Search is not available for this dataset
abstract stringclasses 0
values | embedding sequence |
|---|---|
This paper presents a practical global optimization algorithm for the
K-center clustering problem, which aims to select K samples as the cluster
centers to minimize the maximum within-cluster distance. This algorithm is
based on a reduced-space branch and bound scheme and guarantees convergence to
the global optimum in a finite number of steps by only branching on the regions
of centers. To improve efficiency, we have designed a two-stage decomposable
lower bound, the solution of which can be derived in a closed form. In
addition, we also propose several acceleration techniques to narrow down the
region of centers, including bounds tightening, sample reduction, and
parallelization. Extensive studies on synthetic and real-world datasets have
demonstrated that our algorithm can solve the K-center problems to global
optimal within 4 hours for ten million samples in the serial mode and one
billion samples in the parallel mode. Moreover, compared with the
state-of-the-art heuristic methods, the global optimum obtained by our
algorithm can averagely reduce the objective function by 25.8% on all the
synthetic and real-world datasets.
| [
0.000402558798668,
0.010741917416453,
0.010650705546140001,
-0.008805425837635,
0.0030362932011480004,
0.037130128592252,
-0.029159639030694004,
0.000289421353954,
-0.023827271535992,
-0.037158194929361,
0.006107667461037001,
0.020277036353945,
-0.020291067659854,
-0.005332369357347,
-0.... |
Visual surveillance aims to perform robust foreground object detection
regardless of the time and place. Object detection shows good results using
only spatial information, but foreground object detection in visual
surveillance requires proper temporal and spatial information processing. In
deep learning-based foreground object detection algorithms, the detection
ability is superior to classical background subtraction (BGS) algorithms in an
environment similar to training. However, the performance is lower than that of
the classical BGS algorithm in the environment different from training. This
paper proposes a spatio-temporal fusion network (STFN) that could extract
temporal and spatial information using a temporal network and a spatial
network. We suggest a method using a semi-foreground map for stable training of
the proposed STFN. The proposed algorithm shows excellent performance in an
environment different from training, and we show it through experiments with
various public datasets. Also, STFN can generate a compliant background image
in a semi-supervised method, and it can operate in real-time on a desktop with
GPU. The proposed method shows 11.28% and 18.33% higher FM than the latest deep
learning method in the LASIESTA and SBI dataset, respectively.
| [
-0.004978630691766001,
0.017125925049185,
0.010457236319780001,
-0.006834174040704,
0.004679349251091001,
0.018844151869416,
-0.032082941383123,
-0.000666340754833,
-0.026998683810234,
-0.023421393707394003,
0.034026511013507,
0.031716763973236,
-0.004823708441108,
0.018266715109348002,
... |
Recognizing an event in an image can be enhanced by detecting relevant
objects in two ways: 1) indirectly utilizing object detection information
within the unified architecture or 2) directly making use of the object
detection output results. We introduce a novel approach, referred to as
Doubly-injected Object Detection CNN (DOD-CNN), exploiting the object
information in both ways for the task of event recognition. The structure of
this network is inspired by the Integrated Object Detection CNN (IOD-CNN) where
object information is indirectly exploited by the event recognition module
through the shared portion of the network. In the DOD-CNN architecture, the
intermediate object detection outputs are directly injected into the event
recognition network while keeping the indirect sharing structure inherited from
the IOD-CNN, thus being `doubly-injected'. We also introduce a batch pooling
layer which constructs one representative feature map from multiple object
hypotheses. We have demonstrated the effectiveness of injecting the object
detection information in two different ways in the task of malicious event
recognition.
| [
-0.03323445469141,
0.017974574118852,
0.007547676097601001,
-0.005244297906756,
-0.003516764612868,
0.012250405736267001,
-0.007136358413845001,
-0.013655740767717,
-0.020949769765138,
-0.0101526863873,
0.018522998318076002,
0.028709961101412003,
-0.005151751451194,
0.012462919577956,
-0... |
This work generalizes graph neural networks (GNNs) beyond those based on the
Weisfeiler-Lehman (WL) algorithm, graph Laplacians, and diffusions. Our
approach, denoted Relational Pooling (RP), draws from the theory of finite
partial exchangeability to provide a framework with maximal representation
power for graphs. RP can work with existing graph representation models and,
somewhat counterintuitively, can make them even more powerful than the original
WL isomorphism test. Additionally, RP allows architectures like Recurrent
Neural Networks and Convolutional Neural Networks to be used in a theoretically
sound approach for graph classification. We demonstrate improved performance of
RP-based graph representations over state-of-the-art methods on a number of
tasks.
| [
-0.0033673143479970003,
0.024942545220255,
0.016293341293931,
-0.017567364498972,
-0.01433984003961,
-0.004565250128507,
-0.009194200858473,
-0.0020508235320440002,
-0.022507743909955,
-0.051272358745336005,
0.0027391500771040004,
0.032671619206666,
0.0009422464063390001,
0.018784765154123... |
This paper presents a novel multi-fake evolutionary generative adversarial
network(MFEGAN) for handling imbalance hyperspectral image classification. It
is an end-to-end approach in which different generative objective losses are
considered in the generator network to improve the classification performance
of the discriminator network. Thus, the same discriminator network has been
used as a standard classifier by embedding the classifier network on top of the
discriminating function. The effectiveness of the proposed method has been
validated through two hyperspectral spatial-spectral data sets. The same
generative and discriminator architectures have been utilized with two
different GAN objectives for a fair performance comparison with the proposed
method. It is observed from the experimental validations that the proposed
method outperforms the state-of-the-art methods with better classification
performance.
| [
-0.018717739731073,
-0.0021929517388340003,
-0.017297867685556002,
0.0023021728266030004,
0.011242930777370002,
0.017803015187382,
-0.015031532384455001,
-0.013645792379975001,
-0.016929246485233,
-0.038227330893278004,
0.025311954319477,
0.022103589028120003,
0.007331456057727,
0.00280390... |
Cultural adaptation, i.e., the matching of a robot's behaviours to the
cultural norms and preferences of its user, is a well known key requirement for
the success of any assistive application. However, culture-dependent robot
behaviours are often implicitly set by designers, thus not allowing for an easy
and automatic adaptation to different cultures. This paper presents a method
for the design of culture-aware robots, that can automatically adapt their
behaviour to conform to a given culture. We propose a mapping from cultural
factors to related parameters of robot behaviours which relies on linguistic
variables to encode heterogeneous cultural factors in a uniform formalism, and
on fuzzy rules to encode qualitative relations among multiple variables. We
illustrate the approach in two practical case studies.
| [
-0.010817383415997,
-0.015743156895041,
0.004963716492056,
-0.016874566674232,
0.010072308592498,
0.013245775364339001,
-0.006816055160015001,
0.019220171496272,
-0.005008558742702,
-0.027885116636753002,
-0.012279937975108,
-0.0036977790296070004,
0.0021351913455870002,
-0.000475588894914... |
" Many possible fields of application of robots in real world settings hinge on\nthe ability of rob(...TRUNCATED) | [-0.011579873971641001,-0.004333680029958,0.022429864853620002,-0.018064603209495,-0.005400432273745(...TRUNCATED) |
" Orbital angular momentum of light is regarded as a valuable resource in\nquantum technology, espe(...TRUNCATED) | [-0.017170963808894,-0.006853869184851,-0.013707738369703001,-0.002530021360144,-0.00528815947473000(...TRUNCATED) |
" Mobile keyboard suggestion is typically regarded as a word-level language\nmodeling problem. Cent(...TRUNCATED) | [-0.028727790340781004,0.018533607944846,0.029536630958318003,-0.026078138500452003,0.01195829082280(...TRUNCATED) |
" Deep Neural Networks (DNNs) are known to be vulnerable to the maliciously\ngenerated adversarial (...TRUNCATED) | [0.000783797469921,0.002981959842145,0.01621139422059,-0.025949249044060003,-0.016404222697019,0.015(...TRUNCATED) |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 7