aid stringlengths 9 15 | mid stringlengths 7 10 | abstract stringlengths 78 2.56k | related_work stringlengths 92 1.77k | ref_abstract dict | template_name stringclasses 7
values | template stringclasses 7
values | rendered_input stringlengths 174 25.1k | rendered_output stringlengths 78 2.56k |
|---|---|---|---|---|---|---|---|---|
1908.08705 | 2969664989 | In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions. To create an attack, we print the rectangular paper sticker on a common color printer and put it on the hat. The adversarial sticker is prepared with a novel algorithm for of... | Another interesting approach @cite_14 uses the concept of nested adversarial examples where separate non-overlapping adversarial perturbations are generated for close and far distances. This attack is designed for Faster R-CNN and YOLOv3 @cite_38 . | {
"cite_N": [
"@cite_38",
"@cite_14"
],
"mid": [
"2796347433",
"2947773286"
],
"abstract": [
"We present some updates to YOLO! We made a bunch of little design changes to make it better. We also trained this new network that's pretty swell. It's a little bigger than last time but more accu... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_38: We present some updates to YOLO! We made a bunch of little design changes to make it better. We also trained this new network that's pretty swell. It's a little bigger than last time but more accurate. It's still fast ... | In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions. To create an attack, we print the rectangular paper sticker on a common color printer and put it on the hat. The adversarial sticker is prepared with a novel algorithm for of... |
1908.08705 | 2969664989 | In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions. To create an attack, we print the rectangular paper sticker on a common color printer and put it on the hat. The adversarial sticker is prepared with a novel algorithm for of... | A few works are devoted to more complex approaches. One of such works @cite_29 proposes to use EOT, NPS, and TV loss for fooling YOLOv2-based person detector. Another one @cite_2 is devoted to fooling the Face ID system using adversarial generative nets (a sort of GANs @cite_18 ) where the generator produces the eyegla... | {
"cite_N": [
"@cite_29",
"@cite_18",
"@cite_2"
],
"mid": [
"2938470389",
"1710476689",
"2932026309"
],
"abstract": [
"Adversarial attacks on machine learning models have seen increasing interest in the past years. By making only subtle changes to the input of a convolutional neura... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_29: Adversarial attacks on machine learning models have seen increasing interest in the past years. By making only subtle changes to the input of a convolutional neural network, the output of the network can be swayed to o... | In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions. To create an attack, we print the rectangular paper sticker on a common color printer and put it on the hat. The adversarial sticker is prepared with a novel algorithm for of... |
1908.08654 | 2969398112 | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... | Stream Processing. There are many important problems for stream data processing, including event detection @cite_35 , outlier detection @cite_16 , top- @math query @cite_37 , join @cite_38 @cite_22 , skyline query @cite_12 , nearest neighbor query @cite_33 , aggregate query @cite_17 , and so on. These works usually ass... | {
"cite_N": [
"@cite_35",
"@cite_37",
"@cite_38",
"@cite_22",
"@cite_33",
"@cite_16",
"@cite_12",
"@cite_17"
],
"mid": [
"2613057181",
"2106742801",
"2118924829",
"2138646997",
"2049040861",
"2794689483",
"2109821166",
"2150397765"
],
"abstract":... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_35: Event processing applications from financial fraud detection to health care analytics continuously execute event queries with Kleene closure to extract event sequences of arbitrary, statically unknown length, called Co... | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... |
1908.08654 | 2969398112 | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... | Differential Dependency. Differential dependency (DD) @cite_18 is a valuable tool for data imputation @cite_2 , data cleaning @cite_14 , data repairing @cite_39 , and so on. @cite_2 used the DDs to fill the missing attributes of incomplete objects on static data set via some detected neighbors satisfying the distance c... | {
"cite_N": [
"@cite_18",
"@cite_14",
"@cite_39",
"@cite_23",
"@cite_2"
],
"mid": [
"2108132403",
"2295468252",
"2183774130",
"2616903276",
"2282784388"
],
"abstract": [
"The importance of difference semantics (e.g., “similar” or “dissimilar”) has been recently reco... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_18: The importance of difference semantics (e.g., “similar” or “dissimilar”) has been recently recognized for declaring dependencies among various types of data, such as numerical values or text values. We propose a novel ... | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... |
1908.08654 | 2969398112 | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... | Join Over Certain Uncertain Databases. The join operator was traditionally used in relational databases @cite_15 or data streams @cite_38 . The join predicate may follow equality semantics between attributes of tuples or data objects. According to predicate constraints, join over uncertain databases @cite_11 @cite_22 c... | {
"cite_N": [
"@cite_38",
"@cite_15",
"@cite_22",
"@cite_11"
],
"mid": [
"2118924829",
"2015372451",
"2138646997",
"2129553531"
],
"abstract": [
"We consider the problem of approximating sliding window joins over data streams in a data stream processing system with limited ... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_38: We consider the problem of approximating sliding window joins over data streams in a data stream processing system with limited resources. In our model, we deal with resource constraints by shedding load in the form of... | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... |
1908.08654 | 2969398112 | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... | PSJ has received much attention in many domains. @cite_19 applied PSJ to integrate heterogeneous RDF graphs by introducing an equivalent semantics for RDF graphs. @cite_31 proposed an effective filter-based method for high-dimensional vector similarity join. @cite_30 explored how to leverage relations between sets to p... | {
"cite_N": [
"@cite_30",
"@cite_9",
"@cite_19",
"@cite_40",
"@cite_5",
"@cite_31"
],
"mid": [
"2619410666",
"",
"2741223254",
"2751694342",
"1990947147",
""
],
"abstract": [
"Exact set similarity join, which finds all the similar set pairs from two collecti... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30: Exact set similarity join, which finds all the similar set pairs from two collections of sets, is a fundamental problem with a wide range of applications. The existing solutions for set similarity join follow a filteri... | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... |
1908.08654 | 2969398112 | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... | Incomplete Databases. In the literature of incomplete databases, the most commonly used imputation methods include rule-based @cite_1 , statistical-based @cite_36 , pattern-based @cite_20 , constraint-based @cite_42 imputation, and so on. These existing works may incur the accuracy problem for sparse data sets. That is... | {
"cite_N": [
"@cite_18",
"@cite_36",
"@cite_42",
"@cite_1",
"@cite_32",
"@cite_20"
],
"mid": [
"2108132403",
"2164187405",
"2734096706",
"2161163216",
"2951565755",
"2605046998"
],
"abstract": [
"The importance of difference semantics (e.g., “similar” or “d... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_18: The importance of difference semantics (e.g., “similar” or “dissimilar”) has been recently recognized for declaring dependencies among various types of data, such as numerical values or text values. We propose a novel ... | For decades, the join operator over fast data streams has always drawn much attention from the database community, due to its wide spectrum of real-world applications, such as online clustering, intrusion detection, sensor data monitoring, and so on. Existing works usually assume that the underlying streams to be joine... |
1908.08118 | 2969661104 | Neural plasticity is an important functionality of human brain, in which number of neurons and synapses can shrink or expand in response to stimuli throughout the span of life. We model this dynamic learning process as an @math -norm regularized binary optimization problem, in which each unit of a neural network (e.g.,... | Another closely related area is neural architecture search @cite_24 @cite_29 @cite_6 that searches for an optimal network architecture for a given learning task. It attempts to determine number of layers, types of layers, layer configurations, different activation functions, etc. Given the extremely large search space,... | {
"cite_N": [
"@cite_24",
"@cite_29",
"@cite_6"
],
"mid": [
"2963374479",
"2964081807",
"2904817185"
],
"abstract": [
"Neural networks are powerful and flexible models that work well for many difficult learning tasks in image, speech and natural language understanding. Despite thei... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_24: Neural networks are powerful and flexible models that work well for many difficult learning tasks in image, speech and natural language understanding. Despite their success, neural networks are still hard to design. In... | Neural plasticity is an important functionality of human brain, in which number of neurons and synapses can shrink or expand in response to stimuli throughout the span of life. We model this dynamic learning process as an @math -norm regularized binary optimization problem, in which each unit of a neural network (e.g.,... |
1908.08118 | 2969661104 | Neural plasticity is an important functionality of human brain, in which number of neurons and synapses can shrink or expand in response to stimuli throughout the span of life. We model this dynamic learning process as an @math -norm regularized binary optimization problem, in which each unit of a neural network (e.g.,... | Compared to network sparsification, network expansion is a relatively less explored area. There are few existing works that can dynamically increase the capacity of network during training. For example, DNC @cite_16 sequentially adds neurons one at a time to the hidden layers of network until the desired approximation ... | {
"cite_N": [
"@cite_18",
"@cite_16",
"@cite_25",
"@cite_17"
],
"mid": [
"2756154119",
"2042481239",
"2964091842",
"2165310684"
],
"abstract": [
"CNNs have made an undeniable impact on computer vision through the ability to learn high-capacity models with large annotated tr... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_18: CNNs have made an undeniable impact on computer vision through the ability to learn high-capacity models with large annotated training sets. One of their remarkable properties is the ability to transfer knowledge from ... | Neural plasticity is an important functionality of human brain, in which number of neurons and synapses can shrink or expand in response to stimuli throughout the span of life. We model this dynamic learning process as an @math -norm regularized binary optimization problem, in which each unit of a neural network (e.g.,... |
1908.08338 | 2969823110 | Dynamic network slicing has emerged as a promising and fundamental framework for meeting 5G's diverse use cases. As machine learning (ML) is expected to play a pivotal role in the efficient control and management of these networks, in this work we examine the ML-based Quality-of-Transmission (QoT) estimation problem un... | Several ML applications have been already developed and explored for optical network planning purposes @cite_9 @cite_8 . In general, the state-of-the-art assumes that the optical network is centrally controlled by an SDN-based optical network controller @cite_11 @cite_20 , equipped with storage, processing, and monitor... | {
"cite_N": [
"@cite_9",
"@cite_11",
"@cite_20",
"@cite_8"
],
"mid": [
"2781788077",
"2885792477",
"2809876146",
"2964101383"
],
"abstract": [
"Abstract Artificial intelligence (AI) is an extensive scientific discipline which enables computer systems to solve problems by em... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_9: Abstract Artificial intelligence (AI) is an extensive scientific discipline which enables computer systems to solve problems by emulating complex biological processes such as learning, reasoning and self-correction. Thi... | Dynamic network slicing has emerged as a promising and fundamental framework for meeting 5G's diverse use cases. As machine learning (ML) is expected to play a pivotal role in the efficient control and management of these networks, in this work we examine the ML-based Quality-of-Transmission (QoT) estimation problem un... |
1908.08289 | 2969676305 | Existing deep learning approaches on 3d human pose estimation for videos are either based on Recurrent or Convolutional Neural Networks (RNNs or CNNs). However, RNN-based frameworks can only tackle sequences with limited frames because sequential models are sensitive to bad frames and tend to drift over long sequences.... | The inherent depth ambiguity in 3d pose estimation from monocular images limits the estimation accuracy. Extensive research has been done to exploit extra information contained in temporal sequences. Zhou al @cite_35 formulate an optimization problem to search for the 3d configuration with the highest probability given... | {
"cite_N": [
"@cite_35",
"@cite_5",
"@cite_4"
],
"mid": [
"2963688992",
"2963592930",
"2611932403"
],
"abstract": [
"This paper addresses the challenge of 3D full-body human pose estimation from a monocular image sequence. Here, two cases are considered: (i) the image locations of... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_35: This paper addresses the challenge of 3D full-body human pose estimation from a monocular image sequence. Here, two cases are considered: (i) the image locations of the human joints are provided and (ii) the image loca... | Existing deep learning approaches on 3d human pose estimation for videos are either based on Recurrent or Convolutional Neural Networks (RNNs or CNNs). However, RNN-based frameworks can only tackle sequences with limited frames because sequential models are sensitive to bad frames and tend to drift over long sequences.... |
1908.08289 | 2969676305 | Existing deep learning approaches on 3d human pose estimation for videos are either based on Recurrent or Convolutional Neural Networks (RNNs or CNNs). However, RNN-based frameworks can only tackle sequences with limited frames because sequential models are sensitive to bad frames and tend to drift over long sequences.... | Recently, RNN-based frameworks are used to deal with sequential input data. Lin al @cite_1 use a multi-stage framework based on Long Short-term Memory (LSTM) units to estimate the 3d pose from the extracted 2d features and estimated 3d pose in the previous stage. Coskun al @cite_32 propose to learn a human motion model... | {
"cite_N": [
"@cite_36",
"@cite_26",
"@cite_1",
"@cite_32"
],
"mid": [
"2769237672",
"2903549000",
"2963383668",
"2963203809"
],
"abstract": [
"In this work, we address the problem of 3D human pose estimation from a sequence of 2D human poses. Although the recent success o... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_36: In this work, we address the problem of 3D human pose estimation from a sequence of 2D human poses. Although the recent success of deep networks has led many state-of-the-art methods for 3D pose estimation to train dee... | Existing deep learning approaches on 3d human pose estimation for videos are either based on Recurrent or Convolutional Neural Networks (RNNs or CNNs). However, RNN-based frameworks can only tackle sequences with limited frames because sequential models are sensitive to bad frames and tend to drift over long sequences.... |
1908.08289 | 2969676305 | Existing deep learning approaches on 3d human pose estimation for videos are either based on Recurrent or Convolutional Neural Networks (RNNs or CNNs). However, RNN-based frameworks can only tackle sequences with limited frames because sequential models are sensitive to bad frames and tend to drift over long sequences.... | Inspired by matrix factorization methods commonly used in Structure-from-Motion (SfM) @cite_23 and non-rigid SfM @cite_33 , several works @cite_3 @cite_45 @cite_21 on 3d human pose estimation factorize the sequence of 3d human poses into a linear combination of shape bases. Akhter al @cite_42 suggest a duality of the f... | {
"cite_N": [
"@cite_33",
"@cite_21",
"@cite_42",
"@cite_3",
"@cite_45",
"@cite_23"
],
"mid": [
"2124600577",
"",
"2138816964",
"2155196764",
"",
"2138835141"
],
"abstract": [
"The paper addresses the problem of recovering 3D non-rigid shape models from imag... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_33: The paper addresses the problem of recovering 3D non-rigid shape models from image sequences. For example, given a video recording of a talking person, we would like to estimate a 3D model of the lips and the full face... | Existing deep learning approaches on 3d human pose estimation for videos are either based on Recurrent or Convolutional Neural Networks (RNNs or CNNs). However, RNN-based frameworks can only tackle sequences with limited frames because sequential models are sensitive to bad frames and tend to drift over long sequences.... |
1908.08015 | 2969678456 | Among various optimization algorithms, ADAM can achieve outstanding performance and has been widely used in model learning. ADAM has the advantages of fast convergence with both momentum and adaptive learning rate. For deep neural network learning problems, since their objective functions are nonconvex, ADAM can also g... | : Deep learning models have achieved great success in recent years, whose representative examples include convolutional neural network(CNN) @cite_12 @cite_1 . CNN has been mainly used to deal with image data and shows outstanding performance on various computer vision tasks. Besides CNN, there also exist many other typ... | {
"cite_N": [
"@cite_13",
"@cite_9",
"@cite_21",
"@cite_1",
"@cite_5",
"@cite_10",
"@cite_12"
],
"mid": [
"189596042",
"2091432990",
"2025768430",
"",
"2099471712",
"179875071",
"2163605009"
],
"abstract": [
"We present a new learning algorithm for B... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_13: We present a new learning algorithm for Boltzmann machines that contain many layers of hidden variables. Data-dependent expectations are estimated using a variational approximation that tends to focus on a single mode,... | Among various optimization algorithms, ADAM can achieve outstanding performance and has been widely used in model learning. ADAM has the advantages of fast convergence with both momentum and adaptive learning rate. For deep neural network learning problems, since their objective functions are nonconvex, ADAM can also g... |
1908.08015 | 2969678456 | Among various optimization algorithms, ADAM can achieve outstanding performance and has been widely used in model learning. ADAM has the advantages of fast convergence with both momentum and adaptive learning rate. For deep neural network learning problems, since their objective functions are nonconvex, ADAM can also g... | : Boosting was proposed by @cite_8 . Given a training dataset containing @math training examples, a batch of @math training examples is generated by random sampling with replacement. We can generate @math training sets from the same original training data by applying the sampling @math times @cite_20 , which will be us... | {
"cite_N": [
"@cite_20",
"@cite_8"
],
"mid": [
"605727707",
"2112076978"
],
"abstract": [
"An up-to-date, self-contained introduction to a state-of-the-art machine learning approach, Ensemble Methods: Foundations and Algorithms shows how these accurate methods are used in real-world tasks... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_20: An up-to-date, self-contained introduction to a state-of-the-art machine learning approach, Ensemble Methods: Foundations and Algorithms shows how these accurate methods are used in real-world tasks. It gives you the n... | Among various optimization algorithms, ADAM can achieve outstanding performance and has been widely used in model learning. ADAM has the advantages of fast convergence with both momentum and adaptive learning rate. For deep neural network learning problems, since their objective functions are nonconvex, ADAM can also g... |
1908.07836 | 2969860478 | Recognizing the layout of unstructured digital documents is an important step when parsing the documents into structured machine-readable format for downstream applications. Deep neural networks that are developed for computer vision have been proven to be an effective method to analyze layout of document images. Howev... | Existing datasets for document layout analysis rely on manual annotation. Some of these datasets are used in document processing challenges. Examples of these efforts are available in several ICDAR challenges @cite_19 , which cover as well complex layouts @cite_18 @cite_7 . The US NIH National Library of Medicine has p... | {
"cite_N": [
"@cite_19",
"@cite_18",
"@cite_7"
],
"mid": [
"2151765755",
"2106311500",
"2915774443"
],
"abstract": [
"There is a significant need for a realistic dataset on which to evaluate layout analysis methods and examine their performance in detail. This paper presents a new... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_19: There is a significant need for a realistic dataset on which to evaluate layout analysis methods and examine their performance in detail. This paper presents a new dataset (and the methodology used to create it) based ... | Recognizing the layout of unstructured digital documents is an important step when parsing the documents into structured machine-readable format for downstream applications. Deep neural networks that are developed for computer vision have been proven to be an effective method to analyze layout of document images. Howev... |
1908.07836 | 2969860478 | Recognizing the layout of unstructured digital documents is an important step when parsing the documents into structured machine-readable format for downstream applications. Deep neural networks that are developed for computer vision have been proven to be an effective method to analyze layout of document images. Howev... | In addition to document layout, further understanding of the document content has been studied in the evaluation of table detection methods, e.g. @cite_13 @cite_21 . Examples include table detection from document images using heuristics @cite_11 , vertical arrangement of text blocks @cite_3 and deep learning methods @c... | {
"cite_N": [
"@cite_9",
"@cite_21",
"@cite_3",
"@cite_0",
"@cite_2",
"@cite_13",
"@cite_12",
"@cite_11"
],
"mid": [
"2786480153",
"2150673968",
"2321821989",
"2787523828",
"2444353601",
"2051265407",
"2797320628",
"1506666816"
],
"abstract": [
... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_9: Page segmentation and table detection play an important role in understanding the structure of documents. We present a page segmentation algorithm that incorporates state-of-the-art deep learning methods for segmenting ... | Recognizing the layout of unstructured digital documents is an important step when parsing the documents into structured machine-readable format for downstream applications. Deep neural networks that are developed for computer vision have been proven to be an effective method to analyze layout of document images. Howev... |
1908.07801 | 2969390690 | Instance segmentation requires a large number of training samples to achieve satisfactory performance and benefits from proper data augmentation. To enlarge the training set and increase the diversity, previous methods have investigated using data annotation from other domain (e.g. bbox, point) in a weakly supervised m... | Combining instance detection and semantic segmentation, instance segmentation @cite_45 @cite_19 @cite_4 @cite_29 @cite_39 @cite_5 @cite_11 @cite_27 is a much harder problem. Earlier methods either propose segmentation candidates followed by classification @cite_40 , or associate pixels on the semantic segmentation map ... | {
"cite_N": [
"@cite_4",
"@cite_33",
"@cite_41",
"@cite_29",
"@cite_9",
"@cite_42",
"@cite_6",
"@cite_39",
"@cite_24",
"@cite_19",
"@cite_27",
"@cite_45",
"@cite_40",
"@cite_5",
"@cite_10",
"@cite_12",
"@cite_20",
"@cite_11"
],
"mid": [
"... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4:
@cite_33:
@cite_41: Fully convolutional networks (FCNs) have been proven very successful for semantic segmentation, but the FCN outputs are unaware of object instances. In this paper, we develop FCNs that are capabl... | Instance segmentation requires a large number of training samples to achieve satisfactory performance and benefits from proper data augmentation. To enlarge the training set and increase the diversity, previous methods have investigated using data annotation from other domain (e.g. bbox, point) in a weakly supervised m... |
1908.07820 | 2969722339 | Multi-Task Learning (MTL) aims at boosting the overall performance of each individual task by leveraging useful information contained in multiple related tasks. It has shown great success in natural language processing (NLP). Currently, a number of MLT architectures and learning mechanisms have been proposed for variou... | Multi-task learning with deep neural networks has gained increasing attention within NLP community over the past decades. @cite_3 and @cite_21 described most of the existing techniques for multi-task learning in deep neural networks. Generally, existing MTL methods can be categorised as @cite_29 @cite_10 and @cite_20 @... | {
"cite_N": [
"@cite_29",
"@cite_21",
"@cite_32",
"@cite_3",
"@cite_10",
"@cite_20"
],
"mid": [
"2963877604",
"2742079690",
"2914526845",
"2624871570",
"",
"2308486447"
],
"abstract": [
"Multi-task learning in Convolutional Networks has displayed remarkable ... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_29: Multi-task learning in Convolutional Networks has displayed remarkable success in the field of recognition. This success can be largely attributed to learning shared representations from multiple supervisory tasks. How... | Multi-Task Learning (MTL) aims at boosting the overall performance of each individual task by leveraging useful information contained in multiple related tasks. It has shown great success in natural language processing (NLP). Currently, a number of MLT architectures and learning mechanisms have been proposed for variou... |
1908.07752 | 2969591045 | Clinicians and other analysts working with healthcare data are in need for better support to cope with large and complex data. While an increasing number of visual analytics environments integrates explicit domain knowledge as a means to deliver a precise representation of the available data, theoretical work so far ha... | Since Illuminating the Path'' [p. ,35] thomas_2005_illuminating , incorporating prior domain knowledge and build[ing] knowledge structures'' has been on VA's agenda. This is underscored by the pivotal position of knowledge in the VA process model by @cite_40 @cite_36 and further process models such as the knowledge gen... | {
"cite_N": [
"@cite_4",
"@cite_36",
"@cite_40",
"@cite_50",
"@cite_47",
"@cite_20",
"@cite_17"
],
"mid": [
"2905763413",
"1506965148",
"2097481508",
"2142068257",
"2090687959",
"2294575332",
"197746879"
],
"abstract": [
"Visual Analytics (VA) aims t... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4: Visual Analytics (VA) aims to combine the strengths of humans and computers for effective data analysis. In this endeavor, humans’ tacit knowledge from prior experience is an important asset that can be leveraged by bot... | Clinicians and other analysts working with healthcare data are in need for better support to cope with large and complex data. While an increasing number of visual analytics environments integrates explicit domain knowledge as a means to deliver a precise representation of the available data, theoretical work so far ha... |
1908.07752 | 2969591045 | Clinicians and other analysts working with healthcare data are in need for better support to cope with large and complex data. While an increasing number of visual analytics environments integrates explicit domain knowledge as a means to deliver a precise representation of the available data, theoretical work so far ha... | Beyond the role of knowledge in the VA process, only few works discuss the content and structure of explicit knowledge on a general level. @cite_7 conceptualize domain knowledge as a model of a part of reality and provide definitions for different types of models but they do not specify the form and medium how the mode... | {
"cite_N": [
"@cite_26",
"@cite_33",
"@cite_7",
"@cite_53",
"@cite_43",
"@cite_16"
],
"mid": [
"2169236565",
"2534686024",
"2788844524",
"2042724135",
"1594602328",
"2098960900"
],
"abstract": [
"Visualization has become an increasingly important tool to su... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_26: Visualization has become an increasingly important tool to support exploration and analysis of the large volumes of data we are facing today. However, interests and needs of users are still not being considered suffici... | Clinicians and other analysts working with healthcare data are in need for better support to cope with large and complex data. While an increasing number of visual analytics environments integrates explicit domain knowledge as a means to deliver a precise representation of the available data, theoretical work so far ha... |
1908.07752 | 2969591045 | Clinicians and other analysts working with healthcare data are in need for better support to cope with large and complex data. While an increasing number of visual analytics environments integrates explicit domain knowledge as a means to deliver a precise representation of the available data, theoretical work so far ha... | , it can be seen, that most of the discussed approaches cover how explicit domain knowledge can be exploited to enhance visual representation and data analysis; some approaches provide methods to generate explicit knowledge. Additionally, most of the currently implemented knowledge-assisted VA environments are focused ... | {
"cite_N": [
"@cite_4"
],
"mid": [
"2905763413"
],
"abstract": [
"Visual Analytics (VA) aims to combine the strengths of humans and computers for effective data analysis. In this endeavor, humans’ tacit knowledge from prior experience is an important asset that can be leveraged by both human and ... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4: Visual Analytics (VA) aims to combine the strengths of humans and computers for effective data analysis. In this endeavor, humans’ tacit knowledge from prior experience is an important asset that can be leveraged by bot... | Clinicians and other analysts working with healthcare data are in need for better support to cope with large and complex data. While an increasing number of visual analytics environments integrates explicit domain knowledge as a means to deliver a precise representation of the available data, theoretical work so far ha... |
1908.07516 | 2969539381 | Neural network image reconstruction directly from measurement data is a growing field of research, but until now has been limited to producing small (e.g. 128x128) 2D images by the large memory requirements of the previously suggested networks. In order to facilitate further research with direct reconstruction, we deve... | The terms deep learning and image reconstruction are often used in conjunction to describe a significant amount of recent research @cite_24 that most often falls into one of two categories: 1) combine deep learning with an analytical or statistical method such as using a deep learning prior @cite_13 or regularization t... | {
"cite_N": [
"@cite_22",
"@cite_3",
"@cite_24",
"@cite_16",
"@cite_13"
],
"mid": [
"2753044865",
"2810690955",
"2803224943",
"2800924046",
"2795777276"
],
"abstract": [
"In the presence of met al implants, met al artifacts are introduced to x-ray computed tomograph... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_22: In the presence of met al implants, met al artifacts are introduced to x-ray computed tomography CT images. Although a large number of met al artifact reduction (MAR) methods have been proposed in the past decades, MAR... | Neural network image reconstruction directly from measurement data is a growing field of research, but until now has been limited to producing small (e.g. 128x128) 2D images by the large memory requirements of the previously suggested networks. In order to facilitate further research with direct reconstruction, we deve... |
1908.07516 | 2969539381 | Neural network image reconstruction directly from measurement data is a growing field of research, but until now has been limited to producing small (e.g. 128x128) 2D images by the large memory requirements of the previously suggested networks. In order to facilitate further research with direct reconstruction, we deve... | Early research in this area was based on networks of fully connected multilayer perceptrons @cite_11 @cite_12 @cite_17 @cite_14 that yielded promising results, but only for very low resolution reconstructions. More recent efforts have capitalized on the growth of computational resources, especially in the area of GPUs,... | {
"cite_N": [
"@cite_14",
"@cite_11",
"@cite_27",
"@cite_15",
"@cite_12",
"@cite_17"
],
"mid": [
"2544373769",
"2538611499",
"2963633304",
"2611467245",
"",
""
],
"abstract": [
"A new approach for tomographic image reconstruction from projections using Artif... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_14: A new approach for tomographic image reconstruction from projections using Artificial Neural Network (ANN) techniques is presented in this work. The design of the proposed reconstruction system is based on simple but e... | Neural network image reconstruction directly from measurement data is a growing field of research, but until now has been limited to producing small (e.g. 128x128) 2D images by the large memory requirements of the previously suggested networks. In order to facilitate further research with direct reconstruction, we deve... |
1908.07705 | 2969301397 | Dialogue state tracking (DST) is an essential component in task-oriented dialogue systems, which estimates user goals at every dialogue turn. However, most previous approaches usually suffer from the following problems. Many discriminative models, especially end-to-end (E2E) models, are difficult to extract unknown val... | As far as we know, @cite_4 is the only work using the discriminative model to handle the dynamic and unbounded value set. @cite_4 represents the dialogue states by candidate sets derived from the dialogue and knowledge, then scores values in the candidate set with binary classifications. Although the sophisticated gene... | {
"cite_N": [
"@cite_4"
],
"mid": [
"2757930983"
],
"abstract": [
"Dialogue state tracking (DST) is a key component of task-oriented dialogue systems. DST estimates the user's goal at each user turn given the interaction until then. State of the art approaches for state tracking rely on deep learn... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4: Dialogue state tracking (DST) is a key component of task-oriented dialogue systems. DST estimates the user's goal at each user turn given the interaction until then. State of the art approaches for state tracking rely o... | Dialogue state tracking (DST) is an essential component in task-oriented dialogue systems, which estimates user goals at every dialogue turn. However, most previous approaches usually suffer from the following problems. Many discriminative models, especially end-to-end (E2E) models, are difficult to extract unknown val... |
1908.07674 | 2969763518 | A significantly low cost and tractable progressive learning approach is proposed and discussed for efficient spatiotemporal monitoring of a completely unknown, two dimensional correlated signal distribution in localized wireless sensor field. The spatial distribution is compressed into a number of its contour lines and... | Contour line detection in wireless sensor networks, which is the first step in modeling the spatial distribution has been addressed in several researches, including @cite_13 @cite_31 @cite_1 @cite_17 @cite_18 @cite_15 @cite_26 @cite_30 @cite_12 @cite_20 @cite_16 . Most of these mentioned researches addressed to distrib... | {
"cite_N": [
"@cite_30",
"@cite_18",
"@cite_26",
"@cite_15",
"@cite_1",
"@cite_16",
"@cite_31",
"@cite_20",
"@cite_13",
"@cite_12",
"@cite_17"
],
"mid": [
"2125380743",
"2136684675",
"",
"2125456263",
"2002066573",
"2115930054",
"2085176360"... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30: A robust filter-based approach is proposed for wireless sensor networks for detecting contours of a signal distribution over a 2-dimensional region. The motivation for contour detection is derived from applications whe... | A significantly low cost and tractable progressive learning approach is proposed and discussed for efficient spatiotemporal monitoring of a completely unknown, two dimensional correlated signal distribution in localized wireless sensor field. The spatial distribution is compressed into a number of its contour lines and... |
1908.07674 | 2969763518 | A significantly low cost and tractable progressive learning approach is proposed and discussed for efficient spatiotemporal monitoring of a completely unknown, two dimensional correlated signal distribution in localized wireless sensor field. The spatial distribution is compressed into a number of its contour lines and... | Spatial modeling of signal distributions using contour lines has been addressed in @cite_13 @cite_31 @cite_21 . Modeling the spatial distribution with uniformly spaced contour levels and tracking their variation using time-series analysis in sensors was studied in @cite_21 . Using non-uniformly spaced contour lines was... | {
"cite_N": [
"@cite_31",
"@cite_21",
"@cite_13"
],
"mid": [
"2085176360",
"2147259327",
"2774751177"
],
"abstract": [
"This paper presents algorithms for efficiently detecting the variation of a distributed signal over space and time using large scale wireless sensor networks. The... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_31: This paper presents algorithms for efficiently detecting the variation of a distributed signal over space and time using large scale wireless sensor networks. The proposed algorithms use contours for estimating the spa... | A significantly low cost and tractable progressive learning approach is proposed and discussed for efficient spatiotemporal monitoring of a completely unknown, two dimensional correlated signal distribution in localized wireless sensor field. The spatial distribution is compressed into a number of its contour lines and... |
1908.07674 | 2969763518 | A significantly low cost and tractable progressive learning approach is proposed and discussed for efficient spatiotemporal monitoring of a completely unknown, two dimensional correlated signal distribution in localized wireless sensor field. The spatial distribution is compressed into a number of its contour lines and... | Spatiotemporal modeling using machine learning approaches has been reported in several researches, including @cite_9 @cite_5 @cite_19 . In most of these approaches, neural networks algorithms, genetics algorithms, stochastic gradient descent algorithms, etc. are employed. | {
"cite_N": [
"@cite_19",
"@cite_5",
"@cite_9"
],
"mid": [
"2606901901",
"2114866007",
"2732126315"
],
"abstract": [
"Dictionary learning has emerged as a promising alternative to the conventional hybrid coding framework. However, the rigid structure of sequential training and pred... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_19: Dictionary learning has emerged as a promising alternative to the conventional hybrid coding framework. However, the rigid structure of sequential training and prediction degrades its performance in scalable video codi... | A significantly low cost and tractable progressive learning approach is proposed and discussed for efficient spatiotemporal monitoring of a completely unknown, two dimensional correlated signal distribution in localized wireless sensor field. The spatial distribution is compressed into a number of its contour lines and... |
1908.07489 | 2969242814 | Online platforms, such as Airbnb, this http URL, Amazon, Uber and Lyft, can control and optimize many aspects of product search to improve the efficiency of marketplaces. Here we focus on a common model, called the discriminatory control model, where the platform chooses to display a subset of sellers who sell products... | Bertrand competition, proposed by Joseph Bertrand in 1883, and Cournot competition, introduced in 1838 by Antoine Augustin Cournot, are fundamental economic models that represent sellers competing in a single market, and have been studied comprehensively in economics. Due to the motivation that many sellers compete in ... | {
"cite_N": [
"@cite_30",
"@cite_21",
"@cite_20",
"@cite_2"
],
"mid": [
"1555547018",
"2764126775",
"2784228102",
"2915287126"
],
"abstract": [
"Cournot competition, introduced in 1838 by Antoine Augustin Cournot, is a fundamental economic model that represents firms compet... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30: Cournot competition, introduced in 1838 by Antoine Augustin Cournot, is a fundamental economic model that represents firms competing in a single market of a homogeneous good. Each firm tries to maximize its utility—nat... | Online platforms, such as Airbnb, this http URL, Amazon, Uber and Lyft, can control and optimize many aspects of product search to improve the efficiency of marketplaces. Here we focus on a common model, called the discriminatory control model, where the platform chooses to display a subset of sellers who sell products... |
1908.07567 | 2969713569 | The emerging parallel chain protocols represent a breakthrough to address the scalability of blockchain. By composing multiple parallel chain instances, the whole systems' throughput can approach the network capacity. How to coordinate different chains' blocks and to construct them into a global ordering is critical to... | In @cite_39 , Jiaping Wang and Hao Wang propose a protocol called Monoxide, which composes multiple independent single chain consensus systems, called zones. They also proposed eventual atomicity to ensure transaction atomicity across zones and Chu-ko-nu mining to ensure the effective mining power in each zone. Monoxid... | {
"cite_N": [
"@cite_41",
"@cite_29",
"@cite_52",
"@cite_39"
],
"mid": [
"2534313446",
"2897676665",
"2794533297",
"2917183287"
],
"abstract": [
"The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fau... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_41: The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical applications, such as financial transacti... | The emerging parallel chain protocols represent a breakthrough to address the scalability of blockchain. By composing multiple parallel chain instances, the whole systems' throughput can approach the network capacity. How to coordinate different chains' blocks and to construct them into a global ordering is critical to... |
1908.07625 | 2969552498 | Action recognition has seen a dramatic performance improvement in the last few years. Most of the current state-of-the-art literature either aims at improving performance through changes to the backbone CNN network, or they explore different trade-offs between computational efficiency and performance, again through alt... | Action recognition in the deep learning era has been successfully tackled with 2D @cite_12 @cite_1 and 3D CNNs @cite_31 @cite_29 @cite_0 @cite_28 @cite_40 @cite_15 @cite_30 . Most existing works focus on modeling of motion and temporal structures. @cite_12 the optical flow CNN is introduced to model short-term motion p... | {
"cite_N": [
"@cite_30",
"@cite_14",
"@cite_7",
"@cite_15",
"@cite_28",
"@cite_29",
"@cite_1",
"@cite_0",
"@cite_40",
"@cite_31",
"@cite_16",
"@cite_12",
"@cite_17"
],
"mid": [
"2883429621",
"2963155035",
"2963315828",
"",
"",
"288353417... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30: Despite the steady progress in video analysis led by the adoption of convolutional neural networks (CNNs), the relative improvement has been less drastic as that in 2D static image classification. Three main challenges... | Action recognition has seen a dramatic performance improvement in the last few years. Most of the current state-of-the-art literature either aims at improving performance through changes to the backbone CNN network, or they explore different trade-offs between computational efficiency and performance, again through alt... |
1908.07625 | 2969552498 | Action recognition has seen a dramatic performance improvement in the last few years. Most of the current state-of-the-art literature either aims at improving performance through changes to the backbone CNN network, or they explore different trade-offs between computational efficiency and performance, again through alt... | Most of these methods treat action recognition as a video classification problem. These works tend to focus on how motion is captured by the networks and largely ignore what makes the actions unique. In this work, we provide insights specific to the nature of the action recognition problem itself, showing how it requir... | {
"cite_N": [
"@cite_33"
],
"mid": [
"2798365843"
],
"abstract": [
"Compared to earlier multistage frameworks using CNN features, recent end-to-end deep approaches for fine-grained recognition essentially enhance the mid-level learning capability of CNNs. Previous approaches achieve this by introd... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_33: Compared to earlier multistage frameworks using CNN features, recent end-to-end deep approaches for fine-grained recognition essentially enhance the mid-level learning capability of CNNs. Previous approaches achieve th... | Action recognition has seen a dramatic performance improvement in the last few years. Most of the current state-of-the-art literature either aims at improving performance through changes to the backbone CNN network, or they explore different trade-offs between computational efficiency and performance, again through alt... |
1908.07625 | 2969552498 | Action recognition has seen a dramatic performance improvement in the last few years. Most of the current state-of-the-art literature either aims at improving performance through changes to the backbone CNN network, or they explore different trade-offs between computational efficiency and performance, again through alt... | Understanding human activities as a fine-grained recognition problem has been explored for some domain specific tasks @cite_6 @cite_37 . For example, some works have been proposed for hand-gesture recognition @cite_18 @cite_38 @cite_32 , daily life activity recognition @cite_39 and sports understanding @cite_26 @cite_2... | {
"cite_N": [
"@cite_38",
"@cite_37",
"@cite_18",
"@cite_26",
"@cite_4",
"@cite_8",
"@cite_32",
"@cite_6",
"@cite_39",
"@cite_2"
],
"mid": [
"2491875666",
"",
"1926645898",
"2138105460",
"2149335206",
"2100646116",
"2156798932",
"2150338977",... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_38: Joint segmentation and classification of fine-grained actions is important for applications of human-robot interaction, video surveillance, and human skill evaluation. However, despite substantial recent progress in la... | Action recognition has seen a dramatic performance improvement in the last few years. Most of the current state-of-the-art literature either aims at improving performance through changes to the backbone CNN network, or they explore different trade-offs between computational efficiency and performance, again through alt... |
1908.07625 | 2969552498 | Action recognition has seen a dramatic performance improvement in the last few years. Most of the current state-of-the-art literature either aims at improving performance through changes to the backbone CNN network, or they explore different trade-offs between computational efficiency and performance, again through alt... | Different from common object categories such as those in ImageNet @cite_21 , this field cares for objects that look visually very similar and that can only be differentiated by learning their finer details. Some examples including distinguishing bird @cite_5 and plant @cite_9 species and recognizing different car model... | {
"cite_N": [
"@cite_35",
"@cite_33",
"@cite_36",
"@cite_41",
"@cite_9",
"@cite_21",
"@cite_3",
"@cite_19",
"@cite_23",
"@cite_5",
"@cite_10",
"@cite_20",
"@cite_11"
],
"mid": [
"2138011018",
"2798365843",
"2729172879",
"2773003563",
"2736618... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_35: While 3D object representations are being revived in the context of multi-view object class detection and scene understanding, they have not yet attained wide-spread use in fine-grained categorization. State-of-the-art... | Action recognition has seen a dramatic performance improvement in the last few years. Most of the current state-of-the-art literature either aims at improving performance through changes to the backbone CNN network, or they explore different trade-offs between computational efficiency and performance, again through alt... |
1908.07630 | 2969858281 | Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn... | The transfer learning literature explores a number of different topics and strategies such as few-shot learning @cite_19 @cite_29 , domain adaptation @cite_6 , weight synthesis @cite_2 , and multi-task learning @cite_33 @cite_24 @cite_8 . Some works propose novel combinations of these approaches, yielding new training ... | {
"cite_N": [
"@cite_33",
"@cite_8",
"@cite_29",
"@cite_6",
"@cite_24",
"@cite_19",
"@cite_2",
"@cite_10"
],
"mid": [
"2152917747",
"2763323349",
"2950276680",
"2052293776",
"2517038008",
"181016146",
"2045416664",
"2963049866"
],
"abstract": [
... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_33: Creating labeled training data for relation extraction is expensive. In this paper, we study relation extraction in a special weakly-supervised setting when we have only a few seed instances of the target relation type... | Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn... |
1908.07630 | 2969858281 | Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn... | Several approaches have been tried to transfer robust representations based on large numbers of examples to new tasks. These transfer learning approaches share a common intuition @cite_28 : that networks which have learned compact representations of a "source" task, can reuse these representations to achieve higher per... | {
"cite_N": [
"@cite_18",
"@cite_14",
"@cite_28",
"@cite_21",
"@cite_1",
"@cite_32",
"@cite_24",
"@cite_0",
"@cite_20"
],
"mid": [
"2165698076",
"2149933564",
"2616180702",
"2203224402",
"2964352358",
"2122838776",
"2517038008",
"2962835968",
... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_18: A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. However, in many real-world applications, th... | Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn... |
1908.07630 | 2969858281 | Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn... | While all these methods seek to improve performance on the target task by transfer from the source task, most assume there is only one source model, usually trained from ImageNet. @cite_15 Additionally, this approach involves a number of meta-learning decisions, although in general each change from the original source ... | {
"cite_N": [
"@cite_18",
"@cite_14",
"@cite_5",
"@cite_15",
"@cite_17"
],
"mid": [
"2165698076",
"2149933564",
"2091118421",
"2108598243",
"2604763608"
],
"abstract": [
"A major assumption in many machine learning and data mining algorithms is that the training and... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_18: A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. However, in many real-world applications, th... | Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn... |
1908.07630 | 2969858281 | Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn... | Our approach is most similar to that of fine-tuning with co-training @cite_14 . That method begins by using low-level features to identify images within a source dataset having similar textures to a target dataset, and concludes by using a multi-task objective to fine-tune the target task using these images. A related ... | {
"cite_N": [
"@cite_34",
"@cite_14",
"@cite_25",
"@cite_16"
],
"mid": [
"2745420784",
"2149933564",
"2963336383",
"2591924527"
],
"abstract": [
"Transfer learning borrows knowledge from a source domain to facilitate learning in a target domain. Two primary issues to be add... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_34: Transfer learning borrows knowledge from a source domain to facilitate learning in a target domain. Two primary issues to be addressed in transfer learning are what and how to transfer. For a pair of domains, adopting ... | Transfer learning enhances learning across tasks, by leveraging previously learned representations -- if they are properly chosen. We describe an efficient method to accurately estimate the appropriateness of a previously trained model for use in a new learning task. We use this measure, which we call "Predict To Learn... |
1908.07195 | 2969990170 | Most of the existing generative adversarial networks (GAN) for text generation suffer from the instability of reinforcement learning training algorithms such as policy gradient, leading to unstable performance. To tackle this problem, we propose a novel framework called Adversarial Reward Augmented Maximum Likelihood (... | As mentioned above, MLE suffers from the exposure bias problem @cite_3 @cite_33 . Thus, reinforcement learning has been introduced to text generation tasks such as policy gradient @cite_33 and actor-critic @cite_20 . @cite_37 proposed an efficient and stable approach called Reward Augmented Maximum Likelihood (RAML), w... | {
"cite_N": [
"@cite_37",
"@cite_20",
"@cite_33",
"@cite_3"
],
"mid": [
"2963962369",
"2964352247",
"2963248296",
"648786980"
],
"abstract": [
"A key problem in structured output prediction is direct optimization of the task reward function that matters for test evaluation.... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_37: A key problem in structured output prediction is direct optimization of the task reward function that matters for test evaluation. This paper presents a simple and computationally efficient approach to incorporate task... | Most of the existing generative adversarial networks (GAN) for text generation suffer from the instability of reinforcement learning training algorithms such as policy gradient, leading to unstable performance. To tackle this problem, we propose a novel framework called Adversarial Reward Augmented Maximum Likelihood (... |
1908.07195 | 2969990170 | Most of the existing generative adversarial networks (GAN) for text generation suffer from the instability of reinforcement learning training algorithms such as policy gradient, leading to unstable performance. To tackle this problem, we propose a novel framework called Adversarial Reward Augmented Maximum Likelihood (... | The most similar works to our model are RAML @cite_37 and MaliGAN @cite_1 : 1) Compared with RAML, our model adds a discriminator to learn the reward signals instead of choosing existing metrics as rewards. We believe that our model can adapt to various text generation tasks, particularly those without explicit evaluat... | {
"cite_N": [
"@cite_37",
"@cite_1"
],
"mid": [
"2963962369",
"2593383075"
],
"abstract": [
"A key problem in structured output prediction is direct optimization of the task reward function that matters for test evaluation. This paper presents a simple and computationally efficient approac... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_37: A key problem in structured output prediction is direct optimization of the task reward function that matters for test evaluation. This paper presents a simple and computationally efficient approach to incorporate task... | Most of the existing generative adversarial networks (GAN) for text generation suffer from the instability of reinforcement learning training algorithms such as policy gradient, leading to unstable performance. To tackle this problem, we propose a novel framework called Adversarial Reward Augmented Maximum Likelihood (... |
1908.07325 | 2969224942 | Recognizing multiple labels of images is a practical and challenging task, and significant progress has been made by searching semantic-aware regions and modeling label dependency. However, current methods cannot locate the semantic regions accurately due to the lack of part-level supervision or semantic guidance. More... | Recent progress on multi-label image classification relies on the combination of object localization and deep learning techniques @cite_28 @cite_10 . Generally, they introduced object proposals @cite_22 that were assumed to contain all possible foreground objects in the image and aggregated features extracted from all ... | {
"cite_N": [
"@cite_14",
"@cite_22",
"@cite_28",
"@cite_29",
"@cite_10",
"@cite_20"
],
"mid": [
"2560096627",
"7746136",
"1567302070",
"2592628593",
"2410641892",
"2963300078"
],
"abstract": [
"Deep convolution neural networks (CNNs) have demonstrated advan... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_14: Deep convolution neural networks (CNNs) have demonstrated advanced performance on single-label image classification, and various progress also has been made to apply CNN methods on multilabel image classification, whic... | Recognizing multiple labels of images is a practical and challenging task, and significant progress has been made by searching semantic-aware regions and modeling label dependency. However, current methods cannot locate the semantic regions accurately due to the lack of part-level supervision or semantic guidance. More... |
1908.04441 | 2969162116 | RGB-Thermal object tracking attempt to locate target object using complementary visual and thermal infrared data. Existing RGB-T trackers fuse different modalities by robust feature representation learning or adaptive modal weighting. However, how to integrate dual attention mechanism for visual tracking is still a sub... | RGB-T tracking receives more and more attention in computer vision community with the popularity of thermal infrared sensors. Wu @cite_15 concatenate the image patches from RGB and thermal sources, and then sparsely represent each sample in the target template space for tracking. Modal weights are introduced for each s... | {
"cite_N": [
"@cite_0",
"@cite_15",
"@cite_17"
],
"mid": [
"2765667535",
"2106944077",
"2901716381"
],
"abstract": [
"In this paper, we propose a novel graph model, called weighted sparse representation regularized graph, to learn a robust object representation using multispectral... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_0: In this paper, we propose a novel graph model, called weighted sparse representation regularized graph, to learn a robust object representation using multispectral (RGB and thermal) data for visual tracking. In particul... | RGB-Thermal object tracking attempt to locate target object using complementary visual and thermal infrared data. Existing RGB-T trackers fuse different modalities by robust feature representation learning or adaptive modal weighting. However, how to integrate dual attention mechanism for visual tracking is still a sub... |
1908.04441 | 2969162116 | RGB-Thermal object tracking attempt to locate target object using complementary visual and thermal infrared data. Existing RGB-T trackers fuse different modalities by robust feature representation learning or adaptive modal weighting. However, how to integrate dual attention mechanism for visual tracking is still a sub... | Attention mechanism originates from the study of human congnitive neuroscience @cite_9 . In visual tracking, the cosine window map @cite_8 and Gaussian window map @cite_3 are widely used in DCF tracker to suppress the boundary effect, which can interpreted as one type of visual spatial attention. For short-time trackin... | {
"cite_N": [
"@cite_8",
"@cite_9",
"@cite_6",
"@cite_3",
"@cite_5",
"@cite_13"
],
"mid": [
"1964846093",
"2115441154",
"2610871254",
"1955741794",
"1482209366",
"2797812763"
],
"abstract": [
"Although not commonly used, correlation filters can track complex... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_8: Although not commonly used, correlation filters can track complex objects through rotations, occlusions and other distractions at over 20 times the rate of current state-of-the-art techniques. The oldest and simplest co... | RGB-Thermal object tracking attempt to locate target object using complementary visual and thermal infrared data. Existing RGB-T trackers fuse different modalities by robust feature representation learning or adaptive modal weighting. However, how to integrate dual attention mechanism for visual tracking is still a sub... |
1908.04351 | 2969115771 | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... | Input modification methods observe the changes in the outputs based on changes to the inputs. This can be done using perturbed variants @cite_0 @cite_40 , masks @cite_36 , or noise @cite_1 . For instance, Zeiler and Fergus @cite_36 create heatmaps based on the drop in prediction probability from input images with maske... | {
"cite_N": [
"@cite_0",
"@cite_40",
"@cite_1",
"@cite_36"
],
"mid": [
"1019830208",
"2198606573",
"2963996492",
"1849277567"
],
"abstract": [
"The binding specificities of RNA- and DNA-binding proteins are determined from experimental data using a ‘deep learning’ approach.... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_0: The binding specificities of RNA- and DNA-binding proteins are determined from experimental data using a ‘deep learning’ approach.
@cite_40: DeepSEA, a deep-learning algorithm trained on large-scale chromatin-profiling... | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... |
1908.04351 | 2969115771 | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... | Back propagation-based methods trace the contribution of the output backwards through the network to the input. In the classic example, DeconvNet @cite_36 @cite_35 back propagates the output through the network. However, instead of using the Rectified Linear Unit (ReLU) from the forward pass, DeconvNet applies ReLU to ... | {
"cite_N": [
"@cite_36",
"@cite_35",
"@cite_15"
],
"mid": [
"1849277567",
"2962851944",
"2963382180"
],
"abstract": [
"Large Convolutional Network models have recently demonstrated impressive classification performance on the ImageNet benchmark [18]. However there is no clear unde... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_36: Large Convolutional Network models have recently demonstrated impressive classification performance on the ImageNet benchmark [18]. However there is no clear understanding of why they perform so well, or how they might... | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... |
1908.04351 | 2969115771 | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... | Using the gradients of activation functions to back propagate relevance can sometimes lead to misleading contribution attributions due to discontinuous or vanishing gradients. In order to overcome this, instead of using the gradients to back propagate the relevance, Deep Learning Important FeaTures (DeepLIFT) @cite_21 ... | {
"cite_N": [
"@cite_27",
"@cite_21",
"@cite_25",
"@cite_26"
],
"mid": [
"2964612343",
"2605409611",
"2962862931",
"2594633041"
],
"abstract": [
"",
"The purported \"black box\" nature of neural networks is a barrier to adoption in applications where interpretability is... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_27:
@cite_21: The purported "black box" nature of neural networks is a barrier to adoption in applications where interpretability is essential. Here we present DeepLIFT (Deep Learning Important FeaTures), a method for de... | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... |
1908.04351 | 2969115771 | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... | Gradient-Weighted CAM (Grad-CAM) @cite_24 is a generalization of CAM that can target any layer and introduces the gradient information to CAM. The problem with CAM-based methods is that they specifically target high-level layers. Therefore, hybrid methods, such as Guided Grad-CAM @cite_24 , combine the qualities of CAM... | {
"cite_N": [
"@cite_24"
],
"mid": [
"2962858109"
],
"abstract": [
"We propose a technique for producing ‘visual explanations’ for decisions from a large class of Convolutional Neural Network (CNN)-based models, making them more transparent. Our approach – Gradient-weighted Class Activation Mappin... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_24: We propose a technique for producing ‘visual explanations’ for decisions from a large class of Convolutional Neural Network (CNN)-based models, making them more transparent. Our approach – Gradient-weighted Class Activ... | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... |
1908.04351 | 2969115771 | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... | There are also many other visualization and explanation methods for neural networks. For example, by observing the maximal activations of layers, it is possible to visualize contributing regions of feature maps @cite_36 @cite_7 or the use of attention visualization @cite_30 @cite_34 . In addition, the hidden layers of ... | {
"cite_N": [
"@cite_30",
"@cite_7",
"@cite_8",
"@cite_36",
"@cite_28",
"@cite_9",
"@cite_44",
"@cite_34"
],
"mid": [
"2963811535",
"1825675169",
"2512304460",
"1849277567",
"2787080997",
"2792641098",
"2592004655",
"2913070379"
],
"abstract": [
... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30:
@cite_7: Recent years have produced great advances in training large, deep neural networks (DNNs), including notable successes in training convolutional neural networks (convnets) to recognize natural images. However... | Convolutional Neural Networks (CNN) have become state-of-the-art in the field of image classification. However, not everything is understood about their inner representations. This paper tackles the interpretability and explainability of the predictions of CNNs for multi-class classification problems. Specifically, we ... |
1908.06868 | 2969140094 | Predicting the future of Graph-supported Time Series (GTS) is a key challenge in many domains, such as climate monitoring, finance or neuroimaging. Yet it is a highly difficult problem as it requires to account jointly for time and graph (spatial) dependencies. To simplify this process, it is common to use a two-step p... | When it comes to graphs, a natural approach to define a latent representation is a structure-based approach. It consists in defining the notion of frequency on a graph by analogy with the Fourier Transform (FT) @cite_2 . The so-called Graph Fourier Transform (GFT) represents the signal in another basis. This basis is b... | {
"cite_N": [
"@cite_6",
"@cite_2"
],
"mid": [
"2963660991",
"2101491865"
],
"abstract": [
"We propose an extension of Convolutional Neural Networks (CNNs) to graph-structured data, including strided convolutions and data augmentation defined from inferred graph translations. Our method ma... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_6: We propose an extension of Convolutional Neural Networks (CNNs) to graph-structured data, including strided convolutions and data augmentation defined from inferred graph translations. Our method matches the accuracy of... | Predicting the future of Graph-supported Time Series (GTS) is a key challenge in many domains, such as climate monitoring, finance or neuroimaging. Yet it is a highly difficult problem as it requires to account jointly for time and graph (spatial) dependencies. To simplify this process, it is common to use a two-step p... |
1908.06868 | 2969140094 | Predicting the future of Graph-supported Time Series (GTS) is a key challenge in many domains, such as climate monitoring, finance or neuroimaging. Yet it is a highly difficult problem as it requires to account jointly for time and graph (spatial) dependencies. To simplify this process, it is common to use a two-step p... | Finding the best graph structure for a given problem is a question that recently sparked a lot of interest in the literature @cite_7 @cite_11 @cite_12 . In many cases, a good solution consists in using the covariance matrix (or its inverse) as the adjacency matrix of the graph. Following this lead, in this paper, we ma... | {
"cite_N": [
"@cite_12",
"@cite_7",
"@cite_11"
],
"mid": [
"2299462150",
"",
"2964012239"
],
"abstract": [
"Stationarity is a cornerstone property that facilitates the analysis and processing of random signals in the time domain. Although time-varying signals are abundant in natur... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_12: Stationarity is a cornerstone property that facilitates the analysis and processing of random signals in the time domain. Although time-varying signals are abundant in nature, in many practical scenarios, the informati... | Predicting the future of Graph-supported Time Series (GTS) is a key challenge in many domains, such as climate monitoring, finance or neuroimaging. Yet it is a highly difficult problem as it requires to account jointly for time and graph (spatial) dependencies. To simplify this process, it is common to use a two-step p... |
1908.06868 | 2969140094 | Predicting the future of Graph-supported Time Series (GTS) is a key challenge in many domains, such as climate monitoring, finance or neuroimaging. Yet it is a highly difficult problem as it requires to account jointly for time and graph (spatial) dependencies. To simplify this process, it is common to use a two-step p... | In this work, much of the interest in the latent representation is motivated by its use for sequence time prediction. There are, again, several recent works in this area, based on diverse methods (dictionary learning @cite_4 , source separation @cite_3 ). Again, we restrict the study to a simple question: what is the b... | {
"cite_N": [
"@cite_4",
"@cite_3"
],
"mid": [
"2803751491",
"2888432608"
],
"abstract": [
"Frequency-specific patterns of neural activity are traditionally interpreted as sustained rhythmic oscillations, and related to cognitive mechanisms such as attention, high level visual processing o... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4: Frequency-specific patterns of neural activity are traditionally interpreted as sustained rhythmic oscillations, and related to cognitive mechanisms such as attention, high level visual processing or motor control. Whil... | Predicting the future of Graph-supported Time Series (GTS) is a key challenge in many domains, such as climate monitoring, finance or neuroimaging. Yet it is a highly difficult problem as it requires to account jointly for time and graph (spatial) dependencies. To simplify this process, it is common to use a two-step p... |
1908.06922 | 2968896088 | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... | Prior research shows that the presence of thumbnails in search results help people locate articles of interest online @cite_19 @cite_21 @cite_8 , particularly when paired with informative titles, text snippets, and URLs. Thumbnails are a particularly important signal of relevance when some links to articles have them a... | {
"cite_N": [
"@cite_24",
"@cite_19",
"@cite_21",
"@cite_8"
],
"mid": [
"2035004345",
"2147252560",
"1984274118",
"2139182464"
],
"abstract": [
"In this Note we summarize our research on increasing the information scent of video recordings that are shared via email in a cor... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_24: In this Note we summarize our research on increasing the information scent of video recordings that are shared via email in a corporate setting. We compare two types of email messages for sharing recordings: the first ... | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... |
1908.06922 | 2968896088 | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... | Beyond web search and email reading, thumbnails also appear in the context of navigating other forms of media, from file systems @cite_9 to documents @cite_13 and videos @cite_0 . Prior work in the visualization and visual analytics community has also incorporated thumbnails into the sensemaking process as a means of l... | {
"cite_N": [
"@cite_4",
"@cite_9",
"@cite_6",
"@cite_0",
"@cite_13",
"@cite_12"
],
"mid": [
"2537595510",
"2069324208",
"",
"2161337144",
"2164620969",
""
],
"abstract": [
"Sensemaking is described as the process in which people collect, organize and create... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4: Sensemaking is described as the process in which people collect, organize and create representations of information, all centered around some problem they need to understand. People often get lost when solving complicat... | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... |
1908.06922 | 2968896088 | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... | When browsing unfamiliar content, such as in the case of online news reading, thumbnails must compete for the reader's attention with one another and with other content. We therefore turn to other prior research examining specific aspects of thumbnail design. Several factors appear to impact how thumbnails draw attenti... | {
"cite_N": [
"@cite_7"
],
"mid": [
"1563293148"
],
"abstract": [
"The selectable lists of pages offered by Web browsers’ history and bookmark facilities ostensibly make it easier for people to return to previously visited pages. These lists show the pages as abstractions, typically as truncated t... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_7: The selectable lists of pages offered by Web browsers’ history and bookmark facilities ostensibly make it easier for people to return to previously visited pages. These lists show the pages as abstractions, typically as... | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... |
1908.06922 | 2968896088 | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... | Other prior research has considered how to automatically generate thumbnails using photos and images appearing in the article, such as by cropping, resizing, or selecting the most salient excerpts from them @cite_5 @cite_30 . More recently, @cite_37 introduced an algorithm to select highly salient and evocative thumbna... | {
"cite_N": [
"@cite_30",
"@cite_5",
"@cite_37"
],
"mid": [
"2060502770",
"2115498043",
"2512435841"
],
"abstract": [
"Thumbnail images provide users of image retrieval and browsing systems with a method for quickly scanning large numbers of images. Recognizing the objects in an im... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30: Thumbnail images provide users of image retrieval and browsing systems with a method for quickly scanning large numbers of images. Recognizing the objects in an image is important in many retrieval tasks, but thumbnail... | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... |
1908.06922 | 2968896088 | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... | Visualization is increasingly prevalent in news media @cite_36 . In this context, the communicative intent of visualization often leads to different design choices than those used in the context of data analysis @cite_33 . As a result, we encounter substantial use of graphical and text-based annotation @cite_26 . We al... | {
"cite_N": [
"@cite_38",
"@cite_26",
"@cite_33",
"@cite_36",
"@cite_28",
"@cite_3",
"@cite_39",
"@cite_2",
"@cite_31",
"@cite_34",
"@cite_10",
"@cite_25",
"@cite_20",
"@cite_17"
],
"mid": [
"2120326355",
"2596412070",
"",
"",
"2068562326... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_38: Guidelines for designing information charts (such as bar charts) often state that the presentation should reduce or remove 'chart junk' - visual embellishments that are not essential to understanding the data. In contr... | When people browse online news, small thumbnail images accompanying links to articles attract their attention and help them to decide which articles to read. As an increasing proportion of online news can be construed as data journalism, we have witnessed a corresponding increase in the incorporation of visualization i... |
1908.07106 | 2969508838 | A generalized @math puzzle' consists of an @math numbered grid, with one missing number. A move in the game switches the position of the empty square with the position of one of its neighbors. We solve Diaconis' 15 puzzle problem' by proving that the asymptotic total variation mixing time of the board is at least order... | Much of the prior work regarding @math puzzles has focused on sorting strategies for a puzzle in general position, and on the hardness of finding shortest sorting algorithms. For instance, it is known that any @math puzzle may be returned to sorted order in order @math steps (and fewer are not always possible) @cite_14... | {
"cite_N": [
"@cite_14",
"@cite_13",
"@cite_6"
],
"mid": [
"",
"196900508",
"2149951504"
],
"abstract": [
"",
"Following Wilson (J. Comb. Th. (B), 1975), Johnson (J. of Alg., 1983), and Kornhauser, Miller and Spirakis (25th FOCS, 1984), we consider a game that consists of movi... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_14:
@cite_13: Following Wilson (J. Comb. Th. (B), 1975), Johnson (J. of Alg., 1983), and Kornhauser, Miller and Spirakis (25th FOCS, 1984), we consider a game that consists of moving distinct pebbles along the edges of a... | A generalized @math puzzle' consists of an @math numbered grid, with one missing number. A move in the game switches the position of the empty square with the position of one of its neighbors. We solve Diaconis' 15 puzzle problem' by proving that the asymptotic total variation mixing time of the board is at least order... |
1908.07106 | 2969508838 | A generalized @math puzzle' consists of an @math numbered grid, with one missing number. A move in the game switches the position of the empty square with the position of one of its neighbors. We solve Diaconis' 15 puzzle problem' by proving that the asymptotic total variation mixing time of the board is at least order... | A host of random walks on permutation groups have been studied via a variety of techniques, including the representation theory @cite_8 , @cite_15 , @cite_10 , and couplings @cite_11 . Our method for the upper bound, which uses a three transitive group action, is based on @cite_9 . So far as we are aware, the method of... | {
"cite_N": [
"@cite_8",
"@cite_9",
"@cite_17",
"@cite_15",
"@cite_10",
"@cite_11"
],
"mid": [
"2056389572",
"2963915337",
"1976418263",
"2963409322",
"",
"1922672875"
],
"abstract": [
"",
"Let g, h be a random pair of generators of G=Sym(n) or G=Alt(n).... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_8:
@cite_9: Let g, h be a random pair of generators of G=Sym(n) or G=Alt(n). We show that, with probability tending to 1 as n→∞, (a) the diameter of G with respect to S= g,h,g−1,h−1 is at most O(n2(logn)c), and (b) the ... | A generalized @math puzzle' consists of an @math numbered grid, with one missing number. A move in the game switches the position of the empty square with the position of one of its neighbors. We solve Diaconis' 15 puzzle problem' by proving that the asymptotic total variation mixing time of the board is at least order... |
1908.07085 | 2971040543 | We present a learning-based method to estimate the object bounding box from its 2D bird's-eye view (BEV) LiDAR points. Our method, entitled BoxNet, exploits a simple deep neural network that can efficiently handle unordered points. The method takes as input the 2D coordinates of all the points and the output is a vecto... | We omit the extensive literature review of 3D object detection methods, in which bounding box regression is considered as an essential component. Our proposed method only focuses on the 2D case and does not target an end-to-end solution. Therefore, it is in fact an intermediate step in the pipeline of 3D object detecti... | {
"cite_N": [
"@cite_9",
"@cite_14"
],
"mid": [
"2296035016",
"2157664516"
],
"abstract": [
"Situational awareness is crucial for autonomous driving in urban environments. This paper describes moving vehicle tracking module that we developed for our autonomous driving robot Junior. The rob... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_9: Situational awareness is crucial for autonomous driving in urban environments. This paper describes moving vehicle tracking module that we developed for our autonomous driving robot Junior. The robot won second place in... | We present a learning-based method to estimate the object bounding box from its 2D bird's-eye view (BEV) LiDAR points. Our method, entitled BoxNet, exploits a simple deep neural network that can efficiently handle unordered points. The method takes as input the 2D coordinates of all the points and the output is a vecto... |
1908.06550 | 2964221281 | Abstract In two earlier papers we derived congruence formats with regard to transition system specifications for weak semantics on the basis of a decomposition method for modal formulas. The idea is that a congruence format for a semantics must ensure that the formulas in the modal characterisation of this semantics ar... | In @cite_30 @cite_0 he employs (OSOS) TSSs @cite_4 . An OSOS TSS allows no negative premises, but includes priorities between rules: @math means that @math can only be applied if @math cannot. An OSOS specification can be seen as, or translated into, a GSOS specification with negative premises. Each rule @math with exa... | {
"cite_N": [
"@cite_30",
"@cite_0",
"@cite_4"
],
"mid": [
"82266486",
"1540576960",
"2152688610"
],
"abstract": [
"",
"We present a general class of process languages for rooted eager bisimulation preorder and prove its congruence result. Also, we present classes of process la... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30:
@cite_0: We present a general class of process languages for rooted eager bisimulation preorder and prove its congruence result. Also, we present classes of process languages for the rooted versions of several other ... | Abstract In two earlier papers we derived congruence formats with regard to transition system specifications for weak semantics on the basis of a decomposition method for modal formulas. The idea is that a congruence format for a semantics must ensure that the formulas in the modal characterisation of this semantics ar... |
1908.06550 | 2964221281 | Abstract In two earlier papers we derived congruence formats with regard to transition system specifications for weak semantics on the basis of a decomposition method for modal formulas. The idea is that a congruence format for a semantics must ensure that the formulas in the modal characterisation of this semantics ar... | If patience rules are not allowed to have a lower priority than other rules, then the (r)bbo format, upon translation from OSOS to GSOS, can be seen as a subformat of our (rooted) stability-respecting branching bisimulation format. The basic idea is that in the rbbo format all arguments of so-called @math -preserving f... | {
"cite_N": [
"@cite_0",
"@cite_19",
"@cite_5"
],
"mid": [
"1540576960",
"2343655549",
"2343519619"
],
"abstract": [
"We present a general class of process languages for rooted eager bisimulation preorder and prove its congruence result. Also, we present classes of process language... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_0: We present a general class of process languages for rooted eager bisimulation preorder and prove its congruence result. Also, we present classes of process languages for the rooted versions of several other weak preorde... | Abstract In two earlier papers we derived congruence formats with regard to transition system specifications for weak semantics on the basis of a decomposition method for modal formulas. The idea is that a congruence format for a semantics must ensure that the formulas in the modal characterisation of this semantics ar... |
1908.06560 | 2967118052 | Until now, researchers have proposed several novel heterogeneous defect prediction HDP methods with promising performance. To the best of our knowledge, whether HDP methods can perform significantly better than unsupervised methods has not yet been thoroughly investigated. In this article, we perform a replication stud... | Researchers conducted a set of empirical studies to investigate the feasibility of CPDP by considering real-world software projects. @cite_75 analyzed 12 real-world projects from open-source communities and Microsoft corporation. After running 622 cross-project predictions, they found only 3.4 , @cite_65 analyzed anoth... | {
"cite_N": [
"@cite_48",
"@cite_9",
"@cite_42",
"@cite_65",
"@cite_1",
"@cite_57",
"@cite_75"
],
"mid": [
"2074218040",
"1964544799",
"2276400542",
"2008596407",
"1994248747",
"2147386665",
"2046830558"
],
"abstract": [
"There has been a great deal ... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_48: There has been a great deal of interest in defect prediction: using prediction models trained on historical data to help focus quality-control resources in ongoing development. Since most new projects don't have histor... | Until now, researchers have proposed several novel heterogeneous defect prediction HDP methods with promising performance. To the best of our knowledge, whether HDP methods can perform significantly better than unsupervised methods has not yet been thoroughly investigated. In this article, we perform a replication stud... |
1908.06709 | 2968767118 | In automatic speech recognition, often little training data is available for specific challenging tasks, but training of state-of-the-art automatic speech recognition systems requires large amounts of annotated speech. To address this issue, we propose a two-staged approach to acoustic modeling that combines noise and ... | Applying data augmentation to training data is a common approach to increase the amount of training data in order to improve the robustness of a model. In ASR it can be used, e.g., to apply multi-condition training, when no real data in the desired condition is available. Data augmentation is, however, limited to acous... | {
"cite_N": [
"@cite_15",
"@cite_20"
],
"mid": [
"2696967604",
"2407080277"
],
"abstract": [
"The environmental robustness of DNN-based acoustic models can be significantly improved by using multi-condition training data. However, as data collection is a costly proposition, simulation of t... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_15: The environmental robustness of DNN-based acoustic models can be significantly improved by using multi-condition training data. However, as data collection is a costly proposition, simulation of the desired conditions ... | In automatic speech recognition, often little training data is available for specific challenging tasks, but training of state-of-the-art automatic speech recognition systems requires large amounts of annotated speech. To address this issue, we propose a two-staged approach to acoustic modeling that combines noise and ... |
1908.06709 | 2968767118 | In automatic speech recognition, often little training data is available for specific challenging tasks, but training of state-of-the-art automatic speech recognition systems requires large amounts of annotated speech. To address this issue, we propose a two-staged approach to acoustic modeling that combines noise and ... | Transfer learning is an approach used to transfer knowledge of a model trained in one scenario to train a model in another related scenario to improve generalization and performance @cite_14 . It is particularly useful in scenarios where only little training data is available for the main task but a large amount of ann... | {
"cite_N": [
"@cite_14",
"@cite_10",
"@cite_3"
],
"mid": [
"391985582",
"2963522845",
"2786459654"
],
"abstract": [
"",
"Transfer learning is a vital technique that generalizes models trained for one setting or task to other settings or tasks. For example in speech recognition... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_14:
@cite_10: Transfer learning is a vital technique that generalizes models trained for one setting or task to other settings or tasks. For example in speech recognition, an acoustic model trained for one language can b... | In automatic speech recognition, often little training data is available for specific challenging tasks, but training of state-of-the-art automatic speech recognition systems requires large amounts of annotated speech. To address this issue, we propose a two-staged approach to acoustic modeling that combines noise and ... |
1908.06570 | 2966882610 | First, a new perspective based on binary matrices of placement delivery array (PDA) design was introduced, by which the PDA design problem can be simplified. From this new perspective, and based on some families of combinatorial designs, new schemes with low subpacketization for centralized coded caching problem were c... | Although optimal in rate, the caching scheme in @cite_22 has its limitation in practical implementations: By this caching scheme, each file is divided into @math packets @math The number @math is also referred to as the file size or subpacketization in some literature. @math , which grows exponentially with @math @cite... | {
"cite_N": [
"@cite_9",
"@cite_22"
],
"mid": [
"2517585112",
"2106248279"
],
"abstract": [
"We study a noiseless broadcast link serving @math users whose requests arise from a library of @math files. Every user is equipped with a cache of size @math files each. It has been shown that by s... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_9: We study a noiseless broadcast link serving @math users whose requests arise from a library of @math files. Every user is equipped with a cache of size @math files each. It has been shown that by splitting all the files... | First, a new perspective based on binary matrices of placement delivery array (PDA) design was introduced, by which the PDA design problem can be simplified. From this new perspective, and based on some families of combinatorial designs, new schemes with low subpacketization for centralized coded caching problem were c... |
1908.06570 | 2966882610 | First, a new perspective based on binary matrices of placement delivery array (PDA) design was introduced, by which the PDA design problem can be simplified. From this new perspective, and based on some families of combinatorial designs, new schemes with low subpacketization for centralized coded caching problem were c... | So far, several coded caching schemes with reduced file size have been constructed, all with the sacrifice of increasing the rate. In @cite_2 , a class of coded caching schemes with linear file size @math i.e., @math were constructed from Ruzsa-Szem @math redi graphs. A very interesting framework for constructing centr... | {
"cite_N": [
"@cite_18",
"@cite_14",
"@cite_7",
"@cite_1",
"@cite_6",
"@cite_0",
"@cite_2",
"@cite_5",
"@cite_17"
],
"mid": [
"2793858273",
"2975151417",
"2539811847",
"",
"2915582513",
"2946479852",
"",
"2963720294",
""
],
"abstract": [... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_18: Coded caching is a technique that generalizes conventional caching and promises significant reductions in traffic over caching networks. However, the basic coded caching scheme requires that each file hosted in the ser... | First, a new perspective based on binary matrices of placement delivery array (PDA) design was introduced, by which the PDA design problem can be simplified. From this new perspective, and based on some families of combinatorial designs, new schemes with low subpacketization for centralized coded caching problem were c... |
1908.06209 | 2968708664 | Energy minimization methods are a classical tool in a multitude of computer vision applications. While they are interpretable and well-studied, their regularity assumptions are difficult to design by hand. Deep learning techniques on the other hand are purely data-driven, often provide excellent results, but are very d... | The straightforward way of optimizing bi-level problems is to consider @cite_49 @cite_2 @cite_57 . These methods directly differentiate the higher-level loss function with respect to the minimizing argument and descend in the direction of this gradient. An incomplete list of examples in image processing is @cite_29 @ci... | {
"cite_N": [
"@cite_64",
"@cite_41",
"@cite_29",
"@cite_85",
"@cite_2",
"@cite_58",
"@cite_69",
"@cite_60",
"@cite_23",
"@cite_49",
"@cite_80",
"@cite_7",
"@cite_57",
"@cite_79",
"@cite_40",
"@cite_86",
"@cite_76",
"@cite_94",
"@cite_100"
... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_64: Some recent works in machine learning and computer vision involve the solution of a bi-level optimization problem. Here the solution of a parameterized lower-level problem binds variables that appear in the objective o... | Energy minimization methods are a classical tool in a multitude of computer vision applications. While they are interpretable and well-studied, their regularity assumptions are difficult to design by hand. Deep learning techniques on the other hand are purely data-driven, often provide excellent results, but are very d... |
1908.06209 | 2968708664 | Energy minimization methods are a classical tool in a multitude of computer vision applications. While they are interpretable and well-studied, their regularity assumptions are difficult to design by hand. Deep learning techniques on the other hand are purely data-driven, often provide excellent results, but are very d... | is a prominent strategy in applied bi-level optimization across fields, i.e. MRF literature @cite_59 @cite_10 in deep learning @cite_11 @cite_28 @cite_14 @cite_87 and in variational settings @cite_71 @cite_97 @cite_54 @cite_26 @cite_75 @cite_39 . The problem is transformed into a single level problem by choosing an opt... | {
"cite_N": [
"@cite_61",
"@cite_14",
"@cite_26",
"@cite_75",
"@cite_87",
"@cite_28",
"@cite_97",
"@cite_54",
"@cite_102",
"@cite_17",
"@cite_39",
"@cite_89",
"@cite_59",
"@cite_71",
"@cite_73",
"@cite_10",
"@cite_11"
],
"mid": [
"1585773866"... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_61: Algorithmic, or automatic, differentiation (AD) is a growing area of theoretical research and software development concerned with the accurate and efficient evaluation of derivatives for function evaluations given as c... | Energy minimization methods are a classical tool in a multitude of computer vision applications. While they are interpretable and well-studied, their regularity assumptions are difficult to design by hand. Deep learning techniques on the other hand are purely data-driven, often provide excellent results, but are very d... |
1908.06459 | 2969194430 | Let @math be a discrete time Markov chain on a general state space. It is well-known that if @math is aperiodic and satisfies a drift and minorization condition, then it converges to its stationary distribution @math at an exponential rate. We consider the problem of computing upper bounds for the distance from station... | In the case @math , the decay rate @math of the law of @math was identified by Roberts and Tweedie @cite_18 (who use the notation @math ). Theorem 4.1(i) of @cite_18 is equivalent to a bound of the form [ (T > t) ( const ) (V)^r t ^t. ] Theorem slightly improves this result by removing the factor of @math and generaliz... | {
"cite_N": [
"@cite_18"
],
"mid": [
"1547388036"
],
"abstract": [
"In many applications of Markov chains, and especially in Markov chain Monte Carlo algorithms, the rate of convergence of the chain is of critical importance. Most techniques to establish such rates require bounds on the distributi... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_18: In many applications of Markov chains, and especially in Markov chain Monte Carlo algorithms, the rate of convergence of the chain is of critical importance. Most techniques to establish such rates require bounds on th... | Let @math be a discrete time Markov chain on a general state space. It is well-known that if @math is aperiodic and satisfies a drift and minorization condition, then it converges to its stationary distribution @math at an exponential rate. We consider the problem of computing upper bounds for the distance from station... |
1908.06459 | 2969194430 | Let @math be a discrete time Markov chain on a general state space. It is well-known that if @math is aperiodic and satisfies a drift and minorization condition, then it converges to its stationary distribution @math at an exponential rate. We consider the problem of computing upper bounds for the distance from station... | The most important feature of Theorem and its @math -norm version, Theorem , is that the exponential rate @math is the same as the decay rate in Theorem . As we will see in Section , this conclusion can only be drawn for reversible Markov chains with nonnegative eigenvalues and does not hold in general. Baxendale @cite... | {
"cite_N": [
"@cite_11"
],
"mid": [
"2122337269"
],
"abstract": [
"We give computable bounds on the rate of convergence of the transition probabilities to the stationary distribution for a certain class of geometrically ergodic Markov chains. Our results are dierent from earlier estimates of Meyn... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_11: We give computable bounds on the rate of convergence of the transition probabilities to the stationary distribution for a certain class of geometrically ergodic Markov chains. Our results are dierent from earlier estim... | Let @math be a discrete time Markov chain on a general state space. It is well-known that if @math is aperiodic and satisfies a drift and minorization condition, then it converges to its stationary distribution @math at an exponential rate. We consider the problem of computing upper bounds for the distance from station... |
1908.06459 | 2969194430 | Let @math be a discrete time Markov chain on a general state space. It is well-known that if @math is aperiodic and satisfies a drift and minorization condition, then it converges to its stationary distribution @math at an exponential rate. We consider the problem of computing upper bounds for the distance from station... | The method of proof in @cite_11 uses analytic properties of generating functions for renewal sequences. In principle the argument could be extended to the case @math , but the resulting bound on the exponential convergence rate of the chain would be worse than the rate @math from Theorem . Intuitively, this is because ... | {
"cite_N": [
"@cite_11"
],
"mid": [
"2122337269"
],
"abstract": [
"We give computable bounds on the rate of convergence of the transition probabilities to the stationary distribution for a certain class of geometrically ergodic Markov chains. Our results are dierent from earlier estimates of Meyn... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_11: We give computable bounds on the rate of convergence of the transition probabilities to the stationary distribution for a certain class of geometrically ergodic Markov chains. Our results are dierent from earlier estim... | Let @math be a discrete time Markov chain on a general state space. It is well-known that if @math is aperiodic and satisfies a drift and minorization condition, then it converges to its stationary distribution @math at an exponential rate. We consider the problem of computing upper bounds for the distance from station... |
1908.06381 | 2967107032 | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... | Several rotorcraft UAS that are capable of autonomous, long-duration mission execution in benign indoor (VICON) environments have previously appeared in literature. Focusing on the recharging solution to extend individual platform flight time and a multi-agent scheme for constant operation, impressive operation times h... | {
"cite_N": [
"@cite_38",
"@cite_28",
"@cite_56",
"@cite_27",
"@cite_5"
],
"mid": [
"2126649543",
"2104184073",
"2621390870",
"2089051263",
"2089829108"
],
"abstract": [
"Future Unmanned Aircraft Systems (UASs) are expected to be nearly autonomous and composed of he... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_38: Future Unmanned Aircraft Systems (UASs) are expected to be nearly autonomous and composed of heterogeneous Unmanned Aerial Vehicles (UAVs). While most of the current research focuses on UAV avionics and control algorit... | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... |
1908.06381 | 2967107032 | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... | Our work uses a downward-facing monocular camera to estimate the pose of the landing pad in the world frame using AprilTag visual fiducial markers @cite_60 . We believe that a monocular camera is the cheapest, most lightweight and power efficient sensor choice. Alternatively, GPS and RTK-GPS systems suffer from precisi... | {
"cite_N": [
"@cite_42",
"@cite_60"
],
"mid": [
"2509603109",
"2565233142"
],
"abstract": [
"Nowadays, quadrotor is playing a growing number of critical roles in a great many of aspects. A crucial ability is the autonomous landing ability onto a target such as a fixed platform, moving pla... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_42: Nowadays, quadrotor is playing a growing number of critical roles in a great many of aspects. A crucial ability is the autonomous landing ability onto a target such as a fixed platform, moving platform, or ship deck pl... | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... |
1908.06381 | 2967107032 | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... | Several landing approaches exist in literature for labeled and unlabeled landing sites. @cite_34 present a monocular visual landing method based on estimating the 6 DOF pose of a circled H marker. The same authors extend this work to enable autonomous landing site search by using a scale-corrected PTAM algorithm @cite_... | {
"cite_N": [
"@cite_22",
"@cite_7",
"@cite_8",
"@cite_9",
"@cite_58",
"@cite_59",
"@cite_34"
],
"mid": [
"2157723537",
"1602540331",
"2117228865",
"1970504153",
"2151290401",
"2086123859",
"1997522477"
],
"abstract": [
"Unmanned micro air vehicles (... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_22: Unmanned micro air vehicles (MAVs) will play an important role in future reconnaissance and search and rescue applications. In order to conduct persistent surveillance and to conserve energy, MAVs need the ability to l... | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... |
1908.06381 | 2967107032 | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... | Currently one of the most popular visual fiducial detectors and patterns is the AprilTag algorithm @cite_15 which is renowned for its speed, robustness and extremely low false positive detection rates. The algorithm was updated by @cite_60 to further improve computational efficiency and to enable the detection of small... | {
"cite_N": [
"@cite_31",
"@cite_47",
"@cite_60",
"@cite_46",
"@cite_48",
"@cite_29",
"@cite_0",
"@cite_57",
"@cite_45",
"@cite_15"
],
"mid": [
"2962722232",
"",
"2565233142",
"2546693991",
"2949088561",
"",
"2286867507",
"",
"",
"212... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_31: Many unmanned aerial vehicle surveillance and monitoring applications require observations at precise locations over long periods of time, ideally days or weeks at a time (e.g. ecosystem monitoring), which has been imp... | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... |
1908.06381 | 2967107032 | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... | After obtaining raw tag pose estimates from the AprilTag detector, our approach uses a recursive least squares (RLS) filter to obtain a common tag bundle pose estimate. A relevant previous work on this topic is @cite_55 in which a particle filter is applied to raw tag detections and RLS is compared to RANSAC for bundle... | {
"cite_N": [
"@cite_55",
"@cite_25",
"@cite_17"
],
"mid": [
"2549993168",
"2771387334",
"2242754697"
],
"abstract": [
"Given the advancing importance for light-weight production materials an increase in automation is crucial. This paper presents a prototypical setup to obtain a pr... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_55: Given the advancing importance for light-weight production materials an increase in automation is crucial. This paper presents a prototypical setup to obtain a precise pose estimation for an industrial manipulator in a... | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... |
1908.06381 | 2967107032 | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... | Our approach, however, is not limited to AprilTags, which can be substituted or combined with other markers for specific applications. A vast number of markers is available targeting different use-cases @cite_42 @cite_34 @cite_12 @cite_15 . Patterns include letters, circles, concentric circles and or polygons, letters,... | {
"cite_N": [
"@cite_14",
"@cite_41",
"@cite_53",
"@cite_42",
"@cite_15",
"@cite_34",
"@cite_12"
],
"mid": [
"2117064099",
"2110321083",
"2344366145",
"2509603109",
"2125188427",
"1997522477",
"2164139712"
],
"abstract": [
"We describe the design and... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_14: We describe the design and implementation of a fiducial marker system that encodes data in the frequency spectrum of a synthetic image. This distinctive approach to marker synthesis and data encoding allows for partial... | Recent applications of unmanned aerial systems (UAS) to precision agriculture have shown increased ease and efficiency in data collection at precise remote locations. However, further enhancement of the field requires operation over long periods of time, e.g. days or weeks. This has so far been impractical due to the l... |
1908.06267 | 2968913877 | Most graph neural networks can be described in terms of message passing, vertex update, and readout functions. In this paper, we represent documents as word co-occurrence networks and propose an application of the message passing framework to NLP, the Message Passing Attention network for Document understanding (MPAD).... | There are significant differences between @cite_51 and our work. First, our approach is Note that other GNNs used in inductive settings can be found @cite_10 @cite_52 . , not . Indeed, while the node classification approach of requires all test documents at training time, our graph classification model is able to perfo... | {
"cite_N": [
"@cite_10",
"@cite_51",
"@cite_52"
],
"mid": [
"2962767366",
"2891761261",
"2766453196"
],
"abstract": [
"Low-dimensional embeddings of nodes in large graphs have proved extremely useful in a variety of prediction tasks, from content recommendation to identifying prot... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_10: Low-dimensional embeddings of nodes in large graphs have proved extremely useful in a variety of prediction tasks, from content recommendation to identifying protein functions. However, most existing approaches require... | Most graph neural networks can be described in terms of message passing, vertex update, and readout functions. In this paper, we represent documents as word co-occurrence networks and propose an application of the message passing framework to NLP, the Message Passing Attention network for Document understanding (MPAD).... |
1908.06203 | 2967453594 | External knowledge is often useful for natural language understanding tasks. We introduce a contextual text representation model called Conceptual-Contextual (CC) embeddings, which incorporates structured knowledge into text representations. Unlike entity embedding methods, our approach encodes a knowledge graph into a... | In recent years a number of KB embedding models have been proposed that aim at learning entity embeddings on a knowledge graph @cite_18 . Some models make use of textual information in KBs to improve entity embeddings, like using textual descriptions of entities as complement to triplet modeling @cite_30 @cite_5 , or j... | {
"cite_N": [
"@cite_30",
"@cite_18",
"@cite_9",
"@cite_6",
"@cite_5"
],
"mid": [
"2571811098",
"2963224980",
"2315403234",
"2499696929",
""
],
"abstract": [
"Learning the representations of a knowledge graph has attracted significant research interest in the field ... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30: Learning the representations of a knowledge graph has attracted significant research interest in the field of intelligent Web. By regarding each relation as one translation from head entity to tail entity, translation-... | External knowledge is often useful for natural language understanding tasks. We introduce a contextual text representation model called Conceptual-Contextual (CC) embeddings, which incorporates structured knowledge into text representations. Unlike entity embedding methods, our approach encodes a knowledge graph into a... |
1908.06203 | 2967453594 | External knowledge is often useful for natural language understanding tasks. We introduce a contextual text representation model called Conceptual-Contextual (CC) embeddings, which incorporates structured knowledge into text representations. Unlike entity embedding methods, our approach encodes a knowledge graph into a... | Recently contextual text representation models like ELMo , BERT @cite_10 and OpenAI GPT @cite_8 @cite_28 have pushed the state-of-the-art results of various NLP tasks. Language modeling on a giant corpus learns powerful representations, which provides huge benefits to supervised tasks, especially where labeled data is ... | {
"cite_N": [
"@cite_28",
"@cite_10",
"@cite_25",
"@cite_8"
],
"mid": [
"",
"2896457183",
"2911489562",
"2250930514"
],
"abstract": [
"",
"We introduce a new language representation model called BERT, which stands for Bidirectional Encoder Representations from Transform... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_28:
@cite_10: We introduce a new language representation model called BERT, which stands for Bidirectional Encoder Representations from Transformers. Unlike recent language representation models, BERT is designed to pre-... | External knowledge is often useful for natural language understanding tasks. We introduce a contextual text representation model called Conceptual-Contextual (CC) embeddings, which incorporates structured knowledge into text representations. Unlike entity embedding methods, our approach encodes a knowledge graph into a... |
1908.05976 | 2967964179 | Graph drawing and visualisation techniques are important tools for the exploratory analysis of complex systems. While these methods are regularly applied to visualise data on complex networks, we increasingly have access to time series data that can be modelled as temporal networks or dynamic graphs. In such dynamic gr... | Having motivated the effects that are due to the arrow of time in dynamic graphs, we review related works on dynamic graph drawing. Using the taxonomy from @cite_35 , we categorize those works in (i) animation techniques that map the time dimension of dynamic graphs onto a time dimension of the resulting visualisation,... | {
"cite_N": [
"@cite_35",
"@cite_9"
],
"mid": [
"2287322623",
"2255903209"
],
"abstract": [
"Dynamic graph visualization focuses on the challenge of representing the evolution of relationships between entities in readable, scalable and effective diagrams. This work surveys the growing numb... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_35: Dynamic graph visualization focuses on the challenge of representing the evolution of relationships between entities in readable, scalable and effective diagrams. This work surveys the growing number of approaches in t... | Graph drawing and visualisation techniques are important tools for the exploratory analysis of complex systems. While these methods are regularly applied to visualise data on complex networks, we increasingly have access to time series data that can be modelled as temporal networks or dynamic graphs. In such dynamic gr... |
1908.05976 | 2967964179 | Graph drawing and visualisation techniques are important tools for the exploratory analysis of complex systems. While these methods are regularly applied to visualise data on complex networks, we increasingly have access to time series data that can be modelled as temporal networks or dynamic graphs. In such dynamic gr... | Apart from the issue that animations are cognitively demanding, additional challenges arise in data with high temporal resolution (e.g. seconds or even millisecond), where a single vertex or edge is likely to be active in each time stamp. The application of static graph drawing techniques to such data requires a coarse... | {
"cite_N": [
"@cite_30"
],
"mid": [
"2751016934"
],
"abstract": [
"Timeslices are often used to draw and visualize dynamic graphs. While timeslices are a natural way to think about dynamic graphs, they are routinely imposed on continuous data. Often, it is unclear how many timeslices to select: t... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_30: Timeslices are often used to draw and visualize dynamic graphs. While timeslices are a natural way to think about dynamic graphs, they are routinely imposed on continuous data. Often, it is unclear how many timeslices ... | Graph drawing and visualisation techniques are important tools for the exploratory analysis of complex systems. While these methods are regularly applied to visualise data on complex networks, we increasingly have access to time series data that can be modelled as temporal networks or dynamic graphs. In such dynamic gr... |
1908.05976 | 2967964179 | Graph drawing and visualisation techniques are important tools for the exploratory analysis of complex systems. While these methods are regularly applied to visualise data on complex networks, we increasingly have access to time series data that can be modelled as temporal networks or dynamic graphs. In such dynamic gr... | Despite the advances outlined above, recognizing patterns in animation-based visualisations of dynamic graphs remains a considerable cognitive challenge for users. Moreover, it is difficult to embed dynamic graph animations into scholarly articles, books, or posters, which often limits their use in science and engineer... | {
"cite_N": [
"@cite_4",
"@cite_7",
"@cite_28",
"@cite_54",
"@cite_27",
"@cite_2",
"@cite_31",
"@cite_51"
],
"mid": [
"2100786833",
"2086991377",
"2099864932",
"2075916997",
"1982413833",
"2467385561",
"2559900691",
"2009664208"
],
"abstract": [
... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4: The evolution of dependencies in information hierarchies can be modeled by sequences of compound digraphs with edge weights. In this paper we present a novel approach to visualize such sequences of graphs. It uses radia... | Graph drawing and visualisation techniques are important tools for the exploratory analysis of complex systems. While these methods are regularly applied to visualise data on complex networks, we increasingly have access to time series data that can be modelled as temporal networks or dynamic graphs. In such dynamic gr... |
1908.05947 | 2968302391 | Style is ubiquitous in our daily language uses, while what is language style to learning machines? In this paper, by exploiting the second-order statistics of semantic vectors of different corpora, we present a novel perspective on this question via style matrix, i.e. the covariance matrix of semantic vectors, and expl... | Similarly, image style transfer aims to reconstruct an image with some characters of the style image while preserving its content. The groundbreaking works proposed by @cite_0 @cite_18 show that the Gram matrices (or covariance matrices) of the feature maps, which are extracted by a frozen convolution neural network tr... | {
"cite_N": [
"@cite_18",
"@cite_14",
"@cite_1",
"@cite_6",
"@cite_0",
"@cite_2",
"@cite_16",
"@cite_11"
],
"mid": [
"2475287302",
"",
"",
"2572730214",
"2964193438",
"2604737827",
"2952008036",
"2331128040"
],
"abstract": [
"Rendering the se... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_18: Rendering the semantic content of an image in different styles is a difficult image processing task. Arguably, a major limiting factor for previous approaches has been the lack of image representations that explicitly ... | Style is ubiquitous in our daily language uses, while what is language style to learning machines? In this paper, by exploiting the second-order statistics of semantic vectors of different corpora, we present a novel perspective on this question via style matrix, i.e. the covariance matrix of semantic vectors, and expl... |
1908.05750 | 2968998393 | 3D Human Motion Indexing and Retrieval is an interesting problem due to the rise of several data-driven applications aimed at analyzing and or re-utilizing 3D human skelet al data, such as data-driven animation, analysis of sports bio-mechanics, human surveillance etc. Spatio-temporal articulations of humans, noisy mis... | Most approaches on the 3D human motion retrieval have focused on developing hand crafted features to represent the skeleton sequences @cite_17 @cite_19 @cite_4 . In this section, we broadly categorize them by the method in which they engineer their descriptors. | {
"cite_N": [
"@cite_19",
"@cite_4",
"@cite_17"
],
"mid": [
"1984776140",
"2110819057",
"2059021619"
],
"abstract": [
"Human motion retrieval plays an important role in many motion data based applications. In the past, many researchers tended to use a single type of visual feature ... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_19: Human motion retrieval plays an important role in many motion data based applications. In the past, many researchers tended to use a single type of visual feature as data representation. Because different visual featur... | 3D Human Motion Indexing and Retrieval is an interesting problem due to the rise of several data-driven applications aimed at analyzing and or re-utilizing 3D human skelet al data, such as data-driven animation, analysis of sports bio-mechanics, human surveillance etc. Spatio-temporal articulations of humans, noisy mis... |
1908.05750 | 2968998393 | 3D Human Motion Indexing and Retrieval is an interesting problem due to the rise of several data-driven applications aimed at analyzing and or re-utilizing 3D human skelet al data, such as data-driven animation, analysis of sports bio-mechanics, human surveillance etc. Spatio-temporal articulations of humans, noisy mis... | For the task of retrieval, @cite_2 proposed a simple auto-encoder that captures high-level features. However, their model doesn't explicitly use a temporal construct for motion data. Primarily, learnable representations from 3D motion data have been used for other tasks. @cite_18 @cite_14 are a few amongst many who use... | {
"cite_N": [
"@cite_9",
"@cite_18",
"@cite_14",
"@cite_2"
],
"mid": [
"2950007497",
"2963369114",
"",
"2294696353"
],
"abstract": [
"Motion capture data digitally represent human movements by sequences of 3D skeleton configurations. Such spatio-temporal data, often recorde... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_9: Motion capture data digitally represent human movements by sequences of 3D skeleton configurations. Such spatio-temporal data, often recorded in the stream-based nature, need to be efficiently processed to detect high-i... | 3D Human Motion Indexing and Retrieval is an interesting problem due to the rise of several data-driven applications aimed at analyzing and or re-utilizing 3D human skelet al data, such as data-driven animation, analysis of sports bio-mechanics, human surveillance etc. Spatio-temporal articulations of humans, noisy mis... |
1908.05433 | 2967651842 | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... | Fair allocation of indivisible goods has received considerable attention from the research community, especially in the last few years. We refer to surveys by @cite_7 , @cite_10 , and @cite_14 for an overview of recent developments in the area. | {
"cite_N": [
"@cite_14",
"@cite_10",
"@cite_7"
],
"mid": [
"2944952006",
"2002055996",
"2504160229"
],
"abstract": [
"Fair division, a key concern in the design of many social institutions, has for 70 years been the subject of interdisciplinary research at the interface of mathema... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_14: Fair division, a key concern in the design of many social institutions, has for 70 years been the subject of interdisciplinary research at the interface of mathematics, economics, and game theory. ...
@cite_10: Effici... | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... |
1908.05433 | 2967651842 | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... | The papers most closely related to ours are the two papers that we mentioned, by @cite_12 and @cite_5 . showed that for any number of agents with additive valuations, there always exists an allocation that gives every agent her maximin share when the graph is a tree, but not necessarily when the graph is a cycle. It is... | {
"cite_N": [
"@cite_5",
"@cite_12"
],
"mid": [
"2889292676",
"1577069963"
],
"abstract": [
"We study the existence of allocations of indivisible goods that are envy-free up to one good (EF1), under the additional constraint that each bundle needs to be connected in an underlying item grap... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_5: We study the existence of allocations of indivisible goods that are envy-free up to one good (EF1), under the additional constraint that each bundle needs to be connected in an underlying item graph G. When the items ar... | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... |
1908.05433 | 2967651842 | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... | @cite_5 investigated the same model with respect to relaxations of envy-freeness. As we mentioned, they characterized the set of graphs for which EF1 can be guaranteed in the case of two agents with arbitrary monotonic valuations. Moreover, they showed that an EF1 allocation always exists on a path for @math . Intrigui... | {
"cite_N": [
"@cite_5"
],
"mid": [
"2889292676"
],
"abstract": [
"We study the existence of allocations of indivisible goods that are envy-free up to one good (EF1), under the additional constraint that each bundle needs to be connected in an underlying item graph G. When the items are arranged i... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_5: We study the existence of allocations of indivisible goods that are envy-free up to one good (EF1), under the additional constraint that each bundle needs to be connected in an underlying item graph G. When the items ar... | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... |
1908.05433 | 2967651842 | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... | Besides @cite_12 and @cite_5 , a number of other authors have recently studied fairness under connectivity constraints. @cite_4 investigated maximin share fairness in the case of cycles, also concentrating on the G-MMS notion, while @cite_9 focused on paths and provided approximations of envy-freeness, proportionality,... | {
"cite_N": [
"@cite_4",
"@cite_9",
"@cite_5",
"@cite_15",
"@cite_12",
"@cite_20"
],
"mid": [
"2803597015",
"2917587507",
"2889292676",
"2949883232",
"1577069963",
"2900278988"
],
"abstract": [
"Abstract The maximin share guarantee is, in the context of allo... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4: Abstract The maximin share guarantee is, in the context of allocating indivisible goods to a set of agents, a recent fairness criterion. A solution achieving a constant approximation of this guarantee always exists and ... | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... |
1908.05433 | 2967651842 | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... | A related line of work also combines graphs with resource allocation, but uses graphs to capture the connection between agents instead of goods. In particular, a graph specifies the acquaintance relationship among agents. @cite_1 and @cite_2 defined graph-based versions of envy-freeness and proportionality with divisib... | {
"cite_N": [
"@cite_21",
"@cite_1",
"@cite_23",
"@cite_2",
"@cite_13"
],
"mid": [
"2887778757",
"2555059222",
"2808072441",
"2962830613",
"2788938373"
],
"abstract": [
"We study the fair division problem consisting in allocating one item per agent so as to avoid (o... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_21: We study the fair division problem consisting in allocating one item per agent so as to avoid (or minimize) envy, in a setting where only agents connected in a given social network may experience envy. In a variant of ... | We study the fair allocation of indivisible goods under the assumption that the goods form an undirected graph and each agent must receive a connected subgraph. Our focus is on well-studied fairness notions including envy-freeness and maximin share fairness. We establish graph-specific maximin share guarantees, which a... |
1908.05552 | 2968730564 | Musculoskelet al robots that are based on pneumatic actuation have a variety of properties, such as compliance and back-drivability, that render them particularly appealing for human-robot collaboration. However, programming interactive and responsive behaviors for such systems is extremely challenging due to the nonli... | Robots with pneumatic artificial muscles (PAMs) and compliant limbs have been shown to be desirable for human-robot interaction scenarios @cite_22 @cite_13 . When configured in an anthropomorphic musculoskelet al structure, such robots provide an intriguing platform for human-robot interaction (HRI) @cite_4 due to thei... | {
"cite_N": [
"@cite_4",
"@cite_22",
"@cite_7",
"@cite_21",
"@cite_3",
"@cite_15",
"@cite_16",
"@cite_13",
"@cite_20"
],
"mid": [
"",
"2145098376",
"1684361744",
"",
"",
"2127963617",
"2869878434",
"",
"2131912792"
],
"abstract": [
""... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4:
@cite_22: The application of a robot to rehabilitation has become a matter of great concern. This paper deals with functional recovery therapy, one important aspect of physical rehabilitation. Single-joint therapy mac... | Musculoskelet al robots that are based on pneumatic actuation have a variety of properties, such as compliance and back-drivability, that render them particularly appealing for human-robot collaboration. However, programming interactive and responsive behaviors for such systems is extremely challenging due to the nonli... |
1908.05441 | 2968447920 | Prior work has demonstrated that question classification (QC), recognizing the problem domain of a question, can help answer it more accurately. However, developing strong QC algorithms has been hindered by the limited size and complexity of annotated data available. To address this, we present the largest challenge da... | Question classification typically makes use of a combination of syntactic, semantic, surface, and embedding methods. Syntactic patterns @cite_25 @cite_37 @cite_28 @cite_7 and syntactic dependencies @cite_2 have been shown to improve performance, while syntactically or semantically important words are often expanding us... | {
"cite_N": [
"@cite_35",
"@cite_37",
"@cite_18",
"@cite_7",
"@cite_28",
"@cite_32",
"@cite_39",
"@cite_19",
"@cite_2",
"@cite_5",
"@cite_34",
"@cite_10",
"@cite_25",
"@cite_17"
],
"mid": [
"2912090347",
"",
"2741412196",
"2320227961",
"2... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_35: Sentence classification, which is the foundation of the subsequent text-based processing, plays an important role in the intelligent question answering (IQA). Convolutional neural networks (CNN) as a kind of common arc... | Prior work has demonstrated that question classification (QC), recognizing the problem domain of a question, can help answer it more accurately. However, developing strong QC algorithms has been hindered by the limited size and complexity of annotated data available. To address this, we present the largest challenge da... |
1908.05146 | 2968782052 | Real-time 3D reconstruction from RGB-D sensor data plays an important role in many robotic applications, such as object modeling and mapping. The popular method of fusing depth information into a truncated signed distance function (TSDF) and applying the marching cubes algorithm for mesh extraction has severe issues wi... | Surface reconstruction from range data has been an active research topic for a long time. It gained in popularity through the availability of affordable depth cameras and parallel computing hardware. Zollhöfer al @cite_10 give a comprehensive overview on modern 3D reconstruction from RGB-D data. The two main streams or... | {
"cite_N": [
"@cite_4",
"@cite_1",
"@cite_6",
"@cite_10",
"@cite_25",
"@cite_17"
],
"mid": [
"1965851203",
"2963020433",
"",
"2805202215",
"1987648924",
"2892904655"
],
"abstract": [
"Highlights? Multi-resolution surfel maps as compact RGB-D image represent... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_4: Highlights? Multi-resolution surfel maps as compact RGB-D image representation. ? Maps support rapid extraction from images and fast registration on CPU. ? Object and scene reconstruction through on-line graph optimizat... | Real-time 3D reconstruction from RGB-D sensor data plays an important role in many robotic applications, such as object modeling and mapping. The popular method of fusing depth information into a truncated signed distance function (TSDF) and applying the marching cubes algorithm for mesh extraction has severe issues wi... |
1908.05146 | 2968782052 | Real-time 3D reconstruction from RGB-D sensor data plays an important role in many robotic applications, such as object modeling and mapping. The popular method of fusing depth information into a truncated signed distance function (TSDF) and applying the marching cubes algorithm for mesh extraction has severe issues wi... | In contrast to the related works, we are proposing an improved representation based on the TSDF that utilizes the idea from Henry @cite_12 to represent surfaces with different orientations separate from each other. The implementation is based on the work of Dong al @cite_1 , which also serves as a baseline for state-of... | {
"cite_N": [
"@cite_5",
"@cite_1",
"@cite_12"
],
"mid": [
"2198680548",
"2963020433",
""
],
"abstract": [
"We introduce a novel approach to simultaneous localization and mapping for robots equipped with a 2D laser scanner. In particular, we propose a fast scan registration algorit... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_5: We introduce a novel approach to simultaneous localization and mapping for robots equipped with a 2D laser scanner. In particular, we propose a fast scan registration algorithm that operates on 2D maps represented as a ... | Real-time 3D reconstruction from RGB-D sensor data plays an important role in many robotic applications, such as object modeling and mapping. The popular method of fusing depth information into a truncated signed distance function (TSDF) and applying the marching cubes algorithm for mesh extraction has severe issues wi... |
1908.05318 | 2968312879 | We investigate the performance of a jet identification algorithm based on interaction networks (JEDI-net) to identify all-hadronic decays of high-momentum heavy particles produced at the LHC and distinguish them from ordinary jets originating from the hadronization of quarks and gluons. The jet dynamics is described as... | Jet tagging is one of the most popular LHC-related tasks to which DL solutions have been applied. Several classification algorithms have been studied in the context of jet tagging at the LHC @cite_47 @cite_1 @cite_5 @cite_10 @cite_2 @cite_12 @cite_43 @cite_13 using DNNs, CNNs, or physics-inspired architectures. Recurre... | {
"cite_N": [
"@cite_13",
"@cite_46",
"@cite_1",
"@cite_3",
"@cite_43",
"@cite_19",
"@cite_23",
"@cite_2",
"@cite_5",
"@cite_47",
"@cite_10",
"@cite_12",
"@cite_11"
],
"mid": [
"",
"2952645975",
"2491766731",
"2951016929",
"2563484019",
"... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_13:
@cite_46: Since the machine learning techniques are improving rapidly, it has been shown that the image recognition techniques in deep neural networks can be used to detect jet substructure. And it turns out that dee... | We investigate the performance of a jet identification algorithm based on interaction networks (JEDI-net) to identify all-hadronic decays of high-momentum heavy particles produced at the LHC and distinguish them from ordinary jets originating from the hadronization of quarks and gluons. The jet dynamics is described as... |
1908.05217 | 2967452169 | Recent advances in deep learning greatly boost the performance of object detection. State-of-the-art methods such as Faster-RCNN, FPN and R-FCN have achieved high accuracy in challenging benchmark datasets. However, these methods require fully annotated object bounding boxes for training, which are incredibly hard to s... | There are only a few research works in the semi-supervised detection field. @cite_35 proposes a LSDA-based method that can handle disjoint set semi-supervised detection, but this method is not end-to-end trainable and cannot be easily extended to state-of-the-art detection frameworks. @cite_20 proposes a semiMIL method... | {
"cite_N": [
"@cite_41",
"@cite_35",
"@cite_21",
"@cite_20"
],
"mid": [
"2570343428",
"2418676188",
"2964316443",
"2962685835"
],
"abstract": [
"We introduce YOLO9000, a state-of-the-art, real-time object detection system that can detect over 9000 object categories. First ... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_41: We introduce YOLO9000, a state-of-the-art, real-time object detection system that can detect over 9000 object categories. First we propose various improvements to the YOLO detection method, both novel and drawn from pr... | Recent advances in deep learning greatly boost the performance of object detection. State-of-the-art methods such as Faster-RCNN, FPN and R-FCN have achieved high accuracy in challenging benchmark datasets. However, these methods require fully annotated object bounding boxes for training, which are incredibly hard to s... |
1908.05156 | 2966926636 | The spectacular success of Bitcoin and Blockchain Technology in recent years has provided enough evidence that a widespread adoption of a common cryptocurrency system is not merely a distant vision, but a scenario that might come true in the near future. However, the presence of Bitcoin's obvious shortcomings such as e... | Atomic Broadcast. For an excellent introduction to the field of Distributed Computing and overview of Atomic Broadcast and Consensus protocols we refer the reader to the book @cite_53 . A more recent work of @cite_6 surveys existing consensus protocols in the context of cryptocurrency systems. | {
"cite_N": [
"@cite_53",
"@cite_6"
],
"mid": [
"1794148987",
"2726001757"
],
"abstract": [
"In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of pro... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_53: In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to ex... | The spectacular success of Bitcoin and Blockchain Technology in recent years has provided enough evidence that a widespread adoption of a common cryptocurrency system is not merely a distant vision, but a scenario that might come true in the near future. However, the presence of Bitcoin's obvious shortcomings such as e... |
1908.05156 | 2966926636 | The spectacular success of Bitcoin and Blockchain Technology in recent years has provided enough evidence that a widespread adoption of a common cryptocurrency system is not merely a distant vision, but a scenario that might come true in the near future. However, the presence of Bitcoin's obvious shortcomings such as e... | In this paper we propose a different assumption on the transaction buffers that allows us to better demonstrate the capabilities of our protocol when it comes to latency. We assume that at every round the ratio between lengths of transaction buffers of any two honest nodes is at most a fixed constant. In this model, ou... | {
"cite_N": [
"@cite_5"
],
"mid": [
"2534313446"
],
"abstract": [
"The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical applications, such as financial transactions. Although... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_5: The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical applications, such as financial transactio... | The spectacular success of Bitcoin and Blockchain Technology in recent years has provided enough evidence that a widespread adoption of a common cryptocurrency system is not merely a distant vision, but a scenario that might come true in the near future. However, the presence of Bitcoin's obvious shortcomings such as e... |
1908.04933 | 2968171141 | Re-Pair is a grammar compression scheme with favorably good compression rates. The computation of Re-Pair comes with the cost of maintaining large frequency tables, which makes it hard to compute Re-Pair on large scale data sets. As a solution for this problem we present, given a text of length @math whose characters a... | In-Place String Algorithms For the LZ77 factorization @cite_7 , present an algorithm computing this factorization with n d words on top of the input space in dn time for a variable @math , achieving 1 words with n^2 time. For the suffix sorting problem, gave an algorithm to compute the suffix array with n bits on top o... | {
"cite_N": [
"@cite_7"
],
"mid": [
"2911767650"
],
"abstract": [
"The compression is an important topic in computer science which allows we to storage more amount of data on our data storage. There are several techniques to compress any file. In this manuscript will be described the most importan... | generate_abstract_from_reference | Following are the abstracts of some related work. Can you use it to generate the abstract?
{% for abs in ref_abstract["abstract"] %}
{{ref_abstract["cite_N"][loop.index-1]}}: {{abs}}
{% endfor %} |||
{{abstract}} | Following are the abstracts of some related work. Can you use it to generate the abstract?
@cite_7: The compression is an important topic in computer science which allows we to storage more amount of data on our data storage. There are several techniques to compress any file. In this manuscript will be described the m... | Re-Pair is a grammar compression scheme with favorably good compression rates. The computation of Re-Pair comes with the cost of maintaining large frequency tables, which makes it hard to compute Re-Pair on large scale data sets. As a solution for this problem we present, given a text of length @math whose characters a... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.