their inability to perform continual learning due to catastrophic forgetting and rapid unlearning of a past concept when a new concept is introduced. Catastrophic forgetting can be alleviated by specifically designed models and training techniques. This paper outlines a novel Sp... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 296,217 |
2405.08754 | Hierarchical Resource Partitioning on Modern GPUs: A Reinforcement
Learning Approach | GPU-based heterogeneous architectures are now commonly used in HPC clusters. Due to their architectural simplicity specialized for data-level parallelism, GPUs can offer much higher computational throughput and memory bandwidth than CPUs in the same generation do. However, as the available resources in GPUs have increa... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 454,204 |
1509.00967 | A Reconfigurable Mixed-signal Implementation of a Neuromorphic ADC | We present a neuromorphic Analogue-to-Digital Converter (ADC), which uses integrate-and-fire (I&F) neurons as the encoders of the analogue signal, with modulated inhibitions to decohere the neuronal spikes trains. The architecture consists of an analogue chip and a control module. The analogue chip comprises two scan c... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 46,549 |
2209.15532 | Joint Scheduling and Resource Allocation for Packets with Deadlines and
Priorities | Cellular networks provide communication for different applications. Some applications have strict and very short latency requirements, while others require high bandwidth with varying priorities. The challenge of satisfying the requirements grows in congested traffic where some packets might miss their deadlines. Unfor... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | true | 320,641 |
1403.4789 | Structure-preserving model reduction of physical network systems by
clustering | In this paper, we establish a method for model order reduction of a certain class of physical network systems. The proposed method is based on clustering of the vertices of the underlying graph, and yields a reduced order model within the same class. To capture the physical properties of the network, we allow for weigh... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 31,679 |
2408.06025 | A novel metric for detecting quadrotor loss-of-control | Unmanned aerial vehicles (UAVs) are becoming an integral part of both industry and society. In particular, the quadrotor is now invaluable across a plethora of fields and recent developments, such as the inclusion of aerial manipulators, only extends their versatility. As UAVs become more widespread, preventing loss-of... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 480,050 |
2304.13169 | SAFE: Machine Unlearning With Shard Graphs | We present Synergy Aware Forgetting Ensemble (SAFE), a method to adapt large models on a diverse collection of data while minimizing the expected cost to remove the influence of training samples from the trained model. This process, also known as selective forgetting or unlearning, is often conducted by partitioning a ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 360,487 |
2408.07941 | Robust Offline Active Learning on Graphs | We consider the problem of active learning on graphs, which has crucial applications in many real-world networks where labeling node responses is expensive. In this paper, we propose an offline active learning method that selects nodes to query by explicitly incorporating information from both the network structure and... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 480,787 |
2207.00688 | Building African Voices | Modern speech synthesis techniques can produce natural-sounding speech given sufficient high-quality data and compute resources. However, such data is not readily available for many languages. This paper focuses on speech synthesis for low-resourced African languages, from corpus creation to sharing and deploying the T... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 305,844 |
2004.02352 | Deep Reinforcement Learning-Aided Random Access | We consider a system model comprised of an access point (AP) and K Internet of Things (IoT) nodes that sporadically become active in order to send data to the AP. The AP is assumed to have N time-frequency resource blocks that it can allocate to the IoT nodes that wish to send data, where N < K. The main problem is how... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 171,203 |
2004.03659 | The Russian Drug Reaction Corpus and Neural Models for Drug Reactions
and Effectiveness Detection in User Reviews | The Russian Drug Reaction Corpus (RuDReC) is a new partially annotated corpus of consumer reviews in Russian about pharmaceutical products for the detection of health-related named entities and the effectiveness of pharmaceutical products. The corpus itself consists of two parts, the raw one and the labelled one. The r... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 171,634 |
1911.02590 | Optimizing Millions of Hyperparameters by Implicit Differentiation | We propose an algorithm for inexpensive gradient-based hyperparameter optimization that combines the implicit function theorem (IFT) with efficient inverse Hessian approximations. We present results about the relationship between the IFT and differentiating through optimization, motivating our algorithm. We use the pro... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 152,396 |
1705.06264 | Deep Diagnostics: Applying Convolutional Neural Networks for Vessels
Defects Detection | Coronary angiography is considered to be a safe tool for the evaluation of coronary artery disease and perform in approximately 12 million patients each year worldwide. [1] In most cases, angiograms are manually analyzed by a cardiologist. Actually, there are no clinical practice algorithms which could improve and auto... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 73,611 |
2310.16658 | An Online Self-calibrating Refractive Camera Model with Application to
Underwater Odometry | This work presents a camera model for refractive media such as water and its application in underwater visual-inertial odometry. The model is self-calibrating in real-time and is free of known correspondences or calibration targets. It is separable as a distortion model (dependent on refractive index $n$ and radial pix... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 402,820 |
0711.3726 | Let's get the student into the driver's seat | Speaking a language and achieving proficiency in another one is a highly complex process which requires the acquisition of various kinds of knowledge and skills, like the learning of words, rules and patterns and their connection to communicative goals (intentions), the usual starting point. To help the learner to acqu... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 949 |
2403.20230 | An FPGA-Based Reconfigurable Accelerator for Convolution-Transformer
Hybrid EfficientViT | Vision Transformers (ViTs) have achieved significant success in computer vision. However, their intensive computations and massive memory footprint challenge ViTs' deployment on embedded devices, calling for efficient ViTs. Among them, EfficientViT, the state-of-the-art one, features a Convolution-Transformer hybrid ar... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 442,670 |
1603.05739 | A Readability Analysis of Campaign Speeches from the 2016 US
Presidential Campaign | Readability is defined as the reading level of the speech from grade 1 to grade 12. It results from the use of the REAP readability analysis (vocabulary - Collins-Thompson and Callan, 2004; syntax - Heilman et al ,2006, 2007), which use the lexical contents and grammatical structure of the sentences in a document to pr... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 53,393 |
2402.01989 | Optimal Planning of PV and Battery Resources in Remote Microgrids
Considering Degradation Costs: An Iterative Post-Optimization
Correction-based Approach | The benefits of shifting to renewable energy sources have granted microgrids considerable attention, especially photovoltaic (PV) systems. However, given the inherent variable and intermittent nature of solar power, battery energy storage systems (BESS) are pivotal for a reliable and cost-effective microgrid. The optim... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 426,319 |
1906.07004 | Improving Multi-turn Dialogue Modelling with Utterance ReWriter | Recent research has made impressive progress in single-turn dialogue modelling. In the multi-turn setting, however, current models are still far from satisfactory. One major challenge is the frequently occurred coreference and information omission in our daily conversation, making it hard for machines to understand the... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 135,487 |
2408.07433 | MagicFace: Training-free Universal-Style Human Image Customized
Synthesis | Current human image customization methods leverage Stable Diffusion (SD) for its rich semantic prior. However, since SD is not specifically designed for human-oriented generation, these methods often require extensive fine-tuning on large-scale datasets, which renders them susceptible to overfitting and hinders their a... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 480,580 |
1909.03868 | Partner Approximating Learners (PAL): Simulation-Accelerated Learning
with Explicit Partner Modeling in Multi-Agent Domains | Mixed cooperative-competitive control scenarios such as human-machine interaction with individual goals of the interacting partners are very challenging for reinforcement learning agents. In order to contribute towards intuitive human-machine collaboration, we focus on problems in the continuous state and control domai... | false | false | false | false | true | false | true | false | false | false | true | false | false | false | true | false | false | false | 144,627 |
cs/0007031 | Parameter-free Model of Rank Polysemantic Distribution | A model of rank polysemantic distribution with a minimal number of fitting parameters is offered. In an ideal case a parameter-free description of the dependence on the basis of one or several immediate features of the distribution is possible. | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 537,165 |
2305.12959 | Contrastive Predictive Autoencoders for Dynamic Point Cloud
Self-Supervised Learning | We present a new self-supervised paradigm on point cloud sequence understanding. Inspired by the discriminative and generative self-supervised methods, we design two tasks, namely point cloud sequence based Contrastive Prediction and Reconstruction (CPR), to collaboratively learn more comprehensive spatiotemporal repre... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 366,274 |
1011.0474 | Construction of New Delay-Tolerant Space-Time Codes | Perfect Space-Time Codes (STC) are optimal codes in their original construction for Multiple Input Multiple Output (MIMO) systems. Based on Cyclic Division Algebras (CDA), they are full-rate, full-diversity codes, have Non-Vanishing Determinants (NVD) and hence achieve Diversity-Multiplexing Tradeoff (DMT). In addition... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 8,103 |
2203.06442 | Equivariant Graph Mechanics Networks with Constraints | Learning to reason about relations and dynamics over multiple interacting objects is a challenging topic in machine learning. The challenges mainly stem from that the interacting systems are exponentially-compositional, symmetrical, and commonly geometrically-constrained. Current methods, particularly the ones based on... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 285,118 |
2010.12794 | X-Class: Text Classification with Extremely Weak Supervision | In this paper, we explore text classification with extremely weak supervision, i.e., only relying on the surface text of class names. This is a more challenging setting than the seed-driven weak supervision, which allows a few seed words per class. We opt to attack this problem from a representation learning perspectiv... | false | false | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | 202,856 |
1605.08374 | Kronecker Determinantal Point Processes | Determinantal Point Processes (DPPs) are probabilistic models over all subsets a ground set of $N$ items. They have recently gained prominence in several applications that rely on "diverse" subsets. However, their applicability to large problems is still limited due to the $\mathcal O(N^3)$ complexity of core tasks suc... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 56,425 |
2306.12456 | Pushing the Limits of Machine Design: Automated CPU Design with AI | Design activity -- constructing an artifact description satisfying given goals and constraints -- distinguishes humanity from other animals and traditional machines, and endowing machines with design abilities at the human level or beyond has been a long-term pursuit. Though machines have already demonstrated their abi... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 374,948 |
2407.17914 | Modelling Multimodal Integration in Human Concept Processing with
Vision-and-Language Models | Representations from deep neural networks (DNNs) have proven remarkably predictive of neural activity involved in both visual and linguistic processing. Despite these successes, most studies to date concern unimodal DNNs, encoding either visual or textual input but not both. Yet, there is growing evidence that human me... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 476,174 |
2105.10587 | Techniques Toward Optimizing Viewability in RTB Ad Campaigns Using
Reinforcement Learning | Reinforcement learning (RL) is an effective technique for training decision-making agents through interactions with their environment. The advent of deep learning has been associated with highly notable successes with sequential decision making problems - such as defeating some of the highest-ranked human players at Go... | false | false | false | false | true | true | true | false | false | false | false | false | false | false | false | false | false | false | 236,438 |
2105.00463 | Unsupervised Anomaly Detection in MR Images using Multi-Contrast
Information | Anomaly detection in medical imaging is to distinguish the relevant biomarkers of diseases from those of normal tissues. Deep supervised learning methods have shown potentials in various detection tasks, but its performances would be limited in medical imaging fields where collecting annotated anomaly data is limited a... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 233,231 |
2305.19409 | Examining risks of racial biases in NLP tools for child protective
services | Although much literature has established the presence of demographic bias in natural language processing (NLP) models, most work relies on curated bias metrics that may not be reflective of real-world applications. At the same time, practitioners are increasingly using algorithmic tools in high-stakes settings, with pa... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 369,511 |
2405.07376 | Advocating Feedback Control for Human-Earth System Applications | This paper proposes a feedback control perspective for Human-Earth Systems (HESs) which essentially are complex systems that capture the interactions between humans and nature. Recent attention in HES research has been directed towards devising strategies for climate change mitigation and adaptation, aimed at achieving... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 453,688 |
1907.01332 | Applying Transfer Learning To Deep Learned Models For EEG Analysis | The introduction of deep learning and transfer learning techniques in fields such as computer vision allowed a leap forward in the accuracy of image classification tasks. Currently there is only limited use of such techniques in neuroscience. The challenge of using deep learning methods to successfully train models in ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 137,296 |
1909.11894 | Social Network Analysis for Social Neuroscientists | Although social neuroscience is concerned with understanding how the brain interacts with its social environment, prevailing research in the field has primarily considered the human brain in isolation, deprived of its rich social context. Emerging work in social neuroscience that leverages tools from network analysis h... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 146,958 |
cs/0604077 | Successive Wyner-Ziv Coding Scheme and its Application to the Quadratic
Gaussian CEO Problem | We introduce a distributed source coding scheme called successive Wyner-Ziv coding. We show that any point in the rate region of the quadratic Gaussian CEO problem can be achieved via the successive Wyner-Ziv coding. The concept of successive refinement in the single source coding is generalized to the distributed sour... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 539,398 |
1310.3366 | PCG-Cut: Graph Driven Segmentation of the Prostate Central Gland | Prostate cancer is the most abundant cancer in men, with over 200,000 expected new cases and around 28,000 deaths in 2012 in the US alone. In this study, the segmentation results for the prostate central gland (PCG) in MR scans are presented. The aim of this research study is to apply a graph-based algorithm to automat... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 27,740 |
2308.13140 | Learn With Imagination: Safe Set Guided State-wise Constrained Policy
Optimization | Deep reinforcement learning (RL) excels in various control tasks, yet the absence of safety guarantees hampers its real-world applicability. In particular, explorations during learning usually results in safety violations, while the RL agent learns from those mistakes. On the other hand, safe control techniques ensure ... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 387,792 |
2006.10255 | Calibrated Reliable Regression using Maximum Mean Discrepancy | Accurate quantification of uncertainty is crucial for real-world applications of machine learning. However, modern deep neural networks still produce unreliable predictive uncertainty, often yielding over-confident predictions. In this paper, we are concerned with getting well-calibrated predictions in regression tasks... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 182,822 |
2212.06368 | Single Cell Training on Architecture Search for Image Denoising | Neural Architecture Search (NAS) for automatically finding the optimal network architecture has shown some success with competitive performances in various computer vision tasks. However, NAS in general requires a tremendous amount of computations. Thus reducing computational cost has emerged as an important issue. Mos... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 336,093 |
1405.4507 | A Multi-parent Memetic Algorithm for the Linear Ordering Problem | In this paper, we present a multi-parent memetic algorithm (denoted by MPM) for solving the classic Linear Ordering Problem (LOP). The MPM algorithm integrates in particular a multi-parent recombination operator for generating offspring solutions and a distance-and-quality based criterion for pool updating. Our MPM alg... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 33,181 |
2006.08937 | Channel Relationship Prediction with Forget-Update Module for Few-shot
Classification | In this paper, we proposed a pipeline for inferring the relationship of each class in support set and a query sample using forget-update module. We first propose a novel architectural module called "channel vector sequence construction module", which boosts the performance of sequence-prediction-model-based few-shot cl... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 182,366 |
2104.06481 | Political Polarization in Online News Consumption | Political polarization appears to be on the rise, as measured by voting behavior, general affect towards opposing partisans and their parties, and contents posted and consumed online. Research over the years has focused on the role of the Web as a driver of polarization. In order to further our understanding of the fac... | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | false | 230,087 |
2207.02238 | Improving Trustworthiness of AI Disease Severity Rating in Medical
Imaging with Ordinal Conformal Prediction Sets | The regulatory approval and broad clinical deployment of medical AI have been hampered by the perception that deep learning models fail in unpredictable and possibly catastrophic ways. A lack of statistically rigorous uncertainty quantification is a significant factor undermining trust in AI results. Recent development... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 306,445 |
1905.04127 | Design of Artificial Intelligence Agents for Games using Deep
Reinforcement Learning | In order perform a large variety of tasks and to achieve human-level performance in complex real-world environments, Artificial Intelligence (AI) Agents must be able to learn from their past experiences and gain both knowledge and an accurate representation of their environment from raw sensory inputs. Traditionally, A... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 130,379 |
2303.11454 | How (Implicit) Regularization of ReLU Neural Networks Characterizes the
Learned Function -- Part II: the Multi-D Case of Two Layers with Random First
Layer | Randomized neural networks (randomized NNs), where only the terminal layer's weights are optimized constitute a powerful model class to reduce computational time in training the neural network model. At the same time, these models generalize surprisingly well in various regression and classification tasks. In this pape... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 352,856 |
2202.11697 | Stochastic Coded Offloading Scheme for Unmanned Aerial Vehicle-Assisted
Edge Computing | Unmanned aerial vehicles (UAVs) have gained wide research interests due to their technological advancement and high mobility. The UAVs are equipped with increasingly advanced capabilities to run computationally intensive applications enabled by machine learning techniques. However, because of both energy and computatio... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 281,966 |
2005.06149 | DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses | DeepRobust is a PyTorch adversarial learning library which aims to build a comprehensive and easy-to-use platform to foster this research field. It currently contains more than 10 attack algorithms and 8 defense algorithms in image domain and 9 attack algorithms and 4 defense algorithms in graph domain, under a variety... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 176,928 |
2404.10200 | TEL'M: Test and Evaluation of Language Models | Language Models have demonstrated remarkable capabilities on some tasks while failing dramatically on others. The situation has generated considerable interest in understanding and comparing the capabilities of various Language Models (LMs) but those efforts have been largely ad hoc with results that are often little m... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 446,990 |
1709.09041 | Switching and Information Exchange in Compressed Estimation of Coupled
High Dimensional Processes | Compressed Estimation approaches, such as the Generalised Compressed Kalman Filter (GCKF), reduce the computational cost and complexity of high dimensional and high frequency data assimilation problems; usually without sacrificing optimality. Configured using adequate cores, such as the Unscented Kalman Filter (UKF), t... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 81,564 |
2110.14549 | Latent Equilibrium: A unified learning theory for arbitrarily fast
computation with arbitrarily slow neurons | The response time of physical computational elements is finite, and neurons are no exception. In hierarchical models of cortical networks each layer thus introduces a response lag. This inherent property of physical dynamical systems results in delayed processing of stimuli and causes a timing mismatch between network ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | false | 263,568 |
2502.08514 | Faithful, Unfaithful or Ambiguous? Multi-Agent Debate with Initial
Stance for Summary Evaluation | Faithfulness evaluators based on large language models (LLMs) are often fooled by the fluency of the text and struggle with identifying errors in the summaries. We propose an approach to summary faithfulness evaluation in which multiple LLM-based agents are assigned initial stances (regardless of what their belief migh... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 533,038 |
2410.14942 | 2D Basement Relief Inversion using Sparse Regularization | Basement relief gravimetry is crucial in geophysics, especially for oil exploration and mineral prospecting. It involves solving an inverse problem to infer geological model parameters from observed data. The model represents basement relief with constant-density prisms, and the data reflect gravitational anomalies fro... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 500,273 |
1809.09414 | Triple Trustworthiness Measurement for Knowledge Graph | The Knowledge graph (KG) uses the triples to describe the facts in the real world. It has been widely used in intelligent analysis and applications. However, possible noises and conflicts are inevitably introduced in the process of constructing. And the KG based tasks or applications assume that the knowledge in the KG... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 108,704 |
2210.09468 | Chance Constrained Stochastic Optimal Control for Linear Systems with
Time Varying Random Plant Parameters | We propose an open loop control scheme for linear systems with time-varying random elements in the plant's state matrix. This paper focuses on joint chance constraints for potentially time-varying target sets. Under assumption of finite and known expectation and variance, we use the one-sided Vysochanskij-Petunin inequ... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 324,542 |
2206.04349 | Deep radiomic signature with immune cell markers predicts the survival
of glioma patients | Imaging biomarkers offer a non-invasive way to predict the response of immunotherapy prior to treatment. In this work, we propose a novel type of deep radiomic features (DRFs) computed from a convolutional neural network (CNN), which capture tumor characteristics related to immune cell markers and overall survival. Our... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 301,593 |
1605.05087 | Word2Vec is a special case of Kernel Correspondence Analysis and Kernels
for Natural Language Processing | We show that correspondence analysis (CA) is equivalent to defining a Gini index with appropriately scaled one-hot encoding. Using this relation, we introduce a nonlinear kernel extension to CA. This extended CA gives a known analysis for natural language via specialized kernels that use an appropriate contingency tabl... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 55,950 |
1803.07624 | Dynamic Filtering with Large Sampling Field for ConvNets | We propose a dynamic filtering strategy with large sampling field for ConvNets (LS-DFN), where the position-specific kernels learn from not only the identical position but also multiple sampled neighbor regions. During sampling, residual learning is introduced to ease training and an attention mechanism is applied to f... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 93,091 |
2411.16615 | Graph Pooling by Local Cluster Selection | Graph pooling is a family of operations which take graphs as input and produce shrinked graphs as output. Modern graph pooling methods are trainable and, in general inserted in Graph Neural Networks (GNNs) architectures as graph shrinking operators along the (deep) processing pipeline. This work proposes a novel proced... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 511,090 |
1106.0518 | Submodular Functions Are Noise Stable | We show that all non-negative submodular functions have high {\em noise-stability}. As a consequence, we obtain a polynomial-time learning algorithm for this class with respect to any product distribution on $\{-1,1\}^n$ (for any constant accuracy parameter $\epsilon$). Our algorithm also succeeds in the agnostic setti... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 10,692 |
2302.13935 | RangedIK: An Optimization-based Robot Motion Generation Method for
Ranged-Goal Tasks | Generating feasible robot motions in real-time requires achieving multiple tasks (i.e., kinematic requirements) simultaneously. These tasks can have a specific goal, a range of equally valid goals, or a range of acceptable goals with a preference toward a specific goal. To satisfy multiple and potentially competing tas... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 348,101 |
0905.4162 | Google matrix, dynamical attractors and Ulam networks | We study the properties of the Google matrix generated by a coarse-grained Perron-Frobenius operator of the Chirikov typical map with dissipation. The finite size matrix approximant of this operator is constructed by the Ulam method. This method applied to the simple dynamical model creates the directed Ulam networks w... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 3,770 |
1906.08149 | Efficient privacy preservation of big data for accurate data mining | Computing technologies pervade physical spaces and human lives, and produce a vast amount of data that is available for analysis. However, there is a growing concern that potentially sensitive data may become public if the collected data are not appropriately sanitized before being released for investigation. Although ... | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | 135,790 |
2301.03134 | A Semi-supervised Approach for Activity Recognition from Indoor
Trajectory Data | The increasingly wide usage of location aware sensors has made it possible to collect large volume of trajectory data in diverse application domains. Machine learning allows to study the activities or behaviours of moving objects (e.g., people, vehicles, robot) using such trajectory data with rich spatiotemporal inform... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 339,707 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.