id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2501.14322 | Relative Layer-Wise Relevance Propagation: a more Robust Neural Networks
eXplaination | Machine learning methods are solving very successfully a plethora of tasks, but they have the disadvantage of not providing any information about their decision. Consequently, estimating the reasoning of the system provides additional information. For this, Layer-Wise Relevance Propagation (LRP) is one of the methods i... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 527,082 |
1109.4104 | VOGCLUSTERS: an example of DAME web application | We present the alpha release of the VOGCLUSTERS web application, specialized for data and text mining on globular clusters. It is one of the web2.0 technology based services of Data Mining & Exploration (DAME) Program, devoted to mine and explore heterogeneous information related to globular clusters data. | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 12,235 |
2001.03869 | Finite-Sample Analysis of Image Registration | We study the problem of image registration in the finite-resolution regime and characterize the error probability of algorithms as a function of properties of the transformation and the image capture noise. Specifically, we define a channel-aware Feinstein decoder to obtain upper bounds on the minimum achievable error ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 160,085 |
1601.00909 | The high-conductance state enables neural sampling in networks of LIF
neurons | The apparent stochasticity of in-vivo neural circuits has long been hypothesized to represent a signature of ongoing stochastic inference in the brain. More recently, a theoretical framework for neural sampling has been proposed, which explains how sample-based inference can be performed by networks of spiking neurons.... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 50,692 |
2208.10753 | Neural PCA for Flow-Based Representation Learning | Of particular interest is to discover useful representations solely from observations in an unsupervised generative manner. However, the question of whether existing normalizing flows provide effective representations for downstream tasks remains mostly unanswered despite their strong ability for sample generation and ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 314,187 |
2202.08019 | Model-Based and Data-Driven Control of Event- and Self-Triggered
Discrete-Time LTI Systems | The present paper considers the model-based and data-driven control of unknown linear time-invariant discrete-time systems under event-triggering and self-triggering transmission schemes. To this end, we begin by presenting a dynamic event-triggering scheme (ETS) based on periodic sampling, and a discrete-time looped-f... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 280,737 |
1004.3966 | A Message-Passing Algorithm for Counting Short Cycles in a Graph | A message-passing algorithm for counting short cycles in a graph is presented. For bipartite graphs, which are of particular interest in coding, the algorithm is capable of counting cycles of length g, g +2,..., 2g - 2, where g is the girth of the graph. For a general (non-bipartite) graph, cycles of length g; g + 1, .... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 6,247 |
2404.14117 | Hierarchical localization with panoramic views and triplet loss
functions | The main objective of this paper is to tackle visual localization, which is essential for the safe navigation of mobile robots. The solution we propose employs panoramic images and triplet convolutional neural networks. We seek to exploit the properties of such architectures to address both hierarchical and global loca... | false | false | false | false | true | false | false | true | false | false | false | true | false | false | false | false | false | false | 448,579 |
1503.06982 | Output Feedback Control of Inhomogeneous Parabolic PDEs with Point
Actuation and Point Measurement using SOS and Semi-Separable Kernels | In this paper we use SOS and SDP to design output feedback controllers for a class of one-dimensional parabolic partial differential equations with point measurements and point actuation. Our approach is based on the use of SOS to search for positive quadratic Lyapunov functions, controllers and observers. These Lyapun... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 41,427 |
2412.14728 | LTLf Synthesis Under Unreliable Input | We study the problem of realizing strategies for an LTLf goal specification while ensuring that at least an LTLf backup specification is satisfied in case of unreliability of certain input variables. We formally define the problem and characterize its worst-case complexity as 2EXPTIME-complete, like standard LTLf synth... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 518,839 |
2001.04238 | Nmbr9 as a Constraint Programming Challenge | Modern board games are a rich source of interesting and new challenges for combinatorial problems. The game Nmbr9 is a solitaire style puzzle game using polyominoes. The rules of the game are simple to explain, but modelling the game effectively using constraint programming is hard. This abstract presents the game, con... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 160,190 |
2006.13044 | Scheduling Policy and Power Allocation for Federated Learning in NOMA
Based MEC | Federated learning (FL) is a highly pursued machine learning technique that can train a model centrally while keeping data distributed. Distributed computation makes FL attractive for bandwidth limited applications especially in wireless communications. There can be a large number of distributed edge devices connected ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 183,782 |
2404.02456 | PhonologyBench: Evaluating Phonological Skills of Large Language Models | Phonology, the study of speech's structure and pronunciation rules, is a critical yet often overlooked component in Large Language Model (LLM) research. LLMs are widely used in various downstream applications that leverage phonology such as educational tools and poetry generation. Moreover, LLMs can potentially learn i... | false | false | true | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 443,863 |
1711.03406 | Machine Learning Based Fast Power Integrity Classifier | In this paper, we proposed a new machine learning based fast power integrity classifier that quickly flags the EM/IR hotspots. We discussed the features to extract to describe the power grid, cell power density, routing impact and controlled collapse chip connection (C4) bumps, etc. The continuous and discontinuous cas... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 84,205 |
1611.08024 | EEGNet: A Compact Convolutional Network for EEG-based Brain-Computer
Interfaces | Brain computer interfaces (BCI) enable direct communication with a computer, using neural activity as the control signal. This neural signal is generally chosen from a variety of well-studied electroencephalogram (EEG) signals. For a given BCI paradigm, feature extractors and classifiers are tailored to the distinct ch... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 64,433 |
2501.12390 | GPS as a Control Signal for Image Generation | We show that the GPS tags contained in photo metadata provide a useful control signal for image generation. We train GPS-to-image models and use them for tasks that require a fine-grained understanding of how images vary within a city. In particular, we train a diffusion model to generate images conditioned on both GPS... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 526,294 |
2108.13298 | E-Commerce Promotions Personalization via Online Multiple-Choice
Knapsack with Uplift Modeling | Promotions and discounts are essential components of modern e-commerce platforms, where they are often used to incentivize customers towards purchase completion. Promotions also affect revenue and may incur a monetary loss that is often limited by a dedicated promotional budget. We study the Online Constrained Multiple... | false | false | false | false | true | true | true | false | false | false | false | false | false | false | false | false | false | false | 252,765 |
2007.15109 | Outlier-Robust Estimation: Hardness, Minimally Tuned Algorithms, and
Applications | Nonlinear estimation in robotics and vision is typically plagued with outliers due to wrong data association, or to incorrect detections from signal processing and machine learning methods. This paper introduces two unifying formulations for outlier-robust estimation, Generalized Maximum Consensus (G-MC) and Generalize... | false | false | false | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | 189,569 |
2406.13385 | Explainable by-design Audio Segmentation through Non-Negative Matrix
Factorization and Probing | Audio segmentation is a key task for many speech technologies, most of which are based on neural networks, usually considered as black boxes, with high-level performances. However, in many domains, among which health or forensics, there is not only a need for good performance but also for explanations about the output ... | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 465,832 |
1511.08299 | Hierarchical classification of e-commerce related social media | In this paper, we attempt to classify tweets into root categories of the Amazon browse node hierarchy using a set of tweets with browse node ID labels, a much larger set of tweets without labels, and a set of Amazon reviews. Examining twitter data presents unique challenges in that the samples are short (under 140 char... | false | false | false | true | false | true | true | false | true | false | false | false | false | false | false | false | false | false | 49,520 |
2303.15100 | An Information Extraction Study: Take In Mind the Tokenization! | Current research on the advantages and trade-offs of using characters, instead of tokenized text, as input for deep learning models, has evolved substantially. New token-free models remove the traditional tokenization step; however, their efficiency remains unclear. Moreover, the effect of tokenization is relatively un... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 354,360 |
2109.06817 | Automatic hippocampal surface generation via 3D U-net and active shape
modeling with hybrid particle swarm optimization | In this paper, we proposed and validated a fully automatic pipeline for hippocampal surface generation via 3D U-net coupled with active shape modeling (ASM). Principally, the proposed pipeline consisted of three steps. In the beginning, for each magnetic resonance image, a 3D U-net was employed to obtain the automatic ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | true | false | false | 255,288 |
2110.09710 | Inter-Sense: An Investigation of Sensory Blending in Fiction | This study reports on the semantic organization of English sensory descriptors of the five basic senses of sight, hearing, touch, taste, and smell in a large corpus of over 8,000 fiction books. We introduce a large-scale text data-driven approach based on distributional-semantic word embeddings to identify and extract ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 261,897 |
2405.11198 | Adaptive Stabilization Based on Machine Learning for Column Generation | Column generation (CG) is a well-established method for solving large-scale linear programs. It involves iteratively optimizing a subproblem containing a subset of columns and using its dual solution to generate new columns with negative reduced costs. This process continues until the dual values converge to the optima... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 455,041 |
1304.4028 | A Fuzzy Logic Based Certain Trust Model for E-Commerce | Trustworthiness especially for service oriented system is very important topic now a day in IT field of the whole world. There are many successful E-commerce organizations presently run in the whole world, but E-commerce has not reached its full potential. The main reason behind this is lack of Trust of people in e-com... | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | false | 23,972 |
2310.09755 | Beyond Segmentation: Road Network Generation with Multi-Modal LLMs | This paper introduces an innovative approach to road network generation through the utilization of a multi-modal Large Language Model (LLM). Our model is specifically designed to process aerial images of road layouts and produce detailed, navigable road networks within the input images. The core innovation of our syste... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 399,929 |
2007.08714 | Transfer Learning without Knowing: Reprogramming Black-box Machine
Learning Models with Scarce Data and Limited Resources | Current transfer learning methods are mainly based on finetuning a pretrained model with target-domain data. Motivated by the techniques from adversarial machine learning (ML) that are capable of manipulating the model prediction via data perturbations, in this paper we propose a novel approach, black-box adversarial r... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 187,717 |
2008.02198 | Domain-Specific Mappings for Generative Adversarial Style Transfer | Style transfer generates an image whose content comes from one image and style from the other. Image-to-image translation approaches with disentangled representations have been shown effective for style transfer between two image categories. However, previous methods often assume a shared domain-invariant content space... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 190,552 |
2307.01312 | Self-Tuning PID Control via a Hybrid Actor-Critic-Based Neural Structure
for Quadcopter Control | Proportional-Integrator-Derivative (PID) controller is used in a wide range of industrial and experimental processes. There are a couple of offline methods for tuning PID gains. However, due to the uncertainty of model parameters and external disturbances, real systems such as Quadrotors need more robust and reliable P... | false | false | false | false | true | false | false | true | false | false | true | false | false | false | false | false | false | false | 377,307 |
2401.05318 | Analytical Model and Experimental Testing of the SoftFoot: an Adaptive
Robot Foot for Walking over Obstacles and Irregular Terrains | Robot feet are crucial for maintaining dynamic stability and propelling the body during walking, especially on uneven terrains. Traditionally, robot feet were mostly designed as flat and stiff pieces of metal, which meets its limitations when the robot is required to step on irregular grounds, e.g. stones. While one co... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 420,714 |
2208.08200 | AHEAD: A Triple Attention Based Heterogeneous Graph Anomaly Detection
Approach | Graph anomaly detection on attributed networks has become a prevalent research topic due to its broad applications in many influential domains. In real-world scenarios, nodes and edges in attributed networks usually display distinct heterogeneity, i.e. attributes of different types of nodes show great variety, differen... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 313,296 |
2407.07492 | Fine-Grained Classification for Poisonous Fungi Identification with
Transfer Learning | FungiCLEF 2024 addresses the fine-grained visual categorization (FGVC) of fungi species, with a focus on identifying poisonous species. This task is challenging due to the size and class imbalance of the dataset, subtle inter-class variations, and significant intra-class variability amongst samples. In this paper, we d... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 471,783 |
1701.08254 | Entropic Causality and Greedy Minimum Entropy Coupling | We study the problem of identifying the causal relationship between two discrete random variables from observational data. We recently proposed a novel framework called entropic causality that works in a very general functional model but makes the assumption that the unobserved exogenous variable has small entropy in t... | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | false | false | 67,428 |
2111.12172 | Multi-label Iterated Learning for Image Classification with Label
Ambiguity | Transfer learning from large-scale pre-trained models has become essential for many computer vision tasks. Recent studies have shown that datasets like ImageNet are weakly labeled since images with multiple object classes present are assigned a single label. This ambiguity biases models towards a single prediction, whi... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 267,889 |
2406.06101 | On the Consistency of Kernel Methods with Dependent Observations | The consistency of a learning method is usually established under the assumption that the observations are a realization of an independent and identically distributed (i.i.d.) or mixing process. Yet, kernel methods such as support vector machines (SVMs), Gaussian processes, or conditional kernel mean embeddings (CKMEs)... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 462,439 |
1506.08814 | A differential analysis of the power flow equations | The AC power flow equations are fundamental in all aspects of power systems planning and operations. They are routinely solved using Newton-Raphson like methods. However, there is little theoretical understanding of when these algorithms are guaranteed to find a solution of the power flow equations or how long they may... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 44,660 |
1806.00615 | Multiplex Communities and the Emergence of International Conflict | Advances in community detection reveal new insights into multiplex and multilayer networks. Less work, however, investigates the relationship between these communities and outcomes in social systems. We leverage these advances to shed light on the relationship between the cooperative mesostructure of the international ... | false | false | false | true | false | false | false | false | true | false | false | false | false | true | false | false | false | false | 99,348 |
2409.07581 | Violence detection in videos using deep recurrent and convolutional
neural networks | Violence and abnormal behavior detection research have known an increase of interest in recent years, due mainly to a rise in crimes in large cities worldwide. In this work, we propose a deep learning architecture for violence detection which combines both recurrent neural networks (RNNs) and 2-dimensional convolutiona... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 487,572 |
1705.05590 | Edge-Caching Wireless Networks: Performance Analysis and Optimization | Edge-caching has received much attention as an efficient technique to reduce delivery latency and network congestion during peak-traffic times by bringing data closer to end users. Existing works usually design caching algorithms separately from physical layer design. In this paper, we analyse edge-caching wireless net... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 73,518 |
2410.22594 | Gaussian Derivative Change-point Detection for Early Warnings of
Industrial System Failures | An early warning of future system failure is essential for conducting predictive maintenance and enhancing system availability. This paper introduces a three-step framework for assessing system health to predict imminent system breakdowns. First, the Gaussian Derivative Change-Point Detection (GDCPD) algorithm is propo... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 503,687 |
2104.11276 | Constructing a personalized learning path using genetic algorithms
approach | A substantial disadvantage of traditional learning is that all students follow the same learning sequence, but not all of them have the same background of knowledge, the same preferences, the same learning goals, and the same needs. Traditional teaching resources, such as textbooks, in most cases pursue students to fol... | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | false | false | 231,868 |
2205.14136 | PSL is Dead. Long Live PSL | Property Specification Language (PSL) is a form of temporal logic that has been mainly used in discrete domains (e.g. formal hardware verification). In this paper, we show that by merging machine learning techniques with PSL monitors, we can extend PSL to work on continuous domains. We apply this technique in machine l... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 299,234 |
2303.09458 | Simulation and design of shaped pulses beyond the piecewise-constant
approximation | Response functions of resonant circuits create ringing artefacts if their input changes rapidly. When physical limits of electromagnetic spectroscopies are explored, this creates two types of problems. Firstly, simulation: the system must be propagated accurately through every response transient, this may be computatio... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 352,052 |
2307.06088 | Non-Ideal Program-Time Conservation in Charge Trap Flash for Deep
Learning | Training deep neural networks (DNNs) is computationally intensive but arrays of non-volatile memories like Charge Trap Flash (CTF) can accelerate DNN operations using in-memory computing. Specifically, the Resistive Processing Unit (RPU) architecture uses the voltage-threshold program by stochastic encoded pulse trains... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | true | 378,961 |
2211.08812 | The Levenshtein's Sequence Reconstruction Problem and the Length of the
List | In the paper, the Levenshtein's sequence reconstruction problem is considered in the case where at most $t$ substitution errors occur in each of the $N$ channels and the decoder outputs a list of length $\mathcal{L}$. Moreover, it is assumed that the transmitted words are chosen from an $e$-error-correcting code $C \ (... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 330,782 |
2403.16524 | Harnessing the power of LLMs for normative reasoning in MASs | Software agents, both human and computational, do not exist in isolation and often need to collaborate or coordinate with others to achieve their goals. In human society, social mechanisms such as norms ensure efficient functioning, and these techniques have been adopted by researchers in multi-agent systems (MAS) to c... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 441,087 |
1906.00282 | Biomedical Named Entity Recognition via Reference-Set Augmented
Bootstrapping | We present a weakly-supervised data augmentation approach to improve Named Entity Recognition (NER) in a challenging domain: extracting biomedical entities (e.g., proteins) from the scientific literature. First, we train a neural NER (NNER) model over a small seed of fully-labeled examples. Second, we use a reference s... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 133,336 |
2305.04208 | Segmentation and Vascular Vectorization for Coronary Artery by
Geometry-based Cascaded Neural Network | Segmentation of the coronary artery is an important task for the quantitative analysis of coronary computed tomography angiography (CCTA) images and is being stimulated by the field of deep learning. However, the complex structures with tiny and narrow branches of the coronary artery bring it a great challenge. Coupled... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 362,680 |
2111.03495 | Automated Supervised Feature Selection for Differentiated Patterns of
Care | An automated feature selection pipeline was developed using several state-of-the-art feature selection techniques to select optimal features for Differentiating Patterns of Care (DPOC). The pipeline included three types of feature selection techniques; Filters, Wrappers and Embedded methods to select the top K features... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 265,191 |
1512.08178 | Electricity Demand Forecasting by Multi-Task Learning | We explore the application of kernel-based multi-task learning techniques to forecast the demand of electricity in multiple nodes of a distribution network. We show that recently developed output kernel learning techniques are particularly well suited to solve this problem, as they allow to flexibly model the complex s... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 50,496 |
2107.02281 | DeepCEL0 for 2D Single Molecule Localization in Fluorescence Microscopy | In fluorescence microscopy, Single Molecule Localization Microscopy (SMLM) techniques aim at localizing with high precision high density fluorescent molecules by stochastically activating and imaging small subsets of blinking emitters. Super Resolution (SR) plays an important role in this field since it allows to go be... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 244,750 |
2311.14641 | Neuromorphic Intermediate Representation: A Unified Instruction Set for
Interoperable Brain-Inspired Computing | Spiking neural networks and neuromorphic hardware platforms that simulate neuronal dynamics are getting wide attention and are being applied to many relevant problems using Machine Learning. Despite a well-established mathematical foundation for neural dynamics, there exists numerous software and hardware solutions and... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 410,177 |
2406.12202 | Fast Global Localization on Neural Radiance Field | Neural Radiance Fields (NeRF) presented a novel way to represent scenes, allowing for high-quality 3D reconstruction from 2D images. Following its remarkable achievements, global localization within NeRF maps is an essential task for enabling a wide range of applications. Recently, Loc-NeRF demonstrated a localization ... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 465,267 |
2405.17227 | Learning Generic and Dynamic Locomotion of Humanoids Across Discrete
Terrains | This paper addresses the challenge of terrain-adaptive dynamic locomotion in humanoid robots, a problem traditionally tackled by optimization-based methods or reinforcement learning (RL). Optimization-based methods, such as model-predictive control, excel in finding optimal reaction forces and achieving agile locomotio... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 457,817 |
2010.13357 | Where to Look and How to Describe: Fashion Image Retrieval with an
Attentional Heterogeneous Bilinear Network | Fashion products typically feature in compositions of a variety of styles at different clothing parts. In order to distinguish images of different fashion products, we need to extract both appearance (i.e., "how to describe") and localization (i.e.,"where to look") information, and their interactions. To this end, we p... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 203,097 |
0804.1033 | A Semi-Automatic Framework to Discover Epistemic Modalities in
Scientific Articles | Documents in scientific newspapers are often marked by attitudes and opinions of the author and/or other persons, who contribute with objective and subjective statements and arguments as well. In this respect, the attitude is often accomplished by a linguistic modality. As in languages like english, french and german, ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | 1,542 |
cs/0511004 | Evolutionary Computing | Evolutionary computing (EC) is an exciting development in Computer Science. It amounts to building, applying and studying algorithms based on the Darwinian principles of natural selection. In this paper we briefly introduce the main concepts behind evolutionary computing. We present the main components all evolutionary... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 539,052 |
1706.08336 | Semantically Informed Multiview Surface Refinement | We present a method to jointly refine the geometry and semantic segmentation of 3D surface meshes. Our method alternates between updating the shape and the semantic labels. In the geometry refinement step, the mesh is deformed with variational energy minimization, such that it simultaneously maximizes photo-consistency... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 75,982 |
2211.13331 | Using Focal Loss to Fight Shallow Heuristics: An Empirical Analysis of
Modulated Cross-Entropy in Natural Language Inference | There is no such thing as a perfect dataset. In some datasets, deep neural networks discover underlying heuristics that allow them to take shortcuts in the learning process, resulting in poor generalization capability. Instead of using standard cross-entropy, we explore whether a modulated version of cross-entropy call... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 332,438 |
2303.00111 | PixCUE: Joint Uncertainty Estimation and Image Reconstruction in MRI
using Deep Pixel Classification | Deep learning (DL) models are capable of successfully exploiting latent representations in MR data and have become state-of-the-art for accelerated MRI reconstruction. However, undersampling the measurements in k-space as well as the over- or under-parameterized and non-transparent nature of DL make these models expose... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 348,487 |
2202.11180 | Selecting cells in a raster database for maximal impact intervention in
the presence of spatial interaction: Computational complexity of a Multiple
vs. a Single Flow Direction Method | To minimize the sediment flowing to the outlet of a river catchment with minimal effort or cost, it is important to select the best areas to perform a certain intervention, e.g., afforestation. CAMF (Cellular Automata based heuristic for Minimizing Flow) is a method that performs this selection process iteratively in a... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 281,790 |
2105.14682 | Zero-shot Fact Verification by Claim Generation | Neural models for automated fact verification have achieved promising results thanks to the availability of large, human-annotated datasets. However, for each new domain that requires fact verification, creating a dataset by manually writing claims and linking them to their supporting evidence is expensive. We develop ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 237,766 |
1410.6976 | Distance-Based Influence in Networks: Computation and Maximization | A premise at a heart of network analysis is that entities in a network derive utilities from their connections. The {\em influence} of a seed set $S$ of nodes is defined as the sum over nodes $u$ of the {\em utility} of $S$ to $u$. {\em Distance-based} utility, which is a decreasing function of the distance from $S$ to... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 37,027 |
2402.00197 | Determination of Trace Organic Contaminant Concentration via Machine
Classification of Surface-Enhanced Raman Spectra | Accurate detection and analysis of traces of persistent organic pollutants in water is important in many areas, including environmental monitoring and food quality control, due to their long environmental stability and potential bioaccumulation. While conventional analysis of organic pollutants requires expensive equip... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 425,514 |
1012.5754 | Software Effort Estimation with Ridge Regression and Evolutionary
Attribute Selection | Software cost estimation is one of the prerequisite managerial activities carried out at the software development initiation stages and also repeated throughout the whole software life-cycle so that amendments to the total cost are made. In software cost estimation typically, a selection of project attributes is employ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 8,662 |
2201.05570 | Precise Stock Price Prediction for Robust Portfolio Design from Selected
Sectors of the Indian Stock Market | Stock price prediction is a challenging task and a lot of propositions exist in the literature in this area. Portfolio construction is a process of choosing a group of stocks and investing in them optimally to maximize the return while minimizing the risk. Since the time when Markowitz proposed the Modern Portfolio The... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 275,426 |
2406.15675 | Combining Neural Networks and Symbolic Regression for Analytical
Lyapunov Function Discovery | We propose CoNSAL (Combining Neural networks and Symbolic regression for Analytical Lyapunov function) to construct analytical Lyapunov functions for nonlinear dynamic systems. This framework contains a neural Lyapunov function and a symbolic regression component, where symbolic regression is applied to distill the neu... | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | true | 466,818 |
1707.01161 | Shakespearizing Modern Language Using Copy-Enriched Sequence-to-Sequence
Models | Variations in writing styles are commonly used to adapt the content to a specific context, audience, or purpose. However, applying stylistic variations is still by and large a manual process, and there have been little efforts towards automating it. In this paper we explore automated methods to transform text from mode... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 76,480 |
2103.17020 | Semantic-guided Automatic Natural Image Matting with Trimap Generation
Network and Light-weight Non-local Attention | Natural image matting aims to precisely separate foreground objects from background using alpha matte. Fully automatic natural image matting without external annotation is challenging. Well-performed matting methods usually require accurate labor-intensive handcrafted trimap as extra input, while the performance of aut... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 227,766 |
2106.12226 | Spatio-Temporal SAR-Optical Data Fusion for Cloud Removal via a Deep
Hierarchical Model | Cloud removal is a relevant topic in Remote Sensing as it fosters the usability of high-resolution optical images for Earth monitoring and study. Related techniques have been analyzed for years with a progressively clearer view of the appropriate methods to adopt, from multi-spectral to inpainting methods. Recent appli... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 242,666 |
1802.08924 | Time Series Learning using Monotonic Logical Properties | Cyber-physical systems of today are generating large volumes of time-series data. As manual inspection of such data is not tractable, the need for learning methods to help discover logical structure in the data has increased. We propose a logic-based framework that allows domain-specific knowledge to be embedded into f... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 91,219 |
1810.05426 | On the Existence and Uniqueness of Poincar\'e Maps for Systems with
Impulse Effects | The Poincar\'e map is widely used to study the qualitative behavior of dynamical systems. For instance, it can be used to describe the existence of periodic solutions. The Poincar\'e map for dynamical systems with impulse effects was introduced in the last decade and mainly employed to study the existence of limit cycl... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 110,227 |
2305.00799 | How to address monotonicity for model risk management? | In this paper, we study the problem of establishing the accountability and fairness of transparent machine learning models through monotonicity. Although there have been numerous studies on individual monotonicity, pairwise monotonicity is often overlooked in the existing literature. This paper studies transparent neur... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 361,457 |
2203.06456 | Energy networks for state estimation with random sensors using sparse
labels | State estimation is required whenever we deal with high-dimensional dynamical systems, as the complete measurement is often unavailable. It is key to gaining insight, performing control or optimizing design tasks. Most deep learning-based approaches require high-resolution labels and work with fixed sensor locations, t... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 285,121 |
2007.11986 | Dog Identification using Soft Biometrics and Neural Networks | This paper addresses the problem of biometric identification of animals, specifically dogs. We apply advanced machine learning models such as deep neural network on the photographs of pets in order to determine the pet identity. In this paper, we explore the possibility of using different types of "soft" biometrics, su... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 188,697 |
2311.05309 | Liquid phase fast electron tomography unravels the true 3D structure of
colloidal assemblies | Electron tomography has become a commonly used tool to investigate the three-dimensional (3D) structure of nanomaterials, including colloidal nanoparticle assemblies. However, electron microscopy is typically carried out under high vacuum conditions. Therefore, pre-treatment sample preparation is needed for assemblies ... | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 406,541 |
2204.12144 | Motion Planning and Robust Tracking for the Heat Equation using Boundary
Control | Robust output tracking is addressed in this paper for a heat equation with Neumann boundary conditions and anti-collocated boundary input and output. The desired reference tracking is solved using the well-known flatness and Lyapunov approaches. The reference profile is obtained by solving the motion planning problem f... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 293,388 |
2406.02272 | Computation-Aware Learning for Stable Control with Gaussian Process | In Gaussian Process (GP) dynamical model learning for robot control, particularly for systems constrained by computational resources like small quadrotors equipped with low-end processors, analyzing stability and designing a stable controller present significant challenges. This paper distinguishes between two types of... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 460,695 |
2408.09727 | Quantitative 3D Map Accuracy Evaluation Hardware and Algorithm for
LiDAR(-Inertial) SLAM | Accuracy evaluation of a 3D pointcloud map is crucial for the development of autonomous driving systems. In this work, we propose a user-independent software/hardware system that can quantitatively evaluate the accuracy of a 3D pointcloud map acquired from LiDAR(-Inertial) SLAM. We introduce a LiDAR target that functio... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 481,561 |
2105.07666 | Cortado---An Interactive Tool for Data-Driven Process Discovery and
Modeling | Process mining aims to diagnose and improve operational processes. Process mining techniques allow analyzing the event data generated and recorded during the execution of (business) processes to gain valuable insights. Process discovery is a key discipline in process mining that comprises the discovery of process model... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | 235,517 |
2404.13040 | Analysis of Classifier-Free Guidance Weight Schedulers | Classifier-Free Guidance (CFG) enhances the quality and condition adherence of text-to-image diffusion models. It operates by combining the conditional and unconditional predictions using a fixed weight. However, recent works vary the weights throughout the diffusion process, reporting superior results but without prov... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 448,128 |
2203.03598 | Audio-visual Generalised Zero-shot Learning with Cross-modal Attention
and Language | Learning to classify video data from classes not included in the training data, i.e. video-based zero-shot learning, is challenging. We conjecture that the natural alignment between the audio and visual modalities in video data provides a rich training signal for learning discriminative multi-modal representations. Foc... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 284,149 |
2106.09174 | Can I Be of Further Assistance? Using Unstructured Knowledge Access to
Improve Task-oriented Conversational Modeling | Most prior work on task-oriented dialogue systems are restricted to limited coverage of domain APIs. However, users oftentimes have requests that are out of the scope of these APIs. This work focuses on responding to these beyond-API-coverage user turns by incorporating external, unstructured knowledge sources. Our app... | false | false | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | 241,564 |
1903.08398 | Modelling Graph Errors: Towards Robust Graph Signal Processing | The first step for any graph signal processing (GSP) procedure is to learn the graph signal representation, i.e., to capture the dependence structure of the data into an adjacency matrix. Indeed, the adjacency matrix is typically not known a priori and has to be learned. However, it is learned with errors. A little att... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 124,823 |
2107.10602 | CNN-based Realized Covariance Matrix Forecasting | It is well known that modeling and forecasting realized covariance matrices of asset returns play a crucial role in the field of finance. The availability of high frequency intraday data enables the modeling of the realized covariance matrices directly. However, most of the models available in the literature depend on ... | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 247,342 |
1404.0101 | Quantization for Uplink Transmissions in Two-tier Networks with
Femtocells | We propose two novel schemes to level up the sum--rate for a two-tier network with femtocell where the backhaul uplink and downlink connecting the Base Stations have limited capacity. The backhaul links are exploited to transport the information in order to improve the decoding of the macrocell and femtocell messages. ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 31,985 |
2203.08992 | AdaLoGN: Adaptive Logic Graph Network for Reasoning-Based Machine
Reading Comprehension | Recent machine reading comprehension datasets such as ReClor and LogiQA require performing logical reasoning over text. Conventional neural models are insufficient for logical reasoning, while symbolic reasoners cannot directly apply to text. To meet the challenge, we present a neural-symbolic approach which, to predic... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | true | false | true | 285,984 |
2002.10025 | Triple Wins: Boosting Accuracy, Robustness and Efficiency Together by
Enabling Input-Adaptive Inference | Deep networks were recently suggested to face the odds between accuracy (on clean natural images) and robustness (on adversarially perturbed images) (Tsipras et al., 2019). Such a dilemma is shown to be rooted in the inherently higher sample complexity (Schmidt et al., 2018) and/or model capacity (Nakkiran, 2019), for ... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 165,258 |
cmp-lg/9410012 | Does Baum-Welch Re-estimation Help Taggers? | In part of speech tagging by Hidden Markov Model, a statistical model is used to assign grammatical categories to words in a text. Early work in the field relied on a corpus which had been tagged by a human annotator to train the model. More recently, Cutting {\it et al.} (1992) suggest that training can be achieved wi... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 536,194 |
2205.08910 | Strong Converses using Change of Measure and Asymptotic Markov Chains | The main contribution of this paper is a strong converse result for $K$-hop distributed hypothesis testing against independence with multiple (intermediate) decision centers under a Markov condition. Our result shows that the set of type-II error exponents that can simultaneously be achieved at all the terminals does n... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 297,094 |
1904.13154 | Facial Expressions Analysis Under Occlusions Based on Specificities of
Facial Motion Propagation | Although much progress has been made in the facial expression analysis field, facial occlusions are still challenging. The main innovation brought by this contribution consists in exploiting the specificities of facial movement propagation for recognizing expressions in presence of important occlusions. The movement in... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 129,310 |
2403.17801 | Towards 3D Vision with Low-Cost Single-Photon Cameras | We present a method for reconstructing 3D shape of arbitrary Lambertian objects based on measurements by miniature, energy-efficient, low-cost single-photon cameras. These cameras, operating as time resolved image sensors, illuminate the scene with a very fast pulse of diffuse light and record the shape of that pulse a... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 441,634 |
2408.06345 | Deep Learning based Key Information Extraction from Business Documents:
Systematic Literature Review | Extracting key information from documents represents a large portion of business workloads and therefore offers a high potential for efficiency improvements and process automation. With recent advances in deep learning, a plethora of deep learning-based approaches for Key Information Extraction have been proposed under... | false | false | false | false | false | true | true | false | true | false | false | false | false | false | false | false | false | false | 480,169 |
2104.10974 | Abstraction-Based Output-Feedback Control with State-Based
Specifications | We consider abstraction-based design of output-feedback controllers for non-linear dynamical systems against specifications over state-based predicates in linear-time temporal logic (LTL). In this context, our contribution is two-fold: (I) we generalize feedback-refinement relations for abstraction-based output-feedbac... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 231,775 |
1607.03483 | Block Models and Personalized PageRank | Methods for ranking the importance of nodes in a network have a rich history in machine learning and across domains that analyze structured data. Recent work has evaluated these methods though the seed set expansion problem: given a subset $S$ of nodes from a community of interest in an underlying graph, can we reliabl... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 58,524 |
2212.02746 | UniGeo: Unifying Geometry Logical Reasoning via Reformulating
Mathematical Expression | Geometry problem solving is a well-recognized testbed for evaluating the high-level multi-modal reasoning capability of deep models. In most existing works, two main geometry problems: calculation and proving, are usually treated as two specific tasks, hindering a deep model to unify its reasoning capability on multipl... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 334,867 |
2308.03811 | Non-Convex Bilevel Optimization with Time-Varying Objective Functions | Bilevel optimization has become a powerful tool in a wide variety of machine learning problems. However, the current nonconvex bilevel optimization considers an offline dataset and static functions, which may not work well in emerging online applications with streaming data and time-varying functions. In this work, we ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 384,177 |
2006.11141 | Control of a Rigid Wing Pumping Airborne Wind Energy System in all
Operational Phases | The control design of an airborne wind energy system with rigid aircraft, vertical take-off and landing, and pumping operation is described. A hierarchical control structure is implemented, in order to address all operational phases: take-off, transition to power generation, pumping energy generation cycles, transition... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 183,117 |
1707.08005 | Towards Evolutional Compression | Compressing convolutional neural networks (CNNs) is essential for transferring the success of CNNs to a wide variety of applications to mobile devices. In contrast to directly recognizing subtle weights or filters as redundant in a given CNN, this paper presents an evolutionary method to automatically eliminate redunda... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 77,730 |
2501.06974 | Downlink OFDM-FAMA in 5G-NR Systems | Fluid antenna multiple access (FAMA), enabled by the fluid antenna system (FAS), offers a new and straightforward solution to massive connectivity. Previous results on FAMA were primarily based on narrowband channels. This paper studies the adoption of FAMA within the fifth-generation (5G) orthogonal frequency division... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 524,209 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.