Search is not available for this dataset
abstract stringclasses 0
values | embedding list |
|---|---|
This paper presents a practical global optimization algorithm for the
K-center clustering problem, which aims to select K samples as the cluster
centers to minimize the maximum within-cluster distance. This algorithm is
based on a reduced-space branch and bound scheme and guarantees convergence to
the global optimum ... | [
0.000402558798668,
0.010741917416453,
0.010650705546140001,
-0.008805425837635,
0.0030362932011480004,
0.037130128592252,
-0.029159639030694004,
0.000289421353954,
-0.023827271535992,
-0.037158194929361,
0.006107667461037001,
0.020277036353945,
-0.020291067659854,
-0.005332369357347,
-0.... |
Visual surveillance aims to perform robust foreground object detection
regardless of the time and place. Object detection shows good results using
only spatial information, but foreground object detection in visual
surveillance requires proper temporal and spatial information processing. In
deep learning-based foregr... | [
-0.004978630691766001,
0.017125925049185,
0.010457236319780001,
-0.006834174040704,
0.004679349251091001,
0.018844151869416,
-0.032082941383123,
-0.000666340754833,
-0.026998683810234,
-0.023421393707394003,
0.034026511013507,
0.031716763973236,
-0.004823708441108,
0.018266715109348002,
... |
Recognizing an event in an image can be enhanced by detecting relevant
objects in two ways: 1) indirectly utilizing object detection information
within the unified architecture or 2) directly making use of the object
detection output results. We introduce a novel approach, referred to as
Doubly-injected Object Detect... | [
-0.03323445469141,
0.017974574118852,
0.007547676097601001,
-0.005244297906756,
-0.003516764612868,
0.012250405736267001,
-0.007136358413845001,
-0.013655740767717,
-0.020949769765138,
-0.0101526863873,
0.018522998318076002,
0.028709961101412003,
-0.005151751451194,
0.012462919577956,
-0... |
This work generalizes graph neural networks (GNNs) beyond those based on the
Weisfeiler-Lehman (WL) algorithm, graph Laplacians, and diffusions. Our
approach, denoted Relational Pooling (RP), draws from the theory of finite
partial exchangeability to provide a framework with maximal representation
power for graphs. R... | [
-0.0033673143479970003,
0.024942545220255,
0.016293341293931,
-0.017567364498972,
-0.01433984003961,
-0.004565250128507,
-0.009194200858473,
-0.0020508235320440002,
-0.022507743909955,
-0.051272358745336005,
0.0027391500771040004,
0.032671619206666,
0.0009422464063390001,
0.018784765154123... |
This paper presents a novel multi-fake evolutionary generative adversarial
network(MFEGAN) for handling imbalance hyperspectral image classification. It
is an end-to-end approach in which different generative objective losses are
considered in the generator network to improve the classification performance
of the dis... | [
-0.018717739731073,
-0.0021929517388340003,
-0.017297867685556002,
0.0023021728266030004,
0.011242930777370002,
0.017803015187382,
-0.015031532384455001,
-0.013645792379975001,
-0.016929246485233,
-0.038227330893278004,
0.025311954319477,
0.022103589028120003,
0.007331456057727,
0.00280390... |
Cultural adaptation, i.e., the matching of a robot's behaviours to the
cultural norms and preferences of its user, is a well known key requirement for
the success of any assistive application. However, culture-dependent robot
behaviours are often implicitly set by designers, thus not allowing for an easy
and automati... | [
-0.010817383415997,
-0.015743156895041,
0.004963716492056,
-0.016874566674232,
0.010072308592498,
0.013245775364339001,
-0.006816055160015001,
0.019220171496272,
-0.005008558742702,
-0.027885116636753002,
-0.012279937975108,
-0.0036977790296070004,
0.0021351913455870002,
-0.000475588894914... |
Many possible fields of application of robots in real world settings hinge on
the ability of robots to grasp objects. As a result, robot grasping has been an
active field of research for many years. With our publication we contribute to
the endeavor of enabling robots to grasp, with a particular focus on bin
picking ... | [
-0.011579873971641001,
-0.004333680029958,
0.022429864853620002,
-0.018064603209495,
-0.005400432273745001,
0.032255213707685006,
-0.000748744118027,
0.0058215185999870005,
-0.025433614850044,
-0.036381859332323005,
0.010028872638940001,
0.014345007948577002,
0.009692003950476001,
-0.00735... |
Orbital angular momentum of light is regarded as a valuable resource in
quantum technology, especially in quantum communication and quantum sensing and
ranging. However, the OAM state of light is susceptible to undesirable
experimental conditions such as propagation distance and phase distortions,
which hinders the p... | [
-0.017170963808894,
-0.006853869184851,
-0.013707738369703001,
-0.002530021360144,
-0.005288159474730001,
0.017378343269228002,
-0.007942607626318,
0.005651072133332001,
-0.020157219842076003,
-0.015138652175664001,
0.015138652175664001,
0.020281646400690002,
-0.008530180901288001,
0.00631... |
Mobile keyboard suggestion is typically regarded as a word-level language
modeling problem. Centralized machine learning technique requires massive user
data collected to train on, which may impose privacy concerns for sensitive
personal typing data of users. Federated learning (FL) provides a promising
approach to l... | [
-0.028727790340781004,
0.018533607944846,
0.029536630958318003,
-0.026078138500452003,
0.011958290822803001,
0.0027263509109610004,
-0.019356394186615,
0.004201090428978,
-0.012481248006224,
-0.054192326962947006,
0.012474276125431002,
0.039186935871839,
-0.022647539153695002,
0.0284628253... |
Deep Neural Networks (DNNs) are known to be vulnerable to the maliciously
generated adversarial examples. To detect these adversarial examples, previous
methods use artificially designed metrics to characterize the properties of
\textit{adversarial subspaces} where adversarial examples lie. However, we find
these met... | [
0.000783797469921,
0.002981959842145,
0.01621139422059,
-0.025949249044060003,
-0.016404222697019,
0.015811963006854002,
-0.0021658807527270003,
-0.002227861434221,
-0.026155851781368002,
-0.018497793003916,
0.043854780495166,
0.021968711167573002,
-0.005826184991747,
0.011735010892152,
... |
Data parallelism has become a dominant method to scale Deep Neural Network
(DNN) training across multiple nodes. Since synchronizing a large number of
gradients of the local model can be a bottleneck for large-scale distributed
training, compressing communication data has gained widespread attention
recently. Among s... | [
-0.013290714472532002,
-0.007554721552878001,
0.032597225159406,
-0.010387741960585001,
0.033324718475341006,
0.004560813307762,
-0.033548559993505006,
-0.0022052093409,
-0.007953443564474,
-0.036962173879146,
0.023265745490789,
0.045636113733053006,
0.0060088019818060005,
0.00623614294454... |
We classify and re-examine some of the current approaches to improve the
performance-computes trade-off of language models, including (1) non-causal
models (such as masked language models), (2) extension of batch length with
efficient attention, (3) recurrence, (4) conditional computation and (5)
retrieval. We identi... | [
-0.024774657562375003,
0.007137989625334001,
0.006721375510096001,
-0.012553974054753001,
0.0014425265835590001,
0.014664819464087,
-0.002718407660722,
0.009998740628361001,
-0.030051769688725003,
-0.038828440010547,
0.0020292582921680002,
0.040217157453298,
-0.016025759279727003,
0.009623... |
This work studies the widely adopted ancestral sampling algorithms for
auto-regressive language models, which is not widely studied in the literature.
We use the quality-diversity (Q-D) trade-off to investigate three popular
sampling algorithms (top-k, nucleus and tempered sampling). We focus on the
task of open-ende... | [
0.003052158514037,
0.0021345957648000002,
0.003830432891845,
-0.025099782273173003,
-0.012250420637428,
0.027439827099442003,
-0.018483579158782,
0.007145498413592,
-0.029612727463245003,
-0.012905076146125,
0.018135357648134003,
0.023832255974411003,
-0.012912040576338001,
0.0082040904089... |
Adversarial examples --- perturbations to the input of a model that elicit
large changes in the output --- have been shown to be an effective way of
assessing the robustness of sequence-to-sequence (seq2seq) models. However,
these perturbations only indicate weaknesses in the model if they do not change
the input so ... | [
-0.021278165280818002,
-0.021082568913698002,
0.005497674457728001,
-0.006583936512470001,
0.020160468295216002,
0.021487733349204,
0.0030212760902940004,
-0.007467616349458001,
-0.027062250301241,
-0.019727360457181,
0.032273516058921,
0.011903477832674002,
-0.001663448172621,
-0.00040734... |
State-of-the-art deep learning algorithms generally require large amounts of
data for model training. Lack thereof can severely deteriorate the performance,
particularly in scenarios with fine-grained boundaries between categories. To
this end, we propose a multimodal approach that facilitates bridging the
informatio... | [
-0.025643769651651,
0.00964459311217,
0.027475466951727003,
-0.009651638567447001,
-0.010426587425172001,
0.031138863414525004,
-0.0054880483075970005,
-0.013195268809795001,
-0.028616756200790003,
-0.033477798104286,
0.008848509751260001,
0.033618699759244,
-0.012110340408980002,
-0.00783... |
Low resource Handwritten Text Recognition (HTR) is a hard problem due to the
scarce annotated data and the very limited linguistic information (dictionaries
and language models). For example, in the case of historical ciphered
manuscripts, which are usually written with invented alphabets to hide the
message contents... | [
-0.028198836371302,
0.002488653641194,
-0.004977307282388,
-0.0029792990535490002,
0.015743169933557,
0.026030784472823,
-0.0010937676997850002,
0.0007142701651900001,
-0.019583312794566002,
-0.021170381456613003,
0.016550874337553,
0.039109941571950003,
-0.038939900696277,
-0.001368316588... |
This paper presents privileged multi-label learning (PrML) to explore and
exploit the relationship between labels in multi-label learning problems. We
suggest that for each individual label, it cannot only be implicitly connected
with other labels via the low-rank constraint over label predictors, but also
its perfor... | [
-0.013495877385139,
0.001274495851248,
0.00795698724687,
-0.03769752010703,
-0.0057386755943290004,
0.015789970755577,
-0.006489594932645001,
0.011105336248874002,
-0.045385830104351,
-0.033784471452236,
0.026950420811772003,
0.034060038626194,
-0.023492058739066003,
0.001216799020767,
-... |
Topological data analysis (TDA) is a branch of computational mathematics,
bridging algebraic topology and data science, that provides compact,
noise-robust representations of complex structures. Deep neural networks (DNNs)
learn millions of parameters associated with a series of transformations
defined by the model a... | [
-0.017212886363267,
0.003031419357284,
0.015805192291736003,
-0.017840076237916003,
0.010745858773589,
0.022327970713377002,
-0.011184891685843001,
-0.0025244406424460002,
-0.012752867303788001,
-0.028767123818397,
0.022021343931555002,
0.035931028425693005,
0.002423393307253,
0.0083764735... |
We present GANcraft, an unsupervised neural rendering framework for
generating photorealistic images of large 3D block worlds such as those created
in Minecraft. Our method takes a semantic block world as input, where each
block is assigned a semantic label such as dirt, grass, or water. We represent
the world as a c... | [
0.00013700913405,
-0.016499951481819,
0.011921180412173,
-0.017387045547366,
0.026790242642164,
0.019802670925855,
-0.030516037717461003,
-0.012664974667131,
-0.011375276371836001,
-0.04645643755793501,
0.009178012609481001,
0.017332455143332003,
-0.007731366436928001,
-0.01117738615721400... |
We consider a non-stationary two-armed bandit framework and propose a
change-detection based Thompson sampling (TS) algorithm, named TS with
change-detection (TS-CD), to keep track of the dynamic environment. The
non-stationarity is modeled using a Poisson arrival process, which changes the
mean of the rewards on eac... | [
-0.017763331532478003,
0.005485322326421,
0.0043672276660790006,
0.0015167880337680001,
0.012302543967962001,
0.015141592361032002,
-0.014272352680563,
0.015169632621109002,
-0.044471416622400006,
-0.019529851153492,
0.014440593309700002,
0.028376465663313002,
-0.012632014229893001,
0.0091... |
This paper studies a fundamental mechanism of how to detect a conflict
between arguments given sentiments regarding acceptability of the arguments. We
introduce a concept of the inverse problem of the abstract argumentation to
tackle the problem. Given noisy sets of acceptable arguments, it aims to find
attack relati... | [
0.002012040000408,
-0.00039158642175600005,
-0.006368037778884001,
-0.014139029197394001,
-0.015822572633624,
0.014905520714819001,
0.00010169270535600001,
-0.009560612030327001,
-0.005208035465329001,
-0.018518980592489003,
0.0015064636245360002,
0.010532413609325001,
-0.0061935242265460004... |
Image textures, as a kind of local variations, provide important information
for human visual system. Many image textures, especially the small-scale or
stochastic textures are rich in high-frequency variations, and are difficult to
be preserved. Current state-of-the-art denoising algorithms typically adopt a
nonloca... | [
0.008148178458213001,
0.021908795461058003,
0.022476801648736,
-0.004878764040768001,
0.021746508777141002,
0.029779732227325002,
-0.0033370340242980003,
-0.001414097729139,
-0.023180047050118002,
-0.038705538958311005,
0.002199331996962,
0.002319357125088,
0.007735698018223,
0.01954210363... |
Robotic process automation (RPA) has emerged as the leading approach to
automate tasks in business processes. Moving away from back-end automation, RPA
automated the mouse-click on user interfaces; this outside-in approach reduced
the overhead of updating legacy software. However, its many shortcomings,
namely its la... | [
-0.028766931965947002,
-0.0032366234809160003,
0.013118380680680001,
-0.0037402510643,
0.003013171022757,
0.020447622984647,
-0.012224570848047001,
0.014493472874164002,
-0.029234463348984004,
-0.036274936050176,
0.001022724900394,
0.01771118864417,
-0.029839502647519,
-0.00326068769209000... |
The first contribution of this paper is architecture of a multipurpose
system, which delegates a range of object detection tasks to a classifier,
applied in special grid positions of the tested image. The second contribution
is Gray Level-Radius Co-occurrence Matrix, which describes local image texture
and topology a... | [
-0.011139662936329,
0.007976463995873,
0.009113024920225001,
-0.033822946250438,
0.014268628321588001,
0.022731211036443003,
0.00036223587812800003,
-0.000750147097278,
-0.024429205805063,
-0.031193794682621002,
0.012228296138346001,
0.0038581439293920005,
-0.026907728984951,
0.00487146293... |
It has been experimentally observed that the efficiency of distributed
training with stochastic gradient (SGD) depends decisively on the batch size
and -- in asynchronous implementations -- on the gradient staleness.
Especially, it has been observed that the speedup saturates beyond a certain
batch size and/or when t... | [
-0.017899077385663,
-0.001224312349222,
0.029038470238447002,
-0.014702309854328001,
-0.002195136621594,
0.008808711543679001,
0.006298474967479001,
0.015645848587155002,
-0.037854224443435,
-0.042501505464315005,
0.016504891216754,
0.018715871497988,
-0.00416495045647,
-0.001850111060775,... |
Perception of obstacles remains a critical safety concern for autonomous
vehicles. Real-world collisions have shown that the autonomy faults leading to
fatal collisions originate from obstacle existence detection. Open source
autonomous driving implementations show a perception pipeline with complex
interdependent De... | [
-0.002798799891024,
-0.009282976388931,
-0.023572500795125,
0.015478580258786002,
-0.006348581984639,
0.021806301549077003,
-0.029872408136725002,
0.014560712501406002,
-0.034600816667079,
-0.005966137163341,
0.019608983770012002,
0.003744481364265,
-0.016980545595288003,
0.005541971419006... |
Apricot which is a cultivated type of Zerdali (wild apricot) has an important
place in human nutrition and its medical properties are essential for human
health. The objective of this research was to obtain a model for apricot mass
and separate apricot variety with image processing technology using external
features ... | [
-0.015919677913188,
0.013279969803988,
0.00034798847627800003,
-0.019882632419466,
0.004838333465158,
0.027129953727126004,
-0.003956168889999,
0.009289870969951,
-0.004824761301279,
-0.044705383479595004,
-0.0006115775322540001,
0.016258971765637002,
-0.020154066383838,
-0.006280332803726... |
We introduce an implementation of an extension of Answer Set Programming
(ASP) with language constructs from dynamic (and temporal) logic that provides
an expressive computational framework for modeling dynamic applications.
Starting from logical foundations, provided by dynamic and temporal equilibrium
logics over f... | [
-0.012499065138399,
0.017181081697344003,
0.00001708589297777507,
-0.038441814482212004,
-0.035484749823808004,
0.034937147051095005,
-0.018454261124134,
-0.021904166787862,
-0.018248910084366,
-0.039153698831796,
0.02204106748104,
0.027900433167815004,
-0.021123832091689002,
0.02023397386... |
Spatial-temporal Map (STMap)-based methods have shown great potential to
process high-angle videos for vehicle trajectory reconstruction, which can meet
the needs of various data-driven modeling and imitation learning applications.
In this paper, we developed Spatial-Temporal Deep Embedding (STDE) model that
imposes ... | [
-0.0052391812205310005,
0.002528069075196,
0.012743954546749,
-0.018622059375047,
-0.004617524798959,
0.024313669651746,
-0.009331751614809002,
0.014878307469189,
-0.011044760234653,
-0.04257654771208701,
-0.0029476869385680004,
0.024949138984084,
0.001220863894559,
0.031331479549407,
0.... |
In this work, we propose ReStoCNet, a residual stochastic multilayer
convolutional Spiking Neural Network (SNN) composed of binary kernels, to
reduce the synaptic memory footprint and enhance the computational efficiency
of SNNs for complex pattern recognition tasks. ReStoCNet consists of an input
layer followed by s... | [
-0.013227131217718001,
0.013541730120778,
0.009934330359101,
0.021882094442844002,
0.009046463295817,
0.008508149534463001,
0.020819449797272002,
-0.003338242648169,
-0.025503475219011,
-0.004075801931321,
0.031487844884395,
0.041303325444459006,
-0.012674835510551001,
-0.00069124344736300... |
Knowledge Graph Embedding (KGE) aims to learn representations for entities
and relations. Most KGE models have gained great success, especially on
extrapolation scenarios. Specifically, given an unseen triple (h, r, t), a
trained model can still correctly predict t from (h, r, ?), or h from (?, r,
t), such extrapolat... | [
0.014045441523194,
0.009212236851453,
0.022939080372452,
-0.030802357941865,
0.008005630224943001,
0.018356686457991,
-0.0074158846400670005,
-0.011889819055795002,
-0.031697146594524,
-0.033079996705055,
0.001585365622304,
0.027033407241106002,
-0.034679766744375,
0.020390292629599002,
... |
In this paper, we study adversarial training on datasets that obey the
long-tailed distribution, which is practical but rarely explored in previous
works. Compared with conventional adversarial training on balanced datasets,
this process falls into the dilemma of generating uneven adversarial examples
(AEs) and an un... | [
-0.0252423771,
-0.00428966805,
0.00323732081,
-0.00291097094,
0.015022564700000001,
0.00869102869,
-0.0034624498799999998,
0.00113088079,
-0.017828824,
-0.0187363215,
0.024488456500000002,
0.028900288000000003,
-0.00260730856,
0.00345197879,
-0.0145339128,
-0.00154099963,
0.029486669... |
In this paper, we describe a data enhancement method for developing Emily, an
emotion-affective open-domain chatbot. The proposed method is based on
explicitly modeling positively transitioned (PT) sentiment data from multi-turn
dialogues. We construct a dialogue corpus with PT sentiment data and will
release it for ... | [
-0.023672038689255003,
-0.022176241502165003,
0.027706578373908,
-0.020172694697976,
0.001883470918983,
0.022368362173438003,
-0.011499808169901002,
0.011609591543674,
-0.011348855681717,
-0.022944724187254,
0.005176972132176,
0.029202377423644003,
-0.019678669050335003,
-0.002586770569905... |
Optimal well placement and well injection-production are crucial for the
reservoir development to maximize the financial profits during the project
lifetime. Meta-heuristic algorithms have showed good performance in solving
complex, nonlinear and non-continuous optimization problems. However, a large
number of numeri... | [
-0.022348107770085,
-0.005814997479319001,
-0.00116615591105,
-0.005138100590556,
-0.026991687715053003,
0.017157398164272003,
-0.003363439347594,
0.000475230481242,
-0.05931437388062401,
-0.025729082524776,
-0.0034914533607660002,
0.041188977658748,
-0.001003946294076,
0.01607717014849100... |
Visual question answering is fundamentally compositional in nature---a
question like "where is the dog?" shares substructure with questions like "what
color is the dog?" and "where is the cat?" This paper seeks to simultaneously
exploit the representational capacity of deep networks and the compositional
linguistic s... | [
-0.013843199238181001,
0.015677522867918,
0.01520244590938,
-0.013698036782443001,
-0.023397514596581,
0.013196567073464002,
0.001309759332798,
-0.022843258455395,
-0.005948352627456001,
-0.027791971340775,
0.005859275814145,
0.017327092587947002,
-0.008155479095876,
0.020613038912415,
0... |
We propose an image restoration algorithm that can control the perceptual
quality and/or the mean square error (MSE) of any pre-trained model, trading
one over the other at test time. Our algorithm is few-shot: Given about a dozen
images restored by the model, it can significantly improve the perceptual
quality and/o... | [
-0.00446461653,
-0.015100184800000001,
0.0138336262,
0.0025471886599999997,
0.0116523327,
0.0364205763,
-0.00495013036,
-0.0041866772799999995,
-0.0175770093,
-0.0357732251,
0.00222703093,
0.0376589894,
-0.014290995,
0.00197547837,
-0.0013984909699999999,
-0.0140306465,
0.02324837450... |
A `trajectory' refers to a trace generated by a moving object in geographical
spaces, usually represented by of a series of chronologically ordered points,
where each point consists of a geo-spatial coordinate set and a timestamp.
Rapid advancements in location sensing and wireless communication technology
enabled us... | [
-0.006260382942855001,
-0.0054887384176250005,
0.011608212254941,
-0.017351929098367,
-0.000970426423009,
0.006753563880920001,
-0.031912520527839,
0.0011314651928840001,
-0.022880926728248003,
-0.036528963595628,
0.001996209844946,
0.026611659675836,
-0.010548040270805002,
0.0045124408788... |
For AI technology to fulfill its full promises, we must have effective means
to ensure Responsible AI behavior and curtail potential irresponsible use,
e.g., in areas of privacy protection, human autonomy, robustness, and
prevention of biases and discrimination in automated decision making. Recent
literature in the f... | [
-0.000788573990575,
-0.005210855975747,
0.019108731299638002,
-0.020260676741600002,
0.003835298586636,
0.007379222661256001,
-0.024773590266704,
0.019664375111460002,
-0.010604668408632001,
-0.035615421831607,
0.017021678388118,
0.010150666348636001,
-0.004499360918998,
-0.004133448936045... |
Past research has identified discriminatory automatic speech recognition
(ASR) performance as a function of the racial group and nationality of the
speaker. In this paper, we expand the discussion beyond bias as a function of
the individual national origin of the speaker to look for bias as a function of
the geopolit... | [
-0.017635330557823,
0.006366461049765001,
0.021623956039547,
-0.036391209810972006,
0.017662009224295002,
0.022357650101184002,
-0.008484167978167001,
0.009544689208269001,
-0.009664747864007001,
-0.038045357912778,
-0.008270729333162,
0.020196588709950003,
-0.026439655572175,
0.0134866256... |
This paper deals with symbolic time series representation. It builds up on
the popular mapping technique Symbolic Aggregate approXimation algorithm (SAX),
which is extensively utilized in sequence classification, pattern mining,
anomaly detection, time series indexing and other data mining tasks. However,
the disadva... | [
-0.007788143120706001,
0.004003317095339001,
0.002237769542261,
-0.020805971696972,
-0.022920399904251,
0.026120234280824002,
-0.02796683460474,
-0.007689469959586001,
-0.015308458358049,
-0.02118656784296,
0.006392620503902001,
0.028953567147254004,
0.011157131753861,
0.033041462302207,
... |
Transfer learning (TL) enables the transfer of knowledge gained in learning
to perform one task (source) to a related but different task (target), hence
addressing the expense of data acquisition and labeling, potential
computational power limitations, and dataset distribution mismatches. We
propose a new TL framewor... | [
0.00008090175833785906,
-0.020978542044758002,
0.024317637085914,
-0.0030907774344080003,
-0.013807233422994001,
0.015807872638106003,
0.00044754633563500005,
0.014568040147423002,
-0.026360545307397003,
-0.02234517596662,
0.018611587584018003,
0.040435470640659006,
-0.004469739738851001,
... |
What is the best way to exploit extra data -- be it unlabeled data from the
same task, or labeled data from a related task -- to learn a given task? This
paper formalizes the question using the theory of reference priors. Reference
priors are objective, uninformative Bayesian priors that maximize the mutual
informati... | [
0.009683061391115001,
-0.017771586775779002,
0.011720525100827,
-0.010132802650332002,
0.008504194207489001,
0.00232025492005,
-0.003560450160875,
0.017703443765640002,
-0.015250310301780002,
-0.027856688946485002,
0.016885733231902,
0.018412126228213,
-0.011488839983940001,
0.011652382090... |
Automatic phonemic transcription tools are useful for low-resource language
documentation. However, due to the lack of training sets, only a tiny fraction
of languages have phonemic transcription tools. Fortunately, multilingual
acoustic modeling provides a solution given limited audio training data. A more
challengi... | [
-0.023402292281389,
-0.009309424087405,
0.030868804082274003,
-0.019770668819546002,
0.019391246140003003,
0.041980490088462004,
-0.015000774525105,
0.002329049864783,
-0.017453476786613003,
-0.024621868506073,
0.029676329344511,
0.031519241631031,
-0.028050228953361,
0.0007935708272270001... |
Temporal information extraction plays a critical role in natural language
understanding. Previous systems have incorporated advanced neural language
models and have successfully enhanced the accuracy of temporal information
extraction tasks. However, these systems have two major shortcomings. First,
they fail to make... | [
-0.036057047545909,
0.002720474032685,
0.030654003843665,
-0.021391643211245003,
-0.010054899379611001,
0.01647101342678,
-0.014238123781979,
-0.005289332009851,
-0.0075739100575440005,
-0.046477206051349,
0.020220065489411,
0.031067503616213004,
-0.018235273659229,
0.011391877196729001,
... |
In today's technological era, document images play an important and integral
part in our day to day life, and specifically with the surge of Covid-19,
digitally scanned documents have become key source of communication, thus
avoiding any sort of infection through physical contact. Storage and
transmission of scanned ... | [
-0.013235461898148,
0.014460718259215001,
-0.006718713324517,
-0.015457079745829001,
0.027601929381489,
0.032206740230321,
-0.005931048654019001,
-0.0045105591416350005,
-0.017072802409529002,
-0.032718382775783005,
0.023050976917147,
0.028382861986756002,
0.0062676575034850005,
-0.0101251... |
One advantage of decision tree based methods like random forests is their
ability to natively handle categorical predictors without having to first
transform them (e.g., by using feature engineering techniques). However, in
this paper, we show how this capability can lead to an inherent "absent levels"
problem for de... | [
0.000522529997397,
-0.014885899610817,
0.000361833837814,
-0.004169968888163,
0.0030162092298260004,
0.028621463105082002,
0.008832938969135,
-0.01713179424405,
-0.025225231423974002,
-0.013112463988363,
0.023034114390611003,
0.0076141306199130005,
-0.045931283384561004,
0.016419680789113,... |
To date, there are no effective treatments for most neurodegenerative
diseases. Knowledge graphs can provide comprehensive and semantic
representation for heterogeneous data, and have been successfully leveraged in
many biomedical applications including drug repurposing. Our objective is to
construct a knowledge grap... | [
0.005248109344393,
0.0024172493722280004,
0.031190313398838,
-0.045537855476140005,
-0.018144626170396,
0.030946215614676004,
-0.022768927738070002,
-0.004787034820765,
-0.029210405424237,
-0.024165712296962003,
0.012618515640497001,
0.032492168247699,
0.001006904640235,
0.0116624645888800... |
Current top performing object recognition systems build on object proposals
as a preprocessing step. Object proposal algorithms are designed to generate
candidate regions for generic objects, yet current approaches are limited in
capturing the vast variety of object characteristics. In this paper we analyze
the error... | [
-0.007631989661604,
0.0033669515978540002,
-0.0009583668434060001,
-0.035168655216693004,
-0.024838911369442003,
0.025258252397179003,
-0.012342576868832,
0.025537811219692,
-0.013034488074481002,
-0.039054542779922,
0.011245303787291001,
0.015054309740662,
-0.019275667145848,
-0.005168366... |
Human pose estimation has recently made significant progress with the
adoption of deep convolutional neural networks. Its many applications have
attracted tremendous interest in recent years. However, many practical
applications require pose estimation for human crowds, which still is a rarely
addressed problem. In t... | [
-0.0024977577850220003,
0.005183831788599,
0.006159652490168001,
-0.007731236983090001,
0.013031482696533,
0.013593006879091001,
-0.0038176833186290005,
0.021639246493577003,
-0.025789050385355002,
-0.025720572099089,
0.0031517287716260004,
0.008422871120274001,
-0.017982486635446,
-0.0062... |
This paper considers the integration of rigid cooperative manipulation with
rigidity theory. Motivated by rigid models of cooperative manipulation systems,
i.e., where the grasping contacts are rigid, we introduce first the notion of
bearing and distance rigidity for graph frameworks in SE(3). Next, we associate
the ... | [
-0.005085689947009001,
-0.0042825015261760005,
-0.006832361686974001,
-0.017578950151801002,
0.000173943757545,
0.028395688161253003,
-0.020679468289017,
0.0065798307769,
-0.012268789112567001,
-0.041555348783731,
-0.00046209633001100003,
0.016975682228803,
0.008957829326391002,
0.01001004... |
As research and industry moves towards large-scale models capable of numerous
downstream tasks, the complexity of understanding multi-modal datasets that
give nuance to models rapidly increases. A clear and thorough understanding of
a dataset's origins, development, intent, ethical considerations and evolution
become... | [
-0.022588290274143,
-0.0036623131018130002,
0.004407892469316,
-0.035069838166236,
-0.001984759699553,
0.010555469430983,
-0.012502259574830001,
0.021318044513463003,
-0.025915782898664003,
-0.024769799783825003,
0.008946951478719,
0.022615903988480002,
-0.022049816325306,
0.00894004758447... |
Ionic Polymer Metal Composites (IPMCs) are one of the most preferred choices
among biocompatible materials for industrial and biomedical applications.
Despite their advantages, some of their drawbacks include non-linear and
hysteretic behavior, which complicates the modeling process. In previous works,
usually autore... | [
-0.043272826820611,
0.009157088585197001,
0.001397642539814,
-0.014014812186360002,
-0.006026788149029001,
0.006773593369871001,
-0.010650699026882001,
0.009631693363189,
-0.013547186739742001,
-0.029955962672829003,
0.021329315379261003,
0.027973787859082003,
0.010950816795229001,
0.01268... |
Implementing enterprise process automation often requires significant
technical expertise and engineering effort. It would be beneficial for
non-technical users to be able to describe a business process in natural
language and have an intelligent system generate the workflow that can be
automatically executed. A buil... | [
-0.037192735821008,
-0.020765943452715003,
-0.009958489798009,
-0.010726600885391001,
0.012559286318719,
0.027530709281563003,
-0.026816502213478,
0.002848410978913,
-0.004359365906566001,
-0.021884420886635003,
0.004625509493052,
0.019580088555812003,
0.001007303246296,
0.0019034325378010... |
The ability of reasoning beyond data fitting is substantial to deep learning
systems in order to make a leap forward towards artificial general
intelligence. A lot of efforts have been made to model neural-based reasoning
as an iterative decision-making process based on recurrent networks and
reinforcement learning. ... | [
-0.009468207135796,
0.007555086631327001,
0.020912146195769,
-0.008327291347086001,
0.028606368228793002,
-0.009871701709926,
-0.016932854428887003,
-0.013273577205836001,
-0.016445878893136,
-0.014678850769996001,
0.022011319175362,
0.022734828293323003,
-0.017795497551560003,
0.006087201... |
In multi-turn dialogue generation, responses are not only related to the
topic and background of the context but also related to words and phrases in
the sentences of the context. However, currently widely used hierarchical
dialog models solely rely on context representations from the utterance-level
encoder, ignorin... | [
-0.006912226319999999,
-0.008738096800000001,
0.0314379297,
-0.0307515133,
-0.00523393508,
0.0209220108,
-0.015060003800000001,
0.00601301901,
-0.0260015018,
-0.0237775091,
0.029955267900000002,
0.0316026695,
0.0157601498,
-0.00214333925,
-0.010907176900000001,
-0.0183822662,
0.02273... |
Ultra Light OCR Competition is a Chinese scene text recognition competition
jointly organized by CSIG (China Society of Image and Graphics) and Baidu, Inc.
In addition to focusing on common problems in Chinese scene text recognition,
such as long text length and massive characters, we need to balance the
trade-off of... | [
-0.004201712086796001,
-0.015709832310676002,
0.02956317551434,
-0.0013923664810130002,
0.00869174208492,
0.027298822999,
-0.021841870620846002,
-0.0034861904568970004,
-0.028058294206857,
-0.038986261934041005,
0.030688321217894002,
0.029760075733065,
-0.041208423674106,
-0.01964783854782... |
Non-autoregressive translation (NAT) models have been extensively
investigated within the context of sentence-level machine translation (MT)
tasks, demonstrating comparable quality and superior translation speed when
contrasted with autoregressive translation (AT) models. However, the challenges
associated with multi... | [
-0.0321429893,
-0.009806335900000001,
0.00600297563,
0.00720493263,
0.011290906,
0.024897195400000002,
-0.0317888707,
0.0131500233,
-0.0319795497,
-0.018128099999999998,
0.0193130337,
0.0405328535,
-0.0171202272,
0.00660565635,
0.0025945929799999997,
-0.00100617087,
0.0263000466,
-... |
We present an algorithm to compute planar linkage topology and geometry,
given a user-specified end-effector trajectory. Planar linkage structures
convert rotational or prismatic motions of a single actuator into an
arbitrarily complex periodic motion, \refined{which is an important component
when building low-cost, ... | [
-0.002554101403802,
0.007708484306931,
-0.002749477745965,
-0.021498501300811,
0.002971496433019,
0.0260596498847,
-0.018869800493121,
0.014159455895423001,
-0.014649672433733002,
-0.021526919677853,
0.012539608404040002,
0.019125565886497,
0.010145359672605,
0.024993961676955,
-0.009768... |
Learned image compression has exhibited promising compression performance,
but variable bitrates over a wide range remain a challenge. State-of-the-art
variable rate methods compromise the loss of model performance and require
numerous additional parameters. In this paper, we present a
Quantization-error-aware Variab... | [
-0.038198892000000005,
-0.00031261926099999997,
0.0209295806,
-0.0059892172,
-0.000226186705,
0.013918652200000001,
-0.00707284966,
-0.0212598294,
-0.0282088351,
-0.0324470401,
0.00882042106,
0.00984557159,
-0.0023478695699999997,
-0.012714617000000001,
-0.00554888416,
-0.0197874662,
... |
Artificial neural networks have advanced the frontiers of reversible
steganography. The core strength of neural networks is the ability to render
accurate predictions for a bewildering variety of data. Residual modulation is
recognised as the most advanced reversible steganographic algorithm for digital
images. The p... | [
-0.0027822717092930004,
-0.007368029560893,
-0.003473899792879,
0.011199125088751,
-0.00048282655188800004,
-0.000628156005404,
-0.017299460247159,
-0.006881263107061,
-0.022846493870019,
-0.018644196912646002,
0.027160853147506003,
0.04647741839289601,
-0.026264363899827003,
0.01050574518... |
Attribute-Based Access Control (ABAC) and Relationship-based access control
(ReBAC) provide a high level of expressiveness and flexibility that promote
security and information sharing, by allowing policies to be expressed in terms
of attributes of and chains of relationships between entities. Algorithms for
learning... | [
-0.0037236036732790005,
-0.021194294095039,
0.022445924580097,
-0.053653270006179005,
-0.01614604704082,
0.019692335277795,
-0.013851388357579,
-0.006845728959888,
-0.028286872431635003,
-0.003057805355638,
0.019678428769111002,
-0.0032281661406150003,
0.0063763670623300005,
0.011591498740... |
We propose a general matrix-valued multiple kernel learning framework for
high-dimensional nonlinear multivariate regression problems. This framework
allows a broad class of mixed norm regularizers, including those that induce
sparsity, to be imposed on a dictionary of vector-valued Reproducing Kernel
Hilbert Spaces.... | [
-0.023673370480537,
-0.000924309948459,
0.019465692341327,
-0.014623410999774001,
-0.006635717581957,
0.012374716810882001,
-0.006125277839601001,
0.006670206785202,
-0.033909760415554005,
-0.031812816858291,
0.000878180668223,
0.016140934079885,
0.0038076052442190004,
0.025080529972910003... |
Modern deep learning techniques can be employed to generate effective feature
extractors for the task of iris recognition. The question arises: should we
train such structures from scratch on a relatively large iris image dataset, or
it is better to fine-tune the existing models to adapt them to a new domain? In
this... | [
-0.007626557257026,
0.0051928381435570005,
0.008955272845923,
-0.005623314995318001,
-0.0074774157255880006,
0.019551102072,
-0.012202491052448,
-0.005084371659904,
-0.011090708896517,
-0.031292609870433,
0.027184439823031002,
0.030723161995410003,
-0.018005454912781,
0.004514921922236,
... |
In this paper, we propose two methods for tackling the problem of
cross-device matching for online advertising at CIKM Cup 2016. The first method
considers the matching problem as a binary classification task and solve it by
utilizing ensemble learning techniques. The second method defines the matching
problem as a r... | [
-0.006819215137511001,
0.011895779520273,
0.047044847160577004,
-0.016107747331261,
0.01090670749545,
0.019485393539071,
-0.010173313319683,
-0.000459632603451,
-0.025433283299207,
-0.033265121281147,
0.004777151159942,
0.035122156143188005,
-0.012460963800549,
0.000776707602199,
-0.0107... |
For large libraries of small molecules, exhaustive combinatorial chemical
screens become infeasible to perform when considering a range of disease
models, assay conditions, and dose ranges. Deep learning models have achieved
state of the art results in silico for the prediction of synergy scores.
However, databases o... | [
-0.029215618968009,
-0.002902654465287,
-0.006712169386446001,
-0.023977536708116,
-0.007654043845832001,
0.033445302397012,
0.016974750906229002,
-0.006617631763219001,
-0.036694593727588,
-0.014789882116019,
0.010420144535601,
0.043529313057661,
0.008291297592222,
0.029943909496068004,
... |
We present the application of Restricted Boltzmann Machines (RBMs) to the
task of astronomical image classification using a quantum annealer built by
D-Wave Systems. Morphological analysis of galaxies provides critical
information for studying their formation and evolution across cosmic time
scales. We compress galax... | [
-0.020906701683998,
-0.002256277948617,
-0.00632165884599,
-0.018512701615691,
-0.020253792405128,
0.016390746459364003,
-0.016880428418517,
-0.014023949392139001,
-0.027571819722652,
-0.031611695885658,
-0.0059509971179060005,
0.033788058906793005,
-0.009161135181784,
-0.001490299706347,
... |
The text-independent approach to writer identification does not require the
writer to write some predetermined text. Previous research on text-independent
writer identification has been based on identifying writer-specific features
designed by experts. However, in the last decade, deep learning methods have
been succ... | [
-0.019247790798544002,
0.014272726140916,
0.0007467694231300001,
-0.00659943697974,
0.004156081937253001,
0.0007310524233610001,
-0.015387358143925,
0.000201772170839,
-0.022292640060186,
-0.009698657318949,
0.007761644665151001,
0.050838094204664,
-0.029089175164699003,
0.001522424165159,... |
It is by now well-known that small adversarial perturbations can induce
classification errors in deep neural networks. In this paper, we take a
bottom-up signal processing perspective to this problem and show that a
systematic exploitation of sparsity in natural data is a promising tool for
defense. For linear classi... | [
-0.013756999745965,
0.023106072098016003,
0.006117776967585,
-0.019508633762598003,
-0.00471719354391,
0.008090679533779,
-0.010209328494966,
-0.0009509036899540001,
-0.010109795257449001,
-0.043226126581430005,
0.054772052913904,
0.029860153794288004,
-0.016764342784881002,
0.017901873216... |
The localization of objects is a crucial task in various applications such as
robotics, virtual and augmented reality, and the transportation of goods in
warehouses. Recent advances in deep learning have enabled the localization
using monocular visual cameras. While structure from motion (SfM) predicts the
absolute p... | [
0.0116896136,
0.0009706554119999999,
-0.008064441379999999,
-0.00591438776,
0.006109214389999999,
0.00520466128,
0.00260059116,
-0.0017508327699999999,
-0.0122253876,
-0.0288622119,
0.00280237617,
0.025689316900000002,
0.0108476831,
0.0252161659,
-0.00832189154,
-0.0038060825299999997,... |
The problem of optical character recognition, OCR, has been widely discussed
in the literature. Having a hand-written text, the program aims at recognizing
the text. Even though there are several approaches to this issue, it is still
an open problem. In this paper we would like to propose an approach that uses
K-near... | [
-0.001516920165158,
0.0009804076980790002,
-0.003219074802473,
-0.005530333612114,
0.017809210345149002,
0.02035910449922,
-0.004872834775596,
-0.0024063794407990003,
-0.037674356251955005,
-0.017916012555360003,
0.015993578359484003,
0.009031432680785,
-0.032868273556232,
-0.0005093947984... |
This paper aims to discuss a method of quantifying the 'shape' of data, via a
methodology called topological data analysis. The main tool within topological
data analysis is persistent homology; this is a means of measuring the shape of
data, from the homology of a simplicial complex, calculated over a range of
value... | [
0.00136521202512,
0.043991897255182,
0.005079455208033001,
-0.012974280864000001,
0.012627560645341,
0.013203117065131002,
-0.00043773461948100003,
0.004975439049303,
-0.006410861853510001,
-0.043714519590139,
0.008328226394951,
0.011559661477804,
0.005540593527257,
0.006636230275034001,
... |
We consider the problem of service placement at the network edge, in which a
decision maker has to choose between $N$ services to host at the edge to
satisfy the demands of customers. Our goal is to design adaptive algorithms to
minimize the average service delivery latency for customers. We pose the
problem as a Mar... | [
-0.0076626650989050004,
-0.007592041511088001,
0.015212332829833001,
0.004368072375655,
-0.008785581216216,
0.017754783853888,
-0.011970707215368002,
0.011342156678438001,
-0.0231080558151,
-0.021963952109217002,
0.014675593003630001,
0.034097094088792,
-0.005897074006497,
0.02511376701295... |
In recent years, event cameras (DVS - Dynamic Vision Sensors) have been used
in vision systems as an alternative or supplement to traditional cameras. They
are characterised by high dynamic range, high temporal resolution, low latency,
and reliable performance in limited lighting conditions -- parameters that are
par... | [
-0.021686982363462,
-0.001086722593754,
0.003956958651542,
-0.008551371283829,
-0.008558152243494,
0.002405708888545,
-0.019706808030605,
0.003248300403356,
-0.002451483393087,
-0.023016139864921,
0.026433976367115003,
0.042560193687677,
-0.026135593652725,
0.008931130170822001,
-0.00260... |
Driving behavior monitoring plays a crucial role in managing road safety and
decreasing the risk of traffic accidents. Driving behavior is affected by
multiple factors like vehicle characteristics, types of roads, traffic, but,
most importantly, the pattern of driving of individuals. Current work performs
a robust dr... | [
-0.024574132636189003,
0.0036059869453310004,
0.021218134090304,
-0.038080316036939,
-0.007150332909077001,
0.018916876986622002,
0.00547575764358,
0.012280217371881001,
-0.008403696119785,
-0.038546048104763,
-0.017232028767466,
0.045121066272258,
0.0065099536441260005,
-0.002486178884282... |
Designing effective rehabilitation strategies for upper extremities,
particularly hands and fingers, warrants the need for a computational model of
human motor learning. The presence of large degrees of freedom (DoFs) available
in these systems makes it difficult to balance the trade-off between learning
the full dex... | [
-0.005878658499568001,
0.008455698378384,
0.009139264002442,
-0.023295894265174002,
-0.011832509189844001,
0.030486997216939003,
-0.002131013665348,
0.025743056088685,
-0.02530557475984,
-0.020794047042727002,
0.007054390385746001,
0.021805722266435002,
-0.010219296440482,
0.02053429186344... |
We study the problem of real-time scheduling in a multi-hop millimeter-wave
(mmWave) mesh. We develop a model-free deep reinforcement learning algorithm
called Adaptive Activator RL (AARL), which determines the subset of mmWave
links that should be activated during each time slot and the power level for
each link. Th... | [
-0.001735394704155,
-0.011278753168880001,
-0.006006933748722,
-0.0008567581535310001,
0.007771207951009,
0.008247282356023001,
-0.020443176850676002,
-0.00416214717552,
-0.038674011826515,
-0.033941276371479,
0.013897160068154,
0.020751224830746002,
-0.0038961055688560005,
-0.002354115946... |
In recent years, advances in the development of whole-slide images have laid
a foundation for the utilization of digital images in pathology. With the
assistance of computer images analysis that automatically identifies tissue or
cell types, they have greatly improved the histopathologic interpretation and
diagnosis ... | [
-0.036647677421569005,
0.014031523838639,
-0.0042243986390530005,
-0.015933182090520002,
0.020402079448103003,
-0.001275129965506,
-0.023444732651114002,
-0.019030168652534003,
-0.037163842469453,
-0.011396368034183,
0.022806320339441,
0.025251308456063003,
-0.017128510400652,
0.0073553435... |
Localization is an essential component for autonomous robots. A
well-established localization approach combines ray casting with a particle
filter, leading to a computationally expensive algorithm that is difficult to
run on resource-constrained mobile robots. We present a novel data structure
called the Compressed D... | [
-0.00027670330018700004,
0.030193792656064002,
-0.020236862823367,
-0.011354270391166,
0.007109585218131001,
0.015995688736438002,
-0.016473172232508,
-0.01128405239433,
-0.028073206543922,
-0.029632048681378004,
0.023677552118897,
0.022891107946634,
-0.007997844368219001,
0.00568415690213... |
We connect learning algorithms and algorithms automating proof search in
propositional proof systems: for every sufficiently strong, well-behaved
propositional proof system $P$, we prove that the following statements are
equivalent,
1. Provable learning: $P$ proves efficiently that p-size circuits are
learnable by ... | [
0.008436185307800001,
-0.0017190523212770002,
0.008566183038055,
0.004669664427638,
-0.019636537879705002,
0.007450937293469,
0.0018165508517990002,
0.0027915358077730003,
-0.018596554175019,
-0.039190970361232,
0.023536477237939002,
0.017734462395310003,
0.0013649788452310002,
0.004392563... |
This paper tackles the unsupervised depth estimation task in indoor
environments. The task is extremely challenging because of the vast areas of
non-texture regions in these scenes. These areas could overwhelm the
optimization process in the commonly used unsupervised depth estimation
framework proposed for outdoor e... | [
0.012329151853919001,
0.0025738154072310004,
0.033101398497819005,
0.021876556798815002,
0.006479095201939001,
0.016285104677081,
0.0045640231110150005,
-0.008876430802047001,
-0.021764727309346,
-0.021401284262537002,
0.025636808946728002,
0.020464714616537,
-0.010463004931807001,
0.02198... |
Spiking neural networks are nature's versatile solution to fault-tolerant and
energy efficient signal processing. To translate these benefits into hardware,
a growing number of neuromorphic spiking neural network processors attempt to
emulate biological neural networks. These developments have created an imminent
nee... | [
-0.013516809791326,
-0.0032074078917500005,
0.000250820332439,
-0.012238657101988001,
0.017949113622307,
0.016519783064723,
0.018086550757288003,
0.003748561255633,
-0.044529195874929005,
-0.050851244479417,
0.021412495523691,
0.030593207105994003,
-0.027762029320001002,
0.0179078839719290... |
There are many computer vision applications including object segmentation,
classification, object detection, and reconstruction for which machine learning
(ML) shows state-of-the-art performance. Nowadays, we can build ML tools for
such applications with real-world accuracy. However, each tool works well
within the d... | [
-0.0096648465842,
-0.010889872908592,
0.022443018853664003,
0.003138706320896,
0.014104720205068002,
0.018503986299037,
-0.011776493862271,
0.008561646565794001,
-0.025678170844912,
-0.030754245817661,
0.0033772818278520003,
0.026679851114749003,
-0.011614060029387,
-0.012548057362437,
-... |
In this position paper, I argue that standardized tests for elementary
science such as SAT or Regents tests are not very good benchmarks for measuring
the progress of artificial intelligence systems in understanding basic science.
The primary problem is that these tests are designed to test aspects of
knowledge and a... | [
0.0005457349470810001,
0.0049066077917810005,
0.023231284692883002,
-0.018291298300027,
0.012630342505872002,
-0.0018458190606900002,
-0.020561022683978,
-0.007616924121975001,
-0.010106944479048,
-0.020721238106489,
0.012336613610386,
0.012423397041857001,
-0.000829033087939,
0.0096797021... |
Panel count data describes aggregated counts of recurrent events observed at
discrete time points. To understand dynamics of health behaviors, the field of
quantitative behavioral research has evolved to increasingly rely upon panel
count data collected via multiple self reports, for example, about frequencies
of smo... | [
-0.016320712864398002,
0.0032476289197800002,
-0.009185560978949,
-0.015935400500893,
-0.022375613451004,
0.010362138040363001,
0.002019447274506,
-0.019265595823526,
-0.013974437490105001,
-0.008552548475563,
-0.005693671759217001,
0.022320568561553,
-0.008745204657316001,
-0.001170556992... |
This paper considers the multi-armed bandit (MAB) problem and provides a new
best-of-both-worlds (BOBW) algorithm that works nearly optimally in both
stochastic and adversarial settings. In stochastic settings, some existing BOBW
algorithms achieve tight gap-dependent regret bounds of $O(\sum_{i: \Delta_i>0}
\frac{\l... | [
-0.018857683986425,
-0.029238443821668004,
0.001013583154417,
-0.007545853033661001,
-0.013945236802101002,
0.030961621552705,
-0.011353520676493001,
0.005315449088811,
-0.054863773286342,
-0.047859884798526,
0.00690660951659,
0.022734835743904003,
-0.002339839702472,
-0.001557287643663000... |
We propose a Text-to-Speech method to create an unseen expressive style using
one utterance of expressive speech of around one second. Specifically, we
enhance the disentanglement capabilities of a state-of-the-art
sequence-to-sequence based system with a Variational AutoEncoder (VAE) and a
Householder Flow. The prop... | [
-0.031958989799022,
-0.0033897475805130003,
0.021583415567874003,
-0.0015683000674470001,
0.033540293574333004,
0.009335243143141,
-0.023872144520282003,
0.001365435426123,
-0.023830531165003003,
-0.024135695770382003,
-0.005347304977476,
0.034539014101028005,
-0.004723106045275,
0.0022956... |
Binary Knapsack Problem (BKP) is to select a subset of an element (item) set
with the highest value while keeping the total weight within the capacity of
the knapsack. This paper presents an integer programming model for a variation
of BKP where the value of each element may depend on selecting or ignoring
other elem... | [
0.018717383965849002,
-0.012957126833498001,
0.019159417599439,
-0.019877724349498003,
-0.021714927628636003,
0.01638289168477,
-0.015457382425665002,
-0.030445102602243004,
-0.019380435347557002,
-0.040722396224737,
0.000864211353473,
0.012763736769557001,
0.008488437160849,
0.00351209961... |
This paper presents a hybrid morphological neural network for regression
tasks called linear dilation-erosion regressor ($\ell$-DER). An $\ell$-DER is
given by a convex combination of the composition of linear and morphological
operators. They yield continuous piecewise linear functions and, thus, are
universal appro... | [
-0.011304439976811001,
0.028216212987899003,
0.0006417876575140001,
-0.014266935177147002,
-0.0034268957097080004,
0.026282649487257,
-0.00039707103860500004,
-0.008376472629606,
-0.013714488595724002,
-0.019528988748788,
0.015275150537490002,
0.042593639343976,
-0.0024704723618920003,
0.0... |
Decentralized optimization over time-varying graphs has been increasingly
common in modern machine learning with massive data stored on millions of
mobile devices, such as in federated learning. This paper revisits the widely
used accelerated gradient tracking and extends it to time-varying graphs. We
prove the $O((\... | [
-0.00404991954565,
0.00012829963816300002,
0.005459040869027001,
-0.041918754577636004,
0.018496023491024003,
-0.001002041972242,
-0.013680655509233001,
0.0036532778758550004,
-0.034709617495536,
-0.042280603200197005,
0.031007630750536003,
0.020221762359142,
-0.010737157426774,
0.02157173... |
We propose LaserTagger - a sequence tagging approach that casts text
generation as a text editing task. Target texts are reconstructed from the
inputs using three main edit operations: keeping a token, deleting it, and
adding a phrase before the token. To predict the edit operations, we propose a
novel model, which c... | [
-0.034703377634286,
0.007446360774338001,
-0.014205045066773002,
-0.014559302479028001,
0.015323388390243001,
0.018532548099756,
-0.039121180772781004,
0.004358760546892,
-0.036453828215599005,
-0.021505534648895,
0.002755917608737,
0.027243122458457003,
-0.030869055539369004,
0.0110514555... |
The visual-question localized-answering (VQLA) system can serve as a
knowledgeable assistant in surgical education. Except for providing text-based
answers, the VQLA system can highlight the interested region for better
surgical scene understanding. However, deep neural networks (DNNs) suffer from
catastrophic forget... | [
-0.0190886278,
0.0191448126,
0.0258869343,
-0.010984038000000002,
0.000974447117,
0.0205915589,
-0.0142076146,
0.0112087755,
-0.0254515056,
-0.0230355784,
0.0103449412,
0.040537,
-0.00917911623,
0.0167007949,
-0.0024457743899999997,
0.00376786222,
0.035087119800000004,
0.0149450339... |
Imposing consistency through proxy tasks has been shown to enhance
data-driven learning and enable self-supervision in various tasks. This paper
introduces novel and effective consistency strategies for optical flow
estimation, a problem where labels from real-world data are very challenging to
derive. More specifica... | [
-0.0034099463373420003,
0.006000948138535,
0.009053695015609,
-0.007276411168277001,
0.025760168209671003,
0.019612854346632,
-0.00968097243458,
0.018093451857566,
-0.02001710049808,
-0.045136049389839006,
0.010447643697261,
0.009743699803948,
-0.0015394418733190001,
0.013688573613762,
-... |
We develop a first line of attack for solving programming competition-style
problems from input-output examples using deep learning. The approach is to
train a neural network to predict properties of the program that generated the
outputs from the inputs. We use the neural network's predictions to augment
search tech... | [
-0.002233159728348,
-0.012247351929545002,
0.013573236763477001,
-0.011577574536204002,
0.00998514611274,
0.026299001649022002,
-0.019464541226625002,
-0.016922121867537002,
-0.026394683867692004,
-0.017878945916891,
0.014147331938147002,
0.04223696142435,
-0.020380359143018,
-0.0070736659... |
We have developed a graphic user interface (GUI), ExBrainable, dedicated to
convolutional neural networks (CNN) model training and visualization in
electroencephalography (EEG) decoding. Available functions include model
training, evaluation, and parameter visualization in terms of temporal and
spatial representation... | [
-0.028903620317578003,
0.0016353820683430002,
0.009400624781847,
-0.020135262981057,
-0.000411016779253,
-0.017550611868500002,
0.019398774951696,
-0.009998151101171,
-0.018648393452167,
-0.026972079649567,
0.002572491532191,
0.032433196902275,
-0.019162544980645003,
0.012874617241322,
-... |
In this paper we look into the problem of planning over hybrid domains, where
change can be both discrete and instantaneous, or continuous over time. In
addition, it is required that each state on the trajectory induced by the
execution of plans complies with a given set of global constraints. We approach
the computa... | [
0.005835317075252,
0.016317984089255,
0.005908476188778,
-0.00203452236019,
-0.025250373408198003,
0.026950454339385,
-0.021961694583296002,
0.002036264399066,
-0.02704800106585,
-0.043839778751134005,
0.034893453121185004,
0.014081403613090002,
-0.006072213407605001,
0.010493119247257,
... |
Continuous engineering of autonomous driving functions commonly requires
deploying vehicles in road testing to obtain inputs that cause problematic
decisions. Although the discovery leads to producing an improved system, it
also challenges the foundation of testing using equivalence classes and the
associated relativ... | [
0.003831504145637,
0.000046743778511881835,
-0.008930785581469002,
0.007184070069342001,
-0.017312200739979,
0.011233913712203001,
-0.009775970131158001,
0.00857158191502,
-0.014818905852735001,
-0.020228087902069,
-0.00222213147208,
0.014875250868499001,
-0.017833396792411003,
0.004141405... |
We present an attention-based ranking framework for learning to order
sentences given a paragraph. Our framework is built on a bidirectional sentence
encoder and a self-attention based transformer network to obtain an input order
invariant representation of paragraphs. Moreover, it allows seamless training
using a va... | [
-0.022780809551477002,
-0.0031361170113080004,
0.036137901246547005,
-0.004452364519238,
0.018369417637586,
0.0037421712186180003,
0.0020469266455620003,
-0.009990504942834,
-0.01674416847527,
-0.023026645183563003,
0.028899395838379003,
0.038350425660610005,
-0.017167551442980003,
0.01258... |
We explore methods for option discovery based on variational inference and
make two algorithmic contributions. First: we highlight a tight connection
between variational option discovery methods and variational autoencoders, and
introduce Variational Autoencoding Learning of Options by Reinforcement
(VALOR), a new me... | [
-0.021199444308876002,
-0.013492420315742002,
0.028037974610924003,
-0.030636616051197003,
-0.012829083018004001,
0.032770238816738004,
-0.019599227234721,
-0.021582402288913,
-0.029597159475088,
-0.019024791195988003,
0.021144736558198002,
0.021705495193600002,
-0.001849822467193,
0.00455... |
Inter-robot communication enables multi-robot systems to coordinate and
execute complex missions efficiently. Thus, maintaining connectivity of the
communication network between robots is essential for many multi-robot systems.
In this paper, we present a trajectory planner for connectivity maintenance of
a multi-rob... | [
0.0009610750712450001,
-0.009619400836527,
-0.009716287255287,
-0.015570973046123001,
0.0006799324764870001,
0.023280335590243003,
-0.018657485023140002,
0.012179961428046001,
-0.014574430882930001,
-0.012982731685042001,
0.007048460654914001,
0.023640196770429,
-0.0053218123503020005,
0.0... |
Given the number of Arabic speakers worldwide and the notably large amount of
content in the web today in some fields such as law, medicine, or even news,
documents of considerable length are produced regularly. Classifying those
documents using traditional learning models is often impractical since extended
length o... | [
-0.00858012214,
0.0101531437,
0.0021926977199999997,
-0.0335850492,
0.006697261709999999,
0.0063908286399999995,
-0.0181408282,
0.0128906118,
-0.0230573751,
-0.0179365408,
0.00640785275,
0.0475583896,
-0.015553172700000001,
0.011045204500000001,
-0.008927412329999999,
0.00896827,
0.0... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.