Dataset Viewer
Auto-converted to Parquet Duplicate
Search is not available for this dataset
abstract
stringclasses
0 values
embedding
sequence
This paper presents a practical global optimization algorithm for the K-center clustering problem, which aims to select K samples as the cluster centers to minimize the maximum within-cluster distance. This algorithm is based on a reduced-space branch and bound scheme and guarantees convergence to the global optimum in a finite number of steps by only branching on the regions of centers. To improve efficiency, we have designed a two-stage decomposable lower bound, the solution of which can be derived in a closed form. In addition, we also propose several acceleration techniques to narrow down the region of centers, including bounds tightening, sample reduction, and parallelization. Extensive studies on synthetic and real-world datasets have demonstrated that our algorithm can solve the K-center problems to global optimal within 4 hours for ten million samples in the serial mode and one billion samples in the parallel mode. Moreover, compared with the state-of-the-art heuristic methods, the global optimum obtained by our algorithm can averagely reduce the objective function by 25.8% on all the synthetic and real-world datasets.
[ 0.000402558798668, 0.010741917416453, 0.010650705546140001, -0.008805425837635, 0.0030362932011480004, 0.037130128592252, -0.029159639030694004, 0.000289421353954, -0.023827271535992, -0.037158194929361, 0.006107667461037001, 0.020277036353945, -0.020291067659854, -0.005332369357347, -0....
Visual surveillance aims to perform robust foreground object detection regardless of the time and place. Object detection shows good results using only spatial information, but foreground object detection in visual surveillance requires proper temporal and spatial information processing. In deep learning-based foreground object detection algorithms, the detection ability is superior to classical background subtraction (BGS) algorithms in an environment similar to training. However, the performance is lower than that of the classical BGS algorithm in the environment different from training. This paper proposes a spatio-temporal fusion network (STFN) that could extract temporal and spatial information using a temporal network and a spatial network. We suggest a method using a semi-foreground map for stable training of the proposed STFN. The proposed algorithm shows excellent performance in an environment different from training, and we show it through experiments with various public datasets. Also, STFN can generate a compliant background image in a semi-supervised method, and it can operate in real-time on a desktop with GPU. The proposed method shows 11.28% and 18.33% higher FM than the latest deep learning method in the LASIESTA and SBI dataset, respectively.
[ -0.004978630691766001, 0.017125925049185, 0.010457236319780001, -0.006834174040704, 0.004679349251091001, 0.018844151869416, -0.032082941383123, -0.000666340754833, -0.026998683810234, -0.023421393707394003, 0.034026511013507, 0.031716763973236, -0.004823708441108, 0.018266715109348002, ...
Recognizing an event in an image can be enhanced by detecting relevant objects in two ways: 1) indirectly utilizing object detection information within the unified architecture or 2) directly making use of the object detection output results. We introduce a novel approach, referred to as Doubly-injected Object Detection CNN (DOD-CNN), exploiting the object information in both ways for the task of event recognition. The structure of this network is inspired by the Integrated Object Detection CNN (IOD-CNN) where object information is indirectly exploited by the event recognition module through the shared portion of the network. In the DOD-CNN architecture, the intermediate object detection outputs are directly injected into the event recognition network while keeping the indirect sharing structure inherited from the IOD-CNN, thus being `doubly-injected'. We also introduce a batch pooling layer which constructs one representative feature map from multiple object hypotheses. We have demonstrated the effectiveness of injecting the object detection information in two different ways in the task of malicious event recognition.
[ -0.03323445469141, 0.017974574118852, 0.007547676097601001, -0.005244297906756, -0.003516764612868, 0.012250405736267001, -0.007136358413845001, -0.013655740767717, -0.020949769765138, -0.0101526863873, 0.018522998318076002, 0.028709961101412003, -0.005151751451194, 0.012462919577956, -0...
This work generalizes graph neural networks (GNNs) beyond those based on the Weisfeiler-Lehman (WL) algorithm, graph Laplacians, and diffusions. Our approach, denoted Relational Pooling (RP), draws from the theory of finite partial exchangeability to provide a framework with maximal representation power for graphs. RP can work with existing graph representation models and, somewhat counterintuitively, can make them even more powerful than the original WL isomorphism test. Additionally, RP allows architectures like Recurrent Neural Networks and Convolutional Neural Networks to be used in a theoretically sound approach for graph classification. We demonstrate improved performance of RP-based graph representations over state-of-the-art methods on a number of tasks.
[ -0.0033673143479970003, 0.024942545220255, 0.016293341293931, -0.017567364498972, -0.01433984003961, -0.004565250128507, -0.009194200858473, -0.0020508235320440002, -0.022507743909955, -0.051272358745336005, 0.0027391500771040004, 0.032671619206666, 0.0009422464063390001, 0.018784765154123...
This paper presents a novel multi-fake evolutionary generative adversarial network(MFEGAN) for handling imbalance hyperspectral image classification. It is an end-to-end approach in which different generative objective losses are considered in the generator network to improve the classification performance of the discriminator network. Thus, the same discriminator network has been used as a standard classifier by embedding the classifier network on top of the discriminating function. The effectiveness of the proposed method has been validated through two hyperspectral spatial-spectral data sets. The same generative and discriminator architectures have been utilized with two different GAN objectives for a fair performance comparison with the proposed method. It is observed from the experimental validations that the proposed method outperforms the state-of-the-art methods with better classification performance.
[ -0.018717739731073, -0.0021929517388340003, -0.017297867685556002, 0.0023021728266030004, 0.011242930777370002, 0.017803015187382, -0.015031532384455001, -0.013645792379975001, -0.016929246485233, -0.038227330893278004, 0.025311954319477, 0.022103589028120003, 0.007331456057727, 0.00280390...
Cultural adaptation, i.e., the matching of a robot's behaviours to the cultural norms and preferences of its user, is a well known key requirement for the success of any assistive application. However, culture-dependent robot behaviours are often implicitly set by designers, thus not allowing for an easy and automatic adaptation to different cultures. This paper presents a method for the design of culture-aware robots, that can automatically adapt their behaviour to conform to a given culture. We propose a mapping from cultural factors to related parameters of robot behaviours which relies on linguistic variables to encode heterogeneous cultural factors in a uniform formalism, and on fuzzy rules to encode qualitative relations among multiple variables. We illustrate the approach in two practical case studies.
[ -0.010817383415997, -0.015743156895041, 0.004963716492056, -0.016874566674232, 0.010072308592498, 0.013245775364339001, -0.006816055160015001, 0.019220171496272, -0.005008558742702, -0.027885116636753002, -0.012279937975108, -0.0036977790296070004, 0.0021351913455870002, -0.000475588894914...
" Many possible fields of application of robots in real world settings hinge on\nthe ability of rob(...TRUNCATED)
[-0.011579873971641001,-0.004333680029958,0.022429864853620002,-0.018064603209495,-0.005400432273745(...TRUNCATED)
" Orbital angular momentum of light is regarded as a valuable resource in\nquantum technology, espe(...TRUNCATED)
[-0.017170963808894,-0.006853869184851,-0.013707738369703001,-0.002530021360144,-0.00528815947473000(...TRUNCATED)
" Mobile keyboard suggestion is typically regarded as a word-level language\nmodeling problem. Cent(...TRUNCATED)
[-0.028727790340781004,0.018533607944846,0.029536630958318003,-0.026078138500452003,0.01195829082280(...TRUNCATED)
" Deep Neural Networks (DNNs) are known to be vulnerable to the maliciously\ngenerated adversarial (...TRUNCATED)
[0.000783797469921,0.002981959842145,0.01621139422059,-0.025949249044060003,-0.016404222697019,0.015(...TRUNCATED)
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
7