Search is not available for this dataset
abstract stringclasses 0
values | embedding list |
|---|---|
This paper presents a practical global optimization algorithm for the
K-center clustering problem, which aims to select K samples as the cluster
centers to minimize the maximum within-cluster distance. This algorithm is
based on a reduced-space branch and bound scheme and guarantees convergence to
the global optimum in a finite number of steps by only branching on the regions
of centers. To improve efficiency, we have designed a two-stage decomposable
lower bound, the solution of which can be derived in a closed form. In
addition, we also propose several acceleration techniques to narrow down the
region of centers, including bounds tightening, sample reduction, and
parallelization. Extensive studies on synthetic and real-world datasets have
demonstrated that our algorithm can solve the K-center problems to global
optimal within 4 hours for ten million samples in the serial mode and one
billion samples in the parallel mode. Moreover, compared with the
state-of-the-art heuristic methods, the global optimum obtained by our
algorithm can averagely reduce the objective function by 25.8% on all the
synthetic and real-world datasets.
| [
0.000402558798668,
0.010741917416453,
0.010650705546140001,
-0.008805425837635,
0.0030362932011480004,
0.037130128592252,
-0.029159639030694004,
0.000289421353954,
-0.023827271535992,
-0.037158194929361,
0.006107667461037001,
0.020277036353945,
-0.020291067659854,
-0.005332369357347,
-0.... |
Visual surveillance aims to perform robust foreground object detection
regardless of the time and place. Object detection shows good results using
only spatial information, but foreground object detection in visual
surveillance requires proper temporal and spatial information processing. In
deep learning-based foreground object detection algorithms, the detection
ability is superior to classical background subtraction (BGS) algorithms in an
environment similar to training. However, the performance is lower than that of
the classical BGS algorithm in the environment different from training. This
paper proposes a spatio-temporal fusion network (STFN) that could extract
temporal and spatial information using a temporal network and a spatial
network. We suggest a method using a semi-foreground map for stable training of
the proposed STFN. The proposed algorithm shows excellent performance in an
environment different from training, and we show it through experiments with
various public datasets. Also, STFN can generate a compliant background image
in a semi-supervised method, and it can operate in real-time on a desktop with
GPU. The proposed method shows 11.28% and 18.33% higher FM than the latest deep
learning method in the LASIESTA and SBI dataset, respectively.
| [
-0.004978630691766001,
0.017125925049185,
0.010457236319780001,
-0.006834174040704,
0.004679349251091001,
0.018844151869416,
-0.032082941383123,
-0.000666340754833,
-0.026998683810234,
-0.023421393707394003,
0.034026511013507,
0.031716763973236,
-0.004823708441108,
0.018266715109348002,
... |
Recognizing an event in an image can be enhanced by detecting relevant
objects in two ways: 1) indirectly utilizing object detection information
within the unified architecture or 2) directly making use of the object
detection output results. We introduce a novel approach, referred to as
Doubly-injected Object Detection CNN (DOD-CNN), exploiting the object
information in both ways for the task of event recognition. The structure of
this network is inspired by the Integrated Object Detection CNN (IOD-CNN) where
object information is indirectly exploited by the event recognition module
through the shared portion of the network. In the DOD-CNN architecture, the
intermediate object detection outputs are directly injected into the event
recognition network while keeping the indirect sharing structure inherited from
the IOD-CNN, thus being `doubly-injected'. We also introduce a batch pooling
layer which constructs one representative feature map from multiple object
hypotheses. We have demonstrated the effectiveness of injecting the object
detection information in two different ways in the task of malicious event
recognition.
| [
-0.03323445469141,
0.017974574118852,
0.007547676097601001,
-0.005244297906756,
-0.003516764612868,
0.012250405736267001,
-0.007136358413845001,
-0.013655740767717,
-0.020949769765138,
-0.0101526863873,
0.018522998318076002,
0.028709961101412003,
-0.005151751451194,
0.012462919577956,
-0... |
This work generalizes graph neural networks (GNNs) beyond those based on the
Weisfeiler-Lehman (WL) algorithm, graph Laplacians, and diffusions. Our
approach, denoted Relational Pooling (RP), draws from the theory of finite
partial exchangeability to provide a framework with maximal representation
power for graphs. RP can work with existing graph representation models and,
somewhat counterintuitively, can make them even more powerful than the original
WL isomorphism test. Additionally, RP allows architectures like Recurrent
Neural Networks and Convolutional Neural Networks to be used in a theoretically
sound approach for graph classification. We demonstrate improved performance of
RP-based graph representations over state-of-the-art methods on a number of
tasks.
| [
-0.0033673143479970003,
0.024942545220255,
0.016293341293931,
-0.017567364498972,
-0.01433984003961,
-0.004565250128507,
-0.009194200858473,
-0.0020508235320440002,
-0.022507743909955,
-0.051272358745336005,
0.0027391500771040004,
0.032671619206666,
0.0009422464063390001,
0.018784765154123... |
This paper presents a novel multi-fake evolutionary generative adversarial
network(MFEGAN) for handling imbalance hyperspectral image classification. It
is an end-to-end approach in which different generative objective losses are
considered in the generator network to improve the classification performance
of the discriminator network. Thus, the same discriminator network has been
used as a standard classifier by embedding the classifier network on top of the
discriminating function. The effectiveness of the proposed method has been
validated through two hyperspectral spatial-spectral data sets. The same
generative and discriminator architectures have been utilized with two
different GAN objectives for a fair performance comparison with the proposed
method. It is observed from the experimental validations that the proposed
method outperforms the state-of-the-art methods with better classification
performance.
| [
-0.018717739731073,
-0.0021929517388340003,
-0.017297867685556002,
0.0023021728266030004,
0.011242930777370002,
0.017803015187382,
-0.015031532384455001,
-0.013645792379975001,
-0.016929246485233,
-0.038227330893278004,
0.025311954319477,
0.022103589028120003,
0.007331456057727,
0.00280390... |
Cultural adaptation, i.e., the matching of a robot's behaviours to the
cultural norms and preferences of its user, is a well known key requirement for
the success of any assistive application. However, culture-dependent robot
behaviours are often implicitly set by designers, thus not allowing for an easy
and automatic adaptation to different cultures. This paper presents a method
for the design of culture-aware robots, that can automatically adapt their
behaviour to conform to a given culture. We propose a mapping from cultural
factors to related parameters of robot behaviours which relies on linguistic
variables to encode heterogeneous cultural factors in a uniform formalism, and
on fuzzy rules to encode qualitative relations among multiple variables. We
illustrate the approach in two practical case studies.
| [
-0.010817383415997,
-0.015743156895041,
0.004963716492056,
-0.016874566674232,
0.010072308592498,
0.013245775364339001,
-0.006816055160015001,
0.019220171496272,
-0.005008558742702,
-0.027885116636753002,
-0.012279937975108,
-0.0036977790296070004,
0.0021351913455870002,
-0.000475588894914... |
Many possible fields of application of robots in real world settings hinge on
the ability of robots to grasp objects. As a result, robot grasping has been an
active field of research for many years. With our publication we contribute to
the endeavor of enabling robots to grasp, with a particular focus on bin
picking applications. Bin picking is especially challenging due to the often
cluttered and unstructured arrangement of objects and the often limited
graspability of objects by simple top down grasps. To tackle these challenges,
we propose a fully self-supervised reinforcement learning approach based on a
hybrid discrete-continuous adaptation of soft actor-critic (SAC). We employ
parametrized motion primitives for pushing and grasping movements in order to
enable a flexibly adaptable behavior to the difficult setups we consider.
Furthermore, we use data augmentation to increase sample efficiency. We
demonnstrate our proposed method on challenging picking scenarios in which
planar grasp learning or action discretization methods would face a lot of
difficulties
| [
-0.011579873971641001,
-0.004333680029958,
0.022429864853620002,
-0.018064603209495,
-0.005400432273745001,
0.032255213707685006,
-0.000748744118027,
0.0058215185999870005,
-0.025433614850044,
-0.036381859332323005,
0.010028872638940001,
0.014345007948577002,
0.009692003950476001,
-0.00735... |
Orbital angular momentum of light is regarded as a valuable resource in
quantum technology, especially in quantum communication and quantum sensing and
ranging. However, the OAM state of light is susceptible to undesirable
experimental conditions such as propagation distance and phase distortions,
which hinders the potential for the realistic implementation of relevant
technologies. In this article, we exploit an enhanced deep learning neural
network to identify different OAM modes of light at multiple propagation
distances with phase distortions. Specifically, our trained deep learning
neural network can efficiently identify the vortex beam's topological charge
and propagation distance with 97% accuracy. Our technique has important
implications for OAM based communication and sensing protocols.
| [
-0.017170963808894,
-0.006853869184851,
-0.013707738369703001,
-0.002530021360144,
-0.005288159474730001,
0.017378343269228002,
-0.007942607626318,
0.005651072133332001,
-0.020157219842076003,
-0.015138652175664001,
0.015138652175664001,
0.020281646400690002,
-0.008530180901288001,
0.00631... |
Mobile keyboard suggestion is typically regarded as a word-level language
modeling problem. Centralized machine learning technique requires massive user
data collected to train on, which may impose privacy concerns for sensitive
personal typing data of users. Federated learning (FL) provides a promising
approach to learning private language modeling for intelligent personalized
keyboard suggestion by training models in distributed clients rather than
training in a central server. To obtain a global model for prediction, existing
FL algorithms simply average the client models and ignore the importance of
each client during model aggregation. Furthermore, there is no optimization for
learning a well-generalized global model on the central server. To solve these
problems, we propose a novel model aggregation with the attention mechanism
considering the contribution of clients models to the global model, together
with an optimization technique during server aggregation. Our proposed
attentive aggregation method minimizes the weighted distance between the server
model and client models through iterative parameters updating while attends the
distance between the server model and client models. Through experiments on two
popular language modeling datasets and a social media dataset, our proposed
method outperforms its counterparts in terms of perplexity and communication
cost in most settings of comparison.
| [
-0.028727790340781004,
0.018533607944846,
0.029536630958318003,
-0.026078138500452003,
0.011958290822803001,
0.0027263509109610004,
-0.019356394186615,
0.004201090428978,
-0.012481248006224,
-0.054192326962947006,
0.012474276125431002,
0.039186935871839,
-0.022647539153695002,
0.0284628253... |
Deep Neural Networks (DNNs) are known to be vulnerable to the maliciously
generated adversarial examples. To detect these adversarial examples, previous
methods use artificially designed metrics to characterize the properties of
\textit{adversarial subspaces} where adversarial examples lie. However, we find
these methods are not working in practical attack detection scenarios. Because
the artificially defined features are lack of robustness and show limitation in
discriminative power to detect strong attacks. To solve this problem, we
propose a novel adversarial detection method which identifies adversaries by
adaptively learning reasonable metrics to characterize adversarial subspaces.
As auxiliary context information, \textit{k} nearest neighbors are used to
represent the surrounded subspace of the detected sample. We propose an
innovative model called Neighbor Context Encoder (NCE) to learn from \textit{k}
neighbors context and infer if the detected sample is normal or adversarial. We
conduct thorough experiment on CIFAR-10, CIFAR-100 and ImageNet dataset. The
results demonstrate that our approach surpasses all existing methods under
three settings: \textit{attack-aware black-box detection},
\textit{attack-unaware black-box detection} and \textit{white-box detection}.
| [
0.000783797469921,
0.002981959842145,
0.01621139422059,
-0.025949249044060003,
-0.016404222697019,
0.015811963006854002,
-0.0021658807527270003,
-0.002227861434221,
-0.026155851781368002,
-0.018497793003916,
0.043854780495166,
0.021968711167573002,
-0.005826184991747,
0.011735010892152,
... |
Data parallelism has become a dominant method to scale Deep Neural Network
(DNN) training across multiple nodes. Since synchronizing a large number of
gradients of the local model can be a bottleneck for large-scale distributed
training, compressing communication data has gained widespread attention
recently. Among several recent proposed compression algorithms, Residual
Gradient Compression (RGC) is one of the most successful approaches---it can
significantly compress the transmitting message size (0.1\% of the gradient
size) of each node and still achieve correct accuracy and the same convergence
speed. However, the literature on compressing deep networks focuses almost
exclusively on achieving good theoretical compression rate, while the
efficiency of RGC in real distributed implementation has been less
investigated. In this paper, we develop an RGC-based system that is able to
reduce the end-to-end training time on real-world multi-GPU systems. Our
proposed design called RedSync, which introduces a set of optimizations to
reduce communication bandwidth requirement while introducing limited overhead.
We evaluate the performance of RedSync on two different multiple GPU platforms,
including 128 GPUs of a supercomputer and an 8-GPU server. Our test cases
include image classification tasks on Cifar10 and ImageNet, and language
modeling tasks on Penn Treebank and Wiki2 datasets. For DNNs featured with high
communication to computation ratio, which have long been considered with poor
scalability, RedSync brings significant performance improvements.
| [
-0.013290714472532002,
-0.007554721552878001,
0.032597225159406,
-0.010387741960585001,
0.033324718475341006,
0.004560813307762,
-0.033548559993505006,
-0.0022052093409,
-0.007953443564474,
-0.036962173879146,
0.023265745490789,
0.045636113733053006,
0.0060088019818060005,
0.00623614294454... |
We classify and re-examine some of the current approaches to improve the
performance-computes trade-off of language models, including (1) non-causal
models (such as masked language models), (2) extension of batch length with
efficient attention, (3) recurrence, (4) conditional computation and (5)
retrieval. We identify some limitations (1) - (4) suffer from. For example, (1)
currently struggles with open-ended text generation with the output loosely
constrained by the input as well as performing general textual tasks like
GPT-2/3 due to its need for a specific fine-tuning dataset. (2) and (3) do not
improve the prediction of the first $\sim 10^3$ tokens. Scaling up a model size
(e.g. efficiently with (4)) still results in poor performance scaling for some
tasks. We argue (5) would resolve many of these limitations, and it can (a)
reduce the amount of supervision and (b) efficiently extend the context over
the entire training dataset and the entire past of the current sample. We
speculate how to modify MARGE to perform unsupervised causal modeling that
achieves (b) with the retriever jointly trained.
| [
-0.024774657562375003,
0.007137989625334001,
0.006721375510096001,
-0.012553974054753001,
0.0014425265835590001,
0.014664819464087,
-0.002718407660722,
0.009998740628361001,
-0.030051769688725003,
-0.038828440010547,
0.0020292582921680002,
0.040217157453298,
-0.016025759279727003,
0.009623... |
This work studies the widely adopted ancestral sampling algorithms for
auto-regressive language models, which is not widely studied in the literature.
We use the quality-diversity (Q-D) trade-off to investigate three popular
sampling algorithms (top-k, nucleus and tempered sampling). We focus on the
task of open-ended language generation. We first show that the existing
sampling algorithms have similar performance. After carefully inspecting the
transformations defined by different sampling algorithms, we identify three key
properties that are shared among them: entropy reduction, order preservation,
and slope preservation. To validate the importance of the identified
properties, we design two sets of new sampling algorithms: one set in which
each algorithm satisfies all three properties, and one set in which each
algorithm violates at least one of the properties. We compare their performance
with existing sampling algorithms, and find that violating the identified
properties could lead to drastic performance degradation, as measured by the
Q-D trade-off. On the other hand, we find that the set of sampling algorithms
that satisfies these properties performs on par with the existing sampling
algorithms. Our data and code are available at
https://github.com/moinnadeem/characterizing-sampling-algorithms
| [
0.003052158514037,
0.0021345957648000002,
0.003830432891845,
-0.025099782273173003,
-0.012250420637428,
0.027439827099442003,
-0.018483579158782,
0.007145498413592,
-0.029612727463245003,
-0.012905076146125,
0.018135357648134003,
0.023832255974411003,
-0.012912040576338001,
0.0082040904089... |
Adversarial examples --- perturbations to the input of a model that elicit
large changes in the output --- have been shown to be an effective way of
assessing the robustness of sequence-to-sequence (seq2seq) models. However,
these perturbations only indicate weaknesses in the model if they do not change
the input so significantly that it legitimately results in changes in the
expected output. This fact has largely been ignored in the evaluations of the
growing body of related literature. Using the example of untargeted attacks on
machine translation (MT), we propose a new evaluation framework for adversarial
attacks on seq2seq models that takes the semantic equivalence of the pre- and
post-perturbation input into account. Using this framework, we demonstrate that
existing methods may not preserve meaning in general, breaking the
aforementioned assumption that source side perturbations should not result in
changes in the expected output. We further use this framework to demonstrate
that adding additional constraints on attacks allows for adversarial
perturbations that are more meaning-preserving, but nonetheless largely change
the output sequence. Finally, we show that performing untargeted adversarial
training with meaning-preserving attacks is beneficial to the model in terms of
adversarial robustness, without hurting test performance. A toolkit
implementing our evaluation framework is released at
https://github.com/pmichel31415/teapot-nlp.
| [
-0.021278165280818002,
-0.021082568913698002,
0.005497674457728001,
-0.006583936512470001,
0.020160468295216002,
0.021487733349204,
0.0030212760902940004,
-0.007467616349458001,
-0.027062250301241,
-0.019727360457181,
0.032273516058921,
0.011903477832674002,
-0.001663448172621,
-0.00040734... |
State-of-the-art deep learning algorithms generally require large amounts of
data for model training. Lack thereof can severely deteriorate the performance,
particularly in scenarios with fine-grained boundaries between categories. To
this end, we propose a multimodal approach that facilitates bridging the
information gap by means of meaningful joint embeddings. Specifically, we
present a benchmark that is multimodal during training (i.e. images and texts)
and single-modal in testing time (i.e. images), with the associated task to
utilize multimodal data in base classes (with many samples), to learn explicit
visual classifiers for novel classes (with few samples). Next, we propose a
framework built upon the idea of cross-modal data hallucination. In this
regard, we introduce a discriminative text-conditional GAN for sample
generation with a simple self-paced strategy for sample selection. We show the
results of our proposed discriminative hallucinated method for 1-, 2-, and 5-
shot learning on the CUB dataset, where the accuracy is improved by employing
multimodal data.
| [
-0.025643769651651,
0.00964459311217,
0.027475466951727003,
-0.009651638567447001,
-0.010426587425172001,
0.031138863414525004,
-0.0054880483075970005,
-0.013195268809795001,
-0.028616756200790003,
-0.033477798104286,
0.008848509751260001,
0.033618699759244,
-0.012110340408980002,
-0.00783... |
Low resource Handwritten Text Recognition (HTR) is a hard problem due to the
scarce annotated data and the very limited linguistic information (dictionaries
and language models). For example, in the case of historical ciphered
manuscripts, which are usually written with invented alphabets to hide the
message contents. Thus, in this paper we address this problem through a data
generation technique based on Bayesian Program Learning (BPL). Contrary to
traditional generation approaches, which require a huge amount of annotated
images, our method is able to generate human-like handwriting using only one
sample of each symbol in the alphabet. After generating symbols, we create
synthetic lines to train state-of-the-art HTR architectures in a segmentation
free fashion. Quantitative and qualitative analyses were carried out and
confirm the effectiveness of the proposed method.
| [
-0.028198836371302,
0.002488653641194,
-0.004977307282388,
-0.0029792990535490002,
0.015743169933557,
0.026030784472823,
-0.0010937676997850002,
0.0007142701651900001,
-0.019583312794566002,
-0.021170381456613003,
0.016550874337553,
0.039109941571950003,
-0.038939900696277,
-0.001368316588... |
This paper presents privileged multi-label learning (PrML) to explore and
exploit the relationship between labels in multi-label learning problems. We
suggest that for each individual label, it cannot only be implicitly connected
with other labels via the low-rank constraint over label predictors, but also
its performance on examples can receive the explicit comments from other labels
together acting as an \emph{Oracle teacher}. We generate privileged label
feature for each example and its individual label, and then integrate it into
the framework of low-rank based multi-label learning. The proposed algorithm
can therefore comprehensively explore and exploit label relationships by
inheriting all the merits of privileged information and low-rank constraints.
We show that PrML can be efficiently solved by dual coordinate descent
algorithm using iterative optimization strategy with cheap updates. Experiments
on benchmark datasets show that through privileged label features, the
performance can be significantly improved and PrML is superior to several
competing methods in most cases.
| [
-0.013495877385139,
0.001274495851248,
0.00795698724687,
-0.03769752010703,
-0.0057386755943290004,
0.015789970755577,
-0.006489594932645001,
0.011105336248874002,
-0.045385830104351,
-0.033784471452236,
0.026950420811772003,
0.034060038626194,
-0.023492058739066003,
0.001216799020767,
-... |
Topological data analysis (TDA) is a branch of computational mathematics,
bridging algebraic topology and data science, that provides compact,
noise-robust representations of complex structures. Deep neural networks (DNNs)
learn millions of parameters associated with a series of transformations
defined by the model architecture, resulting in high-dimensional,
difficult-to-interpret internal representations of input data. As DNNs become
more ubiquitous across multiple sectors of our society, there is increasing
recognition that mathematical methods are needed to aid analysts, researchers,
and practitioners in understanding and interpreting how these models' internal
representations relate to the final classification. In this paper, we apply
cutting edge techniques from TDA with the goal of gaining insight into the
interpretability of convolutional neural networks used for image
classification. We use two common TDA approaches to explore several methods for
modeling hidden-layer activations as high-dimensional point clouds, and provide
experimental evidence that these point clouds capture valuable structural
information about the model's process. First, we demonstrate that a distance
metric based on persistent homology can be used to quantify meaningful
differences between layers, and we discuss these distances in the broader
context of existing representational similarity metrics for neural network
interpretability. Second, we show that a mapper graph can provide semantic
insight into how these models organize hierarchical class knowledge at each
layer. These observations demonstrate that TDA is a useful tool to help deep
learning practitioners unlock the hidden structures of their models.
| [
-0.017212886363267,
0.003031419357284,
0.015805192291736003,
-0.017840076237916003,
0.010745858773589,
0.022327970713377002,
-0.011184891685843001,
-0.0025244406424460002,
-0.012752867303788001,
-0.028767123818397,
0.022021343931555002,
0.035931028425693005,
0.002423393307253,
0.0083764735... |
We present GANcraft, an unsupervised neural rendering framework for
generating photorealistic images of large 3D block worlds such as those created
in Minecraft. Our method takes a semantic block world as input, where each
block is assigned a semantic label such as dirt, grass, or water. We represent
the world as a continuous volumetric function and train our model to render
view-consistent photorealistic images for a user-controlled camera. In the
absence of paired ground truth real images for the block world, we devise a
training technique based on pseudo-ground truth and adversarial training. This
stands in contrast to prior work on neural rendering for view synthesis, which
requires ground truth images to estimate scene geometry and view-dependent
appearance. In addition to camera trajectory, GANcraft allows user control over
both scene semantics and output style. Experimental results with comparison to
strong baselines show the effectiveness of GANcraft on this novel task of
photorealistic 3D block world synthesis. The project website is available at
https://nvlabs.github.io/GANcraft/ .
| [
0.00013700913405,
-0.016499951481819,
0.011921180412173,
-0.017387045547366,
0.026790242642164,
0.019802670925855,
-0.030516037717461003,
-0.012664974667131,
-0.011375276371836001,
-0.04645643755793501,
0.009178012609481001,
0.017332455143332003,
-0.007731366436928001,
-0.01117738615721400... |
We consider a non-stationary two-armed bandit framework and propose a
change-detection based Thompson sampling (TS) algorithm, named TS with
change-detection (TS-CD), to keep track of the dynamic environment. The
non-stationarity is modeled using a Poisson arrival process, which changes the
mean of the rewards on each arrival. The proposed strategy compares the
empirical mean of the recent rewards of an arm with the estimate of the mean of
the rewards from its history. It detects a change when the empirical mean
deviates from the mean estimate by a value larger than a threshold. Then, we
characterize the lower bound on the duration of the time-window for which the
bandit framework must remain stationary for TS-CD to successfully detect a
change when it occurs. Consequently, our results highlight an upper bound on
the parameter for the Poisson arrival process, for which the TS-CD achieves
asymptotic regret optimality with high probability. Finally, we validate the
efficacy of TS-CD by testing it for edge-control of radio access technique
(RAT)-selection in a wireless network. Our results show that TS-CD not only
outperforms the classical max-power RAT selection strategy but also other
actively adaptive and passively adaptive bandit algorithms that are designed
for non-stationary environments.
| [
-0.017763331532478003,
0.005485322326421,
0.0043672276660790006,
0.0015167880337680001,
0.012302543967962001,
0.015141592361032002,
-0.014272352680563,
0.015169632621109002,
-0.044471416622400006,
-0.019529851153492,
0.014440593309700002,
0.028376465663313002,
-0.012632014229893001,
0.0091... |
This paper studies a fundamental mechanism of how to detect a conflict
between arguments given sentiments regarding acceptability of the arguments. We
introduce a concept of the inverse problem of the abstract argumentation to
tackle the problem. Given noisy sets of acceptable arguments, it aims to find
attack relations explaining the sets well in terms of acceptability semantics.
It is the inverse of the direct problem corresponding to the traditional
problem of the abstract argumentation that focuses on finding sets of
acceptable arguments in terms of the semantics given an attack relation between
the arguments. We give a probabilistic model handling both of the problems in a
way that is faithful to the acceptability semantics. From a theoretical point
of view, we show that a solution to both the direct and inverse problems is a
special case of the probabilistic inference on the model. We discuss that the
model provides a natural extension of the semantics to cope with uncertain
attack relations distributed probabilistically. From en empirical point of
view, we argue that it reasonably predicts individuals sentiments regarding
acceptability of arguments. This paper contributes to lay the foundation for
making acceptability semantics data-driven and to provide a way to tackle the
knowledge acquisition bottleneck.
| [
0.002012040000408,
-0.00039158642175600005,
-0.006368037778884001,
-0.014139029197394001,
-0.015822572633624,
0.014905520714819001,
0.00010169270535600001,
-0.009560612030327001,
-0.005208035465329001,
-0.018518980592489003,
0.0015064636245360002,
0.010532413609325001,
-0.0061935242265460004... |
Image textures, as a kind of local variations, provide important information
for human visual system. Many image textures, especially the small-scale or
stochastic textures are rich in high-frequency variations, and are difficult to
be preserved. Current state-of-the-art denoising algorithms typically adopt a
nonlocal approach consisting of image patch grouping and group-wise denoising
filtering. To achieve a better image denoising while preserving the variations
in texture, we first adaptively group high correlated image patches with the
same kinds of texture elements (texels) via an adaptive clustering method. This
adaptive clustering method is applied in an
over-clustering-and-iterative-merging approach, where its noise robustness is
improved with a custom merging threshold relating to the noise level and
cluster size. For texture-preserving denoising of each cluster, considering
that the variations in texture are captured and wrapped in not only the
between-dimension energy variations but also the within-dimension variations of
PCA transform coefficients, we further propose a PCA-transform-domain variation
adaptive filtering method to preserve the local variations in textures.
Experiments on natural images show the superiority of the proposed
transform-domain variation adaptive filtering to traditional PCA-based hard or
soft threshold filtering. As a whole, the proposed denoising method achieves a
favorable texture preserving performance both quantitatively and visually,
especially for stochastic textures, which is further verified in camera raw
image denoising.
| [
0.008148178458213001,
0.021908795461058003,
0.022476801648736,
-0.004878764040768001,
0.021746508777141002,
0.029779732227325002,
-0.0033370340242980003,
-0.001414097729139,
-0.023180047050118002,
-0.038705538958311005,
0.002199331996962,
0.002319357125088,
0.007735698018223,
0.01954210363... |
Robotic process automation (RPA) has emerged as the leading approach to
automate tasks in business processes. Moving away from back-end automation, RPA
automated the mouse-click on user interfaces; this outside-in approach reduced
the overhead of updating legacy software. However, its many shortcomings,
namely its lack of accessibility to business users, have prevented its
widespread adoption in highly regulated industries. In this work, we explore
interactive automation in the form of a conversational digital assistant. It
allows business users to interact with and customize their automation solutions
through natural language. The framework, which creates such assistants, relies
on a multi-agent orchestration model and conversational wrappers for autonomous
agents including RPAs. We demonstrate the effectiveness of our proposed
approach on a loan approval business process and a travel preapproval business
process.
| [
-0.028766931965947002,
-0.0032366234809160003,
0.013118380680680001,
-0.0037402510643,
0.003013171022757,
0.020447622984647,
-0.012224570848047001,
0.014493472874164002,
-0.029234463348984004,
-0.036274936050176,
0.001022724900394,
0.01771118864417,
-0.029839502647519,
-0.00326068769209000... |
The first contribution of this paper is architecture of a multipurpose
system, which delegates a range of object detection tasks to a classifier,
applied in special grid positions of the tested image. The second contribution
is Gray Level-Radius Co-occurrence Matrix, which describes local image texture
and topology and, unlike common second order statistics methods, is robust to
image resolution. The third contribution is a parametrically controlled
automatic synthesis of unlimited number of numerical features for
classification. The fourth contribution is a method of optimizing parameters C
and gamma in LibSVM-based classifier, which is 20-100 times faster than the
commonly applied method. The work is essentially experimental, with
demonstration of various methods for definition of objects of interest in
images and video sequences.
| [
-0.011139662936329,
0.007976463995873,
0.009113024920225001,
-0.033822946250438,
0.014268628321588001,
0.022731211036443003,
0.00036223587812800003,
-0.000750147097278,
-0.024429205805063,
-0.031193794682621002,
0.012228296138346001,
0.0038581439293920005,
-0.026907728984951,
0.00487146293... |
It has been experimentally observed that the efficiency of distributed
training with stochastic gradient (SGD) depends decisively on the batch size
and -- in asynchronous implementations -- on the gradient staleness.
Especially, it has been observed that the speedup saturates beyond a certain
batch size and/or when the delays grow too large. We identify a data-dependent
parameter that explains the speedup saturation in both these settings. Our
comprehensive theoretical analysis, for strongly convex, convex and non-convex
settings, unifies and generalized prior work directions that often focused on
only one of these two aspects. In particular, our approach allows us to derive
improved speedup results under frequently considered sparsity assumptions. Our
insights give rise to theoretically based guidelines on how the learning rates
can be adjusted in practice. We show that our results are tight and illustrate
key findings in numerical experiments.
| [
-0.017899077385663,
-0.001224312349222,
0.029038470238447002,
-0.014702309854328001,
-0.002195136621594,
0.008808711543679001,
0.006298474967479001,
0.015645848587155002,
-0.037854224443435,
-0.042501505464315005,
0.016504891216754,
0.018715871497988,
-0.00416495045647,
-0.001850111060775,... |
Perception of obstacles remains a critical safety concern for autonomous
vehicles. Real-world collisions have shown that the autonomy faults leading to
fatal collisions originate from obstacle existence detection. Open source
autonomous driving implementations show a perception pipeline with complex
interdependent Deep Neural Networks. These networks are not fully verifiable,
making them unsuitable for safety-critical tasks.
In this work, we present a safety verification of an existing LiDAR based
classical obstacle detection algorithm. We establish strict bounds on the
capabilities of this obstacle detection algorithm. Given safety standards, such
bounds allow for determining LiDAR sensor properties that would reliably
satisfy the standards. Such analysis has as yet been unattainable for neural
network based perception systems. We provide a rigorous analysis of the
obstacle detection system with empirical results based on real-world sensor
data.
| [
-0.002798799891024,
-0.009282976388931,
-0.023572500795125,
0.015478580258786002,
-0.006348581984639,
0.021806301549077003,
-0.029872408136725002,
0.014560712501406002,
-0.034600816667079,
-0.005966137163341,
0.019608983770012002,
0.003744481364265,
-0.016980545595288003,
0.005541971419006... |
Apricot which is a cultivated type of Zerdali (wild apricot) has an important
place in human nutrition and its medical properties are essential for human
health. The objective of this research was to obtain a model for apricot mass
and separate apricot variety with image processing technology using external
features of apricot fruit. In this study, five verities of apricot were used.
In order to determine the size of the fruits, three mutually perpendicular axes
were defined, length, width, and thickness. Measurements show that the effect
of variety on all properties was statistically significant at the 1%
probability level. Furthermore, there is no significant difference between the
estimated dimensions by image processing approach and the actual dimensions.
The developed system consists of a digital camera, a light diffusion chamber, a
distance adjustment pedestal, and a personal computer. Images taken by the
digital camera were stored as (RGB) for further analysis. The images were taken
for a number of 49 samples of each cultivar in three directions. A linear
equation is recommended to calculate the apricot mass based on the length and
the width with R 2 = 0.97. In addition, ANFIS model with C-means was the best
model for classifying the apricot varieties based on the physical features
including length, width, thickness, mass, and projected area of three
perpendicular surfaces. The accuracy of the model was 87.7.
| [
-0.015919677913188,
0.013279969803988,
0.00034798847627800003,
-0.019882632419466,
0.004838333465158,
0.027129953727126004,
-0.003956168889999,
0.009289870969951,
-0.004824761301279,
-0.044705383479595004,
-0.0006115775322540001,
0.016258971765637002,
-0.020154066383838,
-0.006280332803726... |
We introduce an implementation of an extension of Answer Set Programming
(ASP) with language constructs from dynamic (and temporal) logic that provides
an expressive computational framework for modeling dynamic applications.
Starting from logical foundations, provided by dynamic and temporal equilibrium
logics over finite linear traces, we develop a translation of dynamic formulas
into temporal logic programs. This provides us with a normal form result
establishing the strong equivalence of formulas in different logics. Our
translation relies on the introduction of auxiliary atoms to guarantee
polynomial space complexity and to provide an embedding that is doomed to be
impossible over the same language. Finally, the reduction of dynamic formulas
to temporal logic programs allows us to extend ASP with both approaches in a
uniform way and to implement both extensions via temporal ASP solvers such as
telingo
| [
-0.012499065138399,
0.017181081697344003,
0.00001708589297777507,
-0.038441814482212004,
-0.035484749823808004,
0.034937147051095005,
-0.018454261124134,
-0.021904166787862,
-0.018248910084366,
-0.039153698831796,
0.02204106748104,
0.027900433167815004,
-0.021123832091689002,
0.02023397386... |
Spatial-temporal Map (STMap)-based methods have shown great potential to
process high-angle videos for vehicle trajectory reconstruction, which can meet
the needs of various data-driven modeling and imitation learning applications.
In this paper, we developed Spatial-Temporal Deep Embedding (STDE) model that
imposes parity constraints at both pixel and instance levels to generate
instance-aware embeddings for vehicle stripe segmentation on STMap. At pixel
level, each pixel was encoded with its 8-neighbor pixels at different ranges,
and this encoding is subsequently used to guide a neural network to learn the
embedding mechanism. At the instance level, a discriminative loss function is
designed to pull pixels belonging to the same instance closer and separate the
mean value of different instances far apart in the embedding space. The output
of the spatial-temporal affinity is then optimized by the mutex-watershed
algorithm to obtain final clustering results. Based on segmentation metrics,
our model outperformed five other baselines that have been used for STMap
processing and shows robustness under the influence of shadows, static noises,
and overlapping. The designed model is applied to process all public NGSIM
US-101 videos to generate complete vehicle trajectories, indicating a good
scalability and adaptability. Last but not least, the strengths of the scanline
method with STDE and future directions were discussed. Code, STMap dataset and
video trajectory are made publicly available in the online repository. GitHub
Link: shorturl.at/jklT0.
| [
-0.0052391812205310005,
0.002528069075196,
0.012743954546749,
-0.018622059375047,
-0.004617524798959,
0.024313669651746,
-0.009331751614809002,
0.014878307469189,
-0.011044760234653,
-0.04257654771208701,
-0.0029476869385680004,
0.024949138984084,
0.001220863894559,
0.031331479549407,
0.... |
In this work, we propose ReStoCNet, a residual stochastic multilayer
convolutional Spiking Neural Network (SNN) composed of binary kernels, to
reduce the synaptic memory footprint and enhance the computational efficiency
of SNNs for complex pattern recognition tasks. ReStoCNet consists of an input
layer followed by stacked convolutional layers for hierarchical input feature
extraction, pooling layers for dimensionality reduction, and fully-connected
layer for inference. In addition, we introduce residual connections between the
stacked convolutional layers to improve the hierarchical feature learning
capability of deep SNNs. We propose Spike Timing Dependent Plasticity (STDP)
based probabilistic learning algorithm, referred to as Hybrid-STDP (HB-STDP),
incorporating Hebbian and anti-Hebbian learning mechanisms, to train the binary
kernels forming ReStoCNet in a layer-wise unsupervised manner. We demonstrate
the efficacy of ReStoCNet and the presented HB-STDP based unsupervised training
methodology on the MNIST and CIFAR-10 datasets. We show that residual
connections enable the deeper convolutional layers to self-learn useful
high-level input features and mitigate the accuracy loss observed in deep SNNs
devoid of residual connections. The proposed ReStoCNet offers >20x kernel
memory compression compared to full-precision (32-bit) SNN while yielding high
enough classification accuracy on the chosen pattern recognition tasks.
| [
-0.013227131217718001,
0.013541730120778,
0.009934330359101,
0.021882094442844002,
0.009046463295817,
0.008508149534463001,
0.020819449797272002,
-0.003338242648169,
-0.025503475219011,
-0.004075801931321,
0.031487844884395,
0.041303325444459006,
-0.012674835510551001,
-0.00069124344736300... |
Knowledge Graph Embedding (KGE) aims to learn representations for entities
and relations. Most KGE models have gained great success, especially on
extrapolation scenarios. Specifically, given an unseen triple (h, r, t), a
trained model can still correctly predict t from (h, r, ?), or h from (?, r,
t), such extrapolation ability is impressive. However, most existing KGE works
focus on the design of delicate triple modeling function, which mainly tells us
how to measure the plausibility of observed triples, but offers limited
explanation of why the methods can extrapolate to unseen data, and what are the
important factors to help KGE extrapolate. Therefore in this work, we attempt
to study the KGE extrapolation of two problems: 1. How does KGE extrapolate to
unseen data? 2. How to design the KGE model with better extrapolation ability?
For the problem 1, we first discuss the impact factors for extrapolation and
from relation, entity and triple level respectively, propose three Semantic
Evidences (SEs), which can be observed from train set and provide important
semantic information for extrapolation. Then we verify the effectiveness of SEs
through extensive experiments on several typical KGE methods. For the problem
2, to make better use of the three levels of SE, we propose a novel GNN-based
KGE model, called Semantic Evidence aware Graph Neural Network (SE-GNN). In
SE-GNN, each level of SE is modeled explicitly by the corresponding neighbor
pattern, and merged sufficiently by the multi-layer aggregation, which
contributes to obtaining more extrapolative knowledge representation. Finally,
through extensive experiments on FB15k-237 and WN18RR datasets, we show that
SE-GNN achieves state-of-the-art performance on Knowledge Graph Completion task
and performs a better extrapolation ability. Our code is available at
https://github.com/renli1024/SE-GNN.
| [
0.014045441523194,
0.009212236851453,
0.022939080372452,
-0.030802357941865,
0.008005630224943001,
0.018356686457991,
-0.0074158846400670005,
-0.011889819055795002,
-0.031697146594524,
-0.033079996705055,
0.001585365622304,
0.027033407241106002,
-0.034679766744375,
0.020390292629599002,
... |
In this paper, we study adversarial training on datasets that obey the
long-tailed distribution, which is practical but rarely explored in previous
works. Compared with conventional adversarial training on balanced datasets,
this process falls into the dilemma of generating uneven adversarial examples
(AEs) and an unbalanced feature embedding space, causing the resulting model to
exhibit low robustness and accuracy on tail data. To combat that, we propose a
new adversarial training framework -- Re-balancing Adversarial Training (REAT).
This framework consists of two components: (1) a new training strategy inspired
by the term effective number to guide the model to generate more balanced and
informative AEs; (2) a carefully constructed penalty function to force a
satisfactory feature space. Evaluation results on different datasets and model
structures prove that REAT can effectively enhance the model's robustness and
preserve the model's clean accuracy. The code can be found in
https://github.com/GuanlinLee/REAT.
| [
-0.0252423771,
-0.00428966805,
0.00323732081,
-0.00291097094,
0.015022564700000001,
0.00869102869,
-0.0034624498799999998,
0.00113088079,
-0.017828824,
-0.0187363215,
0.024488456500000002,
0.028900288000000003,
-0.00260730856,
0.00345197879,
-0.0145339128,
-0.00154099963,
0.029486669... |
In this paper, we describe a data enhancement method for developing Emily, an
emotion-affective open-domain chatbot. The proposed method is based on
explicitly modeling positively transitioned (PT) sentiment data from multi-turn
dialogues. We construct a dialogue corpus with PT sentiment data and will
release it for public use. By fine-tuning a pretrained dialogue model using the
produced PT-enhanced dialogues, we are able to develop an emotion-affective
open-domain chatbot exhibiting close-to-human performance in various
emotion-affective metrics. We evaluate Emily against a few state-of-the-art
(SOTA) open-domain chatbots and show the effectiveness of the proposed
approach. The corpus is made publicly available.
| [
-0.023672038689255003,
-0.022176241502165003,
0.027706578373908,
-0.020172694697976,
0.001883470918983,
0.022368362173438003,
-0.011499808169901002,
0.011609591543674,
-0.011348855681717,
-0.022944724187254,
0.005176972132176,
0.029202377423644003,
-0.019678669050335003,
-0.002586770569905... |
Optimal well placement and well injection-production are crucial for the
reservoir development to maximize the financial profits during the project
lifetime. Meta-heuristic algorithms have showed good performance in solving
complex, nonlinear and non-continuous optimization problems. However, a large
number of numerical simulation runs are involved during the optimization
process. In this work, a novel and efficient data-driven evolutionary
algorithm, called generalized data-driven differential evolutionary algorithm
(GDDE), is proposed to reduce the number of simulation runs on well-placement
and control optimization problems. Probabilistic neural network (PNN) is
adopted as the classifier to select informative and promising candidates, and
the most uncertain candidate based on Euclidean distance is prescreened and
evaluated with a numerical simulator. Subsequently, local surrogate model is
built by radial basis function (RBF) and the optimum of the surrogate, found by
optimizer, is evaluated by the numerical simulator to accelerate the
convergence. It is worth noting that the shape factors of RBF model and PNN are
optimized via solving hyper-parameter sub-expensive optimization problem. The
results show the optimization algorithm proposed in this study is very
promising for a well-placement optimization problem of two-dimensional
reservoir and joint optimization of Egg model.
| [
-0.022348107770085,
-0.005814997479319001,
-0.00116615591105,
-0.005138100590556,
-0.026991687715053003,
0.017157398164272003,
-0.003363439347594,
0.000475230481242,
-0.05931437388062401,
-0.025729082524776,
-0.0034914533607660002,
0.041188977658748,
-0.001003946294076,
0.01607717014849100... |
Visual question answering is fundamentally compositional in nature---a
question like "where is the dog?" shares substructure with questions like "what
color is the dog?" and "where is the cat?" This paper seeks to simultaneously
exploit the representational capacity of deep networks and the compositional
linguistic structure of questions. We describe a procedure for constructing and
learning *neural module networks*, which compose collections of jointly-trained
neural "modules" into deep networks for question answering. Our approach
decomposes questions into their linguistic substructures, and uses these
structures to dynamically instantiate modular networks (with reusable
components for recognizing dogs, classifying colors, etc.). The resulting
compound networks are jointly trained. We evaluate our approach on two
challenging datasets for visual question answering, achieving state-of-the-art
results on both the VQA natural image dataset and a new dataset of complex
questions about abstract shapes.
| [
-0.013843199238181001,
0.015677522867918,
0.01520244590938,
-0.013698036782443001,
-0.023397514596581,
0.013196567073464002,
0.001309759332798,
-0.022843258455395,
-0.005948352627456001,
-0.027791971340775,
0.005859275814145,
0.017327092587947002,
-0.008155479095876,
0.020613038912415,
0... |
We propose an image restoration algorithm that can control the perceptual
quality and/or the mean square error (MSE) of any pre-trained model, trading
one over the other at test time. Our algorithm is few-shot: Given about a dozen
images restored by the model, it can significantly improve the perceptual
quality and/or the MSE of the model for newly restored images without further
training. Our approach is motivated by a recent theoretical result that links
between the minimum MSE (MMSE) predictor and the predictor that minimizes the
MSE under a perfect perceptual quality constraint. Specifically, it has been
shown that the latter can be obtained by optimally transporting the output of
the former, such that its distribution matches the source data. Thus, to
improve the perceptual quality of a predictor that was originally trained to
minimize MSE, we approximate the optimal transport by a linear transformation
in the latent space of a variational auto-encoder, which we compute in
closed-form using empirical means and covariances. Going beyond the theory, we
find that applying the same procedure on models that were initially trained to
achieve high perceptual quality, typically improves their perceptual quality
even further. And by interpolating the results with the original output of the
model, we can improve their MSE on the expense of perceptual quality. We
illustrate our method on a variety of degradations applied to general content
images of arbitrary dimensions.
| [
-0.00446461653,
-0.015100184800000001,
0.0138336262,
0.0025471886599999997,
0.0116523327,
0.0364205763,
-0.00495013036,
-0.0041866772799999995,
-0.0175770093,
-0.0357732251,
0.00222703093,
0.0376589894,
-0.014290995,
0.00197547837,
-0.0013984909699999999,
-0.0140306465,
0.02324837450... |
A `trajectory' refers to a trace generated by a moving object in geographical
spaces, usually represented by of a series of chronologically ordered points,
where each point consists of a geo-spatial coordinate set and a timestamp.
Rapid advancements in location sensing and wireless communication technology
enabled us to collect and store a massive amount of trajectory data. As a
result, many researchers use trajectory data to analyze mobility of various
moving objects. In this dissertation, we focus on the `urban vehicle
trajectory,' which refers to trajectories of vehicles in urban traffic
networks, and we focus on `urban vehicle trajectory analytics.' The urban
vehicle trajectory analytics offers unprecedented opportunities to understand
vehicle movement patterns in urban traffic networks including both user-centric
travel experiences and system-wide spatiotemporal patterns. The spatiotemporal
features of urban vehicle trajectory data are structurally correlated with each
other, and consequently, many previous researchers used various methods to
understand this structure. Especially, deep-learning models are getting
attentions of many researchers due to its powerful function approximation and
feature representation abilities. As a result, the objective of this
dissertation is to develop deep-learning based models for urban vehicle
trajectory analytics to better understand the mobility patterns of urban
traffic networks. Particularly, this dissertation focuses on two research
topics, which has high necessity, importance and applicability: Next Location
Prediction, and Synthetic Trajectory Generation. In this study, we propose
various novel models for urban vehicle trajectory analytics using deep
learning.
| [
-0.006260382942855001,
-0.0054887384176250005,
0.011608212254941,
-0.017351929098367,
-0.000970426423009,
0.006753563880920001,
-0.031912520527839,
0.0011314651928840001,
-0.022880926728248003,
-0.036528963595628,
0.001996209844946,
0.026611659675836,
-0.010548040270805002,
0.0045124408788... |
For AI technology to fulfill its full promises, we must have effective means
to ensure Responsible AI behavior and curtail potential irresponsible use,
e.g., in areas of privacy protection, human autonomy, robustness, and
prevention of biases and discrimination in automated decision making. Recent
literature in the field has identified serious shortcomings of narrow
technology focused and formalism-oriented research and has proposed an
interdisciplinary approach that brings the social context into the scope of
study. In this paper, we take a sociotechnical approach to propose a more
expansive framework of thinking about the Responsible AI challenges in both
technical and social context. Effective solutions need to bridge the gap
between a technical system with the social system that it will be deployed to.
To this end, we propose human agency and regulation as main mechanisms of
intervention and propose a decentralized computational infrastructure, or a set
of public utilities, as the computational means to bridge this gap. A
decentralized infrastructure is uniquely suited for meeting this challenge and
enable technical solutions and social institutions in a mutually reinforcing
dynamic to achieve Responsible AI goals. Our approach is novel in its
sociotechnical approach and its aim in tackling the structural issues that
cannot be solved within the narrow confines of AI technical research. We then
explore possible features of the proposed infrastructure and discuss how it may
help solve example problems recently studied in the field.
| [
-0.000788573990575,
-0.005210855975747,
0.019108731299638002,
-0.020260676741600002,
0.003835298586636,
0.007379222661256001,
-0.024773590266704,
0.019664375111460002,
-0.010604668408632001,
-0.035615421831607,
0.017021678388118,
0.010150666348636001,
-0.004499360918998,
-0.004133448936045... |
Past research has identified discriminatory automatic speech recognition
(ASR) performance as a function of the racial group and nationality of the
speaker. In this paper, we expand the discussion beyond bias as a function of
the individual national origin of the speaker to look for bias as a function of
the geopolitical orientation of their nation of origin. We audit some of the
most popular English language ASR services using a large and global data set of
speech from The Speech Accent Archive, which includes over 2,700 speakers of
English born in 171 different countries. We show that, even when controlling
for multiple linguistic covariates, ASR service performance has a statistically
significant relationship to the political alignment of the speaker's birth
country with respect to the United States' geopolitical power. This holds for
all ASR services tested. We discuss this bias in the context of the historical
use of language to maintain global and political power.
| [
-0.017635330557823,
0.006366461049765001,
0.021623956039547,
-0.036391209810972006,
0.017662009224295002,
0.022357650101184002,
-0.008484167978167001,
0.009544689208269001,
-0.009664747864007001,
-0.038045357912778,
-0.008270729333162,
0.020196588709950003,
-0.026439655572175,
0.0134866256... |
This paper deals with symbolic time series representation. It builds up on
the popular mapping technique Symbolic Aggregate approXimation algorithm (SAX),
which is extensively utilized in sequence classification, pattern mining,
anomaly detection, time series indexing and other data mining tasks. However,
the disadvantage of this method is, that it works reliably only for time series
with Gaussian-like distribution. In our previous work we have proposed an
improvement of SAX, called dwSAX, which can deal with Gaussian as well as
non-Gaussian data distribution. Recently we have made further progress in our
solution - edwSAX. Our goal was to optimally cover the information space by
means of sufficient alphabet utilization; and to satisfy lower bounding
criterion as tight as possible. We describe here our approach, including
evaluation on commonly employed tasks such as time series reconstruction error
and Euclidean distance lower bounding with promising improvements over SAX.
| [
-0.007788143120706001,
0.004003317095339001,
0.002237769542261,
-0.020805971696972,
-0.022920399904251,
0.026120234280824002,
-0.02796683460474,
-0.007689469959586001,
-0.015308458358049,
-0.02118656784296,
0.006392620503902001,
0.028953567147254004,
0.011157131753861,
0.033041462302207,
... |
Transfer learning (TL) enables the transfer of knowledge gained in learning
to perform one task (source) to a related but different task (target), hence
addressing the expense of data acquisition and labeling, potential
computational power limitations, and dataset distribution mismatches. We
propose a new TL framework for task-specific learning (functional regression in
partial differential equations (PDEs)) under conditional shift based on the
deep operator network (DeepONet). Task-specific operator learning is
accomplished by fine-tuning task-specific layers of the target DeepONet using a
hybrid loss function that allows for the matching of individual target samples
while also preserving the global properties of the conditional distribution of
target data. Inspired by the conditional embedding operator theory, we minimize
the statistical distance between labeled target data and the surrogate
prediction on unlabeled target data by embedding conditional distributions onto
a reproducing kernel Hilbert space. We demonstrate the advantages of our
approach for various TL scenarios involving nonlinear PDEs under diverse
conditions due to shift in the geometric domain and model dynamics. Our TL
framework enables fast and efficient learning of heterogeneous tasks despite
significant differences between the source and target domains.
| [
0.00008090175833785906,
-0.020978542044758002,
0.024317637085914,
-0.0030907774344080003,
-0.013807233422994001,
0.015807872638106003,
0.00044754633563500005,
0.014568040147423002,
-0.026360545307397003,
-0.02234517596662,
0.018611587584018003,
0.040435470640659006,
-0.004469739738851001,
... |
What is the best way to exploit extra data -- be it unlabeled data from the
same task, or labeled data from a related task -- to learn a given task? This
paper formalizes the question using the theory of reference priors. Reference
priors are objective, uninformative Bayesian priors that maximize the mutual
information between the task and the weights of the model. Such priors enable
the task to maximally affect the Bayesian posterior, e.g., reference priors
depend upon the number of samples available for learning the task and for very
small sample sizes, the prior puts more probability mass on low-complexity
models in the hypothesis space. This paper presents the first demonstration of
reference priors for medium-scale deep networks and image-based data. We
develop generalizations of reference priors and demonstrate applications to two
problems. First, by using unlabeled data to compute the reference prior, we
develop new Bayesian semi-supervised learning methods that remain effective
even with very few samples per class. Second, by using labeled data from the
source task to compute the reference prior, we develop a new pretraining method
for transfer learning that allows data from the target task to maximally affect
the Bayesian posterior. Empirical validation of these methods is conducted on
image classification datasets. Code is available at
https://github.com/grasp-lyrl/deep_reference_priors.
| [
0.009683061391115001,
-0.017771586775779002,
0.011720525100827,
-0.010132802650332002,
0.008504194207489001,
0.00232025492005,
-0.003560450160875,
0.017703443765640002,
-0.015250310301780002,
-0.027856688946485002,
0.016885733231902,
0.018412126228213,
-0.011488839983940001,
0.011652382090... |
Automatic phonemic transcription tools are useful for low-resource language
documentation. However, due to the lack of training sets, only a tiny fraction
of languages have phonemic transcription tools. Fortunately, multilingual
acoustic modeling provides a solution given limited audio training data. A more
challenging problem is to build phonemic transcribers for languages with zero
training data. The difficulty of this task is that phoneme inventories often
differ between the training languages and the target language, making it
infeasible to recognize unseen phonemes. In this work, we address this problem
by adopting the idea of zero-shot learning. Our model is able to recognize
unseen phonemes in the target language without any training data. In our model,
we decompose phonemes into corresponding articulatory attributes such as vowel
and consonant. Instead of predicting phonemes directly, we first predict
distributions over articulatory attributes, and then compute phoneme
distributions with a customized acoustic model. We evaluate our model by
training it using 13 languages and testing it using 7 unseen languages. We find
that it achieves 7.7% better phoneme error rate on average over a standard
multilingual model.
| [
-0.023402292281389,
-0.009309424087405,
0.030868804082274003,
-0.019770668819546002,
0.019391246140003003,
0.041980490088462004,
-0.015000774525105,
0.002329049864783,
-0.017453476786613003,
-0.024621868506073,
0.029676329344511,
0.031519241631031,
-0.028050228953361,
0.0007935708272270001... |
Temporal information extraction plays a critical role in natural language
understanding. Previous systems have incorporated advanced neural language
models and have successfully enhanced the accuracy of temporal information
extraction tasks. However, these systems have two major shortcomings. First,
they fail to make use of the two-sided nature of temporal relations in
prediction. Second, they involve non-parallelizable pipelines in inference
process that bring little performance gain. To this end, we propose a novel
temporal information extraction model based on deep biaffine attention to
extract temporal relationships between events in unstructured text efficiently
and accurately. Our model is performant because we perform relation extraction
tasks directly instead of considering event annotation as a prerequisite of
relation extraction. Moreover, our architecture uses Multilayer Perceptrons
(MLP) with biaffine attention to predict arcs and relation labels separately,
improving relation detecting accuracy by exploiting the two-sided nature of
temporal relationships. We experimentally demonstrate that our model achieves
state-of-the-art performance in temporal relation extraction.
| [
-0.036057047545909,
0.002720474032685,
0.030654003843665,
-0.021391643211245003,
-0.010054899379611001,
0.01647101342678,
-0.014238123781979,
-0.005289332009851,
-0.0075739100575440005,
-0.046477206051349,
0.020220065489411,
0.031067503616213004,
-0.018235273659229,
0.011391877196729001,
... |
In today's technological era, document images play an important and integral
part in our day to day life, and specifically with the surge of Covid-19,
digitally scanned documents have become key source of communication, thus
avoiding any sort of infection through physical contact. Storage and
transmission of scanned document images is a very memory intensive task, hence
compression techniques are being used to reduce the image size before archival
and transmission. To extract information or to operate on the compressed
images, we have two ways of doing it. The first way is to decompress the image
and operate on it and subsequently compress it again for the efficiency of
storage and transmission. The other way is to use the characteristics of the
underlying compression algorithm to directly process the images in their
compressed form without involving decompression and re-compression. In this
paper, we propose a novel idea of developing an OCR for CCITT (The
International Telegraph and Telephone Consultative Committee) compressed
machine printed TIFF document images directly in the compressed domain. After
segmenting text regions into lines and words, HMM is applied for recognition
using three coding modes of CCITT- horizontal, vertical and the pass mode.
Experimental results show that OCR on pass modes give a promising results.
| [
-0.013235461898148,
0.014460718259215001,
-0.006718713324517,
-0.015457079745829001,
0.027601929381489,
0.032206740230321,
-0.005931048654019001,
-0.0045105591416350005,
-0.017072802409529002,
-0.032718382775783005,
0.023050976917147,
0.028382861986756002,
0.0062676575034850005,
-0.0101251... |
One advantage of decision tree based methods like random forests is their
ability to natively handle categorical predictors without having to first
transform them (e.g., by using feature engineering techniques). However, in
this paper, we show how this capability can lead to an inherent "absent levels"
problem for decision tree based methods that has never been thoroughly
discussed, and whose consequences have never been carefully explored. This
problem occurs whenever there is an indeterminacy over how to handle an
observation that has reached a categorical split which was determined when the
observation in question's level was absent during training. Although these
incidents may appear to be innocuous, by using Leo Breiman and Adele Cutler's
random forests FORTRAN code and the randomForest R package (Liaw and Wiener,
2002) as motivating case studies, we examine how overlooking the absent levels
problem can systematically bias a model. Furthermore, by using three real data
examples, we illustrate how absent levels can dramatically alter a model's
performance in practice, and we empirically demonstrate how some simple
heuristics can be used to help mitigate the effects of the absent levels
problem until a more robust theoretical solution is found.
| [
0.000522529997397,
-0.014885899610817,
0.000361833837814,
-0.004169968888163,
0.0030162092298260004,
0.028621463105082002,
0.008832938969135,
-0.01713179424405,
-0.025225231423974002,
-0.013112463988363,
0.023034114390611003,
0.0076141306199130005,
-0.045931283384561004,
0.016419680789113,... |
To date, there are no effective treatments for most neurodegenerative
diseases. Knowledge graphs can provide comprehensive and semantic
representation for heterogeneous data, and have been successfully leveraged in
many biomedical applications including drug repurposing. Our objective is to
construct a knowledge graph from literature to study relations between
Alzheimer's disease (AD) and chemicals, drugs and dietary supplements in order
to identify opportunities to prevent or delay neurodegenerative progression. We
collected biomedical annotations and extracted their relations using SemRep via
SemMedDB. We used both a BERT-based classifier and rule-based methods during
data preprocessing to exclude noise while preserving most AD-related semantic
triples. The 1,672,110 filtered triples were used to train with knowledge graph
completion algorithms (i.e., TransE, DistMult, and ComplEx) to predict
candidates that might be helpful for AD treatment or prevention. Among three
knowledge graph completion models, TransE outperformed the other two (MR =
13.45, Hits@1 = 0.306). We leveraged the time-slicing technique to further
evaluate the prediction results. We found supporting evidence for most highly
ranked candidates predicted by our model which indicates that our approach can
inform reliable new knowledge. This paper shows that our graph mining model can
predict reliable new relationships between AD and other entities (i.e., dietary
supplements, chemicals, and drugs). The knowledge graph constructed can
facilitate data-driven knowledge discoveries and the generation of novel
hypotheses.
| [
0.005248109344393,
0.0024172493722280004,
0.031190313398838,
-0.045537855476140005,
-0.018144626170396,
0.030946215614676004,
-0.022768927738070002,
-0.004787034820765,
-0.029210405424237,
-0.024165712296962003,
0.012618515640497001,
0.032492168247699,
0.001006904640235,
0.0116624645888800... |
Current top performing object recognition systems build on object proposals
as a preprocessing step. Object proposal algorithms are designed to generate
candidate regions for generic objects, yet current approaches are limited in
capturing the vast variety of object characteristics. In this paper we analyze
the error modes of the state-of-the-art Selective Search object proposal
algorithm and suggest extensions to broaden its feature diversity in order to
mitigate its error modes. We devise an edge grouping algorithm for handling
objects without clear boundaries. To further enhance diversity, we incorporate
the Edge Boxes proposal algorithm, which is based on fundamentally different
principles than Selective Search. The combination of segmentations and edges
provides rich image information and feature diversity which is essential for
obtaining high quality object proposals for generic objects. For a preset
amount of object proposals we achieve considerably better results by using our
combination of different strategies than using any single strategy alone.
| [
-0.007631989661604,
0.0033669515978540002,
-0.0009583668434060001,
-0.035168655216693004,
-0.024838911369442003,
0.025258252397179003,
-0.012342576868832,
0.025537811219692,
-0.013034488074481002,
-0.039054542779922,
0.011245303787291001,
0.015054309740662,
-0.019275667145848,
-0.005168366... |
Human pose estimation has recently made significant progress with the
adoption of deep convolutional neural networks. Its many applications have
attracted tremendous interest in recent years. However, many practical
applications require pose estimation for human crowds, which still is a rarely
addressed problem. In this work, we explore methods to optimize pose estimation
for human crowds, focusing on challenges introduced with dense crowds, such as
occlusions, people in close proximity to each other, and partial visibility of
people. In order to address these challenges, we evaluate three aspects of a
pose detection approach: i) a data augmentation method to introduce robustness
to occlusions, ii) the explicit detection of occluded body parts, and iii) the
use of the synthetic generated datasets. The first approach to improve the
accuracy in crowded scenarios is to generate occlusions at training time using
person and object cutouts from the object recognition dataset COCO (Common
Objects in Context). Furthermore, the synthetically generated dataset JTA
(Joint Track Auto) is evaluated for the use in real-world crowd applications.
In order to overcome the transfer gap of JTA originating from a low pose
variety and less dense crowds, an extension dataset is created to ease the use
for real-world applications. Additionally, the occlusion flags provided with
JTA are utilized to train a model, which explicitly distinguishes between
occluded and visible body parts in two distinct branches. The combination of
the proposed additions to the baseline method help to improve the overall
accuracy by 4.7% AP and thereby provide comparable results to current
state-of-the-art approaches on the respective dataset.
| [
-0.0024977577850220003,
0.005183831788599,
0.006159652490168001,
-0.007731236983090001,
0.013031482696533,
0.013593006879091001,
-0.0038176833186290005,
0.021639246493577003,
-0.025789050385355002,
-0.025720572099089,
0.0031517287716260004,
0.008422871120274001,
-0.017982486635446,
-0.0062... |
This paper considers the integration of rigid cooperative manipulation with
rigidity theory. Motivated by rigid models of cooperative manipulation systems,
i.e., where the grasping contacts are rigid, we introduce first the notion of
bearing and distance rigidity for graph frameworks in SE(3). Next, we associate
the nodes of these frameworks to the robotic agents of rigid cooperative
manipulation schemes and we express the object-agent interaction forces by
using the graph rigidity matrix, which encodes the infinitesimal rigid body
motions of the system. Moreover, we show that the associated cooperative
manipulation grasp matrix is related to the rigidity matrix via a
range-nullspace relation, based on which we provide novel results on the
relation between the arising interaction and internal forces and consequently
on the energy-optimal force distribution on a cooperative manipulation system.
Finally, simulation results on a realistic environment enhance the validity of
the theoretical findings.
| [
-0.005085689947009001,
-0.0042825015261760005,
-0.006832361686974001,
-0.017578950151801002,
0.000173943757545,
0.028395688161253003,
-0.020679468289017,
0.0065798307769,
-0.012268789112567001,
-0.041555348783731,
-0.00046209633001100003,
0.016975682228803,
0.008957829326391002,
0.01001004... |
As research and industry moves towards large-scale models capable of numerous
downstream tasks, the complexity of understanding multi-modal datasets that
give nuance to models rapidly increases. A clear and thorough understanding of
a dataset's origins, development, intent, ethical considerations and evolution
becomes a necessary step for the responsible and informed deployment of models,
especially those in people-facing contexts and high-risk domains. However, the
burden of this understanding often falls on the intelligibility, conciseness,
and comprehensiveness of the documentation. It requires consistency and
comparability across the documentation of all datasets involved, and as such
documentation must be treated as a user-centric product in and of itself. In
this paper, we propose Data Cards for fostering transparent, purposeful and
human-centered documentation of datasets within the practical contexts of
industry and research. Data Cards are structured summaries of essential facts
about various aspects of ML datasets needed by stakeholders across a dataset's
lifecycle for responsible AI development. These summaries provide explanations
of processes and rationales that shape the data and consequently the models,
such as upstream sources, data collection and annotation methods; training and
evaluation methods, intended use; or decisions affecting model performance. We
also present frameworks that ground Data Cards in real-world utility and
human-centricity. Using two case studies, we report on desirable
characteristics that support adoption across domains, organizational
structures, and audience groups. Finally, we present lessons learned from
deploying over 20 Data Cards.
| [
-0.022588290274143,
-0.0036623131018130002,
0.004407892469316,
-0.035069838166236,
-0.001984759699553,
0.010555469430983,
-0.012502259574830001,
0.021318044513463003,
-0.025915782898664003,
-0.024769799783825003,
0.008946951478719,
0.022615903988480002,
-0.022049816325306,
0.00894004758447... |
Ionic Polymer Metal Composites (IPMCs) are one of the most preferred choices
among biocompatible materials for industrial and biomedical applications.
Despite their advantages, some of their drawbacks include non-linear and
hysteretic behavior, which complicates the modeling process. In previous works,
usually autoregressive models were used to predict the behavior of an IPMC
actuator. The main drawback of using an autoregressive model is that it cannot
be used in mobile and real-time applications. In this study, we proposed a
hybrid analytical intelligent model for an IPMC actuator. The most outstanding
feature of this model is its non-autoregressive structure. The hybrid concept
proposed in this study can be generalized to various problems other than IPMCs.
The structure used in this work comprises an analytical model and a deep neural
network, providing a non-linear, dynamic, and non-autoregressive model for the
IPMC actuator. Lastly, the average NMSE achieved using the proposed hybrid
model is 9.5781e-04 showing a significant drop in the error rate compared to
other non-autoregressive structures.
| [
-0.043272826820611,
0.009157088585197001,
0.001397642539814,
-0.014014812186360002,
-0.006026788149029001,
0.006773593369871001,
-0.010650699026882001,
0.009631693363189,
-0.013547186739742001,
-0.029955962672829003,
0.021329315379261003,
0.027973787859082003,
0.010950816795229001,
0.01268... |
Implementing enterprise process automation often requires significant
technical expertise and engineering effort. It would be beneficial for
non-technical users to be able to describe a business process in natural
language and have an intelligent system generate the workflow that can be
automatically executed. A building block of process automations are If-Then
programs. In the consumer space, sites like IFTTT and Zapier allow users to
create automations by defining If-Then programs using a graphical interface. We
explore the efficacy of modeling If-Then programs as a sequence learning task.
We find Seq2Seq approaches have high potential (performing strongly on the
Zapier recipes) and can serve as a promising approach to more complex program
synthesis challenges.
| [
-0.037192735821008,
-0.020765943452715003,
-0.009958489798009,
-0.010726600885391001,
0.012559286318719,
0.027530709281563003,
-0.026816502213478,
0.002848410978913,
-0.004359365906566001,
-0.021884420886635003,
0.004625509493052,
0.019580088555812003,
0.001007303246296,
0.0019034325378010... |
The ability of reasoning beyond data fitting is substantial to deep learning
systems in order to make a leap forward towards artificial general
intelligence. A lot of efforts have been made to model neural-based reasoning
as an iterative decision-making process based on recurrent networks and
reinforcement learning. Instead, inspired by the consciousness prior proposed
by Yoshua Bengio, we explore reasoning with the notion of attentive awareness
from a cognitive perspective, and formulate it in the form of attentive message
passing on graphs, called neural consciousness flow (NeuCFlow). Aiming to
bridge the gap between deep learning systems and reasoning, we propose an
attentive computation framework with a three-layer architecture, which consists
of an unconsciousness flow layer, a consciousness flow layer, and an attention
flow layer. We implement the NeuCFlow model with graph neural networks (GNNs)
and conditional transition matrices. Our attentive computation greatly reduces
the complexity of vanilla GNN-based methods, capable of running on large-scale
graphs. We validate our model for knowledge graph reasoning by solving a series
of knowledge base completion (KBC) tasks. The experimental results show
NeuCFlow significantly outperforms previous state-of-the-art KBC methods,
including the embedding-based and the path-based. The reproducible code can be
found by the link below.
| [
-0.009468207135796,
0.007555086631327001,
0.020912146195769,
-0.008327291347086001,
0.028606368228793002,
-0.009871701709926,
-0.016932854428887003,
-0.013273577205836001,
-0.016445878893136,
-0.014678850769996001,
0.022011319175362,
0.022734828293323003,
-0.017795497551560003,
0.006087201... |
In multi-turn dialogue generation, responses are not only related to the
topic and background of the context but also related to words and phrases in
the sentences of the context. However, currently widely used hierarchical
dialog models solely rely on context representations from the utterance-level
encoder, ignoring the sentence representations output by the word-level
encoder. This inevitably results in a loss of information while decoding and
generating. In this paper, we propose a new dialog model X-ReCoSa to tackle
this problem which aggregates multi-scale context information for hierarchical
dialog models. Specifically, we divide the generation decoder into upper and
lower parts, namely the intention part and the generation part. Firstly, the
intention part takes context representations as input to generate the intention
of the response. Then the generation part generates words depending on sentence
representations. Therefore, the hierarchical information has been fused into
response generation. we conduct experiments on the English dataset DailyDialog.
Experimental results exhibit that our method outperforms baseline models on
both automatic metric-based and human-based evaluations.
| [
-0.006912226319999999,
-0.008738096800000001,
0.0314379297,
-0.0307515133,
-0.00523393508,
0.0209220108,
-0.015060003800000001,
0.00601301901,
-0.0260015018,
-0.0237775091,
0.029955267900000002,
0.0316026695,
0.0157601498,
-0.00214333925,
-0.010907176900000001,
-0.0183822662,
0.02273... |
Ultra Light OCR Competition is a Chinese scene text recognition competition
jointly organized by CSIG (China Society of Image and Graphics) and Baidu, Inc.
In addition to focusing on common problems in Chinese scene text recognition,
such as long text length and massive characters, we need to balance the
trade-off of model scale and accuracy since the model size limitation in the
competition is 10M.
From experiments in aspects of data, model, training, etc, we proposed a
general and effective method for Chinese scene text recognition, which got us
second place among over 100 teams with accuracy 0.817 in TestB dataset. The
code is available at https://aistudio.baidu.com/aistudio/projectdetail/2159102.
| [
-0.004201712086796001,
-0.015709832310676002,
0.02956317551434,
-0.0013923664810130002,
0.00869174208492,
0.027298822999,
-0.021841870620846002,
-0.0034861904568970004,
-0.028058294206857,
-0.038986261934041005,
0.030688321217894002,
0.029760075733065,
-0.041208423674106,
-0.01964783854782... |
Non-autoregressive translation (NAT) models have been extensively
investigated within the context of sentence-level machine translation (MT)
tasks, demonstrating comparable quality and superior translation speed when
contrasted with autoregressive translation (AT) models. However, the challenges
associated with multi-modality and alignment issues within NAT models become
more prominent when increasing input and output length, leading to unexpected
complications in document-level MT. In this paper, we conduct a comprehensive
examination of typical NAT models in the context of document-level MT tasks.
Experiments reveal that, although NAT models significantly accelerate text
generation on documents, they do not perform as effectively as on sentences. To
bridge this performance gap, we introduce a novel design that underscores the
importance of sentence-level alignment for non-autoregressive document-level
machine translation (NA-DMT). This innovation substantially reduces the
performance discrepancy. However, it is worth noting that NA-DMT models are
still far from perfect and may necessitate additional research to fully
optimize their performance. We delve into the related opportunities and
challenges and provide our code at https://github.com/baoguangsheng/nat-on-doc
to stimulate further research in this field.
| [
-0.0321429893,
-0.009806335900000001,
0.00600297563,
0.00720493263,
0.011290906,
0.024897195400000002,
-0.0317888707,
0.0131500233,
-0.0319795497,
-0.018128099999999998,
0.0193130337,
0.0405328535,
-0.0171202272,
0.00660565635,
0.0025945929799999997,
-0.00100617087,
0.0263000466,
-... |
We present an algorithm to compute planar linkage topology and geometry,
given a user-specified end-effector trajectory. Planar linkage structures
convert rotational or prismatic motions of a single actuator into an
arbitrarily complex periodic motion, \refined{which is an important component
when building low-cost, modular robots, mechanical toys, and foldable
structures in our daily lives (chairs, bikes, and shelves). The design of such
structures require trial and error even for experienced engineers. Our research
provides semi-automatic methods for exploring novel designs given high-level
specifications and constraints.} We formulate this problem as a non-smooth
numerical optimization with quadratic objective functions and non-convex
quadratic constraints involving mixed-integer decision variables (MIQCQP). We
propose and compare three approximate algorithms to solve this problem:
mixed-integer conic-programming (MICP), mixed-integer nonlinear programming
(MINLP), and simulated annealing (SA). We evaluated these algorithms searching
for planar linkages involving $10-14$ rigid links. Our results show that the
best performance can be achieved by combining MICP and MINLP, leading to a
hybrid algorithm capable of finding the planar linkages within a couple of
hours on a desktop machine, which significantly outperforms the SA baseline in
terms of optimality. We highlight the effectiveness of our optimized planar
linkages by using them as legs of a walking robot.
| [
-0.002554101403802,
0.007708484306931,
-0.002749477745965,
-0.021498501300811,
0.002971496433019,
0.0260596498847,
-0.018869800493121,
0.014159455895423001,
-0.014649672433733002,
-0.021526919677853,
0.012539608404040002,
0.019125565886497,
0.010145359672605,
0.024993961676955,
-0.009768... |
Learned image compression has exhibited promising compression performance,
but variable bitrates over a wide range remain a challenge. State-of-the-art
variable rate methods compromise the loss of model performance and require
numerous additional parameters. In this paper, we present a
Quantization-error-aware Variable Rate Framework (QVRF) that utilizes a
univariate quantization regulator a to achieve wide-range variable rates within
a single model. Specifically, QVRF defines a quantization regulator vector
coupled with predefined Lagrange multipliers to control quantization error of
all latent representation for discrete variable rates. Additionally, the
reparameterization method makes QVRF compatible with a round quantizer.
Exhaustive experiments demonstrate that existing fixed-rate VAE-based methods
equipped with QVRF can achieve wide-range continuous variable rates within a
single model without significant performance degradation. Furthermore, QVRF
outperforms contemporary variable-rate methods in rate-distortion performance
with minimal additional parameters.
| [
-0.038198892000000005,
-0.00031261926099999997,
0.0209295806,
-0.0059892172,
-0.000226186705,
0.013918652200000001,
-0.00707284966,
-0.0212598294,
-0.0282088351,
-0.0324470401,
0.00882042106,
0.00984557159,
-0.0023478695699999997,
-0.012714617000000001,
-0.00554888416,
-0.0197874662,
... |
Artificial neural networks have advanced the frontiers of reversible
steganography. The core strength of neural networks is the ability to render
accurate predictions for a bewildering variety of data. Residual modulation is
recognised as the most advanced reversible steganographic algorithm for digital
images. The pivot of this algorithm is predictive analytics in which pixel
intensities are predicted given some pixel-wise contextual information. This
task can be perceived as a low-level vision problem and hence neural networks
for addressing a similar class of problems can be deployed. On top of the prior
art, this paper investigates predictability of pixel intensities based on
supervised and unsupervised learning frameworks. Predictability analysis
enables adaptive data embedding, which in turn leads to a better trade-off
between capacity and imperceptibility. While conventional methods estimate
predictability by the statistics of local image patterns, learning-based
frameworks consider further the degree to which correct predictions can be made
by a designated predictor. Not only should the image patterns be taken into
account but also the predictor in use. Experimental results show that
steganographic performance can be significantly improved by incorporating the
learning-based predictability analysers into a reversible steganographic
system.
| [
-0.0027822717092930004,
-0.007368029560893,
-0.003473899792879,
0.011199125088751,
-0.00048282655188800004,
-0.000628156005404,
-0.017299460247159,
-0.006881263107061,
-0.022846493870019,
-0.018644196912646002,
0.027160853147506003,
0.04647741839289601,
-0.026264363899827003,
0.01050574518... |
Attribute-Based Access Control (ABAC) and Relationship-based access control
(ReBAC) provide a high level of expressiveness and flexibility that promote
security and information sharing, by allowing policies to be expressed in terms
of attributes of and chains of relationships between entities. Algorithms for
learning ABAC and ReBAC policies from legacy access control information have
the potential to significantly reduce the cost of migration to ABAC or ReBAC.
This paper presents the first algorithms for mining ABAC and ReBAC policies
from access control lists (ACLs) and incomplete information about entities,
where the values of some attributes of some entities are unknown. We show that
the core of this problem can be viewed as learning a concise three-valued logic
formula from a set of labeled feature vectors containing unknowns, and we give
the first algorithm (to the best of our knowledge) for that problem.
| [
-0.0037236036732790005,
-0.021194294095039,
0.022445924580097,
-0.053653270006179005,
-0.01614604704082,
0.019692335277795,
-0.013851388357579,
-0.006845728959888,
-0.028286872431635003,
-0.003057805355638,
0.019678428769111002,
-0.0032281661406150003,
0.0063763670623300005,
0.011591498740... |
We propose a general matrix-valued multiple kernel learning framework for
high-dimensional nonlinear multivariate regression problems. This framework
allows a broad class of mixed norm regularizers, including those that induce
sparsity, to be imposed on a dictionary of vector-valued Reproducing Kernel
Hilbert Spaces. We develop a highly scalable and eigendecomposition-free
algorithm that orchestrates two inexact solvers for simultaneously learning
both the input and output components of separable matrix-valued kernels. As a
key application enabled by our framework, we show how high-dimensional causal
inference tasks can be naturally cast as sparse function estimation problems,
leading to novel nonlinear extensions of a class of Graphical Granger Causality
techniques. Our algorithmic developments and extensive empirical studies are
complemented by theoretical analyses in terms of Rademacher generalization
bounds.
| [
-0.023673370480537,
-0.000924309948459,
0.019465692341327,
-0.014623410999774001,
-0.006635717581957,
0.012374716810882001,
-0.006125277839601001,
0.006670206785202,
-0.033909760415554005,
-0.031812816858291,
0.000878180668223,
0.016140934079885,
0.0038076052442190004,
0.025080529972910003... |
Modern deep learning techniques can be employed to generate effective feature
extractors for the task of iris recognition. The question arises: should we
train such structures from scratch on a relatively large iris image dataset, or
it is better to fine-tune the existing models to adapt them to a new domain? In
this work we explore five different sets of weights for the popular ResNet-50
architecture to find out whether iris-specific feature extractors perform
better than models trained for non-iris tasks. Features are extracted from each
convolutional layer and the classification accuracy achieved by a Support
Vector Machine is measured on a dataset that is disjoint from the samples used
in training of the ResNet-50 model. We show that the optimal training strategy
is to fine-tune an off-the-shelf set of weights to the iris recognition domain.
This approach results in greater accuracy than both off-the-shelf weights and a
model trained from scratch. The winning, fine-tuned approach also shows an
increase in performance when compared to previous work, in which only
off-the-shelf (not fine-tuned) models were used in iris feature extraction. We
make the best-performing ResNet-50 model, fine-tuned with more than 360,000
iris images, publicly available along with this paper.
| [
-0.007626557257026,
0.0051928381435570005,
0.008955272845923,
-0.005623314995318001,
-0.0074774157255880006,
0.019551102072,
-0.012202491052448,
-0.005084371659904,
-0.011090708896517,
-0.031292609870433,
0.027184439823031002,
0.030723161995410003,
-0.018005454912781,
0.004514921922236,
... |
In this paper, we propose two methods for tackling the problem of
cross-device matching for online advertising at CIKM Cup 2016. The first method
considers the matching problem as a binary classification task and solve it by
utilizing ensemble learning techniques. The second method defines the matching
problem as a ranking task and effectively solve it with using learning-to-rank
algorithms. The results show that the proposed methods obtain promising
results, in which the ranking-based method outperforms the classification-based
method for the task.
| [
-0.006819215137511001,
0.011895779520273,
0.047044847160577004,
-0.016107747331261,
0.01090670749545,
0.019485393539071,
-0.010173313319683,
-0.000459632603451,
-0.025433283299207,
-0.033265121281147,
0.004777151159942,
0.035122156143188005,
-0.012460963800549,
0.000776707602199,
-0.0107... |
For large libraries of small molecules, exhaustive combinatorial chemical
screens become infeasible to perform when considering a range of disease
models, assay conditions, and dose ranges. Deep learning models have achieved
state of the art results in silico for the prediction of synergy scores.
However, databases of drug combinations are biased towards synergistic agents
and these results do not necessarily generalise out of distribution. We employ
a sequential model optimization search utilising a deep learning model to
quickly discover synergistic drug combinations active against a cancer cell
line, requiring substantially less screening than an exhaustive evaluation. Our
small scale wet lab experiments only account for evaluation of ~5% of the total
search space. After only 3 rounds of ML-guided in vitro experimentation
(including a calibration round), we find that the set of drug pairs queried is
enriched for highly synergistic combinations; two additional rounds of
ML-guided experiments were performed to ensure reproducibility of trends.
Remarkably, we rediscover drug combinations later confirmed to be under study
within clinical trials. Moreover, we find that drug embeddings generated using
only structural information begin to reflect mechanisms of action. Prior in
silico benchmarking suggests we can enrich search queries by a factor of ~5-10x
for highly synergistic drug combinations by using sequential rounds of
evaluation when compared to random selection, or by a factor of >3x when using
a pretrained model selecting all drug combinations at a single time point.
| [
-0.029215618968009,
-0.002902654465287,
-0.006712169386446001,
-0.023977536708116,
-0.007654043845832001,
0.033445302397012,
0.016974750906229002,
-0.006617631763219001,
-0.036694593727588,
-0.014789882116019,
0.010420144535601,
0.043529313057661,
0.008291297592222,
0.029943909496068004,
... |
We present the application of Restricted Boltzmann Machines (RBMs) to the
task of astronomical image classification using a quantum annealer built by
D-Wave Systems. Morphological analysis of galaxies provides critical
information for studying their formation and evolution across cosmic time
scales. We compress galaxy images using principal component analysis to fit a
representation on the quantum hardware. Then, we train RBMs with discriminative
and generative algorithms, including contrastive divergence and hybrid
generative-discriminative approaches, to classify different galaxy
morphologies. The methods we compare include Quantum Annealing (QA), Markov
Chain Monte Carlo (MCMC) Gibbs Sampling, and Simulated Annealing (SA) as well
as machine learning algorithms like gradient boosted decision trees. We find
that RBMs implemented on D-Wave hardware perform well, and that they show some
classification performance advantages on small datasets, but they don't offer a
broadly strategic advantage for this task. During this exploration, we analyzed
the steps required for Boltzmann sampling with the D-Wave 2000Q, including a
study of temperature estimation, and examined the impact of qubit noise by
comparing and contrasting the original D-Wave 2000Q to the lower-noise version
recently made available. While these analyses ultimately had minimal impact on
the performance of the RBMs, we include them for reference.
| [
-0.020906701683998,
-0.002256277948617,
-0.00632165884599,
-0.018512701615691,
-0.020253792405128,
0.016390746459364003,
-0.016880428418517,
-0.014023949392139001,
-0.027571819722652,
-0.031611695885658,
-0.0059509971179060005,
0.033788058906793005,
-0.009161135181784,
-0.001490299706347,
... |
The text-independent approach to writer identification does not require the
writer to write some predetermined text. Previous research on text-independent
writer identification has been based on identifying writer-specific features
designed by experts. However, in the last decade, deep learning methods have
been successfully applied to learn features from data automatically. We propose
here an end-to-end deep-learning method for text-independent writer
identification that does not require prior identification of features. A
Convolutional Neural Network (CNN) is trained initially to extract local
features, which represent characteristics of individual handwriting in the
whole character images and their sub-regions. Randomly sampled tuples of images
from the training set are used to train the CNN and aggregate the extracted
local features of images from the tuples to form global features. For every
training epoch, the process of randomly sampling tuples is repeated, which is
equivalent to a large number of training patterns being prepared for training
the CNN for text-independent writer identification. We conducted experiments on
the JEITA-HP database of offline handwritten Japanese character patterns. With
200 characters, our method achieved an accuracy of 99.97% to classify 100
writers. Even when using 50 characters for 100 writers or 100 characters for
400 writers, our method achieved accuracy levels of 92.80% or 93.82%,
respectively. We conducted further experiments on the Firemaker and IAM
databases of offline handwritten English text. Using only one page per writer
to train, our method achieved over 91.81% accuracy to classify 900 writers.
Overall, we achieved a better performance than the previously published best
result based on handcrafted features and clustering algorithms, which
demonstrates the effectiveness of our method for handwritten English text also.
| [
-0.019247790798544002,
0.014272726140916,
0.0007467694231300001,
-0.00659943697974,
0.004156081937253001,
0.0007310524233610001,
-0.015387358143925,
0.000201772170839,
-0.022292640060186,
-0.009698657318949,
0.007761644665151001,
0.050838094204664,
-0.029089175164699003,
0.001522424165159,... |
It is by now well-known that small adversarial perturbations can induce
classification errors in deep neural networks. In this paper, we take a
bottom-up signal processing perspective to this problem and show that a
systematic exploitation of sparsity in natural data is a promising tool for
defense. For linear classifiers, we show that a sparsifying front end is
provably effective against $\ell_{\infty}$-bounded attacks, reducing output
distortion due to the attack by a factor of roughly $K/N$ where $N$ is the data
dimension and $K$ is the sparsity level. We then extend this concept to deep
networks, showing that a "locally linear" model can be used to develop a
theoretical foundation for crafting attacks and defenses. We also devise
attacks based on the locally linear model that outperform the well-known FGSM
attack. We supplement our theoretical results with experiments on the MNIST and
CIFAR-10 datasets, showing the efficacy of the proposed sparsity-based defense
schemes.
| [
-0.013756999745965,
0.023106072098016003,
0.006117776967585,
-0.019508633762598003,
-0.00471719354391,
0.008090679533779,
-0.010209328494966,
-0.0009509036899540001,
-0.010109795257449001,
-0.043226126581430005,
0.054772052913904,
0.029860153794288004,
-0.016764342784881002,
0.017901873216... |
The localization of objects is a crucial task in various applications such as
robotics, virtual and augmented reality, and the transportation of goods in
warehouses. Recent advances in deep learning have enabled the localization
using monocular visual cameras. While structure from motion (SfM) predicts the
absolute pose from a point cloud, absolute pose regression (APR) methods learn
a semantic understanding of the environment through neural networks. However,
both fields face challenges caused by the environment such as motion blur,
lighting changes, repetitive patterns, and feature-less structures. This study
aims to address these challenges by incorporating additional information and
regularizing the absolute pose using relative pose regression (RPR) methods.
The optical flow between consecutive images is computed using the Lucas-Kanade
algorithm, and the relative pose is predicted using an auxiliary small
recurrent convolutional network. The fusion of absolute and relative poses is a
complex task due to the mismatch between the global and local coordinate
systems. State-of-the-art methods fusing absolute and relative poses use pose
graph optimization (PGO) to regularize the absolute pose predictions using
relative poses. In this work, we propose recurrent fusion networks to optimally
align absolute and relative pose predictions to improve the absolute pose
prediction. We evaluate eight different recurrent units and construct a
simulation environment to pre-train the APR and RPR networks for better
generalized training. Additionally, we record a large database of different
scenarios in a challenging large-scale indoor environment that mimics a
warehouse with transportation robots. We conduct hyperparameter searches and
experiments to show the effectiveness of our recurrent fusion method compared
to PGO.
| [
0.0116896136,
0.0009706554119999999,
-0.008064441379999999,
-0.00591438776,
0.006109214389999999,
0.00520466128,
0.00260059116,
-0.0017508327699999999,
-0.0122253876,
-0.0288622119,
0.00280237617,
0.025689316900000002,
0.0108476831,
0.0252161659,
-0.00832189154,
-0.0038060825299999997,... |
The problem of optical character recognition, OCR, has been widely discussed
in the literature. Having a hand-written text, the program aims at recognizing
the text. Even though there are several approaches to this issue, it is still
an open problem. In this paper we would like to propose an approach that uses
K-nearest neighbors algorithm, and has the accuracy of more than 90%. The
training and run time is also very short.
| [
-0.001516920165158,
0.0009804076980790002,
-0.003219074802473,
-0.005530333612114,
0.017809210345149002,
0.02035910449922,
-0.004872834775596,
-0.0024063794407990003,
-0.037674356251955005,
-0.017916012555360003,
0.015993578359484003,
0.009031432680785,
-0.032868273556232,
-0.0005093947984... |
This paper aims to discuss a method of quantifying the 'shape' of data, via a
methodology called topological data analysis. The main tool within topological
data analysis is persistent homology; this is a means of measuring the shape of
data, from the homology of a simplicial complex, calculated over a range of
values. The required background theory and a method of computing persistent
homology is presented here, with applications specific to structural health
monitoring. These results allow for topological inference and the ability to
deduce features in higher-dimensional data, that might otherwise be overlooked.
A simplicial complex is constructed for data for a given distance parameter.
This complex encodes information about the local proximity of data points. A
singular homology value can be calculated from this simplicial complex.
Extending this idea, the distance parameter is given for a range of values, and
the homology is calculated over this range. The persistent homology is a
representation of how the homological features of the data persist over this
interval. The result is characteristic to the data. A method that allows for
the comparison of the persistent homology for different data sets is also
discussed.
| [
0.00136521202512,
0.043991897255182,
0.005079455208033001,
-0.012974280864000001,
0.012627560645341,
0.013203117065131002,
-0.00043773461948100003,
0.004975439049303,
-0.006410861853510001,
-0.043714519590139,
0.008328226394951,
0.011559661477804,
0.005540593527257,
0.006636230275034001,
... |
We consider the problem of service placement at the network edge, in which a
decision maker has to choose between $N$ services to host at the edge to
satisfy the demands of customers. Our goal is to design adaptive algorithms to
minimize the average service delivery latency for customers. We pose the
problem as a Markov decision process (MDP) in which the system state is given
by describing, for each service, the number of customers that are currently
waiting at the edge to obtain the service. However, solving this $N$-services
MDP is computationally expensive due to the curse of dimensionality. To
overcome this challenge, we show that the optimal policy for a single-service
MDP has an appealing threshold structure, and derive explicitly the Whittle
indices for each service as a function of the number of requests from customers
based on the theory of Whittle index policy.
Since request arrival and service delivery rates are usually unknown and
possibly time-varying, we then develop efficient learning augmented algorithms
that fully utilize the structure of optimal policies with a low learning
regret. The first of these is UCB-Whittle, and relies upon the principle of
optimism in the face of uncertainty. The second algorithm, Q-learning-Whittle,
utilizes Q-learning iterations for each service by using a two time scale
stochastic approximation. We characterize the non-asymptotic performance of
UCB-Whittle by analyzing its learning regret, and also analyze the convergence
properties of Q-learning-Whittle. Simulation results show that the proposed
policies yield excellent empirical performance.
| [
-0.0076626650989050004,
-0.007592041511088001,
0.015212332829833001,
0.004368072375655,
-0.008785581216216,
0.017754783853888,
-0.011970707215368002,
0.011342156678438001,
-0.0231080558151,
-0.021963952109217002,
0.014675593003630001,
0.034097094088792,
-0.005897074006497,
0.02511376701295... |
In recent years, event cameras (DVS - Dynamic Vision Sensors) have been used
in vision systems as an alternative or supplement to traditional cameras. They
are characterised by high dynamic range, high temporal resolution, low latency,
and reliable performance in limited lighting conditions -- parameters that are
particularly important in the context of advanced driver assistance systems
(ADAS) and self-driving cars. In this work, we test whether these rather novel
sensors can be applied to the popular task of traffic sign detection. To this
end, we analyse different representations of the event data: event frame, event
frequency, and the exponentially decaying time surface, and apply video frame
reconstruction using a deep neural network called FireNet. We use the deep
convolutional neural network YOLOv4 as a detector. For particular
representations, we obtain a detection accuracy in the range of 86.9-88.9%
mAP@0.5. The use of a fusion of the considered representations allows us to
obtain a detector with higher accuracy of 89.9% mAP@0.5. In comparison, the
detector for the frames reconstructed with FireNet is characterised by an
accuracy of 72.67% mAP@0.5. The results obtained illustrate the potential of
event cameras in automotive applications, either as standalone sensors or in
close cooperation with typical frame-based cameras.
| [
-0.021686982363462,
-0.001086722593754,
0.003956958651542,
-0.008551371283829,
-0.008558152243494,
0.002405708888545,
-0.019706808030605,
0.003248300403356,
-0.002451483393087,
-0.023016139864921,
0.026433976367115003,
0.042560193687677,
-0.026135593652725,
0.008931130170822001,
-0.00260... |
Driving behavior monitoring plays a crucial role in managing road safety and
decreasing the risk of traffic accidents. Driving behavior is affected by
multiple factors like vehicle characteristics, types of roads, traffic, but,
most importantly, the pattern of driving of individuals. Current work performs
a robust driving pattern analysis by capturing variations in driving patterns.
It forms consistent groups by learning compressed representation of time series
(Auto Encoded Compact Sequence) using a multi-layer seq-2-seq autoencoder and
exploiting hierarchical clustering along with recommending the choice of best
distance measure. Consistent groups aid in identifying variations in driving
patterns of individuals captured in the dataset. These groups are generated for
both train and hidden test data. The consistent groups formed using train data,
are exploited for training multiple instances of the classifier. Obtained
choice of best distance measure is used to select the best train-test pair of
consistent groups. We have experimented on the publicly available UAH-DriveSet
dataset considering the signals captured from IMU sensors (accelerometer and
gyroscope) for classifying driving behavior. We observe proposed method,
significantly outperforms the benchmark performance.
| [
-0.024574132636189003,
0.0036059869453310004,
0.021218134090304,
-0.038080316036939,
-0.007150332909077001,
0.018916876986622002,
0.00547575764358,
0.012280217371881001,
-0.008403696119785,
-0.038546048104763,
-0.017232028767466,
0.045121066272258,
0.0065099536441260005,
-0.002486178884282... |
Designing effective rehabilitation strategies for upper extremities,
particularly hands and fingers, warrants the need for a computational model of
human motor learning. The presence of large degrees of freedom (DoFs) available
in these systems makes it difficult to balance the trade-off between learning
the full dexterity and accomplishing manipulation goals. The motor learning
literature argues that humans use motor synergies to reduce the dimension of
control space. Using the low-dimensional space spanned by these synergies, we
develop a computational model based on the internal model theory of motor
control. We analyze the proposed model in terms of its convergence properties
and fit it to the data collected from human experiments. We compare the
performance of the fitted model to the experimental data and show that it
captures human motor learning behavior well.
| [
-0.005878658499568001,
0.008455698378384,
0.009139264002442,
-0.023295894265174002,
-0.011832509189844001,
0.030486997216939003,
-0.002131013665348,
0.025743056088685,
-0.02530557475984,
-0.020794047042727002,
0.007054390385746001,
0.021805722266435002,
-0.010219296440482,
0.02053429186344... |
We study the problem of real-time scheduling in a multi-hop millimeter-wave
(mmWave) mesh. We develop a model-free deep reinforcement learning algorithm
called Adaptive Activator RL (AARL), which determines the subset of mmWave
links that should be activated during each time slot and the power level for
each link. The most important property of AARL is its ability to make
scheduling decisions within the strict time slot constraints of typical 5G
mmWave networks. AARL can handle a variety of network topologies, network
loads, and interference models, it can also adapt to different workloads. We
demonstrate the operation of AARL on several topologies: a small topology with
10 links, a moderately-sized mesh with 48 links, and a large topology with 96
links. We show that for each topology, we compare the throughput obtained by
AARL to that of a benchmark algorithm called RPMA (Residual Profit Maximizer
Algorithm). The most important advantage of AARL compared to RPMA is that it is
much faster and can make the necessary scheduling decisions very rapidly during
every time slot, while RPMA cannot. In addition, the quality of the scheduling
decisions made by AARL outperforms those made by RPMA.
| [
-0.001735394704155,
-0.011278753168880001,
-0.006006933748722,
-0.0008567581535310001,
0.007771207951009,
0.008247282356023001,
-0.020443176850676002,
-0.00416214717552,
-0.038674011826515,
-0.033941276371479,
0.013897160068154,
0.020751224830746002,
-0.0038961055688560005,
-0.002354115946... |
In recent years, advances in the development of whole-slide images have laid
a foundation for the utilization of digital images in pathology. With the
assistance of computer images analysis that automatically identifies tissue or
cell types, they have greatly improved the histopathologic interpretation and
diagnosis accuracy. In this paper, the Convolutional Neutral Network (CNN) has
been adapted to predict and classify lymph node metastasis in breast cancer.
Unlike traditional image cropping methods that are only suitable for large
resolution images, we propose a novel data augmentation method named Random
Center Cropping (RCC) to facilitate small resolution images. RCC enriches the
datasets while retaining the image resolution and the center area of images. In
addition, we reduce the downsampling scale of the network to further facilitate
small resolution images better. Moreover, Attention and Feature Fusion (FF)
mechanisms are employed to improve the semantic information of images.
Experiments demonstrate that our methods boost performances of basic CNN
architectures. And the best-performed method achieves an accuracy of 97.96% and
an AUC of 99.68% on RPCam datasets, respectively.
| [
-0.036647677421569005,
0.014031523838639,
-0.0042243986390530005,
-0.015933182090520002,
0.020402079448103003,
-0.001275129965506,
-0.023444732651114002,
-0.019030168652534003,
-0.037163842469453,
-0.011396368034183,
0.022806320339441,
0.025251308456063003,
-0.017128510400652,
0.0073553435... |
Localization is an essential component for autonomous robots. A
well-established localization approach combines ray casting with a particle
filter, leading to a computationally expensive algorithm that is difficult to
run on resource-constrained mobile robots. We present a novel data structure
called the Compressed Directional Distance Transform for accelerating ray
casting in two dimensional occupancy grid maps. Our approach allows online map
updates, and near constant time ray casting performance for a fixed size map,
in contrast with other methods which exhibit poor worst case performance. Our
experimental results show that the proposed algorithm approximates the
performance characteristics of reading from a three dimensional lookup table of
ray cast solutions while requiring two orders of magnitude less memory and
precomputation. This results in a particle filter algorithm which can maintain
2500 particles with 61 ray casts per particle at 40Hz, using a single CPU
thread onboard a mobile robot.
| [
-0.00027670330018700004,
0.030193792656064002,
-0.020236862823367,
-0.011354270391166,
0.007109585218131001,
0.015995688736438002,
-0.016473172232508,
-0.01128405239433,
-0.028073206543922,
-0.029632048681378004,
0.023677552118897,
0.022891107946634,
-0.007997844368219001,
0.00568415690213... |
We connect learning algorithms and algorithms automating proof search in
propositional proof systems: for every sufficiently strong, well-behaved
propositional proof system $P$, we prove that the following statements are
equivalent,
1. Provable learning: $P$ proves efficiently that p-size circuits are
learnable by subexponential-size circuits over the uniform distribution with
membership queries.
2. Provable automatability: $P$ proves efficiently that $P$ is automatable by
non-uniform circuits on propositional formulas expressing p-size circuit lower
bounds.
Here, $P$ is sufficiently strong and well-behaved if I.-III. holds: I. $P$
p-simulates Je\v{r}\'abek's system $WF$ (which strengthens the Extended Frege
system $EF$ by a surjective weak pigeonhole principle); II. $P$ satisfies some
basic properties of standard proof systems which p-simulate $WF$; III. $P$
proves efficiently for some Boolean function $h$ that $h$ is hard on average
for circuits of subexponential size. For example, if III. holds for $P=WF$,
then Items 1 and 2 are equivalent for $P=WF$.
If there is a function $h\in NE\cap coNE$ which is hard on average for
circuits of size $2^{n/4}$, for each sufficiently big $n$, then there is an
explicit propositional proof system $P$ satisfying properties I.-III., i.e. the
equivalence of Items 1 and 2 holds for $P$.
| [
0.008436185307800001,
-0.0017190523212770002,
0.008566183038055,
0.004669664427638,
-0.019636537879705002,
0.007450937293469,
0.0018165508517990002,
0.0027915358077730003,
-0.018596554175019,
-0.039190970361232,
0.023536477237939002,
0.017734462395310003,
0.0013649788452310002,
0.004392563... |
This paper tackles the unsupervised depth estimation task in indoor
environments. The task is extremely challenging because of the vast areas of
non-texture regions in these scenes. These areas could overwhelm the
optimization process in the commonly used unsupervised depth estimation
framework proposed for outdoor environments. However, even when those regions
are masked out, the performance is still unsatisfactory. In this paper, we
argue that the poor performance suffers from the non-discriminative point-based
matching. To this end, we propose P$^2$Net. We first extract points with large
local gradients and adopt patches centered at each point as its representation.
Multiview consistency loss is then defined over patches. This operation
significantly improves the robustness of the network training. Furthermore,
because those textureless regions in indoor scenes (e.g., wall, floor, roof,
\etc) usually correspond to planar regions, we propose to leverage superpixels
as a plane prior. We enforce the predicted depth to be well fitted by a plane
within each superpixel. Extensive experiments on NYUv2 and ScanNet show that
our P$^2$Net outperforms existing approaches by a large margin. Code is
available at \url{https://github.com/svip-lab/Indoor-SfMLearner}.
| [
0.012329151853919001,
0.0025738154072310004,
0.033101398497819005,
0.021876556798815002,
0.006479095201939001,
0.016285104677081,
0.0045640231110150005,
-0.008876430802047001,
-0.021764727309346,
-0.021401284262537002,
0.025636808946728002,
0.020464714616537,
-0.010463004931807001,
0.02198... |
Spiking neural networks are nature's versatile solution to fault-tolerant and
energy efficient signal processing. To translate these benefits into hardware,
a growing number of neuromorphic spiking neural network processors attempt to
emulate biological neural networks. These developments have created an imminent
need for methods and tools to enable such systems to solve real-world signal
processing problems. Like conventional neural networks, spiking neural networks
can be trained on real, domain specific data. However, their training requires
overcoming a number of challenges linked to their binary and dynamical nature.
This article elucidates step-by-step the problems typically encountered when
training spiking neural networks, and guides the reader through the key
concepts of synaptic plasticity and data-driven learning in the spiking
setting. To that end, it gives an overview of existing approaches and provides
an introduction to surrogate gradient methods, specifically, as a particularly
flexible and efficient method to overcome the aforementioned challenges.
| [
-0.013516809791326,
-0.0032074078917500005,
0.000250820332439,
-0.012238657101988001,
0.017949113622307,
0.016519783064723,
0.018086550757288003,
0.003748561255633,
-0.044529195874929005,
-0.050851244479417,
0.021412495523691,
0.030593207105994003,
-0.027762029320001002,
0.0179078839719290... |
There are many computer vision applications including object segmentation,
classification, object detection, and reconstruction for which machine learning
(ML) shows state-of-the-art performance. Nowadays, we can build ML tools for
such applications with real-world accuracy. However, each tool works well
within the domain in which it has been trained and developed. Often, when we
train a model on a dataset in one specific domain and test on another unseen
domain known as an out of distribution (OOD) dataset, models or ML tools show a
decrease in performance. For instance, when we train a simple classifier on
real-world images and apply that model on the same classes but with a different
domain like cartoons, paintings or sketches then the performance of ML tools
disappoints. This presents serious challenges of domain generalisation (DG),
domain adaptation (DA), and domain shifting. To enhance the power of ML tools,
we can rebuild and retrain models from scratch or we can perform transfer
learning. In this paper, we present a comparison study between vision-based
technologies for domain-specific and domain-generalised methods. In this
research we highlight that simple convolutional neural network (CNN) based deep
learning methods perform poorly when they have to tackle domain shifting.
Experiments are conducted on two popular vision-based benchmarks, PACS and
Office-Home. We introduce an implementation pipeline for domain generalisation
methods and conventional deep learning models. The outcome confirms that
CNN-based deep learning models show poor generalisation compare to other
extensive methods.
| [
-0.0096648465842,
-0.010889872908592,
0.022443018853664003,
0.003138706320896,
0.014104720205068002,
0.018503986299037,
-0.011776493862271,
0.008561646565794001,
-0.025678170844912,
-0.030754245817661,
0.0033772818278520003,
0.026679851114749003,
-0.011614060029387,
-0.012548057362437,
-... |
In this position paper, I argue that standardized tests for elementary
science such as SAT or Regents tests are not very good benchmarks for measuring
the progress of artificial intelligence systems in understanding basic science.
The primary problem is that these tests are designed to test aspects of
knowledge and ability that are challenging for people; the aspects that are
challenging for AI systems are very different. In particular, standardized
tests do not test knowledge that is obvious for people; none of this knowledge
can be assumed in AI systems. Individual standardized tests also have specific
features that are not necessarily appropriate for an AI benchmark. I analyze
the Physics subject SAT in some detail and the New York State Regents Science
test more briefly. I also argue that the apparent advantages offered by using
standardized tests are mostly either minor or illusory. The one major real
advantage is that the significance is easily explained to the public; but I
argue that even this is a somewhat mixed blessing. I conclude by arguing that,
first, more appropriate collections of exam style problems could be assembled,
and second, that there are better kinds of benchmarks than exam-style problems.
In an appendix I present a collection of sample exam-style problems that test
kinds of knowledge missing from the standardized tests.
| [
0.0005457349470810001,
0.0049066077917810005,
0.023231284692883002,
-0.018291298300027,
0.012630342505872002,
-0.0018458190606900002,
-0.020561022683978,
-0.007616924121975001,
-0.010106944479048,
-0.020721238106489,
0.012336613610386,
0.012423397041857001,
-0.000829033087939,
0.0096797021... |
Panel count data describes aggregated counts of recurrent events observed at
discrete time points. To understand dynamics of health behaviors, the field of
quantitative behavioral research has evolved to increasingly rely upon panel
count data collected via multiple self reports, for example, about frequencies
of smoking using in-the-moment surveys on mobile devices. However, missing
reports are common and present a major barrier to downstream statistical
learning. As a first step, under a missing completely at random assumption
(MCAR), we propose a simple yet widely applicable functional EM algorithm to
estimate the counting process mean function, which is of central interest to
behavioral scientists. The proposed approach wraps several popular panel count
inference methods, seamlessly deals with incomplete counts and is robust to
misspecification of the Poisson process assumption. Theoretical analysis of the
proposed algorithm provides finite-sample guarantees by expanding parametric EM
theory to our general non-parametric setting. We illustrate the utility of the
proposed algorithm through numerical experiments and an analysis of smoking
cessation data. We also discuss useful extensions to address deviations from
the MCAR assumption and covariate effects.
| [
-0.016320712864398002,
0.0032476289197800002,
-0.009185560978949,
-0.015935400500893,
-0.022375613451004,
0.010362138040363001,
0.002019447274506,
-0.019265595823526,
-0.013974437490105001,
-0.008552548475563,
-0.005693671759217001,
0.022320568561553,
-0.008745204657316001,
-0.001170556992... |
This paper considers the multi-armed bandit (MAB) problem and provides a new
best-of-both-worlds (BOBW) algorithm that works nearly optimally in both
stochastic and adversarial settings. In stochastic settings, some existing BOBW
algorithms achieve tight gap-dependent regret bounds of $O(\sum_{i: \Delta_i>0}
\frac{\log T}{\Delta_i})$ for suboptimality gap $\Delta_i$ of arm $i$ and time
horizon $T$. As Audibert et al. [2007] have shown, however, that the
performance can be improved in stochastic environments with low-variance arms.
In fact, they have provided a stochastic MAB algorithm with
gap-variance-dependent regret bounds of $O(\sum_{i: \Delta_i>0}
(\frac{\sigma_i^2}{\Delta_i} + 1) \log T )$ for loss variance $\sigma_i^2$ of
arm $i$. In this paper, we propose the first BOBW algorithm with
gap-variance-dependent bounds, showing that the variance information can be
used even in the possibly adversarial environment. Further, the leading
constant factor in our gap-variance dependent bound is only (almost) twice the
value for the lower bound. Additionally, the proposed algorithm enjoys multiple
data-dependent regret bounds in adversarial settings and works well in
stochastic settings with adversarial corruptions. The proposed algorithm is
based on the follow-the-regularized-leader method and employs adaptive learning
rates that depend on the empirical prediction error of the loss, which leads to
gap-variance-dependent regret bounds reflecting the variance of the arms.
| [
-0.018857683986425,
-0.029238443821668004,
0.001013583154417,
-0.007545853033661001,
-0.013945236802101002,
0.030961621552705,
-0.011353520676493001,
0.005315449088811,
-0.054863773286342,
-0.047859884798526,
0.00690660951659,
0.022734835743904003,
-0.002339839702472,
-0.001557287643663000... |
We propose a Text-to-Speech method to create an unseen expressive style using
one utterance of expressive speech of around one second. Specifically, we
enhance the disentanglement capabilities of a state-of-the-art
sequence-to-sequence based system with a Variational AutoEncoder (VAE) and a
Householder Flow. The proposed system provides a 22% KL-divergence reduction
while jointly improving perceptual metrics over state-of-the-art. At synthesis
time we use one example of expressive style as a reference input to the encoder
for generating any text in the desired style. Perceptual MUSHRA evaluations
show that we can create a voice with a 9% relative naturalness improvement over
standard Neural Text-to-Speech, while also improving the perceived emotional
intensity (59 compared to the 55 of neutral speech).
| [
-0.031958989799022,
-0.0033897475805130003,
0.021583415567874003,
-0.0015683000674470001,
0.033540293574333004,
0.009335243143141,
-0.023872144520282003,
0.001365435426123,
-0.023830531165003003,
-0.024135695770382003,
-0.005347304977476,
0.034539014101028005,
-0.004723106045275,
0.0022956... |
Binary Knapsack Problem (BKP) is to select a subset of an element (item) set
with the highest value while keeping the total weight within the capacity of
the knapsack. This paper presents an integer programming model for a variation
of BKP where the value of each element may depend on selecting or ignoring
other elements. Strengths of such Value-Related Dependencies are assumed to be
imprecise and hard to specify. To capture this imprecision, we have proposed
modeling value-related dependencies using fuzzy graphs and their algebraic
structure.
| [
0.018717383965849002,
-0.012957126833498001,
0.019159417599439,
-0.019877724349498003,
-0.021714927628636003,
0.01638289168477,
-0.015457382425665002,
-0.030445102602243004,
-0.019380435347557002,
-0.040722396224737,
0.000864211353473,
0.012763736769557001,
0.008488437160849,
0.00351209961... |
This paper presents a hybrid morphological neural network for regression
tasks called linear dilation-erosion regressor ($\ell$-DER). An $\ell$-DER is
given by a convex combination of the composition of linear and morphological
operators. They yield continuous piecewise linear functions and, thus, are
universal approximators. Besides introducing the $\ell$-DER model, we formulate
their training as a difference of convex (DC) programming problem. Precisely,
an $\ell$-DER is trained by minimizing the least-squares using the
convex-concave procedure (CCP). Computational experiments using several
regression tasks confirm the efficacy of the proposed regressor, outperforming
other hybrid morphological models and state-of-the-art approaches such as the
multilayer perceptron network and the radial-basis support vector regressor.
| [
-0.011304439976811001,
0.028216212987899003,
0.0006417876575140001,
-0.014266935177147002,
-0.0034268957097080004,
0.026282649487257,
-0.00039707103860500004,
-0.008376472629606,
-0.013714488595724002,
-0.019528988748788,
0.015275150537490002,
0.042593639343976,
-0.0024704723618920003,
0.0... |
Decentralized optimization over time-varying graphs has been increasingly
common in modern machine learning with massive data stored on millions of
mobile devices, such as in federated learning. This paper revisits the widely
used accelerated gradient tracking and extends it to time-varying graphs. We
prove the $O((\frac{\gamma}{1-\sigma_{\gamma}})^2\sqrt{\frac{L}{\epsilon}})$
and
$O((\frac{\gamma}{1-\sigma_{\gamma}})^{1.5}\sqrt{\frac{L}{\mu}}\log\frac{1}{\epsilon})$
complexities for the practical single loop accelerated gradient tracking over
time-varying graphs when the problems are nonstrongly convex and strongly
convex, respectively, where $\gamma$ and $\sigma_{\gamma}$ are two common
constants charactering the network connectivity, $\epsilon$ is the desired
precision, and $L$ and $\mu$ are the smoothness and strong convexity constants,
respectively. Our complexities improve significantly over the ones of
$O(\frac{1}{\epsilon^{5/7}})$ and
$O((\frac{L}{\mu})^{5/7}\frac{1}{(1-\sigma)^{1.5}}\log\frac{1}{\epsilon})$,
respectively, which were proved in the original literature only for static
graphs, where $\frac{1}{1-\sigma}$ equals $\frac{\gamma}{1-\sigma_{\gamma}}$
when the network is time-invariant. When combining with a multiple consensus
subroutine, the dependence on the network connectivity constants can be further
improved to $O(1)$ and $O(\frac{\gamma}{1-\sigma_{\gamma}})$ for the
computation and communication complexities, respectively. When the network is
static, by employing the Chebyshev acceleration, our complexities exactly match
the lower bounds without hiding any poly-logarithmic factor for both
nonstrongly convex and strongly convex problems.
| [
-0.00404991954565,
0.00012829963816300002,
0.005459040869027001,
-0.041918754577636004,
0.018496023491024003,
-0.001002041972242,
-0.013680655509233001,
0.0036532778758550004,
-0.034709617495536,
-0.042280603200197005,
0.031007630750536003,
0.020221762359142,
-0.010737157426774,
0.02157173... |
We propose LaserTagger - a sequence tagging approach that casts text
generation as a text editing task. Target texts are reconstructed from the
inputs using three main edit operations: keeping a token, deleting it, and
adding a phrase before the token. To predict the edit operations, we propose a
novel model, which combines a BERT encoder with an autoregressive Transformer
decoder. This approach is evaluated on English text on four tasks: sentence
fusion, sentence splitting, abstractive summarization, and grammar correction.
LaserTagger achieves new state-of-the-art results on three of these tasks,
performs comparably to a set of strong seq2seq baselines with a large number of
training examples, and outperforms them when the number of examples is limited.
Furthermore, we show that at inference time tagging can be more than two orders
of magnitude faster than comparable seq2seq models, making it more attractive
for running in a live environment.
| [
-0.034703377634286,
0.007446360774338001,
-0.014205045066773002,
-0.014559302479028001,
0.015323388390243001,
0.018532548099756,
-0.039121180772781004,
0.004358760546892,
-0.036453828215599005,
-0.021505534648895,
0.002755917608737,
0.027243122458457003,
-0.030869055539369004,
0.0110514555... |
The visual-question localized-answering (VQLA) system can serve as a
knowledgeable assistant in surgical education. Except for providing text-based
answers, the VQLA system can highlight the interested region for better
surgical scene understanding. However, deep neural networks (DNNs) suffer from
catastrophic forgetting when learning new knowledge. Specifically, when DNNs
learn on incremental classes or tasks, their performance on old tasks drops
dramatically. Furthermore, due to medical data privacy and licensing issues, it
is often difficult to access old data when updating continual learning (CL)
models. Therefore, we develop a non-exemplar continual surgical VQLA framework,
to explore and balance the rigidity-plasticity trade-off of DNNs in a
sequential learning paradigm. We revisit the distillation loss in CL tasks, and
propose rigidity-plasticity-aware distillation (RP-Dist) and self-calibrated
heterogeneous distillation (SH-Dist) to preserve the old knowledge. The weight
aligning (WA) technique is also integrated to adjust the weight bias between
old and new tasks. We further establish a CL framework on three public surgical
datasets in the context of surgical settings that consist of overlapping
classes between old and new surgical VQLA tasks. With extensive experiments, we
demonstrate that our proposed method excellently reconciles learning and
forgetting on the continual surgical VQLA over conventional CL methods. Our
code is publicly accessible.
| [
-0.0190886278,
0.0191448126,
0.0258869343,
-0.010984038000000002,
0.000974447117,
0.0205915589,
-0.0142076146,
0.0112087755,
-0.0254515056,
-0.0230355784,
0.0103449412,
0.040537,
-0.00917911623,
0.0167007949,
-0.0024457743899999997,
0.00376786222,
0.035087119800000004,
0.0149450339... |
Imposing consistency through proxy tasks has been shown to enhance
data-driven learning and enable self-supervision in various tasks. This paper
introduces novel and effective consistency strategies for optical flow
estimation, a problem where labels from real-world data are very challenging to
derive. More specifically, we propose occlusion consistency and zero forcing in
the forms of self-supervised learning and transformation consistency in the
form of semi-supervised learning. We apply these consistency techniques in a
way that the network model learns to describe pixel-level motions better while
requiring no additional annotations. We demonstrate that our consistency
strategies applied to a strong baseline network model using the original
datasets and labels provide further improvements, attaining the
state-of-the-art results on the KITTI-2015 scene flow benchmark in the
non-stereo category. Our method achieves the best foreground accuracy (4.33% in
Fl-all) over both the stereo and non-stereo categories, even though using only
monocular image inputs.
| [
-0.0034099463373420003,
0.006000948138535,
0.009053695015609,
-0.007276411168277001,
0.025760168209671003,
0.019612854346632,
-0.00968097243458,
0.018093451857566,
-0.02001710049808,
-0.045136049389839006,
0.010447643697261,
0.009743699803948,
-0.0015394418733190001,
0.013688573613762,
-... |
We develop a first line of attack for solving programming competition-style
problems from input-output examples using deep learning. The approach is to
train a neural network to predict properties of the program that generated the
outputs from the inputs. We use the neural network's predictions to augment
search techniques from the programming languages community, including
enumerative search and an SMT-based solver. Empirically, we show that our
approach leads to an order of magnitude speedup over the strong non-augmented
baselines and a Recurrent Neural Network approach, and that we are able to
solve problems of difficulty comparable to the simplest problems on programming
competition websites.
| [
-0.002233159728348,
-0.012247351929545002,
0.013573236763477001,
-0.011577574536204002,
0.00998514611274,
0.026299001649022002,
-0.019464541226625002,
-0.016922121867537002,
-0.026394683867692004,
-0.017878945916891,
0.014147331938147002,
0.04223696142435,
-0.020380359143018,
-0.0070736659... |
We have developed a graphic user interface (GUI), ExBrainable, dedicated to
convolutional neural networks (CNN) model training and visualization in
electroencephalography (EEG) decoding. Available functions include model
training, evaluation, and parameter visualization in terms of temporal and
spatial representations. We demonstrate these functions using a well-studied
public dataset of motor-imagery EEG and compare the results with existing
knowledge of neuroscience. The primary objective of ExBrainable is to provide a
fast, simplified, and user-friendly solution of EEG decoding for investigators
across disciplines to leverage cutting-edge methods in brain/neuroscience
research.
| [
-0.028903620317578003,
0.0016353820683430002,
0.009400624781847,
-0.020135262981057,
-0.000411016779253,
-0.017550611868500002,
0.019398774951696,
-0.009998151101171,
-0.018648393452167,
-0.026972079649567,
0.002572491532191,
0.032433196902275,
-0.019162544980645003,
0.012874617241322,
-... |
In this paper we look into the problem of planning over hybrid domains, where
change can be both discrete and instantaneous, or continuous over time. In
addition, it is required that each state on the trajectory induced by the
execution of plans complies with a given set of global constraints. We approach
the computation of plans for such domains as the problem of searching over a
deterministic state model. In this model, some of the successor states are
obtained by solving numerically the so-called initial value problem over a set
of ordinary differential equations (ODE) given by the current plan prefix.
These equations hold over time intervals whose duration is determined
dynamically, according to whether zero crossing events take place for a set of
invariant conditions. The resulting planner, FS+, incorporates these features
together with effective heuristic guidance. FS+ does not impose any of the
syntactic restrictions on process effects often found on the existing
literature on Hybrid Planning. A key concept of our approach is that a clear
separation is struck between planning and simulation time steps. The former is
the time allowed to observe the evolution of a given dynamical system before
committing to a future course of action, whilst the later is part of the model
of the environment. FS+ is shown to be a robust planner over a diverse set of
hybrid domains, taken from the existing literature on hybrid planning and
systems.
| [
0.005835317075252,
0.016317984089255,
0.005908476188778,
-0.00203452236019,
-0.025250373408198003,
0.026950454339385,
-0.021961694583296002,
0.002036264399066,
-0.02704800106585,
-0.043839778751134005,
0.034893453121185004,
0.014081403613090002,
-0.006072213407605001,
0.010493119247257,
... |
Continuous engineering of autonomous driving functions commonly requires
deploying vehicles in road testing to obtain inputs that cause problematic
decisions. Although the discovery leads to producing an improved system, it
also challenges the foundation of testing using equivalence classes and the
associated relative test coverage criterion. In this paper, we propose believed
equivalence, where the establishment of an equivalence class is initially based
on expert belief and is subject to a set of available test cases having a
consistent valuation. Upon a newly encountered test case that breaks the
consistency, one may need to refine the established categorization in order to
split the originally believed equivalence into two. Finally, we focus on
modules implemented using deep neural networks where every category partitions
an input over the real domain. We present both analytical and lazy methods to
suggest the refinement. The concept is demonstrated in analyzing multiple
autonomous driving modules, indicating the potential of our proposed approach.
| [
0.003831504145637,
0.000046743778511881835,
-0.008930785581469002,
0.007184070069342001,
-0.017312200739979,
0.011233913712203001,
-0.009775970131158001,
0.00857158191502,
-0.014818905852735001,
-0.020228087902069,
-0.00222213147208,
0.014875250868499001,
-0.017833396792411003,
0.004141405... |
We present an attention-based ranking framework for learning to order
sentences given a paragraph. Our framework is built on a bidirectional sentence
encoder and a self-attention based transformer network to obtain an input order
invariant representation of paragraphs. Moreover, it allows seamless training
using a variety of ranking based loss functions, such as pointwise, pairwise,
and listwise ranking. We apply our framework on two tasks: Sentence Ordering
and Order Discrimination. Our framework outperforms various state-of-the-art
methods on these tasks on a variety of evaluation metrics. We also show that it
achieves better results when using pairwise and listwise ranking losses, rather
than the pointwise ranking loss, which suggests that incorporating relative
positions of two or more sentences in the loss function contributes to better
learning.
| [
-0.022780809551477002,
-0.0031361170113080004,
0.036137901246547005,
-0.004452364519238,
0.018369417637586,
0.0037421712186180003,
0.0020469266455620003,
-0.009990504942834,
-0.01674416847527,
-0.023026645183563003,
0.028899395838379003,
0.038350425660610005,
-0.017167551442980003,
0.01258... |
We explore methods for option discovery based on variational inference and
make two algorithmic contributions. First: we highlight a tight connection
between variational option discovery methods and variational autoencoders, and
introduce Variational Autoencoding Learning of Options by Reinforcement
(VALOR), a new method derived from the connection. In VALOR, the policy encodes
contexts from a noise distribution into trajectories, and the decoder recovers
the contexts from the complete trajectories. Second: we propose a curriculum
learning approach where the number of contexts seen by the agent increases
whenever the agent's performance is strong enough (as measured by the decoder)
on the current set of contexts. We show that this simple trick stabilizes
training for VALOR and prior variational option discovery methods, allowing a
single agent to learn many more modes of behavior than it could with a fixed
context distribution. Finally, we investigate other topics related to
variational option discovery, including fundamental limitations of the general
approach and the applicability of learned options to downstream tasks.
| [
-0.021199444308876002,
-0.013492420315742002,
0.028037974610924003,
-0.030636616051197003,
-0.012829083018004001,
0.032770238816738004,
-0.019599227234721,
-0.021582402288913,
-0.029597159475088,
-0.019024791195988003,
0.021144736558198002,
0.021705495193600002,
-0.001849822467193,
0.00455... |
Inter-robot communication enables multi-robot systems to coordinate and
execute complex missions efficiently. Thus, maintaining connectivity of the
communication network between robots is essential for many multi-robot systems.
In this paper, we present a trajectory planner for connectivity maintenance of
a multi-robot system. We first define a weighted undirected graph to represent
the connectivity of the system. Unlike previous connectivity maintenance works,
we explicitly account for robot motion and sensing uncertainties while
formulating the graph edge weights. These uncertainties result in uncertain
robot positions which directly affect the connectivity of the system. Next, the
algebraic connectivity of the weighted undirected graph is maintained above a
specified lower limit using a trajectory planner based on a distributed
alternating direction method of multipliers (ADMM) framework. Here we derive an
approximation for the Hessian matrices required within the ADMM optimization
step to reduce the computational load. Finally, simulation results are
presented to statistically validate the connectivity maintenance of our
trajectory planner.
| [
0.0009610750712450001,
-0.009619400836527,
-0.009716287255287,
-0.015570973046123001,
0.0006799324764870001,
0.023280335590243003,
-0.018657485023140002,
0.012179961428046001,
-0.014574430882930001,
-0.012982731685042001,
0.007048460654914001,
0.023640196770429,
-0.0053218123503020005,
0.0... |
Given the number of Arabic speakers worldwide and the notably large amount of
content in the web today in some fields such as law, medicine, or even news,
documents of considerable length are produced regularly. Classifying those
documents using traditional learning models is often impractical since extended
length of the documents increases computational requirements to an
unsustainable level. Thus, it is necessary to customize these models
specifically for long textual documents. In this paper we propose two simple
but effective models to classify long length Arabic documents. We also
fine-tune two different models-namely, Longformer and RoBERT, for the same task
and compare their results to our models. Both of our models outperform the
Longformer and RoBERT in this task over two different datasets.
| [
-0.00858012214,
0.0101531437,
0.0021926977199999997,
-0.0335850492,
0.006697261709999999,
0.0063908286399999995,
-0.0181408282,
0.0128906118,
-0.0230573751,
-0.0179365408,
0.00640785275,
0.0475583896,
-0.015553172700000001,
0.011045204500000001,
-0.008927412329999999,
0.00896827,
0.0... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.