id
stringlengths
9
16
title
stringlengths
4
278
abstract
stringlengths
3
4.08k
cs.HC
bool
2 classes
cs.CE
bool
2 classes
cs.SD
bool
2 classes
cs.SI
bool
2 classes
cs.AI
bool
2 classes
cs.IR
bool
2 classes
cs.LG
bool
2 classes
cs.RO
bool
2 classes
cs.CL
bool
2 classes
cs.IT
bool
2 classes
cs.SY
bool
2 classes
cs.CV
bool
2 classes
cs.CR
bool
2 classes
cs.CY
bool
2 classes
cs.MA
bool
2 classes
cs.NE
bool
2 classes
cs.DB
bool
2 classes
Other
bool
2 classes
__index_level_0__
int64
0
541k
2404.17419
Multi-view Image Prompted Multi-view Diffusion for Improved 3D Generation
Using image as prompts for 3D generation demonstrate particularly strong performances compared to using text prompts alone, for images provide a more intuitive guidance for the 3D generation process. In this work, we delve into the potential of using multiple image prompts, instead of a single image prompt, for 3D gene...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
449,849
1703.04943
Matched bipartite block model with covariates
Community detection or clustering is a fundamental task in the analysis of network data. Many real networks have a bipartite structure which makes community detection challenging. In this paper, we consider a model which allows for matched communities in the bipartite setting, in addition to node covariates with inform...
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
false
false
69,996
2105.07869
Fast and Accurate Camera Scene Detection on Smartphones
AI-powered automatic camera scene detection mode is nowadays available in nearly any modern smartphone, though the problem of accurate scene prediction has not yet been addressed by the research community. This paper for the first time carefully defines this problem and proposes a novel Camera Scene Detection Dataset (...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
235,581
2411.07729
Exploring the loss landscape of regularized neural networks via convex duality
We discuss several aspects of the loss landscape of regularized neural networks: the structure of stationary points, connectivity of optimal solutions, path with nonincreasing loss to arbitrary global optimum, and the nonuniqueness of optimal solutions, by casting the problem into an equivalent convex problem and consi...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
507,658
2210.03205
Synthetic Dataset Generation for Privacy-Preserving Machine Learning
Machine Learning (ML) has achieved enormous success in solving a variety of problems in computer vision, speech recognition, object detection, to name a few. The principal reason for this success is the availability of huge datasets for training deep neural networks (DNNs). However, datasets can not be publicly release...
false
false
false
false
true
false
true
false
false
false
false
true
true
false
false
false
false
false
321,936
2403.03455
Robust Control Lyapunov-Value Functions for Nonlinear Disturbed Systems
Control Lyapunov Functions (CLFs) have been extensively used in the control community. A well-known drawback is the absence of a systematic way to construct CLFs for general nonlinear systems, and the problem can become more complex with input or state constraints. Our preliminary work on constructing Control Lyapunov ...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
435,199
2206.11321
An Application of a Modified Beta Factor Method for the Analysis of Software Common Cause Failures
This paper presents an approach for modeling software common cause failures (CCFs) within digital instrumentation and control (I&C) systems. CCFs consist of a concurrent failure between two or more components due to a shared failure cause and coupling mechanism. This work emphasizes the importance of identifying softwa...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
true
304,226
2409.11410
Multilevel Verification on a Single Digital Decentralized Distributed (DDD) Ledger
This paper presents an approach to using decentralized distributed digital (DDD) ledgers like blockchain with multi-level verification. In regular DDD ledgers like Blockchain, only a single level of verification is available, which makes it not useful for those systems where there is a hierarchy and verification is req...
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
true
false
489,147
2202.01857
Brain Cancer Survival Prediction on Treatment-na ive MRI using Deep Anchor Attention Learning with Vision Transformer
Image-based brain cancer prediction models, based on radiomics, quantify the radiologic phenotype from magnetic resonance imaging (MRI). However, these features are difficult to reproduce because of variability in acquisition and preprocessing pipelines. Despite evidence of intra-tumor phenotypic heterogeneity, the spa...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
278,607
2201.08099
JEDI: These aren't the JSON documents you're looking for... (Extended Version*)
The JavaScript Object Notation (JSON) is a popular data format used in document stores to natively support semi-structured data. In this paper, we address the problem of JSON similarity lookup queries: given a query document and a distance threshold $\tau$, retrieve all JSON documents that are within $\tau$ from the qu...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
276,229
1204.4779
Paraiso : An Automated Tuning Framework for Explicit Solvers of Partial Differential Equations
We propose Paraiso, a domain specific language embedded in functional programming language Haskell, for automated tuning of explicit solvers of partial differential equations (PDEs) on GPUs as well as multicore CPUs. In Paraiso, one can describe PDE solving algorithms succinctly using tensor equations notation. Hydrody...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
true
15,612
2404.11993
Knowledge-Aware Multi-Intent Contrastive Learning for Multi-Behavior Recommendation
Multi-behavioral recommendation optimizes user experiences by providing users with more accurate choices based on their diverse behaviors, such as view, add to cart, and purchase. Current studies on multi-behavioral recommendation mainly explore the connections and differences between multi-behaviors from an implicit p...
false
false
false
false
false
true
true
false
false
false
false
false
false
false
false
false
false
false
447,693
2406.14558
CooHOI: Learning Cooperative Human-Object Interaction with Manipulated Object Dynamics
Enabling humanoid robots to clean rooms has long been a pursued dream within humanoid research communities. However, many tasks require multi-humanoid collaboration, such as carrying large and heavy furniture together. Given the scarcity of motion capture data on multi-humanoid collaboration and the efficiency challeng...
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
false
466,371
2402.05828
Discovering Temporally-Aware Reinforcement Learning Algorithms
Recent advancements in meta-learning have enabled the automatic discovery of novel reinforcement learning algorithms parameterized by surrogate objective functions. To improve upon manually designed algorithms, the parameterization of this learned objective function must be expressive enough to represent novel principl...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
428,022
cs/0006011
Bagging and Boosting a Treebank Parser
Bagging and boosting, two effective machine learning techniques, are applied to natural language parsing. Experiments using these techniques with a trainable statistical parser are described. The best resulting system provides roughly as large of a gain in F-measure as doubling the corpus size. Error analysis of the re...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
537,123
1902.07602
Point cloud denoising based on tensor Tucker decomposition
In this paper, we propose a new algorithm for point cloud denoising based on the tensor Tucker decomposition. We first represent the local surface patches of a noisy point cloud to be matrices by their distances to a reference point, and stack the similar patch matrices to be a 3rd order tensor. Then we use the Tucker ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
122,018
2307.11308
DPM-OT: A New Diffusion Probabilistic Model Based on Optimal Transport
Sampling from diffusion probabilistic models (DPMs) can be viewed as a piecewise distribution transformation, which generally requires hundreds or thousands of steps of the inverse diffusion trajectory to get a high-quality image. Recent progress in designing fast samplers for DPMs achieves a trade-off between sampling...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
380,855
1703.01830
Decomposable Submodular Function Minimization: Discrete and Continuous
This paper investigates connections between discrete and continuous approaches for decomposable submodular function minimization. We provide improved running time estimates for the state-of-the-art continuous algorithms for the problem using combinatorial arguments. We also provide a systematic experimental comparison ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
69,438
1907.09504
Reservoir Computing Models for Patient-Adaptable ECG Monitoring in Wearable Devices
The reservoir computing paradigm is employed to classify heartbeat anomalies online based on electrocardiogram signals. Inspired by the principles of information processing in the brain, reservoir computing provides a framework to design, train, and analyze recurrent neural networks (RNNs) for processing time-dependent...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
139,378
1508.03765
SoftNull: Many-Antenna Full-Duplex Wireless via Digital Beamforming
In this paper, we present and study a digital-controlled method, called SoftNull, to enable full-duplex in many-antenna systems. Unlike most designs that rely on analog cancelers to suppress self-interference, SoftNull relies on digital transmit beamforming to reduce self-interference. SoftNull does not attempt to perf...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
46,038
2411.00121
I Can Hear You: Selective Robust Training for Deepfake Audio Detection
Recent advances in AI-generated voices have intensified the challenge of detecting deepfake audio, posing risks for scams and the spread of disinformation. To tackle this issue, we establish the largest public voice dataset to date, named DeepFakeVox-HQ, comprising 1.3 million samples, including 270,000 high-quality de...
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
504,440
2205.15707
CALEB: A Conditional Adversarial Learning Framework to Enhance Bot Detection
The high growth of Online Social Networks (OSNs) over the last few years has allowed automated accounts, known as social bots, to gain ground. As highlighted by other researchers, most of these bots have malicious purposes and tend to mimic human behavior, posing high-level security threats on OSN platforms. Moreover, ...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
299,838
2405.12299
Perturbing the Gradient for Alleviating Meta Overfitting
The reason for Meta Overfitting can be attributed to two factors: Mutual Non-exclusivity and the Lack of diversity, consequent to which a single global function can fit the support set data of all the meta-training tasks and fail to generalize to new unseen tasks. This issue is evidenced by low error rates on the meta-...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
455,469
1309.0790
SKYNET: an efficient and robust neural network training tool for machine learning in astronomy
We present the first public release of our generic neural network training algorithm, called SkyNet. This efficient and robust machine learning tool is able to train large and deep feed-forward neural networks, including autoencoders, for use in a wide range of supervised and unsupervised learning applications, such as...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
true
false
false
26,808
2008.09461
The paradox of productivity during quarantine: an agent-based simulation
Economies across the globe were brought to their knees due to lockdowns and social restriction measures to contain the spread of the SARS-CoV-2, despite the quick switch to remote working. This downfall may be partially explained by the "water cooler effect", which holds that higher levels of social interaction lead to...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
192,719
2208.04777
Learning Mean-Field Control for Delayed Information Load Balancing in Large Queuing Systems
Recent years have seen a great increase in the capacity and parallel processing power of data centers and cloud services. To fully utilize the said distributed systems, optimal load balancing for parallel queuing architectures must be realized. Existing state-of-the-art solutions fail to consider the effect of communic...
false
false
false
false
false
false
true
false
false
false
true
false
false
false
true
false
false
true
312,223
2402.01456
Convolution kernel adaptation to calibrated fisheye
Convolution kernels are the basic structural component of convolutional neural networks (CNNs). In the last years there has been a growing interest in fisheye cameras for many applications. However, the radially symmetric projection model of these cameras produces high distortions that affect the performance of CNNs, e...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
426,030
2010.12707
Learning to Recognize Dialect Features
Building NLP systems that serve everyone requires accounting for dialect differences. But dialects are not monolithic entities: rather, distinctions between and within dialects are captured by the presence, absence, and frequency of dozens of dialect features in speech and text, such as the deletion of the copula in "H...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
202,810
2403.18212
Preference-Based Planning in Stochastic Environments: From Partially-Ordered Temporal Goals to Most Preferred Policies
Human preferences are not always represented via complete linear orders: It is natural to employ partially-ordered preferences for expressing incomparable outcomes. In this work, we consider decision-making and probabilistic planning in stochastic systems modeled as Markov decision processes (MDPs), given a partially o...
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
true
441,824
1907.00511
Automatic Real-time Anomaly Detection for Autonomous Aerial Vehicles
The recent increase in the use of aerial vehicles raises concerns about the safety and reliability of autonomous operations. There is a growing need for methods to monitor the status of these aircraft and report any faults and anomalies to the safety pilot or to the autopilot to deal with the emergency situation. In th...
false
false
false
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
137,072
2104.01103
Semi-supervised Viewpoint Estimation with Geometry-aware Conditional Generation
There is a growing interest in developing computer vision methods that can learn from limited supervision. In this paper, we consider the problem of learning to predict camera viewpoints, where obtaining ground-truth annotations are expensive and require special equipment, from a limited number of labeled images. We pr...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
228,233
2309.17280
STRONG -- Structure Controllable Legal Opinion Summary Generation
We propose an approach for the structure controllable summarization of long legal opinions that considers the argument structure of the document. Our approach involves using predicted argument role information to guide the model in generating coherent summaries that follow a provided structure pattern. We demonstrate t...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
395,711
2204.09280
Reinforced Structured State-Evolution for Vision-Language Navigation
Vision-and-language Navigation (VLN) task requires an embodied agent to navigate to a remote location following a natural language instruction. Previous methods usually adopt a sequence model (e.g., Transformer and LSTM) as the navigator. In such a paradigm, the sequence model predicts action at each step through a mai...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
292,379
1710.04163
An Information Theoretic Framework for Active De-anonymization in Social Networks Based on Group Memberships
In this paper, a new mathematical formulation for the problem of de-anonymizing social network users by actively querying their membership in social network groups is introduced. In this formulation, the attacker has access to a noisy observation of the group membership of each user in the social network. When an unide...
false
false
false
true
false
false
false
false
false
true
false
false
true
false
false
false
false
false
82,442
2012.08662
Automated system to measure Tandem Gait to assess executive functions in children
As mobile technologies have become ubiquitous in recent years, computer-based cognitive tests have become more popular and efficient. In this work, we focus on assessing motor function in children by analyzing their gait movements. Although there has been a lot of research on designing automated assessment systems for ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
211,823
2403.15407
X-AMR Annotation Tool
This paper presents a novel Cross-document Abstract Meaning Representation (X-AMR) annotation tool designed for annotating key corpus-level event semantics. Leveraging machine assistance through the Prodigy Annotation Tool, we enhance the user experience, ensuring ease and efficiency in the annotation process. Through ...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
440,538
1310.8499
Deep AutoRegressive Networks
We introduce a deep, generative autoencoder capable of learning hierarchies of distributed representations from data. Successive deep stochastic hidden layers are equipped with autoregressive connections, which enable the model to be sampled from quickly and exactly via ancestral sampling. We derive an efficient approx...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
28,109
1912.02143
Landscape Complexity for the Empirical Risk of Generalized Linear Models
We present a method to obtain the average and the typical value of the number of critical points of the empirical risk landscape for generalized linear estimation problems and variants. This represents a substantial extension of previous applications of the Kac-Rice method since it allows to analyze the critical points...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
156,266
2204.02338
MGDCF: Distance Learning via Markov Graph Diffusion for Neural Collaborative Filtering
Graph Neural Networks (GNNs) have recently been utilized to build Collaborative Filtering (CF) models to predict user preferences based on historical user-item interactions. However, there is relatively little understanding of how GNN-based CF models relate to some traditional Network Representation Learning (NRL) appr...
false
false
false
true
false
false
true
false
false
false
false
false
false
false
false
false
false
false
289,908
2005.04246
ConvoKit: A Toolkit for the Analysis of Conversations
This paper describes the design and functionality of ConvoKit, an open-source toolkit for analyzing conversations and the social interactions embedded within. ConvoKit provides an unified framework for representing and manipulating conversational data, as well as a large and diverse collection of conversational dataset...
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
false
false
false
176,398
2404.00884
Self-Demos: Eliciting Out-of-Demonstration Generalizability in Large Language Models
Large language models (LLMs) have shown promising abilities of in-context learning (ICL), adapting swiftly to new tasks with only few-shot demonstrations. However, current few-shot methods heavily depend on high-quality, query-specific demos, which are often lacking. When faced with out-of-demonstration (OOD) queries, ...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
443,147
2202.09363
Towards Digital Twin Oriented Modelling of Complex Networked Systems and Their Dynamics: A Comprehensive Survey
This paper aims to provide a comprehensive critical overview on how entities and their interactions in Complex Networked Systems (CNS) are modelled across disciplines as they approach their ultimate goal of creating a Digital Twin (DT) that perfectly matches the reality. We propose a new framework to conceptually compa...
false
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
false
false
281,169
1905.00877
You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle
Deep learning achieves state-of-the-art results in many tasks in computer vision and natural language processing. However, recent works have shown that deep networks can be vulnerable to adversarial perturbations, which raised a serious robustness issue of deep networks. Adversarial training, typically formulated as a ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
129,583
1704.04966
Larger is Better: The Effect of Learning Rates Enjoyed by Stochastic Optimization with Progressive Variance Reduction
In this paper, we propose a simple variant of the original stochastic variance reduction gradient (SVRG), where hereafter we refer to as the variance reduced stochastic gradient descent (VR-SGD). Different from the choices of the snapshot point and starting point in SVRG and its proximal variant, Prox-SVRG, the two vec...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
71,924
2305.06341
Non-Euclidean Motion Planning with Graphs of Geodesically-Convex Sets
Computing optimal, collision-free trajectories for high-dimensional systems is a challenging problem. Sampling-based planners struggle with the dimensionality, whereas trajectory optimizers may get stuck in local minima due to inherent nonconvexities in the optimization landscape. The use of mixed-integer programming t...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
363,499
2203.00235
Beam Squint-Aware Integrated Sensing and Communications for Hybrid Massive MIMO LEO Satellite Systems
The space-air-ground-sea integrated network (SAGSIN) plays an important role in offering global coverage. To improve the efficient utilization of spectral and hardware resources in the SAGSIN, integrated sensing and communications (ISAC) has drawn extensive attention. Most existing ISAC works focus on terrestrial netwo...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
282,923
2108.11523
SOMTimeS: Self Organizing Maps for Time Series Clustering and its Application to Serious Illness Conversations
There is an increasing demand for scalable algorithms capable of clustering and analyzing large time series datasets. The Kohonen self-organizing map (SOM) is a type of unsupervised artificial neural network for visualizing and clustering complex data, reducing the dimensionality of data, and selecting influential feat...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
252,199
2309.00966
Compositional Diffusion-Based Continuous Constraint Solvers
This paper introduces an approach for learning to solve continuous constraint satisfaction problems (CCSP) in robotic reasoning and planning. Previous methods primarily rely on hand-engineering or learning generators for specific constraint types and then rejecting the value assignments when other constraints are viola...
false
false
false
false
true
false
true
true
false
false
false
false
false
false
false
false
false
false
389,490
2108.06119
Effective semantic segmentation in Cataract Surgery: What matters most?
Our work proposes neural network design choices that set the state-of-the-art on a challenging public benchmark on cataract surgery, CaDIS. Our methodology achieves strong performance across three semantic segmentation tasks with increasingly granular surgical tool class sets by effectively handling class imbalance, an...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
250,509
2201.08281
Symplectic Momentum Neural Networks -- Using Discrete Variational Mechanics as a prior in Deep Learning
With deep learning gaining attention from the research community for prediction and control of real physical systems, learning important representations is becoming now more than ever mandatory. It is of extreme importance that deep learning representations are coherent with physics. When learning from discrete data th...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
276,290
2411.15800
PG-SLAM: Photo-realistic and Geometry-aware RGB-D SLAM in Dynamic Environments
Simultaneous localization and mapping (SLAM) has achieved impressive performance in static environments. However, SLAM in dynamic environments remains an open question. Many methods directly filter out dynamic objects, resulting in incomplete scene reconstruction and limited accuracy of camera localization. The other w...
false
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
510,777
1106.5270
Decision-Theoretic Bidding Based on Learned Density Models in Simultaneous, Interacting Auctions
Auctions are becoming an increasingly popular method for transacting business, especially over the Internet. This article presents a general approach to building autonomous bidding agents to bid in multiple simultaneous auctions for interacting goods. A core component of our approach learns a model of the empirical pri...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
11,015
2501.06554
Hierarchical Reinforcement Learning for Optimal Agent Grouping in Cooperative Systems
This paper presents a hierarchical reinforcement learning (RL) approach to address the agent grouping or pairing problem in cooperative multi-agent systems. The goal is to simultaneously learn the optimal grouping and agent policy. By employing a hierarchical RL framework, we distinguish between high-level decisions of...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
true
false
false
false
524,030
2102.00976
Can Predominant Credible Information Suppress Misinformation in Crises? Empirical Studies of Tweets Related to Prevention Measures during COVID-19
During COVID-19, misinformation on social media affects the adoption of appropriate prevention behaviors. It is urgent to suppress the misinformation to prevent negative public health consequences. Although an array of studies has proposed misinformation suppression strategies, few have investigated the role of predomi...
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
false
217,971
2206.10608
Generating Diverse Indoor Furniture Arrangements
We present a method for generating arrangements of indoor furniture from human-designed furniture layout data. Our method creates arrangements that target specified diversity, such as the total price of all furniture in the room and the number of pieces placed. To generate realistic furniture arrangement, we train a ge...
false
false
false
false
true
false
true
true
false
false
false
false
false
false
false
false
false
true
303,975
2211.12911
Data-driven approximation of control invariant set for linear system based on convex piecewise linear fitting
Control invariant set is critical for guaranteeing safe control and the problem of computing control invariant set for linear discrete-time system is revisited in this paper by using a data-driven approach. Specifically, sample points on convergent trajectories of linear MPC are recorded, of which the convex hull formu...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
332,286
2109.04266
An objective function for order preserving hierarchical clustering
We present a theory and an objective function for similarity-based hierarchical clustering of probabilistic partial orders and directed acyclic graphs (DAGs). Specifically, given elements $x \le y$ in the partial order, and their respective clusters $[x]$ and $[y]$, the theory yields an order relation $\le'$ on the clu...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
254,337
2502.02975
TGB-Seq Benchmark: Challenging Temporal GNNs with Complex Sequential Dynamics
Future link prediction is a fundamental challenge in various real-world dynamic systems. To address this, numerous temporal graph neural networks (temporal GNNs) and benchmark datasets have been developed. However, these datasets often feature excessive repeated edges and lack complex sequential dynamics, a key charact...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
530,551
2410.08224
A Survey of Spatio-Temporal EEG data Analysis: from Models to Applications
In recent years, the field of electroencephalography (EEG) analysis has witnessed remarkable advancements, driven by the integration of machine learning and artificial intelligence. This survey aims to encapsulate the latest developments, focusing on emerging methods and technologies that are poised to transform our co...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
497,015
2206.14989
A Unified End-to-End Retriever-Reader Framework for Knowledge-based VQA
Knowledge-based Visual Question Answering (VQA) expects models to rely on external knowledge for robust answer prediction. Though significant it is, this paper discovers several leading factors impeding the advancement of current state-of-the-art methods. On the one hand, methods which exploit the explicit knowledge ta...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
305,448
1401.1456
Using temporal IDF for efficient novelty detection in text streams
Novelty detection in text streams is a challenging task that emerges in quite a few different scenarios, ranging from email thread filtering to RSS news feed recommendation on a smartphone. An efficient novelty detection algorithm can save the user a great deal of time and resources when browsing through relevant yet u...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
29,652
2405.03060
Tree-based Ensemble Learning for Out-of-distribution Detection
Being able to successfully determine whether the testing samples has similar distribution as the training samples is a fundamental question to address before we can safely deploy most of the machine learning models into practice. In this paper, we propose TOOD detection, a simple yet effective tree-based out-of-distrib...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
452,031
2108.10810
Design and integration of end-effector for 3D printing of novel UV-curable shape memory polymers with a collaborative robotic system
This paper presents the initial development of a robotic additive manufacturing technology based on ultraviolet (UV)-curable thermoset polymers. This is designed to allow free-standing printing through partial UV curing and fiber reinforcement for structural applications. The proposed system integrates a collaborative ...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
252,014
2409.12579
Sharp estimates for Gowers norms on discrete cubes
We study optimal dimensionless inequalities $$ \|f\|_{U^k} \leq \|f\|_{\ell^{p_{k,n}}} $$ that hold for all functions $f\colon\mathbb{Z}^d\to\mathbb{C}$ supported in $\{0,1,\ldots,n-1\}^d$ and estimates $$ \|1_A\|_{U^k}^{2^k}\leq |A|^{t_{k,n}} $$ that hold for all subsets $A$ of the same discrete cubes. A general theor...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
489,645
2302.11982
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots
Building advanced machine learning (ML) models requires expert knowledge and many trials to discover the best architecture and hyperparameter settings. Previous work demonstrates that model information can be leveraged to assist other attacks, such as membership inference, generating adversarial examples. Therefore, su...
false
false
false
false
false
false
true
false
false
false
false
false
true
false
false
false
false
false
347,388
2407.01559
Data-driven approaches for electrical impedance tomography image segmentation from partial boundary data
Electrical impedance tomography (EIT) plays a crucial role in non-invasive imaging, with both medical and industrial applications. In this paper, we present three data-driven reconstruction methods for EIT imaging. These three approaches were originally submitted to the Kuopio tomography challenge 2023 (KTC2023). First...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
469,354
2312.01650
Adaptive Confidence Threshold for ByteTrack in Multi-Object Tracking
We investigate the application of ByteTrack in the realm of multiple object tracking. ByteTrack, a simple tracking algorithm, enables the simultaneous tracking of multiple objects by strategically incorporating detections with a low confidence threshold. Conventionally, objects are initially associated with high confid...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
412,530
2305.17526
Computing a partition function of a generalized pattern-based energy over a semiring
Valued constraint satisfaction problems with ordered variables (VCSPO) are a special case of Valued CSPs in which variables are totally ordered and soft constraints are imposed on tuples of variables that do not violate the order. We study a restriction of VCSPO, in which soft constraints are imposed on a segment of ad...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
368,632
1810.09147
Summarizing User-generated Textual Content: Motivation and Methods for Fairness in Algorithmic Summaries
As the amount of user-generated textual content grows rapidly, text summarization algorithms are increasingly being used to provide users a quick overview of the information content. Traditionally, summarization algorithms have been evaluated only based on how well they match human-written summaries (e.g. as measured b...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
110,998
2107.01980
Gaze Estimation with an Ensemble of Four Architectures
This paper presents a method for gaze estimation according to face images. We train several gaze estimators adopting four different network architectures, including an architecture designed for gaze estimation (i.e.,iTracker-MHSA) and three originally designed for general computer vision tasks(i.e., BoTNet, HRNet, ResN...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
244,660
2409.18197
Autonomous Network Defence using Reinforcement Learning
In the network security arms race, the defender is significantly disadvantaged as they need to successfully detect and counter every malicious attack. In contrast, the attacker needs to succeed only once. To level the playing field, we investigate the effectiveness of autonomous agents in a realistic network defence sc...
false
false
false
false
true
false
true
false
false
false
false
false
true
false
false
false
false
false
492,136
2403.11460
Fed3DGS: Scalable 3D Gaussian Splatting with Federated Learning
In this work, we present Fed3DGS, a scalable 3D reconstruction framework based on 3D Gaussian splatting (3DGS) with federated learning. Existing city-scale reconstruction methods typically adopt a centralized approach, which gathers all data in a central server and reconstructs scenes. The approach hampers scalability ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
438,709
2502.10868
NitiBench: A Comprehensive Studies of LLM Frameworks Capabilities for Thai Legal Question Answering
The application of large language models (LLMs) in the legal domain holds significant potential for information retrieval and question answering, yet Thai legal QA systems face challenges due to a lack of standardized evaluation benchmarks and the complexity of Thai legal structures. This paper introduces NitiBench, a ...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
534,082
1610.03792
Decentralized Coded Caching with Distinct Cache Capacities
Decentralized coded caching is studied for a content server with $N$ files, each of size $F$ bits, serving $K$ active users, each equipped with a cache of distinct capacity. It is assumed that the users' caches are filled in advance during the off-peak traffic period without the knowledge of the number of active users,...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
62,301
2409.14316
MVPGS: Excavating Multi-view Priors for Gaussian Splatting from Sparse Input Views
Recently, the Neural Radiance Field (NeRF) advancement has facilitated few-shot Novel View Synthesis (NVS), which is a significant challenge in 3D vision applications. Despite numerous attempts to reduce the dense input requirement in NeRF, it still suffers from time-consumed training and rendering processes. More rece...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
490,419
2003.13027
Abstractive Text Summarization based on Language Model Conditioning and Locality Modeling
We explore to what extent knowledge about the pre-trained language model that is used is beneficial for the task of abstractive summarization. To this end, we experiment with conditioning the encoder and decoder of a Transformer-based neural model on the BERT language model. In addition, we propose a new method of BERT...
false
false
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
170,082
1806.03740
Unsupervised Disambiguation of Syncretism in Inflected Lexicons
Lexical ambiguity makes it difficult to compute various useful statistics of a corpus. A given word form might represent any of several morphological feature bundles. One can, however, use unsupervised learning (as in EM) to fit a model that probabilistically disambiguates word forms. We present such an approach, which...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
100,073
2004.06101
Near-Optimal Distributed Band-Joins through Recursive Partitioning
We consider running-time optimization for band-joins in a distributed system, e.g., the cloud. To balance load across worker machines, input has to be partitioned, which causes duplication. We explore how to resolve this tension between maximum load per worker and input duplication for band-joins between two relations....
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
true
172,417
1804.06201
LCMR: Local and Centralized Memories for Collaborative Filtering with Unstructured Text
Collaborative filtering (CF) is the key technique for recommender systems. Pure CF approaches exploit the user-item interaction data (e.g., clicks, likes, and views) only and suffer from the sparsity issue. Items are usually associated with content information such as unstructured text (e.g., abstracts of articles and ...
false
false
false
false
true
true
false
false
true
false
false
false
false
false
false
false
false
false
95,243
2404.05673
CoReS: Orchestrating the Dance of Reasoning and Segmentation
The reasoning segmentation task, which demands a nuanced comprehension of intricate queries to accurately pinpoint object regions, is attracting increasing attention. However, Multi-modal Large Language Models (MLLM) often find it difficult to accurately localize the objects described in complex reasoning contexts. We ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
445,168
1801.09496
Improving Active Learning in Systematic Reviews
Systematic reviews are essential to summarizing the results of different clinical and social science studies. The first step in a systematic review task is to identify all the studies relevant to the review. The task of identifying relevant studies for a given systematic review is usually performed manually, and as a r...
false
false
false
false
true
true
true
false
false
false
false
false
false
false
false
false
false
true
89,123
2003.14204
Verification of Nonblockingness in Bounded Petri Nets With Minimax Basis Reachability Graphs
This paper proposes a semi-structural approach to verify the nonblockingness of a Petri net. We construct a structure, called minimax basis reachability graph (minimax-BRG): it provides an abstract description of the reachability set of a net while preserving all information needed to test if the net is blocking. We pr...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
true
170,440
2401.04979
DualDynamics: Synergizing Implicit and Explicit Methods for Robust Irregular Time Series Analysis
Real-world time series analysis faces significant challenges when dealing with irregular and incomplete data. While Neural Differential Equation (NDE) based methods have shown promise, they struggle with limited expressiveness, scalability issues, and stability concerns. Conversely, Neural Flows offer stability but fal...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
420,611
1702.08033
Euclidean and Hermitian LCD MDS codes
Linear codes with complementary duals (abbreviated LCD) are linear codes whose intersection with their dual is trivial. When they are binary, they play an important role in armoring implementations against side-channel attacks and fault injection attacks. Non-binary LCD codes in characteristic 2 can be transformed into...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
68,899
2401.09496
Learning to Generalize over Subpartitions for Heterogeneity-aware Domain Adaptive Nuclei Segmentation
Annotation scarcity and cross-modality/stain data distribution shifts are two major obstacles hindering the application of deep learning models for nuclei analysis, which holds a broad spectrum of potential applications in digital pathology. Recently, unsupervised domain adaptation (UDA) methods have been proposed to m...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
422,289
2008.00851
Planning to Score a Goal in Robotic Football with Heuristic Search
This paper considers a problem of planning an attack in robotic football (RoboCup). The problem is reduced to finding a trajectory of the ball from its current position to the opponents goals. Heuristic search algorithm, i.e. A*, is used to find such a trajectory. For this algorithm to be applicable we introduce a disc...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
190,135
2106.01499
Personalizing Pre-trained Models
Self-supervised or weakly supervised models trained on large-scale datasets have shown sample-efficient transfer to diverse datasets in few-shot settings. We consider how upstream pretrained models can be leveraged for downstream few-shot, multilabel, and continual learning tasks. Our model CLIPPER (CLIP PERsonalized) ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
238,516
2007.14634
Approximation Based Variance Reduction for Reparameterization Gradients
Flexible variational distributions improve variational inference but are harder to optimize. In this work we present a control variate that is applicable for any reparameterizable distribution with known mean and covariance matrix, e.g. Gaussians with any covariance structure. The control variate is based on a quadrati...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
189,462
2104.11416
Predicting Distant Metastases in Soft-Tissue Sarcomas from PET-CT scans using Constrained Hierarchical Multi-Modality Feature Learning
Distant metastases (DM) refer to the dissemination of tumors, usually, beyond the organ where the tumor originated. They are the leading cause of death in patients with soft-tissue sarcomas (STSs). Positron emission tomography-computed tomography (PET-CT) is regarded as the imaging modality of choice for the management...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
231,903
2306.14067
UAlberta at SemEval-2023 Task 1: Context Augmentation and Translation for Multilingual Visual Word Sense Disambiguation
We describe the systems of the University of Alberta team for the SemEval-2023 Visual Word Sense Disambiguation (V-WSD) Task. We present a novel algorithm that leverages glosses retrieved from BabelNet, in combination with text and image encoders. Furthermore, we compare language-specific encoders against the applicati...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
375,527
1501.02620
Energy Harvesting Small Cell Networks: Feasibility, Deployment and Operation
Small cell networks (SCNs) have attracted great attention in recent years due to their potential to meet the exponential growth of mobile data traffic and the increasing demand for better quality of service and user experience in mobile applications. Nevertheless, a wide deployment of SCNs has not happened yet because ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
39,203
2309.10438
AutoDiffusion: Training-Free Optimization of Time Steps and Architectures for Automated Diffusion Model Acceleration
Diffusion models are emerging expressive generative models, in which a large number of time steps (inference steps) are required for a single image generation. To accelerate such tedious process, reducing steps uniformly is considered as an undisputed principle of diffusion models. We consider that such a uniform assum...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
393,013
2408.10482
Evaluation Framework for AI-driven Molecular Design of Multi-target Drugs: Brain Diseases as a Case Study
The widespread application of Artificial Intelligence (AI) techniques has significantly influenced the development of new therapeutic agents. These computational methods can be used to design and predict the properties of generated molecules. Multi-target Drug Discovery (MTDD) is an emerging paradigm for discovering dr...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
false
false
481,867
1601.00595
Robust Non-linear Regression: A Greedy Approach Employing Kernels with Application to Image Denoising
We consider the task of robust non-linear regression in the presence of both inlier noise and outliers. Assuming that the unknown non-linear function belongs to a Reproducing Kernel Hilbert Space (RKHS), our goal is to estimate the set of the associated unknown parameters. Due to the presence of outliers, common techni...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
50,657
1912.00983
Quasi-factorization and Multiplicative Comparison of Subalgebra-Relative Entropy
Purely multiplicative comparisons of quantum relative entropy are desirable but challenging to prove. We show such comparisons for relative entropies between comparable densities, including the relative entropy of a density with respect to its subalgebraic restriction. These inequalities are asymptotically tight in app...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
155,951
1207.1408
Representation Policy Iteration
This paper addresses a fundamental issue central to approximation methods for solving large Markov decision processes (MDPs): how to automatically learn the underlying representation for value function approximation? A novel theoretically rigorous framework is proposed that automatically generates geometrically customi...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
17,288
2112.14518
Mutual influence between language and perception in multi-agent communication games
Language interfaces with many other cognitive domains. This paper explores how interactions at these interfaces can be studied with deep learning methods, focusing on the relation between language emergence and visual perception. To model the emergence of language, a sender and a receiver agent are trained on a referen...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
273,554
1606.06439
Social-sparsity brain decoders: faster spatial sparsity
Spatially-sparse predictors are good models for brain decoding: they give accurate predictions and their weight maps are interpretable as they focus on a small number of regions. However, the state of the art, based on total variation or graph-net, is computationally costly. Here we introduce sparsity in the local neig...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
57,578
2308.09372
Which Transformer to Favor: A Comparative Analysis of Efficiency in Vision Transformers
Self-attention in Transformers comes with a high computational cost because of their quadratic computational complexity, but their effectiveness in addressing problems in language and vision has sparked extensive research aimed at enhancing their efficiency. However, diverse experimental conditions, spanning multiple i...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
386,268
2202.12426
Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?
Few studies have focused on examining how people recognize morphing attacks, even as several publications have examined the susceptibility of automated FRS and offered morphing attack detection (MAD) approaches. MAD approaches base their decisions either on a single image with no reference to compare against (S-MAD) or...
false
false
false
false
false
false
false
false
false
false
false
true
false
true
false
false
false
false
282,233