id stringlengths 9 16 | title stringlengths 4 278 | abstract stringlengths 3 4.08k | cs.HC bool 2
classes | cs.CE bool 2
classes | cs.SD bool 2
classes | cs.SI bool 2
classes | cs.AI bool 2
classes | cs.IR bool 2
classes | cs.LG bool 2
classes | cs.RO bool 2
classes | cs.CL bool 2
classes | cs.IT bool 2
classes | cs.SY bool 2
classes | cs.CV bool 2
classes | cs.CR bool 2
classes | cs.CY bool 2
classes | cs.MA bool 2
classes | cs.NE bool 2
classes | cs.DB bool 2
classes | Other bool 2
classes | __index_level_0__ int64 0 541k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2110.09374 | Ortho-Shot: Low Displacement Rank Regularization with Data Augmentation
for Few-Shot Learning | In few-shot classification, the primary goal is to learn representations from a few samples that generalize well for novel classes. In this paper, we propose an efficient low displacement rank (LDR) regularization strategy termed Ortho-Shot; a technique that imposes orthogonal regularization on the convolutional layers... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 261,788 |
2304.01902 | Affective Robotics For Wellbeing: A Scoping Review | Affective robotics research aims to better understand human social and emotional signals to improve human-robot interaction (HRI), and has been widely used during the last decade in multiple application fields. Past works have demonstrated, indeed, the potential of using affective robots (i.e., that can recognize, or i... | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | 356,249 |
2106.07627 | Toward Automatic Interpretation of 3D Plots | This paper explores the challenge of teaching a machine how to reverse-engineer the grid-marked surfaces used to represent data in 3D surface plots of two-variable functions. These are common in scientific and economic publications; and humans can often interpret them with ease, quickly gleaning general shape and curva... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 240,997 |
1811.01715 | Multi-armed Bandits with Compensation | We propose and study the known-compensation multi-arm bandit (KCMAB) problem, where a system controller offers a set of arms to many short-term players for $T$ steps. In each step, one short-term player arrives to the system. Upon arrival, the player aims to select an arm with the current best average reward and receiv... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 112,431 |
2501.14452 | On the Rate-Exponent Region of Integrated Sensing and Communications
With Variable-Length Coding | This paper considers the achievable rate-exponent region of integrated sensing and communication systems in the presence of variable-length coding with feedback. This scheme is fundamentally different from earlier studies, as the coding methods that utilize feedback impose different constraints on the codewords. The fo... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 527,123 |
2206.06520 | Memory-Based Model Editing at Scale | Even the largest neural networks make errors, and once-correct predictions can become invalid as the world changes. Model editors make local updates to the behavior of base (pre-trained) models to inject updated knowledge or correct undesirable behaviors. Existing model editors have shown promise, but also suffer from ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 302,402 |
2304.13302 | HiQ -- A Declarative, Non-intrusive, Dynamic and Transparent
Observability and Optimization System | This paper proposes a non-intrusive, declarative, dynamic and transparent system called `HiQ` to track Python program runtime information without compromising on the run-time system performance and losing insight. HiQ can be used for monolithic and distributed systems, offline and online applications. HiQ is developed ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | true | 360,535 |
1711.08155 | A Face Fairness Framework for 3D Meshes | In this paper, we present a face fairness framework for 3D meshes that preserves the regular shape of faces and is applicable to a variety of 3D mesh restoration tasks. Specifically, we present a number of desirable properties for any mesh restoration method and show that our framework satisfies them. We then apply our... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 85,146 |
1706.03791 | Significantly Improving Lossy Compression for Scientific Data Sets Based
on Multidimensional Prediction and Error-Controlled Quantization | Today's HPC applications are producing extremely large amounts of data, such that data storage and analysis are becoming more challenging for scientific research. In this work, we design a new error-controlled lossy compression algorithm for large-scale scientific data. Our key contribution is significantly improving t... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 75,223 |
2404.14808 | Visual-Augmented Dynamic Semantic Prototype for Generative Zero-Shot
Learning | Generative Zero-shot learning (ZSL) learns a generator to synthesize visual samples for unseen classes, which is an effective way to advance ZSL. However, existing generative methods rely on the conditions of Gaussian noise and the predefined semantic prototype, which limit the generator only optimized on specific seen... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 448,826 |
2409.12257 | MQA-KEAL: Multi-hop Question Answering under Knowledge Editing for
Arabic Language | Large Language Models (LLMs) have demonstrated significant capabilities across numerous application domains. A key challenge is to keep these models updated with latest available information, which limits the true potential of these models for the end-applications. Although, there have been numerous attempts for LLMs K... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 489,502 |
1911.06155 | RNN-Test: Towards Adversarial Testing for Recurrent Neural Network
Systems | While massive efforts have been investigated in adversarial testing of convolutional neural networks (CNN), testing for recurrent neural networks (RNN) is still limited and leaves threats for vast sequential application domains. In this paper, we propose an adversarial testing framework RNN-Test for RNN systems, focusi... | false | false | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | 153,463 |
2309.13047 | NeuroCADR: Drug Repurposing to Reveal Novel Anti-Epileptic Drug
Candidates Through an Integrated Computational Approach | Drug repurposing is an emerging approach for drug discovery involving the reassignment of existing drugs for novel purposes. An alternative to the traditional de novo process of drug development, repurposed drugs are faster, cheaper, and less failure prone than drugs developed from traditional methods. Recently, drug r... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 394,025 |
2302.06354 | Less is More: Selective Layer Finetuning with SubTuning | Finetuning a pretrained model has become a standard approach for training neural networks on novel tasks, resulting in fast convergence and improved performance. In this work, we study an alternative finetuning method, where instead of finetuning all the weights of the network, we only train a carefully chosen subset o... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 345,370 |
2008.13585 | At Your Service: Coffee Beans Recommendation From a Robot Assistant | With advances in the field of machine learning, precisely algorithms for recommendation systems, robot assistants are envisioned to become more present in the hospitality industry. Additionally, the COVID-19 pandemic has also highlighted the need to have more service robots in our everyday lives, to minimise the risk o... | true | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 193,889 |
1707.02733 | Synthesis-based Robust Low Resolution Face Recognition | Recognition of low resolution face images is a challenging problem in many practical face recognition systems. Methods have been proposed in the face recognition literature for the problem which assume that the probe is low resolution, but a high resolution gallery is available for recognition. These attempts have been... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 76,748 |
1511.07953 | Exploring Correlation between Labels to improve Multi-Label
Classification | This paper attempts multi-label classification by extending the idea of independent binary classification models for each output label, and exploring how the inherent correlation between output labels can be used to improve predictions. Logistic Regression, Naive Bayes, Random Forest, and SVM models were constructed, w... | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 49,489 |
2409.14639 | Impedance Control for Manipulators Handling Heavy Payloads | Attaching a heavy payload to the wrist force/moment (F/M) sensor of a manipulator can cause conventional impedance controllers to fail in establishing the desired impedance due to the presence of non-contact forces; namely, the inertial and gravitational forces of the payload. This paper presents an impedance control s... | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | 490,564 |
2206.06712 | Visual Radial Basis Q-Network | While reinforcement learning (RL) from raw images has been largely investigated in the last decade, existing approaches still suffer from a number of constraints. The high input dimension is often handled using either expert knowledge to extract handcrafted features or environment encoding through convolutional network... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 302,470 |
2207.05064 | Adaptive Graph Spatial-Temporal Transformer Network for Traffic Flow
Forecasting | Traffic flow forecasting on graphs has real-world applications in many fields, such as transportation system and computer networks. Traffic forecasting can be highly challenging due to complex spatial-temporal correlations and non-linear traffic patterns. Existing works mostly model such spatial-temporal dependencies b... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 307,411 |
2411.14972 | Open-Amp: Synthetic Data Framework for Audio Effect Foundation Models | This paper introduces Open-Amp, a synthetic data framework for generating large-scale and diverse audio effects data. Audio effects are relevant to many musical audio processing and Music Information Retrieval (MIR) tasks, such as modelling of analog audio effects, automatic mixing, tone matching and transcription. Exi... | false | false | true | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 510,390 |
2307.11684 | Minibatching Offers Improved Generalization Performance for Second Order
Optimizers | Training deep neural networks (DNNs) used in modern machine learning is computationally expensive. Machine learning scientists, therefore, rely on stochastic first-order methods for training, coupled with significant hand-tuning, to obtain good performance. To better understand performance variability of different stoc... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 380,990 |
1608.03639 | Faster Training of Very Deep Networks Via p-Norm Gates | A major contributing factor to the recent advances in deep neural networks is structural units that let sensory information and gradients to propagate easily. Gating is one such structure that acts as a flow control. Gates are employed in many recent state-of-the-art recurrent models such as LSTM and GRU, and feedforwa... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | 59,697 |
2411.10632 | Quantifying community evolution in temporal networks | When we detect communities in temporal networks it is important to ask questions about how they change in time. Normalised Mutual Information (NMI) has been used to measure the similarity of communities when the nodes on a network do not change. We propose two extensions namely Union-Normalised Mutual Information (UNMI... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 508,724 |
1605.06409 | R-FCN: Object Detection via Region-based Fully Convolutional Networks | We present region-based, fully convolutional networks for accurate and efficient object detection. In contrast to previous region-based detectors such as Fast/Faster R-CNN that apply a costly per-region subnetwork hundreds of times, our region-based detector is fully convolutional with almost all computation shared on ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 56,131 |
2105.07645 | Leveraging EfficientNet and Contrastive Learning for Accurate
Global-scale Location Estimation | In this paper, we address the problem of global-scale image geolocation, proposing a mixed classification-retrieval scheme. Unlike other methods that strictly tackle the problem as a classification or retrieval task, we combine the two practices in a unified solution leveraging the advantages of each approach with two ... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 235,509 |
2409.01087 | Pre-Trained Language Models for Keyphrase Prediction: A Review | Keyphrase Prediction (KP) is essential for identifying keyphrases in a document that can summarize its content. However, recent Natural Language Processing (NLP) advances have developed more efficient KP models using deep learning techniques. The limitation of a comprehensive exploration jointly both keyphrase extracti... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 485,204 |
2110.08393 | A Bayesian Approach for Medical Inquiry and Disease Inference in
Automated Differential Diagnosis | We propose a Bayesian approach for both medical inquiry and disease inference, the two major phases in differential diagnosis. Unlike previous work that simulates data from given probabilities and uses ML algorithms on them, we directly use the Quick Medical Reference (QMR) belief network, and apply Bayesian inference ... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 261,373 |
1911.11451 | Optimization of Chance-Constrained Submodular Functions | Submodular optimization plays a key role in many real-world problems. In many real-world scenarios, it is also necessary to handle uncertainty, and potentially disruptive events that violate constraints in stochastic settings need to be avoided. In this paper, we investigate submodular optimization problems with chance... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 155,133 |
2011.04797 | Attentive Social Recommendation: Towards User And Item Diversities | Social recommendation system is to predict unobserved user-item rating values by taking advantage of user-user social relation and user-item ratings. However, user/item diversities in social recommendations are not well utilized in the literature. Especially, inter-factor (social and rating factors) relations and disti... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 205,692 |
1604.04383 | Composition of Deep and Spiking Neural Networks for Very Low Bit Rate
Speech Coding | Most current very low bit rate (VLBR) speech coding systems use hidden Markov model (HMM) based speech recognition/synthesis techniques. This allows transmission of information (such as phonemes) segment by segment that decreases the bit rate. However, the encoder based on a phoneme speech recognition may create bursts... | false | false | true | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 54,639 |
2408.13271 | Survey Paper on Control Barrier Functions | Control Barrier Functions (CBFs) have emerged as a powerful paradigm in control theory, providing a principled approach to enforcing safety-critical constraints in dynamic systems. This survey paper comprehensively explores the foundational principles of CBFs, delves into the complexities of High Order Control Barrier ... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 483,080 |
2406.10280 | Transferable Embedding Inversion Attack: Uncovering Privacy Risks in
Text Embeddings without Model Queries | This study investigates the privacy risks associated with text embeddings, focusing on the scenario where attackers cannot access the original embedding model. Contrary to previous research requiring direct model access, we explore a more realistic threat model by developing a transfer attack method. This approach uses... | false | false | false | false | false | false | true | false | true | false | false | false | true | false | false | false | false | false | 464,332 |
1702.08021 | Friends and Enemies of Clinton and Trump: Using Context for Detecting
Stance in Political Tweets | Stance detection, the task of identifying the speaker's opinion towards a particular target, has attracted the attention of researchers. This paper describes a novel approach for detecting stance in Twitter. We define a set of features in order to consider the context surrounding a target of interest with the final aim... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 68,898 |
1508.05034 | Opinion Dynamics in Social Networks with Hostile Camps: Consensus vs.
Polarization | Most of the distributed protocols for multi-agent consensus assume that the agents are mutually cooperative and "trustful," and so the couplings among the agents bring the values of their states closer. Opinion dynamics in social groups, however, require beyond these conventional models due to ubiquitous competition an... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 46,192 |
1806.03743 | Are All Languages Equally Hard to Language-Model? | For general modeling methods applied to diverse languages, a natural question is: how well should we expect our models to work on languages with differing typological profiles? In this work, we develop an evaluation framework for fair cross-linguistic comparison of language models, using translated text so that all mod... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 100,074 |
2105.02960 | A Deep Transfer Learning-based Edge Computing Method for Home Health
Monitoring | The health-care gets huge stress in a pandemic or epidemic situation. Some diseases such as COVID-19 that causes a pandemic is highly spreadable from an infected person to others. Therefore, providing health services at home for non-critical infected patients with isolation shall assist to mitigate this kind of stress.... | true | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 233,986 |
2303.04557 | Scene Matters: Model-based Deep Video Compression | Video compression has always been a popular research area, where many traditional and deep video compression methods have been proposed. These methods typically rely on signal prediction theory to enhance compression performance by designing high efficient intra and inter prediction strategies and compressing video fra... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 350,133 |
2001.04652 | A deep machine learning algorithm for construction of the
Kolmogorov-Arnold representation | The Kolmogorov-Arnold representation is a proven adequate replacement of a continuous multivariate function by an hierarchical structure of multiple functions of one variable. The proven existence of such representation inspired many researchers to search for a practical way of its construction, since such model answer... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 160,312 |
1905.03219 | Evaluating the Stability of Recurrent Neural Models during Training with
Eigenvalue Spectra Analysis | We analyze the stability of recurrent networks, specifically, reservoir computing models during training by evaluating the eigenvalue spectra of the reservoir dynamics. To circumvent the instability arising in examining a closed loop reservoir system with feedback, we propose to break the closed loop system. Essentiall... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | false | 130,152 |
2105.12332 | SimNet: Learning Reactive Self-driving Simulations from Real-world
Observations | In this work, we present a simple end-to-end trainable machine learning system capable of realistically simulating driving experiences. This can be used for the verification of self-driving system performance without relying on expensive and time-consuming road testing. In particular, we frame the simulation problem as... | false | false | false | false | false | false | true | true | false | false | false | true | false | false | false | false | false | false | 236,976 |
2409.05872 | CSRec: Rethinking Sequential Recommendation from A Causal Perspective | The essence of sequential recommender systems (RecSys) lies in understanding how users make decisions. Most existing approaches frame the task as sequential prediction based on users' historical purchase records. While effective in capturing users' natural preferences, this formulation falls short in accurately modelin... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 486,921 |
2105.05237 | Freshness Based Cache Updating in Parallel Relay Networks | We consider a system consisting of a server, which receives updates for $N$ files according to independent Poisson processes. The goal of the server is to deliver the latest version of the files to the user through a parallel network of $K$ caches. We consider an update received by the user successful, if the user rece... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 234,759 |
2106.10165 | The Principles of Deep Learning Theory | This book develops an effective theory approach to understanding deep neural networks of practical relevance. Beginning from a first-principles component-level picture of networks, we explain how to determine an accurate description of the output of trained networks by solving layer-to-layer iteration equations and non... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 241,922 |
2308.08213 | MEDOE: A Multi-Expert Decoder and Output Ensemble Framework for
Long-tailed Semantic Segmentation | Long-tailed distribution of semantic categories, which has been often ignored in conventional methods, causes unsatisfactory performance in semantic segmentation on tail categories. In this paper, we focus on the problem of long-tailed semantic segmentation. Although some long-tailed recognition methods (e.g., re-sampl... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 385,816 |
1511.06072 | Mediated Experts for Deep Convolutional Networks | We present a new supervised architecture termed Mediated Mixture-of-Experts (MMoE) that allows us to improve classification accuracy of Deep Convolutional Networks (DCN). Our architecture achieves this with the help of expert networks: A network is trained on a disjoint subset of a given dataset and then run in paralle... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | true | false | false | 49,154 |
2206.03066 | Recent Advances for Quantum Neural Networks in Generative Learning | Quantum computers are next-generation devices that hold promise to perform calculations beyond the reach of classical computers. A leading method towards achieving this goal is through quantum machine learning, especially quantum generative learning. Due to the intrinsic probabilistic nature of quantum mechanics, it is... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 301,137 |
2108.09048 | A Contactless Fingerprint Recognition System | Fingerprints are one of the most widely explored biometric traits. Specifically, contact-based fingerprint recognition systems reign supreme due to their robustness, portability and the extensive research work done in the field. However, these systems suffer from issues such as hygiene, sensor degradation due to consta... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 251,479 |
2101.07124 | Tip of the Tongue Known-Item Retrieval: A Case Study in Movie
Identification | While current information retrieval systems are effective for known-item retrieval where the searcher provides a precise name or identifier for the item being sought, systems tend to be much less effective for cases where the searcher is unable to express a precise name or identifier. We refer to this as tip of the ton... | true | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | 215,941 |
1901.03729 | Automated Rationale Generation: A Technique for Explainable AI and its
Effects on Human Perceptions | Automated rationale generation is an approach for real-time explanation generation whereby a computational model learns to translate an autonomous agent's internal state and action data representations into natural language. Training on human explanation data can enable agents to learn to generate human-like explanatio... | true | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 118,473 |
2406.14529 | A Benchmarking Study of Kolmogorov-Arnold Networks on Tabular Data | Kolmogorov-Arnold Networks (KANs) have very recently been introduced into the world of machine learning, quickly capturing the attention of the entire community. However, KANs have mostly been tested for approximating complex functions or processing synthetic data, while a test on real-world tabular datasets is current... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 466,354 |
2109.14881 | Extracting stochastic dynamical systems with $\alpha$-stable L\'evy
noise from data | With the rapid increase of valuable observational, experimental and simulated data for complex systems, much efforts have been devoted to identifying governing laws underlying the evolution of these systems. Despite the wide applications of non-Gaussian fluctuations in numerous physical phenomena, the data-driven appro... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 258,103 |
2101.04051 | Horizontal-to-Vertical Video Conversion | Alongside the prevalence of mobile videos, the general public leans towards consuming vertical videos on hand-held devices. To revitalize the exposure of horizontal contents, we hereby set forth the exploration of automated horizontal-to-vertical (abbreviated as H2V) video conversion with our proposed H2V framework, ac... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 215,057 |
2310.11976 | InfoDiffusion: Information Entropy Aware Diffusion Process for
Non-Autoregressive Text Generation | Diffusion models have garnered considerable interest in the field of text generation. Several studies have explored text diffusion models with different structures and applied them to various tasks, including named entity recognition and summarization. However, there exists a notable disparity between the "easy-first" ... | false | false | false | false | true | false | false | false | true | false | false | false | false | false | false | false | false | false | 400,856 |
0710.2889 | An efficient reduction of ranking to classification | This paper describes an efficient reduction of the learning problem of ranking to binary classification. The reduction guarantees an average pairwise misranking regret of at most that of the binary classifier regret, improving a recent result of Balcan et al which only guarantees a factor of 2. Moreover, our reduction ... | false | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | 789 |
1903.11626 | Bridging Adversarial Robustness and Gradient Interpretability | Adversarial training is a training scheme designed to counter adversarial attacks by augmenting the training dataset with adversarial examples. Surprisingly, several studies have observed that loss gradients from adversarially trained DNNs are visually more interpretable than those from standard DNNs. Although this phe... | false | false | false | false | true | false | true | false | false | false | false | false | false | false | false | false | false | false | 125,547 |
2001.10039 | Prediction diversity and selective attention in the wisdom of crowds | The wisdom of crowds is the idea that the combination of independent estimates of the magnitude of some quantity yields a remarkably accurate prediction, which is always more accurate than the average individual estimate. In addition, it is largely believed that the accuracy of the crowd can be improved by increasing t... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | 161,719 |
2404.12447 | AmbigDocs: Reasoning across Documents on Different Entities under the
Same Name | Different entities with the same name can be difficult to distinguish. Handling confusing entity mentions is a crucial skill for language models (LMs). For example, given the question "Where was Michael Jordan educated?" and a set of documents discussing different people named Michael Jordan, can LMs distinguish entity... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 447,890 |
2011.08641 | A Review of Generalized Zero-Shot Learning Methods | Generalized zero-shot learning (GZSL) aims to train a model for classifying data samples under the condition that some output classes are unknown during supervised learning. To address this challenging task, GZSL leverages semantic information of the seen (source) and unseen (target) classes to bridge the gap between b... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 206,941 |
2410.04925 | Intent Classification for Bank Chatbots through LLM Fine-Tuning | This study evaluates the application of large language models (LLMs) for intent classification within a chatbot with predetermined responses designed for banking industry websites. Specifically, the research examines the effectiveness of fine-tuning SlovakBERT compared to employing multilingual generative models, such ... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 495,497 |
1511.08476 | Low-Complexity SINR Feasibility Checking and Joint Power and Admission
Control in Prioritized Multi-tier Cellular Networks | Next generation cellular networks will consist of multiple tiers of cells and users associated with different network tiers may have different priorities (e.g., macrocell-picocell-femtocell networks with macro tier prioritized over pico tier, which is again prioritized over femto tier). Designing efficient joint power ... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 49,543 |
2110.08756 | Stability evaluation of the Russian sociologists online community:
2011-2018 years | This study deals with the stability evaluation of the online community of Russian sociologists. Based on the data from the Facebook group, which consists of 7 years of communication from 2011 till 2018, we constructed the networks based on commenting and reacting. The participants activity includes four main periods fo... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 261,544 |
2211.02213 | SSDA-YOLO: Semi-supervised Domain Adaptive YOLO for Cross-Domain Object
Detection | Domain adaptive object detection (DAOD) aims to alleviate transfer performance degradation caused by the cross-domain discrepancy. However, most existing DAOD methods are dominated by outdated and computationally intensive two-stage Faster R-CNN, which is not the first choice for industrial applications. In this paper,... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 328,507 |
2104.10956 | FCOS3D: Fully Convolutional One-Stage Monocular 3D Object Detection | Monocular 3D object detection is an important task for autonomous driving considering its advantage of low cost. It is much more challenging than conventional 2D cases due to its inherent ill-posed property, which is mainly reflected in the lack of depth information. Recent progress on 2D detection offers opportunities... | false | false | false | false | true | false | false | true | false | false | false | true | false | false | false | false | false | false | 231,771 |
1912.12635 | \AE THEL: Automatically Extracted Typelogical Derivations for Dutch | We present {\AE}THEL, a semantic compositionality dataset for written Dutch. {\AE}THEL consists of two parts. First, it contains a lexicon of supertags for about 900 000 words in context. The supertags correspond to types of the simply typed linear lambda-calculus, enhanced with dependency decorations that capture gram... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 158,894 |
2203.02217 | Quantification of emotions in decision making | The problem of quantification of emotions in the choice between alternatives is considered. The alternatives are evaluated in a dual manner. From one side, they are characterized by rational features defining the utility of each alternative. From the other side, the choice is affected by emotions labeling the alternati... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 283,686 |
2208.08226 | Auto-segmentation of Hip Joints using MultiPlanar UNet with Transfer
learning | Accurate geometry representation is essential in developing finite element models. Although generally good, deep-learning segmentation approaches with only few data have difficulties in accurately segmenting fine features, e.g., gaps and thin structures. Subsequently, segmented geometries need labor-intensive manual mo... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 313,307 |
2103.16775 | Attention, please! A survey of Neural Attention Models in Deep Learning | In humans, Attention is a core property of all perceptual and cognitive operations. Given our limited ability to process competing sources, attention mechanisms select, modulate, and focus on the information most relevant to behavior. For decades, concepts and functions of attention have been studied in philosophy, psy... | false | false | false | false | true | false | true | true | false | false | false | true | false | false | false | false | false | false | 227,699 |
2404.00261 | A Simple Yet Effective Approach for Diversified Session-Based
Recommendation | Session-based recommender systems (SBRSs) have become extremely popular in view of the core capability of capturing short-term and dynamic user preferences. However, most SBRSs primarily maximize recommendation accuracy but ignore user minor preferences, thus leading to filter bubbles in the long run. Only a handful of... | false | false | false | false | true | true | false | false | false | false | false | false | false | false | false | false | false | false | 442,838 |
1702.05272 | Magnetic MIMO Signal Processing and Optimization for Wireless Power
Transfer | In magnetic resonant coupling (MRC) enabled multiple-input multiple-output (MIMO) wireless power transfer (WPT) systems, multiple transmitters (TXs) each with one single coil are used to enhance the efficiency of simultaneous power transfer to multiple single-coil receivers (RXs) by constructively combining their induc... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | 68,375 |
1906.01241 | Kinetic Market Model: An Evolutionary Algorithm | This research proposes the econophysics kinetic market model as an evolutionary algorithm's instance. The immediate results from this proposal is a new replacement rule for family competition genetic algorithms. It also represents a starting point to adding evolvable entities to kinetic market models. | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 133,651 |
1511.07917 | Context-aware CNNs for person head detection | Person detection is a key problem for many computer vision tasks. While face detection has reached maturity, detecting people under a full variation of camera view-points, human poses, lighting conditions and occlusions is still a difficult challenge. In this work we focus on detecting human heads in natural scenes. St... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 49,482 |
2404.01958 | MESEN: Exploit Multimodal Data to Design Unimodal Human Activity
Recognition with Few Labels | Human activity recognition (HAR) will be an essential function of various emerging applications. However, HAR typically encounters challenges related to modality limitations and label scarcity, leading to an application gap between current solutions and real-world requirements. In this work, we propose MESEN, a multimo... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 443,664 |
2402.08856 | Approximation of relation functions and attention mechanisms | Inner products of neural network feature maps arise in a wide variety of machine learning frameworks as a method of modeling relations between inputs. This work studies the approximation properties of inner products of neural networks. It is shown that the inner product of a multi-layer perceptron with itself is a univ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 429,265 |
2301.12303 | Presence of informal language, such as emoticons, hashtags, and slang,
impact the performance of sentiment analysis models on social media text? | This study aimed to investigate the influence of the presence of informal language, such as emoticons and slang, on the performance of sentiment analysis models applied to social media text. A convolutional neural network (CNN) model was developed and trained on three datasets: a sarcasm dataset, a sentiment dataset, a... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 342,479 |
1209.0852 | Automatic firewall rules generator for anomaly detection systems with
Apriori algorithm | Network intrusion detection systems have become a crucial issue for computer systems security infrastructures. Different methods and algorithms are developed and proposed in recent years to improve intrusion detection systems. The most important issue in current systems is that they are poor at detecting novel anomaly ... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 18,396 |
2401.07721 | Graph Transformer GANs with Graph Masked Modeling for Architectural
Layout Generation | We present a novel graph Transformer generative adversarial network (GTGAN) to learn effective graph node relations in an end-to-end fashion for challenging graph-constrained architectural layout generation tasks. The proposed graph-Transformer-based generator includes a novel graph Transformer encoder that combines gr... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 421,634 |
2412.17303 | When Focus Enhances Utility: Target Range LDP Frequency Estimation and
Unknown Item Discovery | Local Differential Privacy (LDP) protocols enable the collection of randomized client messages for data analysis, without the necessity of a trusted data curator. Such protocols have been successfully deployed in real-world scenarios by major tech companies like Google, Apple, and Microsoft. In this paper, we propose a... | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | true | false | 519,916 |
1011.3400 | Prize insights in probability, and one goat of a recycled error: Jason
Rosenhouse's The Monty Hall Problem | The Monty Hall problem is the TV game scenario where you, the contestant, are presented with three doors, with a car hidden behind one and goats hidden behind the other two. After you select a door, the host (Monty Hall) opens a second door to reveal a goat. You are then invited to stay with your original choice of doo... | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | 8,241 |
0802.1258 | Bayesian Nonlinear Principal Component Analysis Using Random Fields | We propose a novel model for nonlinear dimension reduction motivated by the probabilistic formulation of principal component analysis. Nonlinearity is achieved by specifying different transformation matrices at different locations of the latent space and smoothing the transformation using a Markov random field type pri... | false | false | false | false | false | false | true | false | false | false | false | true | false | false | false | false | false | false | 1,266 |
2502.08603 | Scalable Thermodynamic Second-order Optimization | Many hardware proposals have aimed to accelerate inference in AI workloads. Less attention has been paid to hardware acceleration of training, despite the enormous societal impact of rapid training of AI models. Physics-based computers, such as thermodynamic computers, offer an efficient means to solve key primitives i... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | true | 533,076 |
2412.20725 | Dialogue Director: Bridging the Gap in Dialogue Visualization for
Multimodal Storytelling | Recent advances in AI-driven storytelling have enhanced video generation and story visualization. However, translating dialogue-centric scripts into coherent storyboards remains a significant challenge due to limited script detail, inadequate physical context understanding, and the complexity of integrating cinematic p... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 521,331 |
2207.05462 | Adaptive and Robust Cross-Voltage-Level Power Flow Control of Active
Distribution Networks | The large-scale integration of Distributed Energy Resources (DERs) into the electric power system offers new opportunities to ensure stability. For example, Active Distribution Networks (ADNs) can be used in (sub-)transmission systems in the emergency state, as far as high robustness and performance of the ADN control ... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 307,545 |
2411.00196 | Whole-Herd Elephant Pose Estimation from Drone Data for Collective
Behavior Analysis | This research represents a pioneering application of automated pose estimation from drone data to study elephant behavior in the wild, utilizing video footage captured from Samburu National Reserve, Kenya. The study evaluates two pose estimation workflows: DeepLabCut, known for its application in laboratory settings an... | false | false | false | false | true | false | false | false | false | false | false | true | false | false | false | false | false | false | 504,478 |
2502.04668 | Machine-Learning Interatomic Potentials for Long-Range Systems | Machine-learning interatomic potentials have emerged as a revolutionary class of force-field models in molecular simulations, delivering quantum-mechanical accuracy at a fraction of the computational cost and enabling the simulation of large-scale systems over extended timescales. However, they often focus on modeling ... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 531,265 |
2304.06626 | Hebbian fast plasticity and working memory | Theories and models of working memory (WM) were at least since the mid-1990s dominated by the persistent activity hypothesis. The past decade has seen rising concerns about the shortcomings of sustained activity as the mechanism for short-term maintenance of WM information in the light of accumulating experimental evid... | false | false | false | false | false | false | false | false | false | false | false | false | false | false | false | true | false | false | 358,043 |
1811.06590 | Reduced Order Model Predictive Control For Setpoint Tracking | Despite the success of model predictive control (MPC), its application to high-dimensional systems, such as flexible structures and coupled fluid/rigid-body systems, remains a largely open challenge due to excessive computational complexity. A promising solution approach is to leverage reduced order models for designin... | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | 113,557 |
1910.08613 | Poisson CNN: Convolutional neural networks for the solution of the
Poisson equation on a Cartesian mesh | The Poisson equation is commonly encountered in engineering, for instance in computational fluid dynamics (CFD) where it is needed to compute corrections to the pressure field to ensure the incompressibility of the velocity field. In the present work, we propose a novel fully convolutional neural network (CNN) architec... | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | 149,913 |
2205.16005 | Neural Retriever and Go Beyond: A Thesis Proposal | Information Retriever (IR) aims to find the relevant documents (e.g. snippets, passages, and articles) to a given query at large scale. IR plays an important role in many tasks such as open domain question answering and dialogue systems, where external knowledge is needed. In the past, searching algorithms based on ter... | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | false | false | false | 299,952 |
2501.14877 | DrawEduMath: Evaluating Vision Language Models with Expert-Annotated
Students' Hand-Drawn Math Images | In real-world settings, vision language models (VLMs) should robustly handle naturalistic, noisy visual content as well as domain-specific language and concepts. For example, K-12 educators using digital learning platforms may need to examine and provide feedback across many images of students' math work. To assess the... | false | false | false | false | false | false | false | false | true | false | false | true | false | false | false | false | false | false | 527,305 |
2502.00706 | Model Provenance Testing for Large Language Models | Large language models are increasingly customized through fine-tuning and other adaptations, creating challenges in enforcing licensing terms and managing downstream impacts. Tracking model origins is crucial both for protecting intellectual property and for identifying derived models when biases or vulnerabilities are... | false | false | false | false | false | false | true | false | true | false | false | false | true | false | false | false | false | false | 529,509 |
2205.08534 | Vision Transformer Adapter for Dense Predictions | This work investigates a simple yet powerful dense prediction task adapter for Vision Transformer (ViT). Unlike recently advanced variants that incorporate vision-specific inductive biases into their architectures, the plain ViT suffers inferior performance on dense predictions due to weak prior assumptions. To address... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 296,972 |
1510.07954 | Core-satellite Graphs. Clustering, Assortativity and Spectral Properties | Core-satellite graphs (sometimes referred to as generalized friendship graphs) are an interesting class of graphs that generalize many well known types of graphs. In this paper we show that two popular clustering measures, the average Watts-Strogatz clustering coefficient and the transitivity index, diverge when the gr... | false | false | false | true | false | false | false | false | false | false | false | false | false | false | false | false | false | false | 48,247 |
1909.09006 | APIR-Net: Autocalibrated Parallel Imaging Reconstruction using a Neural
Network | Deep learning has been successfully demonstrated in MRI reconstruction of accelerated acquisitions. However, its dependence on representative training data limits the application across different contrasts, anatomies, or image sizes. To address this limitation, we propose an unsupervised, auto-calibrated k-space comple... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 146,120 |
2106.13415 | Building Intelligent Autonomous Navigation Agents | Breakthroughs in machine learning in the last decade have led to `digital intelligence', i.e. machine learning models capable of learning from vast amounts of labeled data to perform several digital tasks such as speech recognition, face recognition, machine translation and so on. The goal of this thesis is to make pro... | false | false | false | false | true | false | true | true | false | false | false | true | false | false | false | false | false | false | 243,069 |
2204.08545 | A Novel Region Duplication Detection Algorithm Based on Hybrid Approach | The digital images from various sources are ubiquitous due to easy availability of high bandwidth Internet. Digital images are easy to tamper with good or bad intentions. Non-availability of pre-embedded information in digital images makes the tampering detection process more difficult in case of digital forensics. Thu... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 292,124 |
0801.0701 | Adversarial Models and Resilient Schemes for Network Coding | In a recent paper, Jaggi et al. (INFOCOM 2007), presented a distributed polynomial-time rate-optimal network-coding scheme that works in the presence of Byzantine faults. We revisit their adversarial models and augment them with three, arguably realistic, models. In each of the models, we present a distributed scheme t... | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | true | 1,120 |
2112.00443 | TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit | Growing evidence points to recurring influence campaigns on social media, often sponsored by state actors aiming to manipulate public opinion on sensitive political topics. Typically, campaigns are performed through instrumented accounts, known as troll accounts; despite their prominence, however, little work has been ... | false | false | false | true | false | false | false | false | false | false | false | false | true | true | false | false | false | false | 269,140 |
2412.03304 | Global MMLU: Understanding and Addressing Cultural and Linguistic Biases
in Multilingual Evaluation | Cultural biases in multilingual datasets pose significant challenges for their effectiveness as global benchmarks. These biases stem not only from differences in language but also from the cultural knowledge required to interpret questions, reducing the practical utility of translated datasets like MMLU. Furthermore, t... | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | false | false | false | 513,908 |
2007.04574 | Neural Video Coding using Multiscale Motion Compensation and
Spatiotemporal Context Model | Over the past two decades, traditional block-based video coding has made remarkable progress and spawned a series of well-known standards such as MPEG-4, H.264/AVC and H.265/HEVC. On the other hand, deep neural networks (DNNs) have shown their powerful capacity for visual content understanding, feature extraction and c... | false | false | false | false | false | false | false | false | false | false | false | true | false | false | false | false | false | false | 186,401 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.