id
stringlengths
9
16
title
stringlengths
4
278
abstract
stringlengths
3
4.08k
cs.HC
bool
2 classes
cs.CE
bool
2 classes
cs.SD
bool
2 classes
cs.SI
bool
2 classes
cs.AI
bool
2 classes
cs.IR
bool
2 classes
cs.LG
bool
2 classes
cs.RO
bool
2 classes
cs.CL
bool
2 classes
cs.IT
bool
2 classes
cs.SY
bool
2 classes
cs.CV
bool
2 classes
cs.CR
bool
2 classes
cs.CY
bool
2 classes
cs.MA
bool
2 classes
cs.NE
bool
2 classes
cs.DB
bool
2 classes
Other
bool
2 classes
__index_level_0__
int64
0
541k
1703.10251
Dialectical Rough Sets, Parthood and Figures of Opposition-1
In one perspective, the main theme of this research revolves around the inverse problem in the context of general rough sets that concerns the existence of rough basis for given approximations in a context. Granular operator spaces and variants were recently introduced by the present author as an optimal framework for ...
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
false
true
70,883
2108.12226
Injecting Text in Self-Supervised Speech Pretraining
Self-supervised pretraining for Automated Speech Recognition (ASR) has shown varied degrees of success. In this paper, we propose to jointly learn representations during pretraining from two different modalities: speech and text. The proposed method, tts4pretrain complements the power of contrastive learning in self-su...
false
false
true
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
252,437
1910.05265
Automating dynamic consent decisions for the processing of social media data in health research
Social media have become a rich source of data, particularly in health research. Yet, the use of such data raises significant ethical questions about the need for the informed consent of those being studied. Consent mechanisms, if even obtained, are typically broad and inflexible, or place a significant burden on the p...
true
false
false
true
false
false
true
false
false
false
false
false
false
true
false
false
false
false
149,004
1804.00506
Towards Explanation of DNN-based Prediction with Guided Feature Inversion
While deep neural networks (DNN) have become an effective computational tool, the prediction results are often criticized by the lack of interpretability, which is essential in many real-world applications such as health informatics. Existing attempts based on local interpretations aim to identify relevant features con...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
94,051
2003.00353
Clinical Text Summarization with Syntax-Based Negation and Semantic Concept Identification
In the era of clinical information explosion, a good strategy for clinical text summarization is helpful to improve the clinical workflow. The ideal summarization strategy can preserve important information in the informative but less organized, ill-structured clinical narrative texts. Instead of using pure statistical...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
166,267
2404.16891
Attacks on Third-Party APIs of Large Language Models
Large language model (LLM) services have recently begun offering a plugin ecosystem to interact with third-party API services. This innovation enhances the capabilities of LLMs, but it also introduces risks, as these plugins developed by various third parties cannot be easily trusted. This paper proposes a new attackin...
false
false
false
false
true
false
false
false
true
false
false
false
true
true
false
false
false
false
449,661
1911.10576
Facial Landmark Correlation Analysis
We present a facial landmark position correlation analysis as well as its applications. Although numerous facial landmark detection methods have been presented in the literature, few of them explicitly take into account the inherent relationship among landmarks. To reveal and interpret this relationship, we propose to ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
154,877
2106.05468
Multi-VFL: A Vertical Federated Learning System for Multiple Data and Label Owners
Vertical Federated Learning (VFL) refers to the collaborative training of a model on a dataset where the features of the dataset are split among multiple data owners, while label information is owned by a single data owner. In this paper, we propose a novel method, Multi Vertical Federated Learning (Multi-VFL), to trai...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
240,102
2206.02897
Distributive Justice as the Foundational Premise of Fair ML: Unification, Extension, and Interpretation of Group Fairness Metrics
Group fairness metrics are an established way of assessing the fairness of prediction-based decision-making systems. However, these metrics are still insufficiently linked to philosophical theories, and their moral meaning is often unclear. In this paper, we propose a comprehensive framework for group fairness metrics,...
false
false
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
301,068
2205.02141
RecipeSnap -- a lightweight image-to-recipe model
In this paper we want to address the problem of automation for recognition of photographed cooking dishes and generating the corresponding food recipes. Current image-to-recipe models are computation expensive and require powerful GPUs for model training and implementation. High computational cost prevents those existi...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
294,858
2207.14685
Replacing the Framingham-based equation for prediction of cardiovascular disease risk and adverse outcome by using artificial intelligence and retinal imaging
Purpose: To create and evaluate the accuracy of an artificial intelligence Deep learning platform (ORAiCLE) capable of using only retinal fundus images to predict both an individuals overall 5 year cardiovascular risk (CVD) and the relative contribution of the component risk factors that comprise this risk. Methods: We...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
310,678
1402.6636
Analysis of Multibeam SONAR Data using Dissimilarity Representations
This paper considers the problem of low-dimensional visualisation of very high dimensional information sources for the purpose of situation awareness in the maritime environment. In response to the requirement for human decision support aids to reduce information overload (and specifically, data amenable to inter-point...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
31,193
1102.5364
On Outage Probability and Diversity-Multiplexing Tradeoff in MIMO Relay Channels
Fading MIMO relay channels are studied analytically, when the source and destination are equipped with multiple antennas and the relays have a single one. Compact closed-form expressions are obtained for the outage probability under i.i.d. and correlated Rayleigh-fading links. Low-outage approximations are derived, whi...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
9,373
2403.18413
HyRRT-Connect: A Bidirectional Rapidly-Exploring Random Trees Motion Planning Algorithm for Hybrid Systems
This paper proposes a bidirectional rapidly-exploring random trees (RRT) algorithm to solve the motion planning problem for hybrid systems. The proposed algorithm, called HyRRT-Connect, propagates in both forward and backward directions in hybrid time until an overlap between the forward and backward propagation result...
false
false
false
false
false
false
false
true
false
false
true
false
false
false
false
false
false
false
441,927
2408.04107
ZACK: Zero-Overhead LLM Inference Acceleration via Dimensionality Compression of the Key-Value Cache
In large-language models, memory constraints in the Key-Value Cache (KVC) pose a challenge during inference. In this work, we propose ZACK, the first KV dimensionality compression system that achieves zero-overhead compression and decompression and also reduces attention computation time. It complements and can be comb...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
479,246
2103.10147
A Physics-based and Data-driven Linear Three-Phase Power Flow Model for Distribution Power Systems
Distribution power systems (DPSs) are mostly unbalanced, and their loads may have notable static voltage characteristics (ZIP loads). Hence, despite abundant papers on linear single-phase power flow models, it is still necessary to study linear three-phase distribution power flow models. To this end, this paper propose...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
225,363
1306.1323
Verdict Accuracy of Quick Reduct Algorithm using Clustering and Classification Techniques for Gene Expression Data
In most gene expression data, the number of training samples is very small compared to the large number of genes involved in the experiments. However, among the large amount of genes, only a small fraction is effective for performing a certain task. Furthermore, a small subset of genes is desirable in developing gene e...
false
true
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
25,036
1303.2547
On a family of binary completely transitive codes with growing covering radius
A new family of binary linear completely transitive (and, therefore, completely regular) codes is constructed. The covering radius of these codes is growing with the length of the code. In particular, for any integer r > 1, there exist two codes with d=3, covering radius r and length 2r(4r-1) and (2r+1)(4r+1), respecti...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
22,843
2107.10350
Uncertainty-Aware Task Allocation for Distributed Autonomous Robots
This paper addresses task-allocation problems with uncertainty in situational awareness for distributed autonomous robots (DARs). The uncertainty propagation over a task-allocation process is done by using the Unscented transform that uses the Sigma-Point sampling mechanism. It has great potential to be employed for ge...
false
false
false
false
true
false
false
true
false
false
true
false
false
false
false
false
false
false
247,271
1905.11229
A Novel Demodulation and Estimation Algorithm for Blackout Communication: Extract Principal Components with Deep Learning
For reentry or near space communication, owing to the influence of the time-varying plasma sheath channel environment, the received IQ baseband signals are severely rotated on the constellation. Researches have shown that the frequency of electron density varies from 20kHz to 100 kHz which is on the same order as the s...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
132,365
2205.02673
On Disentangled and Locally Fair Representations
We study the problem of performing classification in a manner that is fair for sensitive groups, such as race and gender. This problem is tackled through the lens of disentangled and locally fair representations. We learn a locally fair representation, such that, under the learned representation, the neighborhood of ea...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
false
295,018
1906.02667
Application of Machine Learning to accidents detection at directional drilling
We present a data-driven algorithm and mathematical model for anomaly alarming at directional drilling. The algorithm is based on machine learning. It compares the real-time drilling telemetry with one corresponding to past accidents and analyses the level of similarity. The model performs a time-series comparison usin...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
134,140
2304.12406
AutoFocusFormer: Image Segmentation off the Grid
Real world images often have highly imbalanced content density. Some areas are very uniform, e.g., large patches of blue sky, while other areas are scattered with many small objects. Yet, the commonly used successive grid downsampling strategy in convolutional deep networks treats all areas equally. Hence, small object...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
360,192
2405.18679
Vim-F: Visual State Space Model Benefiting from Learning in the Frequency Domain
In recent years, State Space Models (SSMs) with efficient hardware-aware designs, known as the Mamba deep learning models, have made significant progress in modeling long sequences such as language understanding. Therefore, building efficient and general-purpose visual backbones based on SSMs is a promising direction. ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
458,529
2001.11921
Predicting Goal-directed Attention Control Using Inverse-Reinforcement Learning
Understanding how goal states control behavior is a question ripe for interrogation by new methods from machine learning. These methods require large and labeled datasets to train models. To annotate a large-scale image dataset with observed search fixations, we collected 16,184 fixations from people searching for eith...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
162,201
2004.09802
Spatio-Temporal Dual Affine Differential Invariant for Skeleton-based Action Recognition
The dynamics of human skeletons have significant information for the task of action recognition. The similarity between trajectories of corresponding joints is an indicating feature of the same action, while this similarity may subject to some distortions that can be modeled as the combination of spatial and temporal a...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
173,458
2404.19218
Flight Trajectory Prediction Using an Enhanced CNN-LSTM Network
Aiming at the problem of low accuracy of flight trajectory prediction caused by the high speed of fighters, the diversity of tactical maneuvers, and the transient nature of situational change in close range air combat, this paper proposes an enhanced CNN-LSTM network as a fighter flight trajectory prediction method. Fi...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
450,545
2311.16075
BioLORD-2023: Semantic Textual Representations Fusing LLM and Clinical Knowledge Graph Insights
In this study, we investigate the potential of Large Language Models to complement biomedical knowledge graphs in the training of semantic models for the biomedical and clinical domains. Drawing on the wealth of the UMLS knowledge graph and harnessing cutting-edge Large Language Models, we propose a new state-of-the-ar...
false
false
false
false
true
true
false
false
true
false
false
false
false
false
false
false
false
false
410,740
1012.3311
Validating XML Documents in the Streaming Model with External Memory
We study the problem of validating XML documents of size $N$ against general DTDs in the context of streaming algorithms. The starting point of this work is a well-known space lower bound. There are XML documents and DTDs for which $p$-pass streaming algorithms require $\Omega(N/p)$ space. We show that when allowing ...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
true
8,546
2111.12927
Rethinking Generic Camera Models for Deep Single Image Camera Calibration to Recover Rotation and Fisheye Distortion
Although recent learning-based calibration methods can predict extrinsic and intrinsic camera parameters from a single image, the accuracy of these methods is degraded in fisheye images. This degradation is caused by mismatching between the actual projection and expected projection. To address this problem, we propose ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
268,128
2103.06877
Fast and Accurate Model Scaling
In this work we analyze strategies for convolutional neural network scaling; that is, the process of scaling a base convolutional network to endow it with greater computational complexity and consequently representational power. Example scaling strategies may include increasing model width, depth, resolution, etc. Whil...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
224,428
2406.01894
SVASTIN: Sparse Video Adversarial Attack via Spatio-Temporal Invertible Neural Networks
Robust and imperceptible adversarial video attack is challenging due to the spatial and temporal characteristics of videos. The existing video adversarial attack methods mainly take a gradient-based approach and generate adversarial videos with noticeable perturbations. In this paper, we propose a novel Sparse Adversar...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
460,507
2409.19993
Mitigating Backdoor Threats to Large Language Models: Advancement and Challenges
The advancement of Large Language Models (LLMs) has significantly impacted various domains, including Web search, healthcare, and software development. However, as these models scale, they become more vulnerable to cybersecurity risks, particularly backdoor attacks. By exploiting the potent memorization capacity of LLM...
false
false
false
false
true
false
true
false
true
false
true
false
true
false
false
false
false
false
492,953
2207.10273
Don't Forget Me: Accurate Background Recovery for Text Removal via Modeling Local-Global Context
Text removal has attracted increasingly attention due to its various applications on privacy protection, document restoration, and text editing. It has shown significant progress with deep neural network. However, most of the existing methods often generate inconsistent results for complex background. To address this i...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
309,194
2103.01929
SoundCLR: Contrastive Learning of Representations For Improved Environmental Sound Classification
Environmental Sound Classification (ESC) is a challenging field of research in non-speech audio processing. Most of current research in ESC focuses on designing deep models with special architectures tailored for specific audio datasets, which usually cannot exploit the intrinsic patterns in the data. However recent st...
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
222,794
2112.04953
Machine Learning for Utility Prediction in Argument-Based Computational Persuasion
Automated persuasion systems (APS) aim to persuade a user to believe something by entering into a dialogue in which arguments and counterarguments are exchanged. To maximize the probability that an APS is successful in persuading a user, it can identify a global policy that will allow it to select the best arguments it...
false
false
false
false
true
false
true
false
false
false
false
false
false
false
false
false
false
true
270,696
2212.11611
Maximising Influence Spread in Complex Networks by Utilising Community-based Driver Nodes as Seeds
Finding a small subset of influential nodes to maximise influence spread in a complex network is an active area of research. Different methods have been proposed in the past to identify a set of seed nodes that can help achieve a faster spread of influence in the network. This paper combines driver node selection metho...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
337,837
2102.10015
Information-Theoretic Abstractions for Resource-Constrained Agents via Mixed-Integer Linear Programming
In this paper, a mixed-integer linear programming formulation for the problem of obtaining task-relevant, multi-resolution, graph abstractions for resource-constrained agents is presented. The formulation leverages concepts from information-theoretic signal compression, specifically the information bottleneck (IB) meth...
false
false
false
false
true
false
false
true
false
true
false
false
false
false
false
false
false
false
220,951
1612.04668
Multi-resolution community detection in massive networks
Aiming at improving the efficiency and accuracy of community detection in complex networks, we proposed a new algorithm, which is based on the idea that communities could be detected from subnetworks by comparing the internal and external cohesion of each subnetwork. In our method, similar nodes are firstly gathered in...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
65,556
2410.14584
MCSFF: Multi-modal Consistency and Specificity Fusion Framework for Entity Alignment
Multi-modal entity alignment (MMEA) is essential for enhancing knowledge graphs and improving information retrieval and question-answering systems. Existing methods often focus on integrating modalities through their complementarity but overlook the specificity of each modality, which can obscure crucial features and r...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
500,085
2409.00082
Towards Human-Level Understanding of Complex Process Engineering Schematics: A Pedagogical, Introspective Multi-Agent Framework for Open-Domain Question Answering
In the chemical and process industries, Process Flow Diagrams (PFDs) and Piping and Instrumentation Diagrams (P&IDs) are critical for design, construction, and maintenance. Recent advancements in Generative AI, such as Large Multimodal Models (LMMs) like GPT4 (Omni), have shown promise in understanding and interpreting...
false
false
false
false
true
false
true
false
true
false
false
true
false
false
false
false
false
false
484,760
cs/0505016
Visual Character Recognition using Artificial Neural Networks
The recognition of optical characters is known to be one of the earliest applications of Artificial Neural Networks, which partially emulate human thinking in the domain of artificial intelligence. In this paper, a simplified neural approach to recognition of optical or visual characters is portrayed and discussed. The...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
538,705
2312.06316
SemiSAM: Enhancing Semi-Supervised Medical Image Segmentation via SAM-Assisted Consistency Regularization
Semi-supervised learning has attracted much attention due to its less dependence on acquiring abundant annotations from experts compared to fully supervised methods, which is especially important for medical image segmentation which typically requires intensive pixel/voxel-wise labeling by domain experts. Although semi...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
414,470
2012.11634
Exploring and Analyzing Machine Commonsense Benchmarks
Commonsense question-answering (QA) tasks, in the form of benchmarks, are constantly being introduced for challenging and comparing commonsense QA systems. The benchmarks provide question sets that systems' developers can use to train and test new models before submitting their implementations to official leaderboards....
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
212,685
2001.07370
Simultaneous Mode, Input and State Set-Valued Observers with Applications to Resilient Estimation Against Sparse Attacks
A simultaneous mode, input and state set-valued observer is proposed for hidden mode switched linear systems with bounded-norm noise and unknown input signals. The observer consists of two constituents: (i) a bank of mode-matched observers and (ii) a mode estimator. Each mode-matched observer recursively outputs the mo...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
161,021
2003.06471
DNN+NeuroSim V2.0: An End-to-End Benchmarking Framework for Compute-in-Memory Accelerators for On-chip Training
DNN+NeuroSim is an integrated framework to benchmark compute-in-memory (CIM) accelerators for deep neural networks, with hierarchical design options from device-level, to circuit-level and up to algorithm-level. A python wrapper is developed to interface NeuroSim with a popular machine learning platform: Pytorch, to su...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
true
168,117
2007.03198
Regional Image Perturbation Reduces $L_p$ Norms of Adversarial Examples While Maintaining Model-to-model Transferability
Regional adversarial attacks often rely on complicated methods for generating adversarial perturbations, making it hard to compare their efficacy against well-known attacks. In this study, we show that effective regional perturbations can be generated without resorting to complex methods. We develop a very simple regio...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
185,981
1901.04791
Mixed Variational Inference
The Laplace approximation has been one of the workhorses of Bayesian inference. It often delivers good approximations in practice despite the fact that it does not strictly take into account where the volume of posterior density lies. Variational approaches avoid this issue by explicitly minimising the Kullback-Leibler...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
118,659
2203.13595
Fast Hybrid Image Retargeting
Image retargeting changes the aspect ratio of images while aiming to preserve content and minimise noticeable distortion. Fast and high-quality methods are particularly relevant at present, due to the large variety of image and display aspect ratios. We propose a retargeting method that quantifies and limits warping di...
false
false
false
false
true
false
false
false
false
false
false
true
false
false
false
false
false
false
287,689
2210.12647
Binary sequences with a low correlation via cyclotomic function fields with odd characteristics
Sequences with a low correlation have very important applications in communications, cryptography, and compressed sensing. In the literature, many efforts have been made to construct good sequences with various lengths where binary sequences attracts great attention. As a result, various constructions of good binary se...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
325,838
1812.05447
Generating Hard Examples for Pixel-wise Classification
Pixel-wise classification in remote sensing identifies entities in large-scale satellite-based images at the pixel level. Few fully annotated large-scale datasets for pixel-wise classification exist due to the challenges of annotating individual pixels. Training data scarcity inevitably ensues from the annotation chall...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
116,411
1912.12740
Practice of Streaming Processing of Dynamic Graphs: Concepts, Models, and Systems
Graph processing has become an important part of various areas of computing, including machine learning, medical applications, social network analysis, computational sciences, and others. A growing amount of the associated graph processing workloads are dynamic, with millions of edges added or removed per second. Graph...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
true
158,920
2312.16218
Hyper-VolTran: Fast and Generalizable One-Shot Image to 3D Object Structure via HyperNetworks
Solving image-to-3D from a single view is an ill-posed problem, and current neural reconstruction methods addressing it through diffusion models still rely on scene-specific optimization, constraining their generalization capability. To overcome the limitations of existing approaches regarding generalization and consis...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
418,311
1708.06694
Structure constrained by metadata in networks of chess players
Chess is an emblematic sport that stands out because of its age, popularity and complexity. It has served to study human behavior from the perspective of a wide number of disciplines, from cognitive skills such as memory and learning, to aspects like innovation and decision making. Given that an extensive documentation...
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
79,363
2406.04038
Road Network Representation Learning with the Third Law of Geography
Road network representation learning aims to learn compressed and effective vectorized representations for road segments that are applicable to numerous tasks. In this paper, we identify the limitations of existing methods, particularly their overemphasis on the distance effect as outlined in the First Law of Geography...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
461,494
2412.08614
Benchmarking Large Vision-Language Models via Directed Scene Graph for Comprehensive Image Captioning
Generating detailed captions comprehending text-rich visual content in images has received growing attention for Large Vision-Language Models (LVLMs). However, few studies have developed benchmarks specifically tailored for detailed captions to measure their accuracy and comprehensiveness. In this paper, we introduce a...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
516,170
2104.01070
MOST: A Multi-Oriented Scene Text Detector with Localization Refinement
Over the past few years, the field of scene text detection has progressed rapidly that modern text detectors are able to hunt text in various challenging scenarios. However, they might still fall short when handling text instances of extreme aspect ratios and varying scales. To tackle such difficulties, we propose in t...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
228,220
cmp-lg/9405031
An Attributive Logic of Set Descriptions and Set Operations
This paper provides a model theoretic semantics to feature terms augmented with set descriptions. We provide constraints to specify HPSG style set descriptions, fixed cardinality set descriptions, set-membership constraints, restricted universal role quantifications, set union, intersection, subset and disjointness. A ...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
536,075
2411.06615
Field Insights for Portable Vine Robots in Urban Search and Rescue
Soft, growing vine robots are well-suited for exploring cluttered, unknown environments, and are theorized to be performant during structural collapse incidents caused by earthquakes, fires, explosions, and material flaws. These vine robots grow from the tip, enabling them to navigate rubble-filled passageways easily. ...
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
507,189
0801.1306
Capacity Bounds for the Gaussian Interference Channel
The capacity region of the two-user Gaussian Interference Channel (IC) is studied. Three classes of channels are considered: weak, one-sided, and mixed Gaussian IC. For the weak Gaussian IC, a new outer bound on the capacity region is obtained that outperforms previously known outer bounds. The sum capacity for a certa...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
1,145
1606.05177
HARQ and AMC: Friends or Foes?
To ensure reliable communication in randomly varying and error-prone channels, wireless systems use adaptive modulation and coding (AMC) as well as hybrid ARQ (HARQ). In order to elucidate their compatibility and interaction, we compare the throughput provided by AMC, HARQ, and their combination (AMC-HARQ) under two op...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
57,364
2108.13332
Overcoming Data Availability Attacks in Blockchain Systems: Short Code-Length LDPC Code Design for Coded Merkle Tree
Light nodes are clients in blockchain systems that only store a small portion of the blockchain ledger. In certain blockchains, light nodes are vulnerable to a data availability (DA) attack where a malicious node makes the light nodes accept an invalid block by hiding the invalid portion of the block from the nodes in ...
false
false
false
false
false
false
false
false
false
true
false
false
true
false
false
false
false
false
252,776
2405.00208
A Primer on the Inner Workings of Transformer-based Language Models
The rapid progress of research aimed at interpreting the inner workings of advanced language models has highlighted a need for contextualizing the insights gained from years of work in this area. This primer provides a concise technical introduction to the current techniques used to interpret the inner workings of Tran...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
450,829
1705.06000
One Shot Joint Colocalization and Cosegmentation
This paper presents a novel framework in which image cosegmentation and colocalization are cast into a single optimization problem that integrates information from low level appearance cues with that of high level localization cues in a very weakly supervised manner. In contrast to multi-task learning paradigm that lea...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
73,584
2409.17774
Faithfulness and the Notion of Adversarial Sensitivity in NLP Explanations
Faithfulness is arguably the most critical metric to assess the reliability of explainable AI. In NLP, current methods for faithfulness evaluation are fraught with discrepancies and biases, often failing to capture the true reasoning of models. We introduce Adversarial Sensitivity as a novel approach to faithfulness ev...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
491,974
1511.02633
Norm minimized Scattering Data from Intensity Spectra
We apply the $l_1$ minimizing technique of compressive sensing (CS) to non-linear quadratic observations. For the example of coherent X-ray scattering we provide the formulae for a Kalman filter approach to quadratic CS and show how to reconstruct the scattering data from their spatial intensity distribution.
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
48,668
2406.07877
Hierarchical Reinforcement Learning for Swarm Confrontation with High Uncertainty
In swarm robotics, confrontation including the pursuit-evasion game is a key scenario. High uncertainty caused by unknown opponents' strategies, dynamic obstacles, and insufficient training complicates the action space into a hybrid decision process. Although the deep reinforcement learning method is significant for sw...
false
false
false
false
true
false
true
true
false
false
false
false
false
false
false
false
false
false
463,254
2006.11132
Deep Transformation-Invariant Clustering
Recent advances in image clustering typically focus on learning better deep representations. In contrast, we present an orthogonal approach that does not rely on abstract features but instead learns to predict image transformations and performs clustering directly in image space. This learning process naturally fits in...
false
false
false
false
false
false
true
false
false
false
false
true
false
false
false
false
false
false
183,112
1511.03897
IfcWoD, Semantically Adapting IFC Model Relations into OWL Properties
In the context of Building Information Modelling, ontologies have been identified as interesting in achieving information interoperability. Regarding the construction and facility management domains, several IFC (Industry Foundation Classes) based ontologies have been developed, such as IfcOWL. In the context of ontolo...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
48,813
2401.08202
IsamasRed: A Public Dataset Tracking Reddit Discussions on Israel-Hamas Conflict
The conflict between Israel and Palestinians significantly escalated after the October 7, 2023 Hamas attack, capturing global attention. To understand the public discourse on this conflict, we present a meticulously compiled dataset-IsamasRed-comprising nearly 400,000 conversations and over 8 million comments from Redd...
false
false
false
true
false
false
false
false
false
false
false
false
false
true
false
false
false
true
421,803
1608.03757
Student's t Distribution based Estimation of Distribution Algorithms for Derivative-free Global Optimization
In this paper, we are concerned with a branch of evolutionary algorithms termed estimation of distribution (EDA), which has been successfully used to tackle derivative-free global optimization problems. For existent EDA algorithms, it is a common practice to use a Gaussian distribution or a mixture of Gaussian componen...
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
true
false
false
59,721
2005.05812
Estimating the Cheeger constant using machine learning
In this paper, we use machine learning to show that the Cheeger constant of a connected regular graph has a predominant linear dependence on the largest two eigenvalues of the graph spectrum. We also show that a trained deep neural network on graphs of smaller sizes can be used as an effective estimator in estimating t...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
176,835
2305.13235
SPARSEFIT: Few-shot Prompting with Sparse Fine-tuning for Jointly Generating Predictions and Natural Language Explanations
Models that generate natural language explanations (NLEs) for their predictions have recently gained increasing interest. However, this approach usually demands large datasets of human-written NLEs for the ground-truth answers at training time, which can be expensive and potentially infeasible for some applications. Wh...
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
false
false
366,411
2405.09362
On the Saturation Effect of Kernel Ridge Regression
The saturation effect refers to the phenomenon that the kernel ridge regression (KRR) fails to achieve the information theoretical lower bound when the smoothness of the underground truth function exceeds certain level. The saturation effect has been widely observed in practices and a saturation lower bound of KRR has ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
454,381
1305.5663
Applications of Clifford's Geometric Algebra
We survey the development of Clifford's geometric algebra and some of its engineering applications during the last 15 years. Several recently developed applications and their merits are discussed in some detail. We thus hope to clearly demonstrate the benefit of developing problem solutions in a unified framework for a...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
24,775
2106.10529
Graph Neural Networks for Learning Real-Time Prices in Electricity Market
Solving the optimal power flow (OPF) problem in real-time electricity market improves the efficiency and reliability in the integration of low-carbon energy resources into the power grids. To address the scalability and adaptivity issues of existing end-to-end OPF learning solutions, we propose a new graph neural netwo...
false
false
false
false
false
false
true
false
false
false
true
false
false
false
false
false
false
false
242,055
1405.3515
Temporal Analysis of Language through Neural Language Models
We provide a method for automatically detecting change in language across time through a chronologically trained neural language model. We train the model on the Google Books Ngram corpus to obtain word vector representations specific to each year, and identify words that have changed significantly from 1900 to 2009. T...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
33,095
2403.00067
Query-OPT: Optimizing Inference of Large Language Models via Multi-Query Instructions in Meeting Summarization
This work focuses on the task of query-based meeting summarization in which the summary of a context (meeting transcript) is generated in response to a specific query. When using Large Language Models (LLMs) for this task, usually a new call to the LLM inference endpoint/API is triggered for each new query, even if the...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
433,849
2411.02669
Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack
Vision-language pre-training (VLP) models excel at interpreting both images and text but remain vulnerable to multimodal adversarial examples (AEs). Advancing the generation of transferable AEs, which succeed across unseen models, is key to developing more robust and practical VLP models. Previous approaches augment im...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
505,606
2311.06643
Privacy Risks Analysis and Mitigation in Federated Learning for Medical Images
Federated learning (FL) is gaining increasing popularity in the medical domain for analyzing medical images, which is considered an effective technique to safeguard sensitive patient data and comply with privacy regulations. However, several recent studies have revealed that the default settings of FL may leak private ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
407,016
1811.08355
Design and Analysis of Distributed State Estimation Algorithms Based on Belief Propagation and Applications in Smart Grids
We present a detailed study on application of factor graphs and the belief propagation (BP) algorithm to the power system state estimation (SE) problem. We start from the BP solution for the linear DC model, for which we provide a detailed convergence analysis. Using BP-based DC model we propose a fast real-time state ...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
114,020
2201.10665
Writer Recognition Using Off-line Handwritten Single Block Characters
Block characters are often used when filling paper forms for a variety of purposes. We investigate if there is biometric information contained within individual digits of handwritten text. In particular, we use personal identity numbers consisting of the six digits of the date of birth, DoB. We evaluate two recognition...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
277,064
2402.00069
Using the Abstract Computer Architecture Description Language to Model AI Hardware Accelerators
Artificial Intelligence (AI) has witnessed remarkable growth, particularly through the proliferation of Deep Neural Networks (DNNs). These powerful models drive technological advancements across various domains. However, to harness their potential in real-world applications, specialized hardware accelerators are essent...
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
true
425,470
1112.0383
Bounds on and Constructions of Unit Time-Phase Signal Sets
Digital signals are complex-valued functions on $\Z_n$. Signal sets with certain properties are required in various communication systems. Traditional signal sets consider only the time distortion during transmission. Recently, signal sets against both the time and phase distortion have been studied, and are called {\e...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
13,289
1810.00839
Network Modeling and Pathway Inference from Incomplete Data ("PathInf")
In this work, we developed a network inference method from incomplete data ("PathInf") , as massive and non-uniformly distributed missing values is a common challenge in practical problems. PathInf is a two-stages inference model. In the first stage, it applies a data summarization model based on maximum likelihood to ...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
109,270
2004.05086
Secret Key Generation from Vector Gaussian Sources with Public and Private Communications
In this paper, we consider the problem of secret key generation with one-way communication through both a rate-limited public channel and a rate-limited secure channels where the public channel is from Alice to Bob and Eve and the secure channel is from Alice to Bob. In this model, we do not pose any constraints on the...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
172,087
2011.09946
Data Driven Modeling of Interfacial Traction Separation Relations using a Thermodynamically Consistent Neural Network
For multilayer structures, interfacial failure is one of the most important elements related to device reliability. For cohesive zone modelling, traction-separation relations represent the adhesive interactions across interfaces. However, existing theoretical models do not currently capture traction-separation relation...
false
true
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
false
207,368
2103.05243
On the Generalization Power of Overfitted Two-Layer Neural Tangent Kernel Models
In this paper, we study the generalization performance of min $\ell_2$-norm overfitting solutions for the neural tangent kernel (NTK) model of a two-layer neural network with ReLU activation that has no bias term. We show that, depending on the ground-truth function, the test error of overfitted NTK models exhibits cha...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
223,916
2312.08413
Privacy Constrained Fairness Estimation for Decision Trees
The protection of sensitive data becomes more vital, as data increases in value and potency. Furthermore, the pressure increases from regulators and society on model developers to make their Artificial Intelligence (AI) models non-discriminatory. To boot, there is a need for interpretable, transparent AI models for hig...
false
false
false
false
false
false
true
false
false
false
false
false
true
true
false
false
false
false
415,302
1802.06450
Reducing Initial Cell-search Latency in mmWave Networks
Millimeter-wave (mmWave) networks rely on directional transmissions, in both control plane and data plane, to overcome severe path-loss. Nevertheless, the use of narrow beams complicates the initial cell-search procedure where we lack sufficient information for beamforming. In this paper, we investigate the feasibility...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
true
90,675
2405.19590
Weights Augmentation: it has never ever ever ever let her model down
Weight play an essential role in deep learning network models. Unlike network structure design, this article proposes the concept of weight augmentation, focusing on weight exploration. The core of Weight Augmentation Strategy (WAS) is to adopt random transformed weight coefficients training and transformed coefficient...
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
458,960
1806.06298
Deformable Generator Networks: Unsupervised Disentanglement of Appearance and Geometry
We present a deformable generator model to disentangle the appearance and geometric information for both image and video data in a purely unsupervised manner. The appearance generator network models the information related to appearance, including color, illumination, identity or category, while the geometric generator...
false
false
false
false
true
false
true
false
false
false
false
true
false
false
false
false
false
false
100,674
2307.08672
FedDefender: Backdoor Attack Defense in Federated Learning
Federated Learning (FL) is a privacy-preserving distributed machine learning technique that enables individual clients (e.g., user participants, edge devices, or organizations) to train a model on their local data in a secure environment and then share the trained model with an aggregator to build a global model collab...
false
false
false
false
true
false
true
false
false
false
false
true
true
false
false
false
false
false
379,894
1509.07859
Information Limits for Recovering a Hidden Community
We study the problem of recovering a hidden community of cardinality $K$ from an $n \times n$ symmetric data matrix $A$, where for distinct indices $i,j$, $A_{ij} \sim P$ if $i, j$ both belong to the community and $A_{ij} \sim Q$ otherwise, for two known probability distributions $P$ and $Q$ depending on $n$. If $P={\r...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
47,297
2306.15091
Understanding In-Context Learning via Supportive Pretraining Data
In-context learning (ICL) improves language models' performance on a variety of NLP tasks by simply demonstrating a handful of examples at inference time. It is not well understood why ICL ability emerges, as the model has never been specifically trained on such demonstrations. Unlike prior work that explores implicit ...
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
375,904
1804.10516
Rate-Splitting Multiple Access for Coordinated Multi-Point Joint Transmission
As a promising downlink multiple access scheme, Rate-Splitting Multiple Access (RSMA) has been shown to achieve superior spectral and energy efficiencies compared with Space-Division Multiple Access (SDMA) and Non-Orthogonal Multiple Access (NOMA) in downlink single-cell systems. By relying on linearly precoded rate-sp...
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
false
96,176
2207.06223
Job Offers Classifier using Neural Networks and Oversampling Methods
Both policy and research benefit from a better understanding of individuals' jobs. However, as large-scale administrative records are increasingly employed to represent labor market activity, new automatic methods to classify jobs will become necessary. We developed an automatic job offers classifier using a dataset co...
false
false
false
false
false
true
true
false
false
false
false
false
false
false
false
false
false
false
307,807
1705.09422
Text-Independent Speaker Verification Using 3D Convolutional Neural Networks
In this paper, a novel method using 3D Convolutional Neural Network (3D-CNN) architecture has been proposed for speaker verification in the text-independent setting. One of the main challenges is the creation of the speaker models. Most of the previously-reported approaches create speaker models based on averaging the ...
false
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
74,194
2304.12650
THUIR at WSDM Cup 2023 Task 1: Unbiased Learning to Rank
This paper introduces the approaches we have used to participate in the WSDM Cup 2023 Task 1: Unbiased Learning to Rank. In brief, we have attempted a combination of both traditional IR models and transformer-based cross-encoder architectures. To further enhance the ranking performance, we also considered a series of f...
false
false
false
false
false
true
false
false
false
false
false
false
false
false
false
false
false
false
360,305
2102.10289
Recurrent Model Predictive Control: Learning an Explicit Recurrent Controller for Nonlinear Systems
This paper proposes an offline control algorithm, called Recurrent Model Predictive Control (RMPC), to solve large-scale nonlinear finite-horizon optimal control problems. It can be regarded as an explicit solver of traditional Model Predictive Control (MPC) algorithms, which can adaptively select appropriate model pre...
false
false
false
false
false
false
false
false
false
false
true
false
false
false
false
false
false
false
221,038