id
stringlengths
9
16
title
stringlengths
4
278
abstract
stringlengths
3
4.08k
cs.HC
bool
2 classes
cs.CE
bool
2 classes
cs.SD
bool
2 classes
cs.SI
bool
2 classes
cs.AI
bool
2 classes
cs.IR
bool
2 classes
cs.LG
bool
2 classes
cs.RO
bool
2 classes
cs.CL
bool
2 classes
cs.IT
bool
2 classes
cs.SY
bool
2 classes
cs.CV
bool
2 classes
cs.CR
bool
2 classes
cs.CY
bool
2 classes
cs.MA
bool
2 classes
cs.NE
bool
2 classes
cs.DB
bool
2 classes
Other
bool
2 classes
__index_level_0__
int64
0
541k
2204.00424
Comparison of convolutional neural networks for cloudy optical images reconstruction from single or multitemporal joint SAR and optical images
With the increasing availability of optical and synthetic aperture radar (SAR) images thanks to the Sentinel constellation, and the explosion of deep learning, new methods have emerged in recent years to tackle the reconstruction of optical images that are impacted by clouds. In this paper, we focus on the evaluation o...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
289,250
2008.00512
Integrated monitoring of ice in selected Swiss lakes. Final project report
Various lake observables, including lake ice, are related to climate and climate change and provide a good opportunity for long-term monitoring. Lakes (and as part of them lake ice) is therefore considered an Essential Climate Variable (ECV) of the Global Climate Observing System (GCOS). Following the need for an integ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
190,032
2109.09692
Modeling Regime Shifts in Multiple Time Series
We investigate the problem of discovering and modeling regime shifts in an ecosystem comprising multiple time series known as co-evolving time series. Regime shifts refer to the changing behaviors exhibited by series at different time intervals. Learning these changing behaviors is a key step toward time series forecas...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
256,363
2406.17190
Sound Tagging in Infant-centric Home Soundscapes
Certain environmental noises have been associated with negative developmental outcomes for infants and young children. Though classifying or tagging sound events in a domestic environment is an active research area, previous studies focused on data collected from a non-stationary microphone placed in the environment or...
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
467,460
1801.08573
Etymo: A New Discovery Engine for AI Research
We present Etymo (https://etymo.io), a discovery engine to facilitate artificial intelligence (AI) research and development. It aims to help readers navigate a large number of AI-related papers published every week by using a novel form of search that finds relevant papers and displays related papers in a graphical int...
false
false
false
true
true
true
false
false
false
false
false
false
false
false
false
false
false
false
88,963
2003.00063
Bio-Inspired Modality Fusion for Active Speaker Detection
Human beings have developed fantastic abilities to integrate information from various sensory sources exploring their inherent complementarity. Perceptual capabilities are therefore heightened, enabling, for instance, the well-known "cocktail party" and McGurk effects, i.e., speech disambiguation from a panoply of soun...
false
false
true
false
false
false
true
false
false
false
false
true
false
false
false
true
false
false
166,183
1812.04405
Conditional Variational Autoencoder for Neural Machine Translation
We explore the performance of latent variable models for conditional text generation in the context of neural machine translation (NMT). Similar to Zhang et al., we augment the encoder-decoder NMT paradigm by introducing a continuous latent variable to model features of the translation process. We extend this model wit...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
116,211
2405.14896
Study on spike-and-wave detection in epileptic signals using t-location-scale distribution and the K-nearest neighbors classifier
Pattern classification in electroencephalography (EEG) signals is an important problem in biomedical engineering since it enables the detection of brain activity, particularly the early detection of epileptic seizures. In this paper, we propose a k-nearest neighbors classification for epileptic EEG signals based on a t...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
456,657
2406.07662
Progress Towards Decoding Visual Imagery via fNIRS
We demonstrate the possibility of reconstructing images from fNIRS brain activity and start building a prototype to match the required specs. By training an image reconstruction model on downsampled fMRI data, we discovered that cm-scale spatial resolution is sufficient for image generation. We obtained 71% retrieval a...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
463,147
1602.00828
Learning a Deep Model for Human Action Recognition from Novel Viewpoints
Recognizing human actions from unknown and unseen (novel) views is a challenging problem. We propose a Robust Non-Linear Knowledge Transfer Model (R-NKTM) for human action recognition from novel views. The proposed R-NKTM is a deep fully-connected neural network that transfers knowledge of human actions from any unknow...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
51,624
1406.0303
A Superposition Calculus for Abductive Reasoning
We present a modification of the superposition calculus that is meant to generate consequences of sets of first-order axioms. This approach is proven to be sound and deductive-complete in the presence of redundancy elimination rules, provided the considered consequences are built on a given finite set of ground terms, ...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
33,549
2204.07772
SETTI: A Self-supervised Adversarial Malware Detection Architecture in an IoT Environment
In recent years, malware detection has become an active research topic in the area of Internet of Things (IoT) security. The principle is to exploit knowledge from large quantities of continuously generated malware. Existing algorithms practice available malware features for IoT devices and lack real-time prediction be...
false
false
false
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
291,841
2409.16632
Functional Stochastic Gradient MCMC for Bayesian Neural Networks
Classical parameter-space Bayesian inference for Bayesian neural networks (BNNs) suffers from several unresolved prior issues, such as knowledge encoding intractability and pathological behaviours in deep networks, which can lead to improper posterior inference. To address these issues, functional Bayesian inference ha...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
491,429
2305.12914
IMBUE: In-Memory Boolean-to-CUrrent Inference ArchitecturE for Tsetlin Machines
In-memory computing for Machine Learning (ML) applications remedies the von Neumann bottlenecks by organizing computation to exploit parallelism and locality. Non-volatile memory devices such as Resistive RAM (ReRAM) offer integrated switching and storage capabilities showing promising performance for ML applications. ...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
true
366,250
1608.04533
Improving link prediction in complex networks by adaptively exploiting multiple structural features of networks
So far, many network-structure-based link prediction methods have been proposed. However, these methods only highlight one or two structural features of networks, and then use the methods to predict missing links in different networks. The performances of these existing methods are not always satisfied in all cases sin...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
59,848
2111.05113
Membership Inference Attacks Against Self-supervised Speech Models
Recently, adapting the idea of self-supervised learning (SSL) on continuous speech has started gaining attention. SSL models pre-trained on a huge amount of unlabeled audio can generate general-purpose representations that benefit a wide variety of speech processing tasks. Despite their ubiquitous deployment, however, ...
false
false
true
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
265,699
2006.05558
Hermitian-Lifted Codes
In this paper, we construct codes for local recovery of erasures with high availability and constant-bounded rate from the Hermitian curve. These new codes, called Hermitian-lifted codes, are evaluation codes with evaluation set being the set of $\mathbb{F}_{q^2}$-rational points on the affine curve. The novelty is in ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
181,107
2007.01391
Secure Beamforming and Ergodic Secrecy Rate Analysis for Amplify-and-Forward Relay Networks with Wireless Powered Jammer
In this correspondence, we consider an amplify-and-forward relay network in which relayed information is overheard by an eavesdropper. In order to confound the eavesdropper, a wireless-powered jammer is also considered which harvests energy from a multiple-antenna source. We proposed a new secure beamforming scheme in ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
185,413
2012.08787
Query expansion with artificially generated texts
A well-known way to improve the performance of document retrieval is to expand the user's query. Several approaches have been proposed in the literature, and some of them are considered as yielding state-of-the-art results in IR. In this paper, we explore the use of text generation to automatically expand the queries. ...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
211,867
1302.4975
Refining Reasoning in Qualitative Probabilistic Networks
In recent years there has been a spate of papers describing systems for probabilisitic reasoning which do not use numerical probabilities. In some cases the simple set of values used by these systems make it impossible to predict how a probability will change or which hypothesis is most likely given certain evidence. T...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
22,249
cs/0606084
The Completeness of Propositional Resolution: A Simple and Constructive<br> Proof
It is well known that the resolution method (for propositional logic) is complete. However, completeness proofs found in the literature use an argument by contradiction showing that if a set of clauses is unsatisfiable, then it must have a resolution refutation. As a consequence, none of these proofs actually gives an ...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
539,532
2104.12898
SGNet: A Super-class Guided Network for Image Classification and Object Detection
Most classification models treat different object classes in parallel and the misclassifications between any two classes are treated equally. In contrast, human beings can exploit high-level information in making a prediction of an unknown object. Inspired by this observation, the paper proposes a super-class guided ne...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
232,348
2303.06212
Weighted Notions of Fairness with Binary Supermodular Chores
We study the problem of allocating indivisible chores among agents with binary supermodular cost functions. In other words, each chore has a marginal cost of $0$ or $1$ and chores exhibit increasing marginal costs (or decreasing marginal utilities). In this note, we combine the techniques of Viswanathan and Zick (2022)...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
350,740
2004.13278
VD-BERT: A Unified Vision and Dialog Transformer with BERT
Visual dialog is a challenging vision-language task, where a dialog agent needs to answer a series of questions through reasoning on the image content and dialog history. Prior work has mostly focused on various attention mechanisms to model such intricate interactions. By contrast, in this work, we propose VD-BERT, a ...
false
false
false
false
false
false
false
false
true
false
false
true
false
false
false
false
false
false
174,500
1901.11090
Neuroevolution with Perceptron Turing Machines
We introduce the perceptron Turing machine and show how it can be used to create a system of neuroevolution. Advantages of this approach include automatic scaling of solutions to larger problem sizes, the ability to experiment with hand-coded solutions, and an enhanced potential for understanding evolved solutions. Han...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
120,163
2206.08094
Deep Neural Imputation: A Framework for Recovering Incomplete Brain Recordings
Neuroscientists and neuroengineers have long relied on multielectrode neural recordings to study the brain. However, in a typical experiment, many factors corrupt neural recordings from individual electrodes, including electrical noise, movement artifacts, and faulty manufacturing. Currently, common practice is to disc...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
true
false
false
303,005
2101.08458
UNIT: Unifying Tensorized Instruction Compilation
Because of the increasing demand for computation in DNN, researchers develope both hardware and software mechanisms to reduce the compute and memory burden. A widely adopted approach is to use mixed precision data types. However, it is hard to leverage mixed precision without hardware support because of the overhead of...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
216,326
2001.09765
Model-assisted cohort selection with bias analysis for generating large-scale cohorts from the EHR for oncology research
Objective Electronic health records (EHRs) are a promising source of data for health outcomes research in oncology. A challenge in using EHR data is that selecting cohorts of patients often requires information in unstructured parts of the record. Machine learning has been used to address this, but even high-performing...
false
false
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
161,663
2112.10229
On Causal Inference for Data-free Structured Pruning
Neural networks (NNs) are making a large impact both on research and industry. Nevertheless, as NNs' accuracy increases, it is followed by an expansion in their size, required number of compute operations and energy consumption. Increase in resource consumption results in NNs' reduced adoption rate and real-world deplo...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
272,381
2109.12052
Free Energy Principle for State and Input Estimation of a Quadcopter Flying in Wind
The free energy principle from neuroscience provides a brain-inspired perception scheme through a data-driven model learning algorithm called Dynamic Expectation Maximization (DEM). This paper aims at introducing an experimental design to provide the first experimental confirmation of the usefulness of DEM as a state a...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
257,141
1408.1750
Time-Asynchronous Gaussian Multiple Access Relay Channel with Correlated Sources
We study the transmission of a set of correlated sources $(U_1,\cdots,U_K)$ over a Gaussian multiple access relay channel with time asynchronism between the encoders. We assume that the maximum possible offset ${\mathsf{d_{max}}}(n)$ between the transmitters grows without bound as the block length $n \rightarrow \infty...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
35,204
2101.02118
Do We Really Need Deep Learning Models for Time Series Forecasting?
Time series forecasting is a crucial task in machine learning, as it has a wide range of applications including but not limited to forecasting electricity consumption, traffic, and air quality. Traditional forecasting models rely on rolling averages, vector auto-regression and auto-regressive integrated moving averages...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
214,530
2003.09093
Masked Face Recognition Dataset and Application
In order to effectively prevent the spread of COVID-19 virus, almost everyone wears a mask during coronavirus epidemic. This almost makes conventional facial recognition technology ineffective in many cases, such as community access control, face access control, facial attendance, facial security checks at train statio...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
168,955
2411.19527
DisCoRD: Discrete Tokens to Continuous Motion via Rectified Flow Decoding
Human motion, inherently continuous and dynamic, presents significant challenges for generative models. Despite their dominance, discrete quantization methods, such as VQ-VAEs, suffer from inherent limitations, including restricted expressiveness and frame-wise noise artifacts. Continuous approaches, while producing sm...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
512,285
2202.11985
Can deep neural networks learn process model structure? An assessment framework and analysis
Predictive process monitoring concerns itself with the prediction of ongoing cases in (business) processes. Prediction tasks typically focus on remaining time, outcome, next event or full case suffix prediction. Various methods using machine and deep learning havebeen proposed for these tasks in recent years. Especiall...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
282,077
2410.02995
Task-free Lifelong Robot Learning with Retrieval-based Weighted Local Adaptation
A fundamental objective in intelligent robotics is to move towards lifelong learning robot that can learn and adapt to unseen scenarios over time. However, continually learning new tasks would introduce catastrophic forgetting problems due to data distribution shifts. To mitigate this, we store a subset of data from pr...
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
false
494,557
1810.10798
A Gaussian Process perspective on Convolutional Neural Networks
In this paper we cast the well-known convolutional neural network in a Gaussian process perspective. In this way we hope to gain additional insights into the performance of convolutional networks, in particular understand under what circumstances they tend to perform well and what assumptions are implicitly made in the...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
111,366
2010.16088
Cross-Domain Sentiment Classification with Contrastive Learning and Mutual Information Maximization
Contrastive learning (CL) has been successful as a powerful representation learning method. In this work we propose CLIM: Contrastive Learning with mutual Information Maximization, to explore the potential of CL on cross-domain sentiment classification. To the best of our knowledge, CLIM is the first to adopt contrasti...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
203,964
2104.11620
GuideBP: Guiding Backpropagation Through Weaker Pathways of Parallel Logits
Convolutional neural networks often generate multiple logits and use simple techniques like addition or averaging for loss computation. But this allows gradients to be distributed equally among all paths. The proposed approach guides the gradients of backpropagation along weakest concept representations. A weakness sco...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
231,971
2105.03791
Enhancing Transformers with Gradient Boosted Decision Trees for NLI Fine-Tuning
Transfer learning has become the dominant paradigm for many natural language processing tasks. In addition to models being pretrained on large datasets, they can be further trained on intermediate (supervised) tasks that are similar to the target task. For small Natural Language Inference (NLI) datasets, language model...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
234,263
2103.05611
Optimal Pricing with a Single Point
We study the following fundamental data-driven pricing problem. How can/should a decision-maker price its product based on data at a single historical price? How valuable is such data? We consider a decision-maker who optimizes over (potentially randomized) pricing policies to maximize the worst-case ratio of the reven...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
224,032
1711.02079
Cone Detection using a Combination of LiDAR and Vision-based Machine Learning
The classification and the position estimation of objects become more and more relevant as the field of robotics is expanding in diverse areas of society. In this Bachelor Thesis, we developed a cone detection algorithm for an autonomous car using a LiDAR sensor and a colour camera. By evaluating simple constraints, th...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
84,001
2011.00718
Fundamental Limits of Obfuscation for Linear Gaussian Dynamical Systems: An Information-Theoretic Approach
In this paper, we study the fundamental limits of obfuscation in terms of privacy-distortion tradeoffs for linear Gaussian dynamical systems via an information-theoretic approach. Particularly, we obtain analytical formulas that capture the fundamental privacy-distortion tradeoffs when privacy masks are to be added to ...
false
false
false
false
false
false
true
false
false
true
true
false
true
false
false
false
false
false
204,340
1911.06172
Word-level Lexical Normalisation using Context-Dependent Embeddings
Lexical normalisation (LN) is the process of correcting each word in a dataset to its canonical form so that it may be more easily and more accurately analysed. Most lexical normalisation systems operate at the character-level, while word-level models are seldom used. Recent language models offer solutions to the drawb...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
153,468
2409.17693
Spatial embedding promotes a specific form of modularity with low entropy and heterogeneous spectral dynamics
Understanding how biological constraints shape neural computation is a central goal of computational neuroscience. Spatially embedded recurrent neural networks provide a promising avenue to study how modelled constraints shape the combined structural and functional organisation of networks over learning. Prior work has...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
491,939
2009.07414
Ground-truth or DAER: Selective Re-query of Secondary Information
Many vision tasks use secondary information at inference time -- a seed -- to assist a computer vision model in solving a problem. For example, an initial bounding box is needed to initialize visual object tracking. To date, all such work makes the assumption that the seed is a good one. However, in practice, from crow...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
195,913
1512.08650
An Importance Sampling Scheme for Models in a Strong External Field
We propose Monte Carlo methods to estimate the partition function of the two-dimensional Ising model in the presence of an external magnetic field. The estimation is done in the dual of the Forney factor graph representing the model. The proposed methods can efficiently compute an estimate of the partition function in ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
50,533
2312.02218
WavePlanes: Compact Hex Planes for Dynamic Novel View Synthesis
Dynamic Novel View Synthesis (Dynamic NVS) enhances NVS technologies to model moving 3-D scenes. However, current methods are resource intensive and challenging to compress. To address this, we present WavePlanes, a fast and more compact hex plane representation, applicable to both Neural Radiance Fields and Gaussian S...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
true
412,769
1906.10718
Active Learning Solution on Distributed Edge Computing
Industry 4.0 becomes possible through the convergence between Operational and Information Technologies. All the requirements to realize the convergence is integrated on the Fog Platform. Fog Platform is introduced between the cloud server and edge devices when the unprecedented generation of data causes the burden of t...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
136,496
2412.05820
Geomagnetic and Inertial Combined Navigation Approach Based on Flexible Correction-Model Predictive Control Algorithm
This paper proposes a geomagnetic and inertial combined navigation approach based on the flexible correction-model predictive control algorithm (Fc-MPC). This approach aims to overcome the limitations of existing combined navigation methods that require prior geomagnetic maps and the inertial navigation drift of long-r...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
514,982
2309.09296
Model-based Subsampling for Knowledge Graph Completion
Subsampling is effective in Knowledge Graph Embedding (KGE) for reducing overfitting caused by the sparsity in Knowledge Graph (KG) datasets. However, current subsampling approaches consider only frequencies of queries that consist of entities and their relations. Thus, the existing subsampling potentially underestimat...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
false
392,549
2404.12888
Learn2Talk: 3D Talking Face Learns from 2D Talking Face
Speech-driven facial animation methods usually contain two main classes, 3D and 2D talking face, both of which attract considerable research attention in recent years. However, to the best of our knowledge, the research on 3D talking face does not go deeper as 2D talking face, in the aspect of lip-synchronization (lip-...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
true
448,075
2406.10569
MDA: An Interpretable and Scalable Multi-Modal Fusion under Missing Modalities and Intrinsic Noise Conditions
Multi-modal learning has shown exceptional performance in various tasks, especially in medical applications, where it integrates diverse medical information for comprehensive diagnostic evidence. However, there still are several challenges in multi-modal learning, 1. Heterogeneity between modalities, 2. uncertainty in ...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
464,463
2208.00905
A quantitative and constructive proof of Willems' Fundamental Lemma and its implications
Willems' Fundamental Lemma provides a powerful data-driven parametrization of all trajectories of a controllable linear time-invariant system based on one trajectory with persistently exciting (PE) input. In this paper, we present a novel proof of this result which is inspired by the classical adaptive control literatu...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
311,014
2103.05905
VideoMoCo: Contrastive Video Representation Learning with Temporally Adversarial Examples
MoCo is effective for unsupervised image representation learning. In this paper, we propose VideoMoCo for unsupervised video representation learning. Given a video sequence as an input sample, we improve the temporal feature representations of MoCo from two perspectives. First, we introduce a generator to drop out seve...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
true
224,123
2409.05030
Some Results on Neural Network Stability, Consistency, and Convergence: Insights into Non-IID Data, High-Dimensional Settings, and Physics-Informed Neural Networks
This paper addresses critical challenges in machine learning, particularly the stability, consistency, and convergence of neural networks under non-IID data, distribution shifts, and high-dimensional settings. We provide new theoretical results on uniform stability for neural networks with dynamic learning rates in non...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
486,612
1602.08186
Search by Ideal Candidates: Next Generation of Talent Search at LinkedIn
One key challenge in talent search is how to translate complex criteria of a hiring position into a search query. This typically requires deep knowledge on which skills are typically needed for the position, what are their alternatives, which companies are likely to have such candidates, etc. However, listing examples ...
false
false
false
false
false
true
true
false
false
false
false
false
false
false
false
false
false
false
52,610
2010.15327
Do Wide and Deep Networks Learn the Same Things? Uncovering How Neural Network Representations Vary with Width and Depth
A key factor in the success of deep neural networks is the ability to scale models to improve performance by varying the architecture depth and width. This simple property of neural network design has resulted in highly effective architectures for a variety of tasks. Nevertheless, there is limited understanding of effe...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
203,732
1608.08465
Intelligent Pinning Based Cooperative Secondary Control of Distributed Generators for Microgrid in Islanding Operation Mode
Motivated by the fact that the location(s) and structural properties of the pinning node(s) affect the algebraic connectivity of a network with respect to the reference value and thereby, its dynamic performance, this paper studies the application of intelligent single and multiple pinning of distributed cooperative se...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
60,364
2403.19721
Computationally and Memory-Efficient Robust Predictive Analytics Using Big Data
In the current data-intensive era, big data has become a significant asset for Artificial Intelligence (AI), serving as a foundation for developing data-driven models and providing insight into various unknown fields. This study navigates through the challenges of data uncertainties, storage limitations, and predictive...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
442,448
cmp-lg/9410003
Principle Based Semantics for HPSG
The paper presents a constraint based semantic formalism for HPSG. The advantages of the formlism are shown with respect to a grammar for a fragment of German that deals with (i) quantifier scope ambiguities triggered by scrambling and/or movement and (ii) ambiguities that arise from the collective/distributive distinc...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
536,185
2405.15926
Dissecting the Interplay of Attention Paths in a Statistical Mechanics Theory of Transformers
Despite the remarkable empirical performance of Transformers, their theoretical understanding remains elusive. Here, we consider a deep multi-head self-attention network, that is closely related to Transformers yet analytically tractable. We develop a statistical mechanics theory of Bayesian learning in this model, der...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
457,165
2308.07791
Informed Named Entity Recognition Decoding for Generative Language Models
Ever-larger language models with ever-increasing capabilities are by now well-established text processing tools. Alas, information extraction tasks such as named entity recognition are still largely unaffected by this progress as they are primarily based on the previous generation of encoder-only transformer models. He...
false
false
false
false
true
false
true
false
true
false
false
false
false
false
false
false
false
false
385,648
1710.09236
Complete classification for simple root cyclic codes over local rings $\mathbb{Z}_{p^s}[v]/\langle v^2-pv\rangle$
Let $p$ be a prime integer, $n,s\geq 2$ be integers satisfying ${\rm gcd}(p,n)=1$, and denote $R=\mathbb{Z}_{p^s}[v]/\langle v^2-pv\rangle$. Then $R$ is a local non-principal ideal ring of $p^{2s}$ elements. First, the structure of any cyclic code over $R$ of length $n$ and a complete classification of all these codes ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
83,178
2405.10448
Dynamic In-context Learning with Conversational Models for Data Extraction and Materials Property Prediction
The advent of natural language processing and large language models (LLMs) has revolutionized the extraction of data from unstructured scholarly papers. However, ensuring data trustworthiness remains a significant challenge. In this paper, we introduce PropertyExtractor, an open-source tool that leverages advanced conv...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
454,764
2008.04355
A Two-Stage Metaheuristic Algorithm for the Dynamic Vehicle Routing Problem in Industry 4.0 approach
Industry 4.0 is a concept that assists companies in developing a modern supply chain (MSC) system when they are faced with a dynamic process. Because Industry 4.0 focuses on mobility and real-time integration, it is a good framework for a dynamic vehicle routing problem (DVRP). This research works on DVRP. The aim of t...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
191,194
1206.4636
Modeling Latent Variable Uncertainty for Loss-based Learning
We consider the problem of parameter estimation using weakly supervised datasets, where a training sample consists of the input and a partially specified annotation, which we refer to as the output. The missing information in the annotation is modeled using latent variables. Previous methods overburden a single distrib...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
16,687
2107.01113
Measuring Information Leakage in Non-stochastic Brute-Force Guessing
This paper proposes an operational measure of non-stochastic information leakage to formalize privacy against a brute-force guessing adversary. The information is measured by non-probabilistic uncertainty of uncertain variables, the non-stochastic counterparts of random variables. For $X$ that is related to released da...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
244,375
2009.11942
Online Learning With Adaptive Rebalancing in Nonstationary Environments
An enormous and ever-growing volume of data is nowadays becoming available in a sequential fashion in various real-world applications. Learning in nonstationary environments constitutes a major challenge, and this problem becomes orders of magnitude more complex in the presence of class imbalance. We provide new insigh...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
197,285
2405.13356
Large Language Models (LLMs) Assisted Wireless Network Deployment in Urban Settings
The advent of Large Language Models (LLMs) has revolutionized language understanding and human-like text generation, drawing interest from many other fields with this question in mind: What else are the LLMs capable of? Despite their widespread adoption, ongoing research continues to explore new ways to integrate LLMs ...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
455,906
2009.07872
Energy and Flow Effects of Optimal Automated Driving in Mixed Traffic: Vehicle-in-the-Loop Experimental Results
This paper experimentally demonstrates the effectiveness of an anticipative car-following algorithm in reducing energy use of gasoline engine and electric Connected and Automated Vehicles (CAV), without sacrificing safety and traffic flow. We propose a Vehicle-in-the-Loop (VIL) testing environment in which experimental...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
196,065
1810.03763
Cubic Regularization with Momentum for Nonconvex Optimization
Momentum is a popular technique to accelerate the convergence in practical training, and its impact on convergence guarantee has been well-studied for first-order algorithms. However, such a successful acceleration technique has not yet been proposed for second-order algorithms in nonconvex optimization.In this paper, ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
109,878
1701.00365
Beam-On-Graph: Simultaneous Channel Estimation for mmWave MIMO Systems with Multiple Users
This paper is concerned with the channel estimation problem in multi-user millimeter wave (mmWave) wireless systems with large antenna arrays. We develop a novel simultaneous-estimation with iterative fountain training (SWIFT) framework, in which multiple users estimate their channels at the same time and the required ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
66,265
2108.05575
Kicktionary-LOME: A Domain-Specific Multilingual Frame Semantic Parsing Model for Football Language
This technical report introduces an adapted version of the LOME frame semantic parsing model (Xia et al., EACL 2021) which is capable of automatically annotating texts according to the "Kicktionary" domain-specific framenet resource. Several methods for training a model even with limited available training data are pro...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
250,343
2101.10717
Combining Deep Generative Models and Multi-lingual Pretraining for Semi-supervised Document Classification
Semi-supervised learning through deep generative models and multi-lingual pretraining techniques have orchestrated tremendous success across different areas of NLP. Nonetheless, their development has happened in isolation, while the combination of both could potentially be effective for tackling task-specific labelled ...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
217,024
2411.14513
Towards a Middleware for Large Language Models
Large language models have gained widespread popularity for their ability to process natural language inputs and generate insights derived from their training data, nearing the qualities of true artificial intelligence. This advancement has prompted enterprises worldwide to integrate LLMs into their services. So far, t...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
true
510,215
2108.11127
AutoShape: Real-Time Shape-Aware Monocular 3D Object Detection
Existing deep learning-based approaches for monocular 3D object detection in autonomous driving often model the object as a rotated 3D cuboid while the object's geometric shape has been ignored. In this work, we propose an approach for incorporating the shape-aware 2D/3D constraints into the 3D detection framework. Spe...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
252,105
1308.5374
Dynamic Reasoning Systems
A {\it dynamic reasoning system} (DRS) is an adaptation of a conventional formal logical system that explicitly portrays reasoning as a temporal activity, with each extralogical input to the system and each inference rule application being viewed as occurring at a distinct time step. Every DRS incorporates some well-de...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
26,636
2105.11606
Centimeter-Wave Free-Space Time-of-Flight Imaging
Depth cameras are emerging as a cornerstone modality with diverse applications that directly or indirectly rely on measured depth, including personal devices, robotics, and self-driving vehicles. Although time-of-flight (ToF) methods have fueled these applications, the precision and robustness of ToF methods is limited...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
236,757
1912.04696
The Unfairness of Popularity Bias in Music Recommendation: A Reproducibility Study
Research has shown that recommender systems are typically biased towards popular items, which leads to less popular items being underrepresented in recommendations. The recent work of Abdollahpouri et al. in the context of movie recommendations has shown that this popularity bias leads to unfair treatment of both long-...
false
false
false
true
false
true
true
false
false
false
false
false
false
false
false
false
false
false
156,908
2008.04071
On Controllability of AI
Invention of artificial general intelligence is predicted to cause a shift in the trajectory of human civilization. In order to reap the benefits and avoid pitfalls of such powerful technology it is important to be able to control it. However, possibility of controlling artificial general intelligence and its more adva...
false
false
false
false
true
false
false
false
false
false
false
false
false
true
false
false
false
false
191,120
1401.3941
Network Coding for $3$s$/n$t Sum-Networks
A sum-network is a directed acyclic network where each source independently generates one symbol from a given field $\mathbb F$ and each terminal wants to receive the sum $($over $\mathbb F)$ of the source symbols. For sum-networks with two sources or two terminals, the solvability is characterized by the connection co...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
30,024
2009.10401
Dynamic Fusion based Federated Learning for COVID-19 Detection
Medical diagnostic image analysis (e.g., CT scan or X-Ray) using machine learning is an efficient and accurate way to detect COVID-19 infections. However, sharing diagnostic images across medical institutions is usually not allowed due to the concern of patients' privacy. This causes the issue of insufficient datasets ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
196,889
2106.06080
Gradual Domain Adaptation in the Wild:When Intermediate Distributions are Absent
We focus on the problem of domain adaptation when the goal is shifting the model towards the target distribution, rather than learning domain invariant representations. It has been shown that under the following two assumptions: (a) access to samples from intermediate distributions, and (b) samples being annotated with...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
240,344
1805.03257
Multimodal Hierarchical Reinforcement Learning Policy for Task-Oriented Visual Dialog
Creating an intelligent conversational system that understands vision and language is one of the ultimate goals in Artificial Intelligence (AI)~\cite{winograd1972understanding}. Extensive research has focused on vision-to-language generation, however, limited research has touched on combining these two modalities in a ...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
97,009
2211.15868
Kinematic-aware Hierarchical Attention Network for Human Pose Estimation in Videos
Previous video-based human pose estimation methods have shown promising results by leveraging aggregated features of consecutive frames. However, most approaches compromise accuracy to mitigate jitter or do not sufficiently comprehend the temporal aspects of human motion. Furthermore, occlusion increases uncertainty be...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
333,417
2409.14320
Exploring the Use of Contingency for Nuclear Electrical Studies
This paper examines the use of contingency analysis for a nuclear power plant to determine its potential benefits for the nuclear industry. Various N-1 contingencies were analyzed for a model of an existing nuclear plant, primarily inspecting voltage violations resulting from a failure. Remedial Actions Schemes were su...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
490,421
2009.14114
Projection-Free Adaptive Gradients for Large-Scale Optimization
The complexity in large-scale optimization can lie in both handling the objective function and handling the constraint set. In this respect, stochastic Frank-Wolfe algorithms occupy a unique position as they alleviate both computational burdens, by querying only approximate first-order information from the objective an...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
197,941
2307.10214
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild
Cyber Threat Intelligence (CTI) plays a crucial role in assessing risks and enhancing security for organizations. However, the process of extracting relevant information from unstructured text sources can be expensive and time-consuming. Our empirical experience shows that existing tools for automated structured CTI ex...
false
false
false
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
380,467
2407.05721
PsycoLLM: Enhancing LLM for Psychological Understanding and Evaluation
Mental health has attracted substantial attention in recent years and LLM can be an effective technology for alleviating this problem owing to its capability in text understanding and dialogue. However, existing research in this domain often suffers from limitations, such as training on datasets lacking crucial prior k...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
471,107
1407.8513
Link overlap, viability, and mutual percolation in multiplex networks
Many real-world complex systems are best modeled by multiplex networks. The multiplexity has proved to have broad impact on the system's structure and function. Most theoretical studies on multiplex networks to date, however, have largely ignored the effect of link overlap across layers despite strong empirical evidenc...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
35,043
1802.00156
The Great Division
When information flow fails, when Democrats and Republicans do not talk to each other, when Israelis and Palestinians do not talk to each other, and when North Koreans and South Koreans do not talk to each other, mis-perceptions, biases and fake news arise. In this paper we present an in-depth study of political polari...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
89,358
1309.2254
Design of Two Dimensional Unipolar (Optical) Orthogonal Codes Through One Dimensional Unipolar (Optical) Orthogonal Codes
In this paper, an algorithm for construction of multiple sets of two dimensional (2D) or matrix unipolar (optical) orthogonal codes has been proposed. Representations of these 2D codes in difference of positions representation (DoPR) have also been discussed along-with conventional weighted positions representation (WP...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
26,941
2006.02713
Self-paced Contrastive Learning with Hybrid Memory for Domain Adaptive Object Re-ID
Domain adaptive object re-ID aims to transfer the learned knowledge from the labeled source domain to the unlabeled target domain to tackle the open-class re-identification problems. Although state-of-the-art pseudo-label-based methods have achieved great success, they did not make full use of all valuable information ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
180,123
2009.04612
How Political is the Spread of COVID-19 in the United States? An Analysis using Transportation and Weather Data
We investigate the difference in the spread of COVID-19 between the states won by Donald Trump (Red) and the states won by Hillary Clinton (Blue) in the 2016 presidential election, by mining transportation patterns of US residents from March 2020 to July 2020. To ensure a fair comparison, we first use a K-means cluster...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
195,095
2102.04577
Bayesian Poroelastic Aquifer Characterization from InSAR Surface Deformation Data Part II: Quantifying the Uncertainty
Uncertainty quantification of groundwater (GW) aquifer parameters is critical for efficient management and sustainable extraction of GW resources. These uncertainties are introduced by the data, model, and prior information on the parameters. Here we develop a Bayesian inversion framework that uses Interferometric Synt...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
219,154
2309.00074
On the Safety of Connected Cruise Control: Analysis and Synthesis with Control Barrier Functions
Connected automated vehicles have shown great potential to improve the efficiency of transportation systems in terms of passenger comfort, fuel economy, stability of driving behavior and mitigation of traffic congestions. Yet, to deploy these vehicles and leverage their benefits, the underlying algorithms must ensure t...
false
false
false
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
389,188
2203.15721
On Decoding Strategies for Neural Text Generators
When generating text from probabilistic models, the chosen decoding strategy has a profound effect on the resulting text. Yet the properties elicited by various decoding strategies do not always transfer across natural language generation tasks. For example, while mode-seeking methods like beam search perform remarkabl...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
288,510
1708.03027
Using Deep Neural Networks to Automate Large Scale Statistical Analysis for Big Data Applications
Statistical analysis (SA) is a complex process to deduce population properties from analysis of data. It usually takes a well-trained analyst to successfully perform SA, and it becomes extremely challenging to apply SA to big data applications. We propose to use deep neural networks to automate the SA process. In parti...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
78,703
2103.03432
Network Consensus with Privacy: A Secret Sharing Method
In this work, inspired by secret sharing schemes, we introduce a privacy-preserving approach for network consensus, by which all nodes in a network can reach an agreement on their states without exposing the individual state to neighbors. With the privacy degree defined for the agents, the proposed method makes the net...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
223,274