Search is not available for this dataset
abstract
stringclasses
0 values
embedding
list
This paper presents a practical global optimization algorithm for the K-center clustering problem, which aims to select K samples as the cluster centers to minimize the maximum within-cluster distance. This algorithm is based on a reduced-space branch and bound scheme and guarantees convergence to the global optimum ...
[ 0.000402558798668, 0.010741917416453, 0.010650705546140001, -0.008805425837635, 0.0030362932011480004, 0.037130128592252, -0.029159639030694004, 0.000289421353954, -0.023827271535992, -0.037158194929361, 0.006107667461037001, 0.020277036353945, -0.020291067659854, -0.005332369357347, -0....
Visual surveillance aims to perform robust foreground object detection regardless of the time and place. Object detection shows good results using only spatial information, but foreground object detection in visual surveillance requires proper temporal and spatial information processing. In deep learning-based foregr...
[ -0.004978630691766001, 0.017125925049185, 0.010457236319780001, -0.006834174040704, 0.004679349251091001, 0.018844151869416, -0.032082941383123, -0.000666340754833, -0.026998683810234, -0.023421393707394003, 0.034026511013507, 0.031716763973236, -0.004823708441108, 0.018266715109348002, ...
Recognizing an event in an image can be enhanced by detecting relevant objects in two ways: 1) indirectly utilizing object detection information within the unified architecture or 2) directly making use of the object detection output results. We introduce a novel approach, referred to as Doubly-injected Object Detect...
[ -0.03323445469141, 0.017974574118852, 0.007547676097601001, -0.005244297906756, -0.003516764612868, 0.012250405736267001, -0.007136358413845001, -0.013655740767717, -0.020949769765138, -0.0101526863873, 0.018522998318076002, 0.028709961101412003, -0.005151751451194, 0.012462919577956, -0...
This work generalizes graph neural networks (GNNs) beyond those based on the Weisfeiler-Lehman (WL) algorithm, graph Laplacians, and diffusions. Our approach, denoted Relational Pooling (RP), draws from the theory of finite partial exchangeability to provide a framework with maximal representation power for graphs. R...
[ -0.0033673143479970003, 0.024942545220255, 0.016293341293931, -0.017567364498972, -0.01433984003961, -0.004565250128507, -0.009194200858473, -0.0020508235320440002, -0.022507743909955, -0.051272358745336005, 0.0027391500771040004, 0.032671619206666, 0.0009422464063390001, 0.018784765154123...
This paper presents a novel multi-fake evolutionary generative adversarial network(MFEGAN) for handling imbalance hyperspectral image classification. It is an end-to-end approach in which different generative objective losses are considered in the generator network to improve the classification performance of the dis...
[ -0.018717739731073, -0.0021929517388340003, -0.017297867685556002, 0.0023021728266030004, 0.011242930777370002, 0.017803015187382, -0.015031532384455001, -0.013645792379975001, -0.016929246485233, -0.038227330893278004, 0.025311954319477, 0.022103589028120003, 0.007331456057727, 0.00280390...
Cultural adaptation, i.e., the matching of a robot's behaviours to the cultural norms and preferences of its user, is a well known key requirement for the success of any assistive application. However, culture-dependent robot behaviours are often implicitly set by designers, thus not allowing for an easy and automati...
[ -0.010817383415997, -0.015743156895041, 0.004963716492056, -0.016874566674232, 0.010072308592498, 0.013245775364339001, -0.006816055160015001, 0.019220171496272, -0.005008558742702, -0.027885116636753002, -0.012279937975108, -0.0036977790296070004, 0.0021351913455870002, -0.000475588894914...
Many possible fields of application of robots in real world settings hinge on the ability of robots to grasp objects. As a result, robot grasping has been an active field of research for many years. With our publication we contribute to the endeavor of enabling robots to grasp, with a particular focus on bin picking ...
[ -0.011579873971641001, -0.004333680029958, 0.022429864853620002, -0.018064603209495, -0.005400432273745001, 0.032255213707685006, -0.000748744118027, 0.0058215185999870005, -0.025433614850044, -0.036381859332323005, 0.010028872638940001, 0.014345007948577002, 0.009692003950476001, -0.00735...
Orbital angular momentum of light is regarded as a valuable resource in quantum technology, especially in quantum communication and quantum sensing and ranging. However, the OAM state of light is susceptible to undesirable experimental conditions such as propagation distance and phase distortions, which hinders the p...
[ -0.017170963808894, -0.006853869184851, -0.013707738369703001, -0.002530021360144, -0.005288159474730001, 0.017378343269228002, -0.007942607626318, 0.005651072133332001, -0.020157219842076003, -0.015138652175664001, 0.015138652175664001, 0.020281646400690002, -0.008530180901288001, 0.00631...
Mobile keyboard suggestion is typically regarded as a word-level language modeling problem. Centralized machine learning technique requires massive user data collected to train on, which may impose privacy concerns for sensitive personal typing data of users. Federated learning (FL) provides a promising approach to l...
[ -0.028727790340781004, 0.018533607944846, 0.029536630958318003, -0.026078138500452003, 0.011958290822803001, 0.0027263509109610004, -0.019356394186615, 0.004201090428978, -0.012481248006224, -0.054192326962947006, 0.012474276125431002, 0.039186935871839, -0.022647539153695002, 0.0284628253...
Deep Neural Networks (DNNs) are known to be vulnerable to the maliciously generated adversarial examples. To detect these adversarial examples, previous methods use artificially designed metrics to characterize the properties of \textit{adversarial subspaces} where adversarial examples lie. However, we find these met...
[ 0.000783797469921, 0.002981959842145, 0.01621139422059, -0.025949249044060003, -0.016404222697019, 0.015811963006854002, -0.0021658807527270003, -0.002227861434221, -0.026155851781368002, -0.018497793003916, 0.043854780495166, 0.021968711167573002, -0.005826184991747, 0.011735010892152, ...
Data parallelism has become a dominant method to scale Deep Neural Network (DNN) training across multiple nodes. Since synchronizing a large number of gradients of the local model can be a bottleneck for large-scale distributed training, compressing communication data has gained widespread attention recently. Among s...
[ -0.013290714472532002, -0.007554721552878001, 0.032597225159406, -0.010387741960585001, 0.033324718475341006, 0.004560813307762, -0.033548559993505006, -0.0022052093409, -0.007953443564474, -0.036962173879146, 0.023265745490789, 0.045636113733053006, 0.0060088019818060005, 0.00623614294454...
We classify and re-examine some of the current approaches to improve the performance-computes trade-off of language models, including (1) non-causal models (such as masked language models), (2) extension of batch length with efficient attention, (3) recurrence, (4) conditional computation and (5) retrieval. We identi...
[ -0.024774657562375003, 0.007137989625334001, 0.006721375510096001, -0.012553974054753001, 0.0014425265835590001, 0.014664819464087, -0.002718407660722, 0.009998740628361001, -0.030051769688725003, -0.038828440010547, 0.0020292582921680002, 0.040217157453298, -0.016025759279727003, 0.009623...
This work studies the widely adopted ancestral sampling algorithms for auto-regressive language models, which is not widely studied in the literature. We use the quality-diversity (Q-D) trade-off to investigate three popular sampling algorithms (top-k, nucleus and tempered sampling). We focus on the task of open-ende...
[ 0.003052158514037, 0.0021345957648000002, 0.003830432891845, -0.025099782273173003, -0.012250420637428, 0.027439827099442003, -0.018483579158782, 0.007145498413592, -0.029612727463245003, -0.012905076146125, 0.018135357648134003, 0.023832255974411003, -0.012912040576338001, 0.0082040904089...
Adversarial examples --- perturbations to the input of a model that elicit large changes in the output --- have been shown to be an effective way of assessing the robustness of sequence-to-sequence (seq2seq) models. However, these perturbations only indicate weaknesses in the model if they do not change the input so ...
[ -0.021278165280818002, -0.021082568913698002, 0.005497674457728001, -0.006583936512470001, 0.020160468295216002, 0.021487733349204, 0.0030212760902940004, -0.007467616349458001, -0.027062250301241, -0.019727360457181, 0.032273516058921, 0.011903477832674002, -0.001663448172621, -0.00040734...
State-of-the-art deep learning algorithms generally require large amounts of data for model training. Lack thereof can severely deteriorate the performance, particularly in scenarios with fine-grained boundaries between categories. To this end, we propose a multimodal approach that facilitates bridging the informatio...
[ -0.025643769651651, 0.00964459311217, 0.027475466951727003, -0.009651638567447001, -0.010426587425172001, 0.031138863414525004, -0.0054880483075970005, -0.013195268809795001, -0.028616756200790003, -0.033477798104286, 0.008848509751260001, 0.033618699759244, -0.012110340408980002, -0.00783...
Low resource Handwritten Text Recognition (HTR) is a hard problem due to the scarce annotated data and the very limited linguistic information (dictionaries and language models). For example, in the case of historical ciphered manuscripts, which are usually written with invented alphabets to hide the message contents...
[ -0.028198836371302, 0.002488653641194, -0.004977307282388, -0.0029792990535490002, 0.015743169933557, 0.026030784472823, -0.0010937676997850002, 0.0007142701651900001, -0.019583312794566002, -0.021170381456613003, 0.016550874337553, 0.039109941571950003, -0.038939900696277, -0.001368316588...
This paper presents privileged multi-label learning (PrML) to explore and exploit the relationship between labels in multi-label learning problems. We suggest that for each individual label, it cannot only be implicitly connected with other labels via the low-rank constraint over label predictors, but also its perfor...
[ -0.013495877385139, 0.001274495851248, 0.00795698724687, -0.03769752010703, -0.0057386755943290004, 0.015789970755577, -0.006489594932645001, 0.011105336248874002, -0.045385830104351, -0.033784471452236, 0.026950420811772003, 0.034060038626194, -0.023492058739066003, 0.001216799020767, -...
Topological data analysis (TDA) is a branch of computational mathematics, bridging algebraic topology and data science, that provides compact, noise-robust representations of complex structures. Deep neural networks (DNNs) learn millions of parameters associated with a series of transformations defined by the model a...
[ -0.017212886363267, 0.003031419357284, 0.015805192291736003, -0.017840076237916003, 0.010745858773589, 0.022327970713377002, -0.011184891685843001, -0.0025244406424460002, -0.012752867303788001, -0.028767123818397, 0.022021343931555002, 0.035931028425693005, 0.002423393307253, 0.0083764735...
We present GANcraft, an unsupervised neural rendering framework for generating photorealistic images of large 3D block worlds such as those created in Minecraft. Our method takes a semantic block world as input, where each block is assigned a semantic label such as dirt, grass, or water. We represent the world as a c...
[ 0.00013700913405, -0.016499951481819, 0.011921180412173, -0.017387045547366, 0.026790242642164, 0.019802670925855, -0.030516037717461003, -0.012664974667131, -0.011375276371836001, -0.04645643755793501, 0.009178012609481001, 0.017332455143332003, -0.007731366436928001, -0.01117738615721400...
We consider a non-stationary two-armed bandit framework and propose a change-detection based Thompson sampling (TS) algorithm, named TS with change-detection (TS-CD), to keep track of the dynamic environment. The non-stationarity is modeled using a Poisson arrival process, which changes the mean of the rewards on eac...
[ -0.017763331532478003, 0.005485322326421, 0.0043672276660790006, 0.0015167880337680001, 0.012302543967962001, 0.015141592361032002, -0.014272352680563, 0.015169632621109002, -0.044471416622400006, -0.019529851153492, 0.014440593309700002, 0.028376465663313002, -0.012632014229893001, 0.0091...
This paper studies a fundamental mechanism of how to detect a conflict between arguments given sentiments regarding acceptability of the arguments. We introduce a concept of the inverse problem of the abstract argumentation to tackle the problem. Given noisy sets of acceptable arguments, it aims to find attack relati...
[ 0.002012040000408, -0.00039158642175600005, -0.006368037778884001, -0.014139029197394001, -0.015822572633624, 0.014905520714819001, 0.00010169270535600001, -0.009560612030327001, -0.005208035465329001, -0.018518980592489003, 0.0015064636245360002, 0.010532413609325001, -0.0061935242265460004...
Image textures, as a kind of local variations, provide important information for human visual system. Many image textures, especially the small-scale or stochastic textures are rich in high-frequency variations, and are difficult to be preserved. Current state-of-the-art denoising algorithms typically adopt a nonloca...
[ 0.008148178458213001, 0.021908795461058003, 0.022476801648736, -0.004878764040768001, 0.021746508777141002, 0.029779732227325002, -0.0033370340242980003, -0.001414097729139, -0.023180047050118002, -0.038705538958311005, 0.002199331996962, 0.002319357125088, 0.007735698018223, 0.01954210363...
Robotic process automation (RPA) has emerged as the leading approach to automate tasks in business processes. Moving away from back-end automation, RPA automated the mouse-click on user interfaces; this outside-in approach reduced the overhead of updating legacy software. However, its many shortcomings, namely its la...
[ -0.028766931965947002, -0.0032366234809160003, 0.013118380680680001, -0.0037402510643, 0.003013171022757, 0.020447622984647, -0.012224570848047001, 0.014493472874164002, -0.029234463348984004, -0.036274936050176, 0.001022724900394, 0.01771118864417, -0.029839502647519, -0.00326068769209000...
The first contribution of this paper is architecture of a multipurpose system, which delegates a range of object detection tasks to a classifier, applied in special grid positions of the tested image. The second contribution is Gray Level-Radius Co-occurrence Matrix, which describes local image texture and topology a...
[ -0.011139662936329, 0.007976463995873, 0.009113024920225001, -0.033822946250438, 0.014268628321588001, 0.022731211036443003, 0.00036223587812800003, -0.000750147097278, -0.024429205805063, -0.031193794682621002, 0.012228296138346001, 0.0038581439293920005, -0.026907728984951, 0.00487146293...
It has been experimentally observed that the efficiency of distributed training with stochastic gradient (SGD) depends decisively on the batch size and -- in asynchronous implementations -- on the gradient staleness. Especially, it has been observed that the speedup saturates beyond a certain batch size and/or when t...
[ -0.017899077385663, -0.001224312349222, 0.029038470238447002, -0.014702309854328001, -0.002195136621594, 0.008808711543679001, 0.006298474967479001, 0.015645848587155002, -0.037854224443435, -0.042501505464315005, 0.016504891216754, 0.018715871497988, -0.00416495045647, -0.001850111060775,...
Perception of obstacles remains a critical safety concern for autonomous vehicles. Real-world collisions have shown that the autonomy faults leading to fatal collisions originate from obstacle existence detection. Open source autonomous driving implementations show a perception pipeline with complex interdependent De...
[ -0.002798799891024, -0.009282976388931, -0.023572500795125, 0.015478580258786002, -0.006348581984639, 0.021806301549077003, -0.029872408136725002, 0.014560712501406002, -0.034600816667079, -0.005966137163341, 0.019608983770012002, 0.003744481364265, -0.016980545595288003, 0.005541971419006...
Apricot which is a cultivated type of Zerdali (wild apricot) has an important place in human nutrition and its medical properties are essential for human health. The objective of this research was to obtain a model for apricot mass and separate apricot variety with image processing technology using external features ...
[ -0.015919677913188, 0.013279969803988, 0.00034798847627800003, -0.019882632419466, 0.004838333465158, 0.027129953727126004, -0.003956168889999, 0.009289870969951, -0.004824761301279, -0.044705383479595004, -0.0006115775322540001, 0.016258971765637002, -0.020154066383838, -0.006280332803726...
We introduce an implementation of an extension of Answer Set Programming (ASP) with language constructs from dynamic (and temporal) logic that provides an expressive computational framework for modeling dynamic applications. Starting from logical foundations, provided by dynamic and temporal equilibrium logics over f...
[ -0.012499065138399, 0.017181081697344003, 0.00001708589297777507, -0.038441814482212004, -0.035484749823808004, 0.034937147051095005, -0.018454261124134, -0.021904166787862, -0.018248910084366, -0.039153698831796, 0.02204106748104, 0.027900433167815004, -0.021123832091689002, 0.02023397386...
Spatial-temporal Map (STMap)-based methods have shown great potential to process high-angle videos for vehicle trajectory reconstruction, which can meet the needs of various data-driven modeling and imitation learning applications. In this paper, we developed Spatial-Temporal Deep Embedding (STDE) model that imposes ...
[ -0.0052391812205310005, 0.002528069075196, 0.012743954546749, -0.018622059375047, -0.004617524798959, 0.024313669651746, -0.009331751614809002, 0.014878307469189, -0.011044760234653, -0.04257654771208701, -0.0029476869385680004, 0.024949138984084, 0.001220863894559, 0.031331479549407, 0....
In this work, we propose ReStoCNet, a residual stochastic multilayer convolutional Spiking Neural Network (SNN) composed of binary kernels, to reduce the synaptic memory footprint and enhance the computational efficiency of SNNs for complex pattern recognition tasks. ReStoCNet consists of an input layer followed by s...
[ -0.013227131217718001, 0.013541730120778, 0.009934330359101, 0.021882094442844002, 0.009046463295817, 0.008508149534463001, 0.020819449797272002, -0.003338242648169, -0.025503475219011, -0.004075801931321, 0.031487844884395, 0.041303325444459006, -0.012674835510551001, -0.00069124344736300...
Knowledge Graph Embedding (KGE) aims to learn representations for entities and relations. Most KGE models have gained great success, especially on extrapolation scenarios. Specifically, given an unseen triple (h, r, t), a trained model can still correctly predict t from (h, r, ?), or h from (?, r, t), such extrapolat...
[ 0.014045441523194, 0.009212236851453, 0.022939080372452, -0.030802357941865, 0.008005630224943001, 0.018356686457991, -0.0074158846400670005, -0.011889819055795002, -0.031697146594524, -0.033079996705055, 0.001585365622304, 0.027033407241106002, -0.034679766744375, 0.020390292629599002, ...
In this paper, we study adversarial training on datasets that obey the long-tailed distribution, which is practical but rarely explored in previous works. Compared with conventional adversarial training on balanced datasets, this process falls into the dilemma of generating uneven adversarial examples (AEs) and an un...
[ -0.0252423771, -0.00428966805, 0.00323732081, -0.00291097094, 0.015022564700000001, 0.00869102869, -0.0034624498799999998, 0.00113088079, -0.017828824, -0.0187363215, 0.024488456500000002, 0.028900288000000003, -0.00260730856, 0.00345197879, -0.0145339128, -0.00154099963, 0.029486669...
In this paper, we describe a data enhancement method for developing Emily, an emotion-affective open-domain chatbot. The proposed method is based on explicitly modeling positively transitioned (PT) sentiment data from multi-turn dialogues. We construct a dialogue corpus with PT sentiment data and will release it for ...
[ -0.023672038689255003, -0.022176241502165003, 0.027706578373908, -0.020172694697976, 0.001883470918983, 0.022368362173438003, -0.011499808169901002, 0.011609591543674, -0.011348855681717, -0.022944724187254, 0.005176972132176, 0.029202377423644003, -0.019678669050335003, -0.002586770569905...
Optimal well placement and well injection-production are crucial for the reservoir development to maximize the financial profits during the project lifetime. Meta-heuristic algorithms have showed good performance in solving complex, nonlinear and non-continuous optimization problems. However, a large number of numeri...
[ -0.022348107770085, -0.005814997479319001, -0.00116615591105, -0.005138100590556, -0.026991687715053003, 0.017157398164272003, -0.003363439347594, 0.000475230481242, -0.05931437388062401, -0.025729082524776, -0.0034914533607660002, 0.041188977658748, -0.001003946294076, 0.01607717014849100...
Visual question answering is fundamentally compositional in nature---a question like "where is the dog?" shares substructure with questions like "what color is the dog?" and "where is the cat?" This paper seeks to simultaneously exploit the representational capacity of deep networks and the compositional linguistic s...
[ -0.013843199238181001, 0.015677522867918, 0.01520244590938, -0.013698036782443001, -0.023397514596581, 0.013196567073464002, 0.001309759332798, -0.022843258455395, -0.005948352627456001, -0.027791971340775, 0.005859275814145, 0.017327092587947002, -0.008155479095876, 0.020613038912415, 0...
We propose an image restoration algorithm that can control the perceptual quality and/or the mean square error (MSE) of any pre-trained model, trading one over the other at test time. Our algorithm is few-shot: Given about a dozen images restored by the model, it can significantly improve the perceptual quality and/o...
[ -0.00446461653, -0.015100184800000001, 0.0138336262, 0.0025471886599999997, 0.0116523327, 0.0364205763, -0.00495013036, -0.0041866772799999995, -0.0175770093, -0.0357732251, 0.00222703093, 0.0376589894, -0.014290995, 0.00197547837, -0.0013984909699999999, -0.0140306465, 0.02324837450...
A `trajectory' refers to a trace generated by a moving object in geographical spaces, usually represented by of a series of chronologically ordered points, where each point consists of a geo-spatial coordinate set and a timestamp. Rapid advancements in location sensing and wireless communication technology enabled us...
[ -0.006260382942855001, -0.0054887384176250005, 0.011608212254941, -0.017351929098367, -0.000970426423009, 0.006753563880920001, -0.031912520527839, 0.0011314651928840001, -0.022880926728248003, -0.036528963595628, 0.001996209844946, 0.026611659675836, -0.010548040270805002, 0.0045124408788...
For AI technology to fulfill its full promises, we must have effective means to ensure Responsible AI behavior and curtail potential irresponsible use, e.g., in areas of privacy protection, human autonomy, robustness, and prevention of biases and discrimination in automated decision making. Recent literature in the f...
[ -0.000788573990575, -0.005210855975747, 0.019108731299638002, -0.020260676741600002, 0.003835298586636, 0.007379222661256001, -0.024773590266704, 0.019664375111460002, -0.010604668408632001, -0.035615421831607, 0.017021678388118, 0.010150666348636001, -0.004499360918998, -0.004133448936045...
Past research has identified discriminatory automatic speech recognition (ASR) performance as a function of the racial group and nationality of the speaker. In this paper, we expand the discussion beyond bias as a function of the individual national origin of the speaker to look for bias as a function of the geopolit...
[ -0.017635330557823, 0.006366461049765001, 0.021623956039547, -0.036391209810972006, 0.017662009224295002, 0.022357650101184002, -0.008484167978167001, 0.009544689208269001, -0.009664747864007001, -0.038045357912778, -0.008270729333162, 0.020196588709950003, -0.026439655572175, 0.0134866256...
This paper deals with symbolic time series representation. It builds up on the popular mapping technique Symbolic Aggregate approXimation algorithm (SAX), which is extensively utilized in sequence classification, pattern mining, anomaly detection, time series indexing and other data mining tasks. However, the disadva...
[ -0.007788143120706001, 0.004003317095339001, 0.002237769542261, -0.020805971696972, -0.022920399904251, 0.026120234280824002, -0.02796683460474, -0.007689469959586001, -0.015308458358049, -0.02118656784296, 0.006392620503902001, 0.028953567147254004, 0.011157131753861, 0.033041462302207, ...
Transfer learning (TL) enables the transfer of knowledge gained in learning to perform one task (source) to a related but different task (target), hence addressing the expense of data acquisition and labeling, potential computational power limitations, and dataset distribution mismatches. We propose a new TL framewor...
[ 0.00008090175833785906, -0.020978542044758002, 0.024317637085914, -0.0030907774344080003, -0.013807233422994001, 0.015807872638106003, 0.00044754633563500005, 0.014568040147423002, -0.026360545307397003, -0.02234517596662, 0.018611587584018003, 0.040435470640659006, -0.004469739738851001, ...
What is the best way to exploit extra data -- be it unlabeled data from the same task, or labeled data from a related task -- to learn a given task? This paper formalizes the question using the theory of reference priors. Reference priors are objective, uninformative Bayesian priors that maximize the mutual informati...
[ 0.009683061391115001, -0.017771586775779002, 0.011720525100827, -0.010132802650332002, 0.008504194207489001, 0.00232025492005, -0.003560450160875, 0.017703443765640002, -0.015250310301780002, -0.027856688946485002, 0.016885733231902, 0.018412126228213, -0.011488839983940001, 0.011652382090...
Automatic phonemic transcription tools are useful for low-resource language documentation. However, due to the lack of training sets, only a tiny fraction of languages have phonemic transcription tools. Fortunately, multilingual acoustic modeling provides a solution given limited audio training data. A more challengi...
[ -0.023402292281389, -0.009309424087405, 0.030868804082274003, -0.019770668819546002, 0.019391246140003003, 0.041980490088462004, -0.015000774525105, 0.002329049864783, -0.017453476786613003, -0.024621868506073, 0.029676329344511, 0.031519241631031, -0.028050228953361, 0.0007935708272270001...
Temporal information extraction plays a critical role in natural language understanding. Previous systems have incorporated advanced neural language models and have successfully enhanced the accuracy of temporal information extraction tasks. However, these systems have two major shortcomings. First, they fail to make...
[ -0.036057047545909, 0.002720474032685, 0.030654003843665, -0.021391643211245003, -0.010054899379611001, 0.01647101342678, -0.014238123781979, -0.005289332009851, -0.0075739100575440005, -0.046477206051349, 0.020220065489411, 0.031067503616213004, -0.018235273659229, 0.011391877196729001, ...
In today's technological era, document images play an important and integral part in our day to day life, and specifically with the surge of Covid-19, digitally scanned documents have become key source of communication, thus avoiding any sort of infection through physical contact. Storage and transmission of scanned ...
[ -0.013235461898148, 0.014460718259215001, -0.006718713324517, -0.015457079745829001, 0.027601929381489, 0.032206740230321, -0.005931048654019001, -0.0045105591416350005, -0.017072802409529002, -0.032718382775783005, 0.023050976917147, 0.028382861986756002, 0.0062676575034850005, -0.0101251...
One advantage of decision tree based methods like random forests is their ability to natively handle categorical predictors without having to first transform them (e.g., by using feature engineering techniques). However, in this paper, we show how this capability can lead to an inherent "absent levels" problem for de...
[ 0.000522529997397, -0.014885899610817, 0.000361833837814, -0.004169968888163, 0.0030162092298260004, 0.028621463105082002, 0.008832938969135, -0.01713179424405, -0.025225231423974002, -0.013112463988363, 0.023034114390611003, 0.0076141306199130005, -0.045931283384561004, 0.016419680789113,...
To date, there are no effective treatments for most neurodegenerative diseases. Knowledge graphs can provide comprehensive and semantic representation for heterogeneous data, and have been successfully leveraged in many biomedical applications including drug repurposing. Our objective is to construct a knowledge grap...
[ 0.005248109344393, 0.0024172493722280004, 0.031190313398838, -0.045537855476140005, -0.018144626170396, 0.030946215614676004, -0.022768927738070002, -0.004787034820765, -0.029210405424237, -0.024165712296962003, 0.012618515640497001, 0.032492168247699, 0.001006904640235, 0.0116624645888800...
Current top performing object recognition systems build on object proposals as a preprocessing step. Object proposal algorithms are designed to generate candidate regions for generic objects, yet current approaches are limited in capturing the vast variety of object characteristics. In this paper we analyze the error...
[ -0.007631989661604, 0.0033669515978540002, -0.0009583668434060001, -0.035168655216693004, -0.024838911369442003, 0.025258252397179003, -0.012342576868832, 0.025537811219692, -0.013034488074481002, -0.039054542779922, 0.011245303787291001, 0.015054309740662, -0.019275667145848, -0.005168366...
Human pose estimation has recently made significant progress with the adoption of deep convolutional neural networks. Its many applications have attracted tremendous interest in recent years. However, many practical applications require pose estimation for human crowds, which still is a rarely addressed problem. In t...
[ -0.0024977577850220003, 0.005183831788599, 0.006159652490168001, -0.007731236983090001, 0.013031482696533, 0.013593006879091001, -0.0038176833186290005, 0.021639246493577003, -0.025789050385355002, -0.025720572099089, 0.0031517287716260004, 0.008422871120274001, -0.017982486635446, -0.0062...
This paper considers the integration of rigid cooperative manipulation with rigidity theory. Motivated by rigid models of cooperative manipulation systems, i.e., where the grasping contacts are rigid, we introduce first the notion of bearing and distance rigidity for graph frameworks in SE(3). Next, we associate the ...
[ -0.005085689947009001, -0.0042825015261760005, -0.006832361686974001, -0.017578950151801002, 0.000173943757545, 0.028395688161253003, -0.020679468289017, 0.0065798307769, -0.012268789112567001, -0.041555348783731, -0.00046209633001100003, 0.016975682228803, 0.008957829326391002, 0.01001004...
As research and industry moves towards large-scale models capable of numerous downstream tasks, the complexity of understanding multi-modal datasets that give nuance to models rapidly increases. A clear and thorough understanding of a dataset's origins, development, intent, ethical considerations and evolution become...
[ -0.022588290274143, -0.0036623131018130002, 0.004407892469316, -0.035069838166236, -0.001984759699553, 0.010555469430983, -0.012502259574830001, 0.021318044513463003, -0.025915782898664003, -0.024769799783825003, 0.008946951478719, 0.022615903988480002, -0.022049816325306, 0.00894004758447...
Ionic Polymer Metal Composites (IPMCs) are one of the most preferred choices among biocompatible materials for industrial and biomedical applications. Despite their advantages, some of their drawbacks include non-linear and hysteretic behavior, which complicates the modeling process. In previous works, usually autore...
[ -0.043272826820611, 0.009157088585197001, 0.001397642539814, -0.014014812186360002, -0.006026788149029001, 0.006773593369871001, -0.010650699026882001, 0.009631693363189, -0.013547186739742001, -0.029955962672829003, 0.021329315379261003, 0.027973787859082003, 0.010950816795229001, 0.01268...
Implementing enterprise process automation often requires significant technical expertise and engineering effort. It would be beneficial for non-technical users to be able to describe a business process in natural language and have an intelligent system generate the workflow that can be automatically executed. A buil...
[ -0.037192735821008, -0.020765943452715003, -0.009958489798009, -0.010726600885391001, 0.012559286318719, 0.027530709281563003, -0.026816502213478, 0.002848410978913, -0.004359365906566001, -0.021884420886635003, 0.004625509493052, 0.019580088555812003, 0.001007303246296, 0.0019034325378010...
The ability of reasoning beyond data fitting is substantial to deep learning systems in order to make a leap forward towards artificial general intelligence. A lot of efforts have been made to model neural-based reasoning as an iterative decision-making process based on recurrent networks and reinforcement learning. ...
[ -0.009468207135796, 0.007555086631327001, 0.020912146195769, -0.008327291347086001, 0.028606368228793002, -0.009871701709926, -0.016932854428887003, -0.013273577205836001, -0.016445878893136, -0.014678850769996001, 0.022011319175362, 0.022734828293323003, -0.017795497551560003, 0.006087201...
In multi-turn dialogue generation, responses are not only related to the topic and background of the context but also related to words and phrases in the sentences of the context. However, currently widely used hierarchical dialog models solely rely on context representations from the utterance-level encoder, ignorin...
[ -0.006912226319999999, -0.008738096800000001, 0.0314379297, -0.0307515133, -0.00523393508, 0.0209220108, -0.015060003800000001, 0.00601301901, -0.0260015018, -0.0237775091, 0.029955267900000002, 0.0316026695, 0.0157601498, -0.00214333925, -0.010907176900000001, -0.0183822662, 0.02273...
Ultra Light OCR Competition is a Chinese scene text recognition competition jointly organized by CSIG (China Society of Image and Graphics) and Baidu, Inc. In addition to focusing on common problems in Chinese scene text recognition, such as long text length and massive characters, we need to balance the trade-off of...
[ -0.004201712086796001, -0.015709832310676002, 0.02956317551434, -0.0013923664810130002, 0.00869174208492, 0.027298822999, -0.021841870620846002, -0.0034861904568970004, -0.028058294206857, -0.038986261934041005, 0.030688321217894002, 0.029760075733065, -0.041208423674106, -0.01964783854782...
Non-autoregressive translation (NAT) models have been extensively investigated within the context of sentence-level machine translation (MT) tasks, demonstrating comparable quality and superior translation speed when contrasted with autoregressive translation (AT) models. However, the challenges associated with multi...
[ -0.0321429893, -0.009806335900000001, 0.00600297563, 0.00720493263, 0.011290906, 0.024897195400000002, -0.0317888707, 0.0131500233, -0.0319795497, -0.018128099999999998, 0.0193130337, 0.0405328535, -0.0171202272, 0.00660565635, 0.0025945929799999997, -0.00100617087, 0.0263000466, -...
We present an algorithm to compute planar linkage topology and geometry, given a user-specified end-effector trajectory. Planar linkage structures convert rotational or prismatic motions of a single actuator into an arbitrarily complex periodic motion, \refined{which is an important component when building low-cost, ...
[ -0.002554101403802, 0.007708484306931, -0.002749477745965, -0.021498501300811, 0.002971496433019, 0.0260596498847, -0.018869800493121, 0.014159455895423001, -0.014649672433733002, -0.021526919677853, 0.012539608404040002, 0.019125565886497, 0.010145359672605, 0.024993961676955, -0.009768...
Learned image compression has exhibited promising compression performance, but variable bitrates over a wide range remain a challenge. State-of-the-art variable rate methods compromise the loss of model performance and require numerous additional parameters. In this paper, we present a Quantization-error-aware Variab...
[ -0.038198892000000005, -0.00031261926099999997, 0.0209295806, -0.0059892172, -0.000226186705, 0.013918652200000001, -0.00707284966, -0.0212598294, -0.0282088351, -0.0324470401, 0.00882042106, 0.00984557159, -0.0023478695699999997, -0.012714617000000001, -0.00554888416, -0.0197874662, ...
Artificial neural networks have advanced the frontiers of reversible steganography. The core strength of neural networks is the ability to render accurate predictions for a bewildering variety of data. Residual modulation is recognised as the most advanced reversible steganographic algorithm for digital images. The p...
[ -0.0027822717092930004, -0.007368029560893, -0.003473899792879, 0.011199125088751, -0.00048282655188800004, -0.000628156005404, -0.017299460247159, -0.006881263107061, -0.022846493870019, -0.018644196912646002, 0.027160853147506003, 0.04647741839289601, -0.026264363899827003, 0.01050574518...
Attribute-Based Access Control (ABAC) and Relationship-based access control (ReBAC) provide a high level of expressiveness and flexibility that promote security and information sharing, by allowing policies to be expressed in terms of attributes of and chains of relationships between entities. Algorithms for learning...
[ -0.0037236036732790005, -0.021194294095039, 0.022445924580097, -0.053653270006179005, -0.01614604704082, 0.019692335277795, -0.013851388357579, -0.006845728959888, -0.028286872431635003, -0.003057805355638, 0.019678428769111002, -0.0032281661406150003, 0.0063763670623300005, 0.011591498740...
We propose a general matrix-valued multiple kernel learning framework for high-dimensional nonlinear multivariate regression problems. This framework allows a broad class of mixed norm regularizers, including those that induce sparsity, to be imposed on a dictionary of vector-valued Reproducing Kernel Hilbert Spaces....
[ -0.023673370480537, -0.000924309948459, 0.019465692341327, -0.014623410999774001, -0.006635717581957, 0.012374716810882001, -0.006125277839601001, 0.006670206785202, -0.033909760415554005, -0.031812816858291, 0.000878180668223, 0.016140934079885, 0.0038076052442190004, 0.025080529972910003...
Modern deep learning techniques can be employed to generate effective feature extractors for the task of iris recognition. The question arises: should we train such structures from scratch on a relatively large iris image dataset, or it is better to fine-tune the existing models to adapt them to a new domain? In this...
[ -0.007626557257026, 0.0051928381435570005, 0.008955272845923, -0.005623314995318001, -0.0074774157255880006, 0.019551102072, -0.012202491052448, -0.005084371659904, -0.011090708896517, -0.031292609870433, 0.027184439823031002, 0.030723161995410003, -0.018005454912781, 0.004514921922236, ...
In this paper, we propose two methods for tackling the problem of cross-device matching for online advertising at CIKM Cup 2016. The first method considers the matching problem as a binary classification task and solve it by utilizing ensemble learning techniques. The second method defines the matching problem as a r...
[ -0.006819215137511001, 0.011895779520273, 0.047044847160577004, -0.016107747331261, 0.01090670749545, 0.019485393539071, -0.010173313319683, -0.000459632603451, -0.025433283299207, -0.033265121281147, 0.004777151159942, 0.035122156143188005, -0.012460963800549, 0.000776707602199, -0.0107...
For large libraries of small molecules, exhaustive combinatorial chemical screens become infeasible to perform when considering a range of disease models, assay conditions, and dose ranges. Deep learning models have achieved state of the art results in silico for the prediction of synergy scores. However, databases o...
[ -0.029215618968009, -0.002902654465287, -0.006712169386446001, -0.023977536708116, -0.007654043845832001, 0.033445302397012, 0.016974750906229002, -0.006617631763219001, -0.036694593727588, -0.014789882116019, 0.010420144535601, 0.043529313057661, 0.008291297592222, 0.029943909496068004, ...
We present the application of Restricted Boltzmann Machines (RBMs) to the task of astronomical image classification using a quantum annealer built by D-Wave Systems. Morphological analysis of galaxies provides critical information for studying their formation and evolution across cosmic time scales. We compress galax...
[ -0.020906701683998, -0.002256277948617, -0.00632165884599, -0.018512701615691, -0.020253792405128, 0.016390746459364003, -0.016880428418517, -0.014023949392139001, -0.027571819722652, -0.031611695885658, -0.0059509971179060005, 0.033788058906793005, -0.009161135181784, -0.001490299706347, ...
The text-independent approach to writer identification does not require the writer to write some predetermined text. Previous research on text-independent writer identification has been based on identifying writer-specific features designed by experts. However, in the last decade, deep learning methods have been succ...
[ -0.019247790798544002, 0.014272726140916, 0.0007467694231300001, -0.00659943697974, 0.004156081937253001, 0.0007310524233610001, -0.015387358143925, 0.000201772170839, -0.022292640060186, -0.009698657318949, 0.007761644665151001, 0.050838094204664, -0.029089175164699003, 0.001522424165159,...
It is by now well-known that small adversarial perturbations can induce classification errors in deep neural networks. In this paper, we take a bottom-up signal processing perspective to this problem and show that a systematic exploitation of sparsity in natural data is a promising tool for defense. For linear classi...
[ -0.013756999745965, 0.023106072098016003, 0.006117776967585, -0.019508633762598003, -0.00471719354391, 0.008090679533779, -0.010209328494966, -0.0009509036899540001, -0.010109795257449001, -0.043226126581430005, 0.054772052913904, 0.029860153794288004, -0.016764342784881002, 0.017901873216...
The localization of objects is a crucial task in various applications such as robotics, virtual and augmented reality, and the transportation of goods in warehouses. Recent advances in deep learning have enabled the localization using monocular visual cameras. While structure from motion (SfM) predicts the absolute p...
[ 0.0116896136, 0.0009706554119999999, -0.008064441379999999, -0.00591438776, 0.006109214389999999, 0.00520466128, 0.00260059116, -0.0017508327699999999, -0.0122253876, -0.0288622119, 0.00280237617, 0.025689316900000002, 0.0108476831, 0.0252161659, -0.00832189154, -0.0038060825299999997,...
The problem of optical character recognition, OCR, has been widely discussed in the literature. Having a hand-written text, the program aims at recognizing the text. Even though there are several approaches to this issue, it is still an open problem. In this paper we would like to propose an approach that uses K-near...
[ -0.001516920165158, 0.0009804076980790002, -0.003219074802473, -0.005530333612114, 0.017809210345149002, 0.02035910449922, -0.004872834775596, -0.0024063794407990003, -0.037674356251955005, -0.017916012555360003, 0.015993578359484003, 0.009031432680785, -0.032868273556232, -0.0005093947984...
This paper aims to discuss a method of quantifying the 'shape' of data, via a methodology called topological data analysis. The main tool within topological data analysis is persistent homology; this is a means of measuring the shape of data, from the homology of a simplicial complex, calculated over a range of value...
[ 0.00136521202512, 0.043991897255182, 0.005079455208033001, -0.012974280864000001, 0.012627560645341, 0.013203117065131002, -0.00043773461948100003, 0.004975439049303, -0.006410861853510001, -0.043714519590139, 0.008328226394951, 0.011559661477804, 0.005540593527257, 0.006636230275034001, ...
We consider the problem of service placement at the network edge, in which a decision maker has to choose between $N$ services to host at the edge to satisfy the demands of customers. Our goal is to design adaptive algorithms to minimize the average service delivery latency for customers. We pose the problem as a Mar...
[ -0.0076626650989050004, -0.007592041511088001, 0.015212332829833001, 0.004368072375655, -0.008785581216216, 0.017754783853888, -0.011970707215368002, 0.011342156678438001, -0.0231080558151, -0.021963952109217002, 0.014675593003630001, 0.034097094088792, -0.005897074006497, 0.02511376701295...
In recent years, event cameras (DVS - Dynamic Vision Sensors) have been used in vision systems as an alternative or supplement to traditional cameras. They are characterised by high dynamic range, high temporal resolution, low latency, and reliable performance in limited lighting conditions -- parameters that are par...
[ -0.021686982363462, -0.001086722593754, 0.003956958651542, -0.008551371283829, -0.008558152243494, 0.002405708888545, -0.019706808030605, 0.003248300403356, -0.002451483393087, -0.023016139864921, 0.026433976367115003, 0.042560193687677, -0.026135593652725, 0.008931130170822001, -0.00260...
Driving behavior monitoring plays a crucial role in managing road safety and decreasing the risk of traffic accidents. Driving behavior is affected by multiple factors like vehicle characteristics, types of roads, traffic, but, most importantly, the pattern of driving of individuals. Current work performs a robust dr...
[ -0.024574132636189003, 0.0036059869453310004, 0.021218134090304, -0.038080316036939, -0.007150332909077001, 0.018916876986622002, 0.00547575764358, 0.012280217371881001, -0.008403696119785, -0.038546048104763, -0.017232028767466, 0.045121066272258, 0.0065099536441260005, -0.002486178884282...
Designing effective rehabilitation strategies for upper extremities, particularly hands and fingers, warrants the need for a computational model of human motor learning. The presence of large degrees of freedom (DoFs) available in these systems makes it difficult to balance the trade-off between learning the full dex...
[ -0.005878658499568001, 0.008455698378384, 0.009139264002442, -0.023295894265174002, -0.011832509189844001, 0.030486997216939003, -0.002131013665348, 0.025743056088685, -0.02530557475984, -0.020794047042727002, 0.007054390385746001, 0.021805722266435002, -0.010219296440482, 0.02053429186344...
We study the problem of real-time scheduling in a multi-hop millimeter-wave (mmWave) mesh. We develop a model-free deep reinforcement learning algorithm called Adaptive Activator RL (AARL), which determines the subset of mmWave links that should be activated during each time slot and the power level for each link. Th...
[ -0.001735394704155, -0.011278753168880001, -0.006006933748722, -0.0008567581535310001, 0.007771207951009, 0.008247282356023001, -0.020443176850676002, -0.00416214717552, -0.038674011826515, -0.033941276371479, 0.013897160068154, 0.020751224830746002, -0.0038961055688560005, -0.002354115946...
In recent years, advances in the development of whole-slide images have laid a foundation for the utilization of digital images in pathology. With the assistance of computer images analysis that automatically identifies tissue or cell types, they have greatly improved the histopathologic interpretation and diagnosis ...
[ -0.036647677421569005, 0.014031523838639, -0.0042243986390530005, -0.015933182090520002, 0.020402079448103003, -0.001275129965506, -0.023444732651114002, -0.019030168652534003, -0.037163842469453, -0.011396368034183, 0.022806320339441, 0.025251308456063003, -0.017128510400652, 0.0073553435...
Localization is an essential component for autonomous robots. A well-established localization approach combines ray casting with a particle filter, leading to a computationally expensive algorithm that is difficult to run on resource-constrained mobile robots. We present a novel data structure called the Compressed D...
[ -0.00027670330018700004, 0.030193792656064002, -0.020236862823367, -0.011354270391166, 0.007109585218131001, 0.015995688736438002, -0.016473172232508, -0.01128405239433, -0.028073206543922, -0.029632048681378004, 0.023677552118897, 0.022891107946634, -0.007997844368219001, 0.00568415690213...
We connect learning algorithms and algorithms automating proof search in propositional proof systems: for every sufficiently strong, well-behaved propositional proof system $P$, we prove that the following statements are equivalent, 1. Provable learning: $P$ proves efficiently that p-size circuits are learnable by ...
[ 0.008436185307800001, -0.0017190523212770002, 0.008566183038055, 0.004669664427638, -0.019636537879705002, 0.007450937293469, 0.0018165508517990002, 0.0027915358077730003, -0.018596554175019, -0.039190970361232, 0.023536477237939002, 0.017734462395310003, 0.0013649788452310002, 0.004392563...
This paper tackles the unsupervised depth estimation task in indoor environments. The task is extremely challenging because of the vast areas of non-texture regions in these scenes. These areas could overwhelm the optimization process in the commonly used unsupervised depth estimation framework proposed for outdoor e...
[ 0.012329151853919001, 0.0025738154072310004, 0.033101398497819005, 0.021876556798815002, 0.006479095201939001, 0.016285104677081, 0.0045640231110150005, -0.008876430802047001, -0.021764727309346, -0.021401284262537002, 0.025636808946728002, 0.020464714616537, -0.010463004931807001, 0.02198...
Spiking neural networks are nature's versatile solution to fault-tolerant and energy efficient signal processing. To translate these benefits into hardware, a growing number of neuromorphic spiking neural network processors attempt to emulate biological neural networks. These developments have created an imminent nee...
[ -0.013516809791326, -0.0032074078917500005, 0.000250820332439, -0.012238657101988001, 0.017949113622307, 0.016519783064723, 0.018086550757288003, 0.003748561255633, -0.044529195874929005, -0.050851244479417, 0.021412495523691, 0.030593207105994003, -0.027762029320001002, 0.0179078839719290...
There are many computer vision applications including object segmentation, classification, object detection, and reconstruction for which machine learning (ML) shows state-of-the-art performance. Nowadays, we can build ML tools for such applications with real-world accuracy. However, each tool works well within the d...
[ -0.0096648465842, -0.010889872908592, 0.022443018853664003, 0.003138706320896, 0.014104720205068002, 0.018503986299037, -0.011776493862271, 0.008561646565794001, -0.025678170844912, -0.030754245817661, 0.0033772818278520003, 0.026679851114749003, -0.011614060029387, -0.012548057362437, -...
In this position paper, I argue that standardized tests for elementary science such as SAT or Regents tests are not very good benchmarks for measuring the progress of artificial intelligence systems in understanding basic science. The primary problem is that these tests are designed to test aspects of knowledge and a...
[ 0.0005457349470810001, 0.0049066077917810005, 0.023231284692883002, -0.018291298300027, 0.012630342505872002, -0.0018458190606900002, -0.020561022683978, -0.007616924121975001, -0.010106944479048, -0.020721238106489, 0.012336613610386, 0.012423397041857001, -0.000829033087939, 0.0096797021...
Panel count data describes aggregated counts of recurrent events observed at discrete time points. To understand dynamics of health behaviors, the field of quantitative behavioral research has evolved to increasingly rely upon panel count data collected via multiple self reports, for example, about frequencies of smo...
[ -0.016320712864398002, 0.0032476289197800002, -0.009185560978949, -0.015935400500893, -0.022375613451004, 0.010362138040363001, 0.002019447274506, -0.019265595823526, -0.013974437490105001, -0.008552548475563, -0.005693671759217001, 0.022320568561553, -0.008745204657316001, -0.001170556992...
This paper considers the multi-armed bandit (MAB) problem and provides a new best-of-both-worlds (BOBW) algorithm that works nearly optimally in both stochastic and adversarial settings. In stochastic settings, some existing BOBW algorithms achieve tight gap-dependent regret bounds of $O(\sum_{i: \Delta_i>0} \frac{\l...
[ -0.018857683986425, -0.029238443821668004, 0.001013583154417, -0.007545853033661001, -0.013945236802101002, 0.030961621552705, -0.011353520676493001, 0.005315449088811, -0.054863773286342, -0.047859884798526, 0.00690660951659, 0.022734835743904003, -0.002339839702472, -0.001557287643663000...
We propose a Text-to-Speech method to create an unseen expressive style using one utterance of expressive speech of around one second. Specifically, we enhance the disentanglement capabilities of a state-of-the-art sequence-to-sequence based system with a Variational AutoEncoder (VAE) and a Householder Flow. The prop...
[ -0.031958989799022, -0.0033897475805130003, 0.021583415567874003, -0.0015683000674470001, 0.033540293574333004, 0.009335243143141, -0.023872144520282003, 0.001365435426123, -0.023830531165003003, -0.024135695770382003, -0.005347304977476, 0.034539014101028005, -0.004723106045275, 0.0022956...
Binary Knapsack Problem (BKP) is to select a subset of an element (item) set with the highest value while keeping the total weight within the capacity of the knapsack. This paper presents an integer programming model for a variation of BKP where the value of each element may depend on selecting or ignoring other elem...
[ 0.018717383965849002, -0.012957126833498001, 0.019159417599439, -0.019877724349498003, -0.021714927628636003, 0.01638289168477, -0.015457382425665002, -0.030445102602243004, -0.019380435347557002, -0.040722396224737, 0.000864211353473, 0.012763736769557001, 0.008488437160849, 0.00351209961...
This paper presents a hybrid morphological neural network for regression tasks called linear dilation-erosion regressor ($\ell$-DER). An $\ell$-DER is given by a convex combination of the composition of linear and morphological operators. They yield continuous piecewise linear functions and, thus, are universal appro...
[ -0.011304439976811001, 0.028216212987899003, 0.0006417876575140001, -0.014266935177147002, -0.0034268957097080004, 0.026282649487257, -0.00039707103860500004, -0.008376472629606, -0.013714488595724002, -0.019528988748788, 0.015275150537490002, 0.042593639343976, -0.0024704723618920003, 0.0...
Decentralized optimization over time-varying graphs has been increasingly common in modern machine learning with massive data stored on millions of mobile devices, such as in federated learning. This paper revisits the widely used accelerated gradient tracking and extends it to time-varying graphs. We prove the $O((\...
[ -0.00404991954565, 0.00012829963816300002, 0.005459040869027001, -0.041918754577636004, 0.018496023491024003, -0.001002041972242, -0.013680655509233001, 0.0036532778758550004, -0.034709617495536, -0.042280603200197005, 0.031007630750536003, 0.020221762359142, -0.010737157426774, 0.02157173...
We propose LaserTagger - a sequence tagging approach that casts text generation as a text editing task. Target texts are reconstructed from the inputs using three main edit operations: keeping a token, deleting it, and adding a phrase before the token. To predict the edit operations, we propose a novel model, which c...
[ -0.034703377634286, 0.007446360774338001, -0.014205045066773002, -0.014559302479028001, 0.015323388390243001, 0.018532548099756, -0.039121180772781004, 0.004358760546892, -0.036453828215599005, -0.021505534648895, 0.002755917608737, 0.027243122458457003, -0.030869055539369004, 0.0110514555...
The visual-question localized-answering (VQLA) system can serve as a knowledgeable assistant in surgical education. Except for providing text-based answers, the VQLA system can highlight the interested region for better surgical scene understanding. However, deep neural networks (DNNs) suffer from catastrophic forget...
[ -0.0190886278, 0.0191448126, 0.0258869343, -0.010984038000000002, 0.000974447117, 0.0205915589, -0.0142076146, 0.0112087755, -0.0254515056, -0.0230355784, 0.0103449412, 0.040537, -0.00917911623, 0.0167007949, -0.0024457743899999997, 0.00376786222, 0.035087119800000004, 0.0149450339...
Imposing consistency through proxy tasks has been shown to enhance data-driven learning and enable self-supervision in various tasks. This paper introduces novel and effective consistency strategies for optical flow estimation, a problem where labels from real-world data are very challenging to derive. More specifica...
[ -0.0034099463373420003, 0.006000948138535, 0.009053695015609, -0.007276411168277001, 0.025760168209671003, 0.019612854346632, -0.00968097243458, 0.018093451857566, -0.02001710049808, -0.045136049389839006, 0.010447643697261, 0.009743699803948, -0.0015394418733190001, 0.013688573613762, -...
We develop a first line of attack for solving programming competition-style problems from input-output examples using deep learning. The approach is to train a neural network to predict properties of the program that generated the outputs from the inputs. We use the neural network's predictions to augment search tech...
[ -0.002233159728348, -0.012247351929545002, 0.013573236763477001, -0.011577574536204002, 0.00998514611274, 0.026299001649022002, -0.019464541226625002, -0.016922121867537002, -0.026394683867692004, -0.017878945916891, 0.014147331938147002, 0.04223696142435, -0.020380359143018, -0.0070736659...
We have developed a graphic user interface (GUI), ExBrainable, dedicated to convolutional neural networks (CNN) model training and visualization in electroencephalography (EEG) decoding. Available functions include model training, evaluation, and parameter visualization in terms of temporal and spatial representation...
[ -0.028903620317578003, 0.0016353820683430002, 0.009400624781847, -0.020135262981057, -0.000411016779253, -0.017550611868500002, 0.019398774951696, -0.009998151101171, -0.018648393452167, -0.026972079649567, 0.002572491532191, 0.032433196902275, -0.019162544980645003, 0.012874617241322, -...
In this paper we look into the problem of planning over hybrid domains, where change can be both discrete and instantaneous, or continuous over time. In addition, it is required that each state on the trajectory induced by the execution of plans complies with a given set of global constraints. We approach the computa...
[ 0.005835317075252, 0.016317984089255, 0.005908476188778, -0.00203452236019, -0.025250373408198003, 0.026950454339385, -0.021961694583296002, 0.002036264399066, -0.02704800106585, -0.043839778751134005, 0.034893453121185004, 0.014081403613090002, -0.006072213407605001, 0.010493119247257, ...
Continuous engineering of autonomous driving functions commonly requires deploying vehicles in road testing to obtain inputs that cause problematic decisions. Although the discovery leads to producing an improved system, it also challenges the foundation of testing using equivalence classes and the associated relativ...
[ 0.003831504145637, 0.000046743778511881835, -0.008930785581469002, 0.007184070069342001, -0.017312200739979, 0.011233913712203001, -0.009775970131158001, 0.00857158191502, -0.014818905852735001, -0.020228087902069, -0.00222213147208, 0.014875250868499001, -0.017833396792411003, 0.004141405...
We present an attention-based ranking framework for learning to order sentences given a paragraph. Our framework is built on a bidirectional sentence encoder and a self-attention based transformer network to obtain an input order invariant representation of paragraphs. Moreover, it allows seamless training using a va...
[ -0.022780809551477002, -0.0031361170113080004, 0.036137901246547005, -0.004452364519238, 0.018369417637586, 0.0037421712186180003, 0.0020469266455620003, -0.009990504942834, -0.01674416847527, -0.023026645183563003, 0.028899395838379003, 0.038350425660610005, -0.017167551442980003, 0.01258...
We explore methods for option discovery based on variational inference and make two algorithmic contributions. First: we highlight a tight connection between variational option discovery methods and variational autoencoders, and introduce Variational Autoencoding Learning of Options by Reinforcement (VALOR), a new me...
[ -0.021199444308876002, -0.013492420315742002, 0.028037974610924003, -0.030636616051197003, -0.012829083018004001, 0.032770238816738004, -0.019599227234721, -0.021582402288913, -0.029597159475088, -0.019024791195988003, 0.021144736558198002, 0.021705495193600002, -0.001849822467193, 0.00455...
Inter-robot communication enables multi-robot systems to coordinate and execute complex missions efficiently. Thus, maintaining connectivity of the communication network between robots is essential for many multi-robot systems. In this paper, we present a trajectory planner for connectivity maintenance of a multi-rob...
[ 0.0009610750712450001, -0.009619400836527, -0.009716287255287, -0.015570973046123001, 0.0006799324764870001, 0.023280335590243003, -0.018657485023140002, 0.012179961428046001, -0.014574430882930001, -0.012982731685042001, 0.007048460654914001, 0.023640196770429, -0.0053218123503020005, 0.0...
Given the number of Arabic speakers worldwide and the notably large amount of content in the web today in some fields such as law, medicine, or even news, documents of considerable length are produced regularly. Classifying those documents using traditional learning models is often impractical since extended length o...
[ -0.00858012214, 0.0101531437, 0.0021926977199999997, -0.0335850492, 0.006697261709999999, 0.0063908286399999995, -0.0181408282, 0.0128906118, -0.0230573751, -0.0179365408, 0.00640785275, 0.0475583896, -0.015553172700000001, 0.011045204500000001, -0.008927412329999999, 0.00896827, 0.0...