id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1305.3586 | Utility Optimal Scheduling and Admission Control for Adaptive Video
Streaming in Small Cell Networks | We consider the jointly optimal design of a transmission scheduling and admission control policy for adaptive video streaming over small cell networks. We formulate the problem as a dynamic network utility maximization and observe that it naturally decomposes into two subproblems: admission control and transmission sch... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 24,618 |
2310.00653 | Reformulating Vision-Language Foundation Models and Datasets Towards
Universal Multimodal Assistants | Recent Multimodal Large Language Models (MLLMs) exhibit impressive abilities to perceive images and follow open-ended instructions. The capabilities of MLLMs depend on two crucial factors: the model architecture to facilitate the feature alignment of visual modules and large language models; the multimodal instruction ... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 396,079 |
2101.11302 | Multilingual and cross-lingual document classification: A meta-learning
approach | The great majority of languages in the world are considered under-resourced for the successful application of deep learning methods. In this work, we propose a meta-learning approach to document classification in limited-resource setting and demonstrate its effectiveness in two different settings: few-shot, cross-lingu... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 217,230 |
1611.04687 | Intrinsic Geometric Information Transfer Learning on Multiple
Graph-Structured Datasets | Graphs provide a powerful means for representing complex interactions between entities. Recently, deep learning approaches are emerging for representing and modeling graph-structured data, although the conventional deep learning methods (such as convolutional neural networks and recurrent neural networks) have mainly f... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 63,885 |
2401.15864 | Spatial Decomposition and Temporal Fusion based Inter Prediction for
Learned Video Compression | Video compression performance is closely related to the accuracy of inter prediction. It tends to be difficult to obtain accurate inter prediction for the local video regions with inconsistent motion and occlusion. Traditional video coding standards propose various technologies to handle motion inconsistency and occlus... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 424,618 |
2301.12012 | In-Distribution Barrier Functions: Self-Supervised Policy Filters that
Avoid Out-of-Distribution States | Learning-based control approaches have shown great promise in performing complex tasks directly from high-dimensional perception data for real robotic systems. Nonetheless, the learned controllers can behave unexpectedly if the trajectories of the system divert from the training data distribution, which can compromise ... | false | false | false | false | false | false | true | true | false | false | true | false | false | false | false | false | false | false | 342,349 |
1611.04654 | Asymptotic Performance Analysis of Majority Sentiment Detection in
Online Social Networks | We analyze the problem of majority sentiment detection in Online Social Networks (OSN), and relate the detection error probability to the underlying graph of the OSN. Modeling the underlying social network as an Ising Markov random field prior based on a given graph, we show that in the case of the empty graph (indepen... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 63,878 |
2011.07980 | Spherical convolutions on molecular graphs for protein model quality
assessment | Processing information on 3D objects requires methods stable to rigid-body transformations, in particular rotations, of the input data. In image processing tasks, convolutional neural networks achieve this property using rotation-equivariant operations. However, contrary to images, graphs generally have irregular topol... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 206,731 |
2401.01887 | LEAP-VO: Long-term Effective Any Point Tracking for Visual Odometry | Visual odometry estimates the motion of a moving camera based on visual input. Existing methods, mostly focusing on two-view point tracking, often ignore the rich temporal context in the image sequence, thereby overlooking the global motion patterns and providing no assessment of the full trajectory reliability. These ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 419,535 |
1701.08259 | Detection, Segmentation and Recognition of Face and its Features Using
Neural Network | Face detection and recognition has been prevalent with research scholars and diverse approaches have been incorporated till date to serve purpose. The rampant advent of biometric analysis systems, which may be full body scanners, or iris detection and recognition systems and the finger print recognition systems, and su... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | false | 67,431 |
1906.02778 | Active Deep Decoding of Linear Codes | High quality data is essential in deep learning to train a robust model. While in other fields data is sparse and costly to collect, in error decoding it is free to query and label thus allowing potential data exploitation. Utilizing this fact and inspired by active learning, two novel methods are introduced to improve... | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | 134,172 |
2304.03973 | RobCaps: Evaluating the Robustness of Capsule Networks against Affine
Transformations and Adversarial Attacks | Capsule Networks (CapsNets) are able to hierarchically preserve the pose relationships between multiple objects for image classification tasks. Other than achieving high accuracy, another relevant factor in deploying CapsNets in safety-critical applications is the robustness against input transformations and malicious ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 357,016 |
1810.03102 | A Fast Text Similarity Measure for Large Document Collections using
Multi-reference Cosine and Genetic Algorithm | One of the important factors that make a search engine fast and accurate is a concise and duplicate free index. In order to remove duplicate and near-duplicate documents from the index, a search engine needs a swift and reliable duplicate and near-duplicate text document detection system. Traditional approaches to this... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 109,737 |
2408.12709 | Autonomous Grid-Forming Inverter Exponential Droop Control for Improved
Frequency Stability | This paper introduces the novel Droop-e grid-forming power electronic converter control strategy, which establishes a non-linear, active power--frequency droop relationship based on an exponential function of the power output. A primary advantage of Droop-e is an increased utilization of available power headroom that d... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 482,850 |
2401.12995 | Harmonizing Code-mixed Conversations: Personality-assisted Code-mixed
Response Generation in Dialogues | Code-mixing, the blending of multiple languages within a single conversation, introduces a distinctive challenge, particularly in the context of response generation. Capturing the intricacies of code-mixing proves to be a formidable task, given the wide-ranging variations influenced by individual speaking styles and cu... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 423,577 |
2403.06396 | A Segmentation Foundation Model for Diverse-type Tumors | Large pre-trained models with their numerous model parameters and extensive training datasets have shown excellent performance in various tasks. Many publicly available medical image datasets do not have a sufficient amount of data so there are few large-scale models in medical imaging. We propose a large-scale Tumor S... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 436,427 |
2011.11487 | Verifying the Correctness of Analytic Query Results | Data outsourcing is a cost-effective solution for data owners to tackle issues such as large volumes of data, huge number of users, and intensive computation needed for data analysis. They can simply upload their databases to a cloud and let it perform all management works, including query processing. One problem with ... | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | 207,840 |
2007.12421 | Micro-expression spotting: A new benchmark | Micro-expressions (MEs) are brief and involuntary facial expressions that occur when people are trying to hide their true feelings or conceal their emotions. Based on psychology research, MEs play an important role in understanding genuine emotions, which leads to many potential applications. Therefore, ME analysis has... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 188,819 |
2303.01330 | Continuous Implicit SDF Based Any-shape Robot Trajectory Optimization | Optimization-based trajectory generation methods are widely used in whole-body planning for robots. However, existing work either oversimplifies the robot's geometry and environment representation, resulting in a conservative trajectory, or suffers from a huge overhead in maintaining additional information such as the ... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 348,926 |
2303.10216 | Approximation of group explainers with coalition structure using Monte
Carlo sampling on the product space of coalitions and features | In recent years, many Machine Learning (ML) explanation techniques have been designed using ideas from cooperative game theory. These game-theoretic explainers suffer from high complexity, hindering their exact computation in practical settings. In our work, we focus on a wide class of linear game values, as well as co... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 352,352 |
2212.11078 | C2F-TCN: A Framework for Semi and Fully Supervised Temporal Action
Segmentation | Temporal action segmentation tags action labels for every frame in an input untrimmed video containing multiple actions in a sequence. For the task of temporal action segmentation, we propose an encoder-decoder-style architecture named C2F-TCN featuring a "coarse-to-fine" ensemble of decoder outputs. The C2F-TCN framew... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 337,683 |
2406.09765 | Application of Natural Language Processing in Financial Risk Detection | This paper explores the application of Natural Language Processing (NLP) in financial risk detection. By constructing an NLP-based financial risk detection model, this study aims to identify and predict potential risks in financial documents and communications. First, the fundamental concepts of NLP and its theoretical... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 464,073 |
1410.4426 | Partial Force Control of Constrained Floating-Base Robots | Legged robots are typically in rigid contact with the environment at multiple locations, which add a degree of complexity to their control. We present a method to control the motion and a subset of the contact forces of a floating-base robot. We derive a new formulation of the lexicographic optimization problem typical... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 36,803 |
1910.01671 | Pure and Spurious Critical Points: a Geometric Study of Linear Networks | The critical locus of the loss function of a neural network is determined by the geometry of the functional space and by the parameterization of this space by the network's weights. We introduce a natural distinction between pure critical points, which only depend on the functional space, and spurious critical points, ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 147,996 |
1805.08263 | Learning What Information to Give in Partially Observed Domains | In many robotic applications, an autonomous agent must act within and explore a partially observed environment that is unobserved by its human teammate. We consider such a setting in which the agent can, while acting, transmit declarative information to the human that helps them understand aspects of this unseen enviro... | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | 98,084 |
2401.04235 | High-precision Voice Search Query Correction via Retrievable Speech-text
Embedings | Automatic speech recognition (ASR) systems can suffer from poor recall for various reasons, such as noisy audio, lack of sufficient training data, etc. Previous work has shown that recall can be improved by retrieving rewrite candidates from a large database of likely, contextually-relevant alternatives to the hypoth... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 420,365 |
1805.03225 | A Mixed Classification-Regression Framework for 3D Pose Estimation from
2D Images | 3D pose estimation from a single 2D image is an important and challenging task in computer vision with applications in autonomous driving, robot manipulation and augmented reality. Since 3D pose is a continuous quantity, a natural formulation for this task is to solve a pose regression problem. However, since pose regr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 97,005 |
1804.02608 | Penetrating a Social Network: The Follow-back Problem | Modern threats have emerged from the prevalence of social networks. Hostile actors, such as extremist groups or foreign governments, utilize these networks to run propaganda campaigns with different aims. For extremists, these campaigns are designed for recruiting new members or inciting violence. For foreign governmen... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 94,444 |
1706.00536 | Modeling Latent Attention Within Neural Networks | Deep neural networks are able to solve tasks across a variety of domains and modalities of data. Despite many empirical successes, we lack the ability to clearly understand and interpret the learned internal mechanisms that contribute to such effective behaviors or, more critically, failure modes. In this work, we pres... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 74,639 |
2202.02894 | Effects of Parametric and Non-Parametric Methods on High Dimensional
Sparse Matrix Representations | The semantics are derived from textual data that provide representations for Machine Learning algorithms. These representations are interpretable form of high dimensional sparse matrix that are given as an input to the machine learning algorithms. Since learning methods are broadly classified as parametric and non-para... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 278,990 |
1910.07995 | Hybrid Fuzzy Control of Nonlinear Inverted Pendulum System | Complexity and nonlinear behaviours of inverted pendulum system make its control design a very challenging task. In this paper, a hybrid fuzzy adaptive control system using model reference approach is designed for inverted-pendulum system control. The proposed method is developed to achieve position control and later s... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 149,752 |
2405.17618 | Symmetric Reinforcement Learning Loss for Robust Learning on Diverse
Tasks and Model Scales | Reinforcement learning (RL) training is inherently unstable due to factors such as moving targets and high gradient variance. Reinforcement Learning from Human Feedback (RLHF) and Reinforcement Learning from AI Feedback (RLAIF) can introduce additional difficulty. Differing preferences can complicate the alignment proc... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 458,028 |
2010.12797 | Collaborative Machine Learning with Incentive-Aware Model Rewards | Collaborative machine learning (ML) is an appealing paradigm to build high-quality ML models by training on the aggregated data from many parties. However, these parties are only willing to share their data when given enough incentives, such as a guaranteed fair reward based on their contributions. This motivates the n... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | true | 202,859 |
2106.09234 | Denoising Distantly Supervised Named Entity Recognition via a
Hypergeometric Probabilistic Model | Denoising is the essential step for distant supervision based named entity recognition. Previous denoising methods are mostly based on instance-level confidence statistics, which ignore the variety of the underlying noise distribution on different datasets and entity types. This makes them difficult to be adapted to hi... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 241,591 |
2102.11228 | Subspace-Based Feature Fusion From Hyperspectral And Multispectral Image
For Land Cover Classification | In remote sensing, hyperspectral (HS) and multispectral (MS) image fusion have emerged as a synthesis tool to improve the data set resolution. However, conventional image fusion methods typically degrade the performance of the land cover classification. In this paper, a feature fusion method from HS and MS images for p... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 221,359 |
2203.03893 | Towards Large-Scale Relative Localization in Multi-Robot Systems with
Dynamic UWB Role Allocation | Ultra-wideband (UWB) ranging has emerged as a key radio technology for robot positioning and relative localization in multi-robot systems. Multiple works are now advancing towards more scalable systems, but challenges still remain. This paper proposes a novel approach to relative localization in multi-robot systems whe... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 284,266 |
2011.09769 | Data-Driven Robust Optimization using Unsupervised Deep Learning | Robust optimization has been established as a leading methodology to approach decision problems under uncertainty. To derive a robust optimization model, a central ingredient is to identify a suitable model for uncertainty, which is called the uncertainty set. An ongoing challenge in the recent literature is to derive ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 207,299 |
2401.08261 | Probabilistically Robust Watermarking of Neural Networks | As deep learning (DL) models are widely and effectively used in Machine Learning as a Service (MLaaS) platforms, there is a rapidly growing interest in DL watermarking techniques that can be used to confirm the ownership of a particular model. Unfortunately, these methods usually produce watermarks susceptible to model... | false | false | false | false | true | false | false | false | false | false | false | false | true | false | false | false | false | false | 421,828 |
1802.04431 | Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic
Thresholding | As spacecraft send back increasing amounts of telemetry data, improved anomaly detection systems are needed to lessen the monitoring burden placed on operations engineers and reduce operational risk. Current spacecraft monitoring systems only target a subset of anomaly types and often require costly expert knowledge to... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 90,219 |
2304.00006 | Bi-directional personalization reinforcement learning-based architecture
with active learning using a multi-model data service for the travel nursing
industry | The challenges of using inadequate online recruitment systems can be addressed with machine learning and software engineering techniques. Bi-directional personalization reinforcement learning-based architecture with active learning can get recruiters to recommend qualified applicants and also enable applicants to recei... | false | false | false | false | true | true | true | false | false | false | false | false | false | false | false | false | false | false | 355,523 |
1208.0432 | Efficient Point-to-Subspace Query in $\ell^1$ with Application to Robust
Object Instance Recognition | Motivated by vision tasks such as robust face and object recognition, we consider the following general problem: given a collection of low-dimensional linear subspaces in a high-dimensional ambient (image) space, and a query point (image), efficiently determine the nearest subspace to the query in $\ell^1$ distance. In... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 17,915 |
2210.00801 | Design of the PID temperature controller for an alkaline electrolysis
system with time delays | Electrolysis systems use proportional-integral-derivative (PID) temperature controllers to maintain stack temperatures around set points. However, heat transfer delays in electrolysis systems cause manual tuning of PID temperature controllers to be time-consuming, and temperature oscillations often occur. This paper fo... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 321,008 |
1909.04102 | LIC-Fusion: LiDAR-Inertial-Camera Odometry | This paper presents a tightly-coupled multi-sensor fusion algorithm termed LiDAR-inertial-camera fusion (LIC-Fusion), which efficiently fuses IMU measurements, sparse visual features, and extracted LiDAR points. In particular, the proposed LIC-Fusion performs online spatial and temporal sensor calibration between all t... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 144,691 |
2110.04663 | Learning to Control Complex Robots Using High-Dimensional Interfaces:
Preliminary Insights | Human body motions can be captured as a high-dimensional continuous signal using motion sensor technologies. The resulting data can be surprisingly rich in information, even when captured from persons with limited mobility. In this work, we explore the use of limited upper-body motions, captured via motion sensors, as ... | true | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | 259,989 |
1904.12072 | Flow-based generative models for Markov chain Monte Carlo in lattice
field theory | A Markov chain update scheme using a machine-learned flow-based generative model is proposed for Monte Carlo sampling in lattice field theories. The generative model may be optimized (trained) to produce samples from a distribution approximating the desired Boltzmann distribution determined by the lattice action of the... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 129,008 |
2402.16912 | An Adversarial Robustness Benchmark for Enterprise Network Intrusion
Detection | As cyber-attacks become more sophisticated, improving the robustness of Machine Learning (ML) models must be a priority for enterprises of all sizes. To reliably compare the robustness of different ML models for cyber-attack detection in enterprise computer networks, they must be evaluated in standardized conditions. T... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | true | 432,769 |
1904.02520 | Deep Multi-scale Discriminative Networks for Double JPEG Compression
Forensics | As JPEG is the most widely used image format, the importance of tampering detection for JPEG images in blind forensics is self-evident. In this area, extracting effective statistical characteristics from a JPEG image for classification remains a challenge. Effective features are designed manually in traditional methods... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 126,453 |
2204.09498 | Backdooring Explainable Machine Learning | Explainable machine learning holds great potential for analyzing and understanding learning-based systems. These methods can, however, be manipulated to present unfaithful explanations, giving rise to powerful and stealthy adversaries. In this paper, we demonstrate blinding attacks that can fully disguise an ongoing at... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 292,459 |
1612.03551 | Reading Comprehension using Entity-based Memory Network | This paper introduces a novel neural network model for question answering, the \emph{entity-based memory network}. It enhances neural networks' ability of representing and calculating information over a long period by keeping records of entities contained in text. The core component is a memory pool which comprises ent... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 65,393 |
2109.05558 | CoG: a Two-View Co-training Framework for Defending Adversarial Attacks
on Graph | Graph neural networks exhibit remarkable performance in graph data analysis. However, the robustness of GNN models remains a challenge. As a result, they are not reliable enough to be deployed in critical applications. Recent studies demonstrate that GNNs could be easily fooled with adversarial perturbations, especiall... | false | false | false | false | false | false | true | false | false | false | false | false | true | false | false | false | false | false | 254,841 |
2402.10202 | Bridging Associative Memory and Probabilistic Modeling | Associative memory and probabilistic modeling are two fundamental topics in artificial intelligence. The first studies recurrent neural networks designed to denoise, complete and retrieve data, whereas the second studies learning and sampling from probability distributions. Based on the observation that associative mem... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 429,866 |
2012.13470 | GIS-Based Estimation of Seasonal Solar Energy Potential for Parking Lots
and Roads | The amount of sun cast on roads and parking lots determines the charging opportunities for solar vehicles and impacts the efficiency of conventional vehicles. Estimates of solar energy potential on urban surfaces to assess parking and driving conditions need to account for the shadows cast by surrounding trees and buil... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | 213,226 |
2009.08061 | Certifying Confidence via Randomized Smoothing | Randomized smoothing has been shown to provide good certified-robustness guarantees for high-dimensional classification problems. It uses the probabilities of predicting the top two most-likely classes around an input point under a smoothing distribution to generate a certified radius for a classifier's prediction. How... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 196,120 |
2103.11388 | Collaborative Agent Gameplay in the Pandemic Board Game | While artificial intelligence has been applied to control players' decisions in board games for over half a century, little attention is given to games with no player competition. Pandemic is an exemplar collaborative board game where all players coordinate to overcome challenges posed by events occurring during the ga... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | false | false | 225,792 |
2210.16544 | Better Lightweight Network for Free: Codeword Mimic Learning for Massive
MIMO CSI feedback | The channel state information (CSI) needs to be fed back from the user equipment (UE) to the base station (BS) in frequency division duplexing (FDD) multiple-input multiple-output (MIMO) system. Recently, neural networks are widely applied to CSI compressed feedback since the original overhead is too large for the mass... | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | false | false | 327,374 |
1708.01354 | CASSL: Curriculum Accelerated Self-Supervised Learning | Recent self-supervised learning approaches focus on using a few thousand data points to learn policies for high-level, low-dimensional action spaces. However, scaling this framework for high-dimensional control require either scaling up the data collection efforts or using a clever sampling strategy for training. We pr... | false | false | false | false | false | false | true | true | false | false | false | true | false | false | false | false | false | false | 78,369 |
2312.15098 | Unsupervised Auditory and Semantic Entrainment Models with Deep Neural
Networks | Speakers tend to engage in adaptive behavior, known as entrainment, when they become similar to their interlocutor in various aspects of speaking. We present an unsupervised deep learning framework that derives meaningful representation from textual features for developing semantic entrainment. We investigate the model... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 417,868 |
2011.13843 | SFTrack++: A Fast Learnable Spectral Segmentation Approach for
Space-Time Consistent Tracking | We propose an object tracking method, SFTrack++, that smoothly learns to preserve the tracked object consistency over space and time dimensions by taking a spectral clustering approach over the graph of pixels from the video, using a fast 3D filtering formulation for finding the principal eigenvector of this graph's ad... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 208,601 |
2007.02269 | Rethinking Bottleneck Structure for Efficient Mobile Network Design | The inverted residual block is dominating architecture design for mobile networks recently. It changes the classic residual bottleneck by introducing two design rules: learning inverted residuals and using linear bottlenecks. In this paper, we rethink the necessity of such design changes and find it may bring risks of ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 185,691 |
2302.09276 | Transformer-Based Neural Marked Spatio Temporal Point Process Model for
Football Match Events Analysis | With recently available football match event data that record the details of football matches, analysts and researchers have a great opportunity to develop new performance metrics, gain insight, and evaluate key performance. However, most sports sequential events modeling methods and performance metrics approaches coul... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 346,352 |
2003.05385 | hp-VPINNs: Variational Physics-Informed Neural Networks With Domain
Decomposition | We formulate a general framework for hp-variational physics-informed neural networks (hp-VPINNs) based on the nonlinear approximation of shallow and deep neural networks and hp-refinement via domain decomposition and projection onto space of high-order polynomials. The trial space is the space of neural network, which ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | true | 167,842 |
2203.06278 | Distributed Dual Quaternion Based Localization of Visual Sensor Networks | In this paper we consider the localization problem for a visual sensor network. Inspired by the alternate attitude and position distributed optimization framework discussed in [1], we propose an estimation scheme that exploits the unit dual quaternion algebra to describe the sensors pose. This representation is benefic... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 285,055 |
2008.11149 | Spatiotemporal Action Recognition in Restaurant Videos | Spatiotemporal action recognition is the task of locating and classifying actions in videos. Our project applies this task to analyzing video footage of restaurant workers preparing food, for which potential applications include automated checkout and inventory management. Such videos are quite different from the stand... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 193,190 |
1902.09357 | CFM-BD: a distributed rule induction algorithm for building Compact
Fuzzy Models in Big Data classification problems | Interpretability has always been a major concern for fuzzy rule-based classifiers. The usage of human-readable models allows them to explain the reasoning behind their predictions and decisions. However, when it comes to Big Data classification problems, fuzzy rule-based classifiers have not been able to maintain the g... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 122,398 |
2007.10778 | Complementing Representation Deficiency in Few-shot Image
Classification: A Meta-Learning Approach | Few-shot learning is a challenging problem that has attracted more and more attention recently since abundant training samples are difficult to obtain in practical applications. Meta-learning has been proposed to address this issue, which focuses on quickly adapting a predictor as a base-learner to new tasks, given lim... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 188,369 |
2106.14977 | The Food Recognition Benchmark: Using DeepLearning to Recognize Food on
Images | The automatic recognition of food on images has numerous interesting applications, including nutritional tracking in medical cohorts. The problem has received significant research attention, but an ongoing public benchmark to develop open and reproducible algorithms has been missing. Here, we report on the setup of suc... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 243,567 |
1911.04862 | An End-to-end Approach for Lexical Stress Detection based on Transformer | The dominant automatic lexical stress detection method is to split the utterance into syllable segments using phoneme sequence and their time-aligned boundaries. Then we extract features from syllable to use classification method to classify the lexical stress. However, we can't get very accurate time boundaries of eac... | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 153,092 |
2502.06314 | From Pixels to Components: Eigenvector Masking for Visual Representation
Learning | Predicting masked from visible parts of an image is a powerful self-supervised approach for visual representation learning. However, the common practice of masking random patches of pixels exhibits certain failure modes, which can prevent learning meaningful high-level features, as required for downstream tasks. We pro... | false | false | false | false | true | false | true | false | false | false | false | true | false | false | false | false | false | false | 532,031 |
2404.14956 | DAWN: Domain-Adaptive Weakly Supervised Nuclei Segmentation via
Cross-Task Interactions | Weakly supervised segmentation methods have gained significant attention due to their ability to reduce the reliance on costly pixel-level annotations during model training. However, the current weakly supervised nuclei segmentation approaches typically follow a two-stage pseudo-label generation and network training pr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 448,884 |
2310.14977 | Probabilistic Counting in Generalized Turnstile Models | Traditionally in the turnstile model of data streams, there is a state vector $x=(x_1,x_2,\ldots,x_n)$ which is updated through a stream of pairs $(i,k)$ where $i\in [n]$ and $k\in \Z$. Upon receiving $(i,k)$, $x_i\gets x_i + k$. A distinct count algorithm in the turnstile model takes one pass of the stream and then es... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | true | 402,107 |
2411.18306 | Delineating Feminist Studies through bibliometric analysis | The multidisciplinary and socially anchored nature of Feminist Studies presents unique challenges for bibliometric analysis, as this research area transcends traditional disciplinary boundaries and reflects discussions from feminist and LGBTQIA+ social movements. This paper proposes a novel approach for identifying gen... | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | true | 511,824 |
1503.01531 | Spectral Clustering by Ellipsoid and Its Connection to Separable
Nonnegative Matrix Factorization | This paper proposes a variant of the normalized cut algorithm for spectral clustering. Although the normalized cut algorithm applies the K-means algorithm to the eigenvectors of a normalized graph Laplacian for finding clusters, our algorithm instead uses a minimum volume enclosing ellipsoid for them. We show that the ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 40,839 |
2007.01719 | Ensemble Regression Models for Software Development Effort Estimation: A
Comparative Study | As demand for computer software continually increases, software scope and complexity become higher than ever. The software industry is in real need of accurate estimates of the project under development. Software development effort estimation is one of the main processes in software project management. However, overest... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | true | 185,516 |
1804.08316 | Bilingual Embeddings with Random Walks over Multilingual Wordnets | Bilingual word embeddings represent words of two languages in the same space, and allow to transfer knowledge from one language to the other without machine translation. The main approach is to train monolingual embeddings first and then map them using bilingual dictionaries. In this work, we present a novel method to ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 95,744 |
2312.12660 | Is post-editing really faster than human translation? | Time efficiency is paramount for the localisation industry, which demands ever-faster turnaround times. However, translation speed is largely underresearched, and there is a lack of clarity about how language service providers (LSPs) can evaluate the performance of their post-editing (PE) and human translation (HT) ser... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 417,043 |
2404.18624 | Do Vision & Language Decoders use Images and Text equally? How
Self-consistent are their Explanations? | Vision and language model (VLM) decoders are currently the best-performing architectures on multimodal tasks. Next to answers, they are able to produce natural language explanations, either in post-hoc or CoT settings. However, it is not clear to what extent they are using the input vision and text modalities when gene... | false | false | false | false | true | false | true | false | true | false | false | true | false | false | false | false | false | false | 450,334 |
2106.11943 | Reusing Combinatorial Structure: Faster Iterative Projections over
Submodular Base Polytopes | Optimization algorithms such as projected Newton's method, FISTA, mirror descent, and its variants enjoy near-optimal regret bounds and convergence rates, but suffer from a computational bottleneck of computing ``projections'' in potentially each iteration (e.g., $O(T^{1/2})$ regret of online mirror descent). On the ot... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 242,568 |
2212.11890 | Decoding surface codes with deep reinforcement learning and
probabilistic policy reuse | Quantum computing (QC) promises significant advantages on certain hard computational tasks over classical computers. However, current quantum hardware, also known as noisy intermediate-scale quantum computers (NISQ), are still unable to carry out computations faithfully mainly because of the lack of quantum error corre... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | true | false | true | 337,912 |
2004.03125 | RYANSQL: Recursively Applying Sketch-based Slot Fillings for Complex
Text-to-SQL in Cross-Domain Databases | Text-to-SQL is the problem of converting a user question into an SQL query, when the question and database are given. In this paper, we present a neural network approach called RYANSQL (Recursively Yielding Annotation Network for SQL) to solve complex Text-to-SQL tasks for cross-domain databases. State-ment Position Co... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 171,456 |
2305.06004 | Safe motion planning with environment uncertainty | We present an approach for safe motion planning under robot state and environment (obstacle and landmark location) uncertainties. To this end, we first develop an approach that accounts for the landmark uncertainties during robot localization. Existing planning approaches assume that the landmark locations are well kno... | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | 363,374 |
2502.02060 | CH-MARL: Constrained Hierarchical Multiagent Reinforcement Learning for
Sustainable Maritime Logistics | Addressing global challenges such as greenhouse gas emissions and resource inequity demands advanced AI-driven coordination among autonomous agents. We propose CH-MARL (Constrained Hierarchical Multiagent Reinforcement Learning), a novel framework that integrates hierarchical decision-making with dynamic constraint enf... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | true | false | false | false | 530,163 |
1510.03055 | A Diversity-Promoting Objective Function for Neural Conversation Models | Sequence-to-sequence neural network models for generation of conversational responses tend to generate safe, commonplace responses (e.g., "I don't know") regardless of the input. We suggest that the traditional objective function, i.e., the likelihood of output (response) given input (message) is unsuited to response g... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 47,804 |
2402.07585 | Identifying architectural design decisions for achieving green ML
serving | The growing use of large machine learning models highlights concerns about their increasing computational demands. While the energy consumption of their training phase has received attention, fewer works have considered the inference phase. For ML inference, the binding of ML models to the ML system for user access, kn... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 428,771 |
2308.00692 | LISA: Reasoning Segmentation via Large Language Model | Although perception systems have made remarkable advancements in recent years, they still rely on explicit human instruction or pre-defined categories to identify the target objects before executing visual recognition tasks. Such systems cannot actively reason and comprehend implicit user intention. In this work, we pr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 383,019 |
1806.01257 | The laws of physics do not prohibit counterfactual communication | It has been conjectured that counterfactual communication is impossible, even for post-selected quantum particles. We strongly challenge this by proposing precisely such a counterfactual scheme where -- unambiguously -- none of Alice's photons that correctly contribute to her information about Bob's message have been t... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 99,512 |
2004.14641 | Query-level Early Exit for Additive Learning-to-Rank Ensembles | Search engine ranking pipelines are commonly based on large ensembles of machine-learned decision trees. The tight constraints on query response time recently motivated researchers to investigate algorithms to make faster the traversal of the additive ensemble or to early terminate the evaluation of documents that are ... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 174,961 |
1306.2967 | Optimization of Clustering for Clustering-based Image Denoising | In this paper, the problem of de-noising of an image contaminated with additive white Gaussian noise (AWGN) is studied. This subject has been continued to be an open problem in signal processing for more than 50 years. In the present paper, we suggest a method based on global clustering of image constructing blocks. No... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 25,167 |
0911.1708 | Different goals in multiscale simulations and how to reach them | In this paper we sum up our works on multiscale programs, mainly simulations. We first start with describing what multiscaling is about, how it helps perceiving signal from a background noise in a ?ow of data for example, for a direct perception by a user or for a further use by another program. We then give three exam... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 4,904 |
2107.08142 | Autonomy 2.0: Why is self-driving always 5 years away? | Despite the numerous successes of machine learning over the past decade (image recognition, decision-making, NLP, image synthesis), self-driving technology has not yet followed the same trend. In this paper, we study the history, composition, and development bottlenecks of the modern self-driving stack. We argue that t... | false | false | false | false | true | false | true | true | false | false | false | true | false | false | false | false | false | false | 246,629 |
1808.00661 | Adaptive Temporal Encoding Network for Video Instance-level Human
Parsing | Beyond the existing single-person and multiple-person human parsing tasks in static images, this paper makes the first attempt to investigate a more realistic video instance-level human parsing that simultaneously segments out each person instance and parses each instance into more fine-grained parts (e.g., head, leg, ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 104,432 |
2009.09776 | Weight Training Analysis of Sportsmen with Kinect Bioinformatics for
Form Improvement | Sports franchises invest a lot in training their athletes. use of latest technology for this purpose is also very common. We propose a system of capturing motion of athletes during weight training and analyzing that data to find out any shortcomings and imperfections. Our system uses Kinect depth image to compute diffe... | true | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 196,684 |
2107.06676 | Higgs Boson Classification: Brain-inspired BCPNN Learning with
StreamBrain | One of the most promising approaches for data analysis and exploration of large data sets is Machine Learning techniques that are inspired by brain models. Such methods use alternative learning rules potentially more efficiently than established learning rules. In this work, we focus on the potential of brain-inspired ... | false | true | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | true | 246,163 |
2202.03896 | Speech Emotion Recognition using Self-Supervised Features | Self-supervised pre-trained features have consistently delivered state-of-art results in the field of natural language processing (NLP); however, their merits in the field of speech emotion recognition (SER) still need further investigation. In this paper we introduce a modular End-to- End (E2E) SER system based on an ... | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 279,380 |
2001.10609 | A Review on Object Pose Recovery: from 3D Bounding Box Detectors to Full
6D Pose Estimators | Object pose recovery has gained increasing attention in the computer vision field as it has become an important problem in rapidly evolving technological areas related to autonomous driving, robotics, and augmented reality. Existing review-related studies have addressed the problem at visual level in 2D, going through ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 161,858 |
2411.12586 | Infrared-Assisted Single-Stage Framework for Joint Restoration and
Fusion of Visible and Infrared Images under Hazy Conditions | Infrared and visible (IR-VIS) image fusion has gained significant attention for its broad application value. However, existing methods often neglect the complementary role of infrared image in restoring visible image features under hazy conditions. To address this, we propose a joint learning framework that utilizes in... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 509,456 |
2412.18096 | Real-world Deployment and Evaluation of PErioperative AI CHatbot (PEACH)
-- a Large Language Model Chatbot for Perioperative Medicine | Large Language Models (LLMs) are emerging as powerful tools in healthcare, particularly for complex, domain-specific tasks. This study describes the development and evaluation of the PErioperative AI CHatbot (PEACH), a secure LLM-based system integrated with local perioperative guidelines to support preoperative clinic... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 520,253 |
2412.20045 | Enhancing Diffusion Models for Inverse Problems with Covariance-Aware
Posterior Sampling | Inverse problems exist in many disciplines of science and engineering. In computer vision, for example, tasks such as inpainting, deblurring, and super resolution can be effectively modeled as inverse problems. Recently, denoising diffusion probabilistic models (DDPMs) are shown to provide a promising solution to noisy... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 521,073 |
1610.01563 | DeepGaze II: Reading fixations from deep features trained on object
recognition | Here we present DeepGaze II, a model that predicts where people look in images. The model uses the features from the VGG-19 deep neural network trained to identify objects in images. Contrary to other saliency models that use deep features, here we use the VGG features for saliency prediction with no additional fine-tu... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 61,986 |
2304.08821 | TTIDA: Controllable Generative Data Augmentation via Text-to-Text and
Text-to-Image Models | Data augmentation has been established as an efficacious approach to supplement useful information for low-resource datasets. Traditional augmentation techniques such as noise injection and image transformations have been widely used. In addition, generative data augmentation (GDA) has been shown to produce more divers... | false | false | false | false | false | false | true | false | true | false | false | true | false | false | false | false | false | false | 358,832 |
2206.11943 | TIAger: Tumor-Infiltrating Lymphocyte Scoring in Breast Cancer for the
TiGER Challenge | The quantification of tumor-infiltrating lymphocytes (TILs) has been shown to be an independent predictor for prognosis of breast cancer patients. Typically, pathologists give an estimate of the proportion of the stromal region that contains TILs to obtain a TILs score. The Tumor InfiltratinG lymphocytes in breast canc... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 304,425 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.