Search is not available for this dataset
abstract stringclasses 0
values | embedding list |
|---|---|
Since its introduction, unsupervised representation learning has attracted a
lot of attention from the research community, as it is demonstrated to be
highly effective and easy-to-apply in tasks such as dimension reduction,
clustering, visualization, information retrieval, and semi-supervised learning.
In this work, ... | [
-0.015959708020091,
0.00119630980771,
0.012604693882167001,
-0.029994627460837003,
0.0046849898062640005,
0.001938155503012,
-0.005984890740364001,
0.004908880218863001,
-0.018165195360779002,
-0.043521616607904004,
-0.0060416986234480006,
0.015531977638602002,
-0.00033541786251500003,
0.0... |
Video anomaly detection has great potential in enhancing safety in the
production and monitoring of crucial areas. Currently, most video anomaly
detection methods are based on RGB modality, but its redundant semantic
information may breach the privacy of residents or patients. The 3D data
obtained by depth camera and... | [
0.00107693207,
-0.006648226639999999,
0.016168272100000002,
-0.023781618100000002,
0.00531656388,
0.0216428861,
-0.00556204701,
-0.0248846114,
-0.009637743229999999,
-0.0311528444,
0.021508375200000002,
0.0263911393,
-0.00292226044,
0.021871555600000002,
0.0183339063,
0.000324718974,
... |
Quantitative investment aims to maximize the return and minimize the risk in
a sequential trading period over a set of financial instruments. Recently,
inspired by rapid development and great potential of AI technologies in
generating remarkable innovation in quantitative investment, there has been
increasing adoptio... | [
-0.022223209962248,
-0.033623248338699,
-0.003828627755865,
-0.029063232243061003,
0.00237958645448,
0.025286111980676002,
-0.029255522415041,
-0.0028912147972730002,
-0.01814391836524,
-0.027085395529866003,
0.005002968944609,
0.019764646887779,
-0.001448182738386,
0.023843938484787,
0.... |
This work proposes a domain-informed neural network architecture for
experimental particle physics, using particle interaction localization with the
time-projection chamber (TPC) technology for dark matter research as an example
application. A key feature of the signals generated within the TPC is that they
allow loc... | [
-0.026595890522003,
0.029011188074946,
0.023214470595121002,
-0.024304807186126,
0.006510955281555,
0.012235213071107,
-0.010330577380955,
-0.008605364710092,
-0.011386408470571001,
-0.04935490339994401,
0.019501812756061002,
0.030833013355731003,
0.00009763629350345583,
0.009136729873716,... |
Soft labels in image classification are vector representations of an image's
true classification. In this paper, we investigate soft labels in the context
of satellite object detection. We propose using detections as the basis for a
new dataset of soft labels. Much of the effort in creating a high-quality model
is ga... | [
-0.011796947568655,
-0.0031517897732550003,
0.007913524284958,
-0.000056422271882183857,
-0.014430132694542,
0.009925081394612002,
0.004913648590445001,
0.021694092079997,
-0.035509582608938,
-0.01841134019196,
0.029782230034470003,
0.021344862878322,
-0.028036085888743,
-0.005315261892974... |
Movies reflect society and also hold power to transform opinions. Social
biases and stereotypes present in movies can cause extensive damage due to
their reach. These biases are not always found to be the need of storyline but
can creep in as the author's bias. Movie production houses would prefer to
ascertain that t... | [
-0.014384184964001002,
-0.027987513691186003,
0.016206182539463,
-0.047399315983057,
0.006099579390138001,
0.007842805236577,
-0.014343087561428,
0.022151645272970002,
-0.032494559884071,
-0.031234230846166004,
0.00524680269882,
0.016206182539463,
0.009267524816095002,
-0.009027788415551,
... |
Given a small corpus $\mathcal D_T$ pertaining to a limited set of focused
topics, our goal is to train embeddings that accurately capture the sense of
words in the topic in spite of the limited size of $\mathcal D_T$. These
embeddings may be used in various tasks involving $\mathcal D_T$. A popular
strategy in limit... | [
-0.029799265787005,
-0.021495241671800003,
0.026312414556741003,
-0.020010879263281,
-0.0029809768311670004,
0.017644301056861,
-0.012379018589854001,
0.003791424445807,
-0.021845325827598003,
-0.049460057169198005,
0.017882360145449,
0.024968087673187003,
-0.020739056169986003,
0.00885015... |
We present OOD-Speech, the first out-of-distribution (OOD) benchmarking
dataset for Bengali automatic speech recognition (ASR). Being one of the most
spoken languages globally, Bengali portrays large diversity in dialects and
prosodic features, which demands ASR frameworks to be robust towards
distribution shifts. Fo... | [
-0.0108269425,
-0.006258467209999999,
0.0057226158699999995,
-0.0135955065,
0.007790452339999999,
0.0359157696,
0.0024937691599999996,
0.0142069263,
-0.0322884694,
-0.0247728135,
0.00242507015,
0.0172296781,
-0.0334151313,
-0.0135199381,
-0.022684367400000002,
0.0134649789,
0.0100231... |
Anchor-free detectors basically formulate object detection as dense
classification and regression. For popular anchor-free detectors, it is common
to introduce an individual prediction branch to estimate the quality of
localization. The following inconsistencies are observed when we delve into the
practices of classi... | [
-0.021868957206606,
0.012677355669438001,
0.017152123153209003,
-0.01648817025125,
-0.032091069966554,
0.011722922325134002,
-0.019960092380642003,
0.035217180848121005,
-0.023805486038327002,
-0.026779443025588,
0.018134219571948003,
0.023598002269864003,
-0.019130149856209002,
0.01637751... |
Contrastive Language-Image Pre-training (CLIP) has been shown to learn visual
representations with great transferability, which achieves promising accuracy
for zero-shot classification. To further improve its downstream performance,
existing works propose additional learnable modules upon CLIP and fine-tune
them by f... | [
-0.035151906311511,
0.002118654549121,
0.040722731500864,
-0.03167014196515,
0.006315922830253001,
0.029023999348282002,
0.010013557970523002,
-0.001289123785682,
-0.016420006752014,
-0.029553227126598,
0.018982587382197002,
0.040082085877656,
-0.025542233139276,
0.012353304773569001,
0.... |
Stackelberg equilibria have become increasingly important as a solution
concept in computational game theory, largely inspired by practical problems
such as security settings. In practice, however, there is typically uncertainty
regarding the model about the opponent. This paper is, to our knowledge, the
first to inv... | [
-0.005899987183511,
-0.021787736564874,
0.0012458960991350001,
-0.024286393076181002,
-0.011134123429656001,
0.031823549419641,
-0.019412640482187,
0.025673009455204003,
-0.032949317246675006,
-0.03207067027688,
0.028144208714365,
-0.005120872985571,
-0.004252521321177,
0.00037840232835100... |
Context: Research at the intersection of cybersecurity, Machine Learning
(ML), and Software Engineering (SE) has recently taken significant steps in
proposing countermeasures for detecting sophisticated data exfiltration
attacks. It is important to systematically review and synthesize the ML-based
data exfiltration c... | [
-0.024269137531518003,
0.006500422023236,
0.018480539321899,
-0.028822120279073004,
-0.005939693655818001,
0.028875842690467002,
-0.014249891974031,
-0.00006180186028359458,
0.0011550337076180002,
-0.024027386680245,
0.022093376144766003,
0.037095382809638006,
-0.025759937241673,
0.0127926... |
The paper presents an O(N log N)-implementation of t-SNE -- an embedding
technique that is commonly used for the visualization of high-dimensional data
in scatter plots and that normally runs in O(N^2). The new implementation uses
vantage-point trees to compute sparse pairwise similarities between the input
data obje... | [
-0.022652857005596,
0.007319043856114001,
0.014046720229089002,
0.014415455050766001,
0.024002566933631002,
0.019605575129389003,
-0.007527761626988001,
-0.016460891813039003,
-0.028830910101532003,
-0.039461612701416,
-0.004727462306618,
0.013114445842802,
0.002073265146464,
0.00807738583... |
Recent systems on structured prediction focus on increasing the level of
structural dependencies within the model. However, our study suggests that
complex structures entail high overfitting risks. To control the
structure-based overfitting, we propose to conduct structure regularization
decoding (SR decoding). The d... | [
-0.006256100721657,
0.019621875137090003,
0.028520964086055003,
-0.018799154087901,
-0.01173747330904,
0.005155712831765,
0.0066160405986010005,
0.003465708345174,
-0.002103078179061,
-0.0029000884387640003,
0.010455401614308002,
0.023008739575743002,
-0.011641489341855,
0.020101794973015,... |
Recurrent Neural Networks (RNNS) are now widely used on sequence generation
tasks due to their ability to learn long-range dependencies and to generate
sequences of arbitrary length. However, their left-to-right generation
procedure only allows a limited control from a potential user which makes them
unsuitable for i... | [
-0.0256018768996,
-0.002156567061319,
0.000313273369101,
-0.006535470951348,
0.026626506820321003,
0.012094775214791001,
-0.021364897489547,
-0.013493255712091002,
-0.03552970290184,
-0.004001591354608001,
0.024937253445386002,
0.012143237516283,
-0.021586440503597003,
0.006410853937268,
... |
Change detection (CD) is an essential task for various real-world
applications, such as urban management and disaster assessment. However,
previous methods primarily focus on improving the accuracy of CD, while
neglecting the reliability of detection results. In this paper, we propose a
novel change detection network... | [
0.00359645602,
-0.0048189800000000005,
0.0155507782,
0.00143333338,
0.00466658827,
-0.00466658827,
-0.01074873,
0.00407395186,
-0.0289612934,
-0.0175555833,
0.0105184484,
0.0283381771,
-0.038958221700000004,
0.0108503252,
-0.0218361095,
0.0107961409,
0.0311286487,
0.0238409135,
-... |
Adversarial machine learning is a fast growing research area, which considers
the scenarios when machine learning systems may face potential adversarial
attackers, who intentionally synthesize input data to make a well-trained model
to make mistake. It always involves a defending side, usually a classifier, and
an at... | [
-0.029044549912214,
-0.0037905939389020005,
0.007434498053044001,
-0.013922180980443,
-0.006290985736995,
0.024483835324645,
-0.0063476609066120005,
0.0077145420946180005,
-0.03216503933072,
-0.028884524479508,
0.027057573199272003,
0.026390802115201003,
-0.019122995436191,
0.0066343727521... |
The speed of convergence of the Expectation Maximization (EM) algorithm for
Gaussian mixture model fitting is known to be dependent on the amount of
overlap among the mixture components. In this paper, we study the impact of
mixing coefficients on the convergence of EM. We show that when the mixture
components exhibi... | [
-0.010548343881964,
0.0023270410019900004,
-0.013083217665553001,
-0.039113368839025005,
-0.011386487632989,
0.037477966398,
-0.0014071273617440002,
0.008544976823031,
-0.039385937154293005,
-0.031481493264436,
0.014718620106577,
0.025730328634381003,
-0.020129075273871002,
0.0087698446586... |
Artificial intelligence literature suggests that minority and fragile
communities in society can be negatively impacted by machine learning
algorithms due to inherent biases in the design process, which lead to socially
exclusive decisions and policies. Faced with similar challenges in dealing with
an increasingly di... | [
-0.017442086711525,
-0.014739791862666001,
0.013313580304384,
-0.014030097983777001,
-0.022287111729383,
0.014521424658596,
-0.015394894406199,
0.011252739466726001,
-0.014371297322213001,
-0.022287111729383,
-0.008454908616840002,
0.01652767509222,
0.0051828110590570005,
-0.01617282815277... |
Sentiment classification and sarcasm detection are both important natural
language processing (NLP) tasks. Sentiment is always coupled with sarcasm where
intensive emotion is expressed. Nevertheless, most literature considers them as
two separate tasks. We argue that knowledge in sarcasm detection can also be
benefic... | [
-0.007216766942292001,
0.004315249621868,
0.035679910331964,
-0.023117890581488002,
0.0037901489995410004,
0.017314855009317003,
-0.021731086075305002,
0.015874193981289,
-0.025635680183768002,
-0.018836300820112003,
0.024450836703181003,
0.045024007558822,
-0.025231756269931002,
0.0145547... |
We study the problem of shape generation in 3D mesh representation from a few
color images with known camera poses. While many previous works learn to
hallucinate the shape directly from priors, we resort to further improving the
shape quality by leveraging cross-view information with a graph convolutional
network. I... | [
-0.023284811526536,
0.0022565338294950003,
0.000966471154242,
-0.015077983029186,
0.004165378864854,
0.016289729624986,
-0.022678939625620002,
-0.013349867425858001,
-0.013143319636583,
-0.044449068605899006,
0.016592666506767002,
0.014127863571047,
-0.006406421773135,
0.006554447580128001... |
Reinforcement Learning (RL) has become an increasingly important research
area as the success of machine learning algorithms and methods grows. To combat
the safety concerns surrounding the freedom given to RL agents while training,
there has been an increase in work concerning Safe Reinforcement Learning
(SRL). Howe... | [
-0.008710419759154,
-0.008863111957907,
0.020557979121804,
-0.02627701126039,
0.000485406373627,
0.008759004063904001,
0.007308423984795,
0.014436393044888002,
-0.041921064257621,
-0.006819113623350001,
0.005871725268661,
0.007103676907718,
-0.006274278275668001,
0.006708064116537,
0.012... |
Here we present a novel approach to conditioning the SampleRNN generative
model for voice conversion (VC). Conventional methods for VC modify the
perceived speaker identity by converting between source and target acoustic
features. Our approach focuses on preserving voice content and depends on the
generative network... | [
-0.021867427974939003,
-0.006231738720089,
0.02280987240374,
0.0019070828566320002,
0.024722076952457,
0.011241032741963001,
0.013856655918061001,
-0.004602950066328,
-0.025268420577049002,
-0.010025416500866,
0.017155209556221,
0.044800225645303005,
-0.013446897268295002,
0.00116012780927... |
The neural network (NN) based singing voice synthesis (SVS) systems require
sufficient data to train well and are prone to over-fitting due to data
scarcity. However, we often encounter data limitation problem in building SVS
systems because of high data acquisition and annotation costs. In this work, we
propose a Pe... | [
-0.018526911735534002,
-0.025049701333045002,
0.013155204243957,
-0.013196314685046001,
0.019650585949420003,
0.016457708552479,
0.006385755259543001,
0.00477561308071,
-0.024734525009989003,
-0.016485115513205,
0.012935950420796,
0.06237759441137301,
-0.02178830653429,
-0.0059095644392070... |
For text summarization, the role of discourse structure is pivotal in
discerning the core content of a text. Regrettably, prior studies on
incorporating Rhetorical Structure Theory (RST) into transformer-based
summarization models only consider the nuclearity annotation, thereby
overlooking the variety of discourse r... | [
-0.0263113827,
0.0040997946599999995,
0.0113032693,
-0.0047813458399999995,
-0.009164246729999999,
0.00797590055,
-0.023123819400000002,
-0.00414173584,
-0.0152667537,
-0.0131766628,
0.011897442900000001,
0.0400962,
0.000547425647,
0.0271362346,
-0.0133584095,
0.0141902519,
0.0269544... |
While known algorithms for sensitivity analysis and parameter tuning in
probabilistic networks have a running time that is exponential in the size of
the network, the exact computational complexity of these problems has not been
established as yet. In this paper we study several variants of the tuning
problem and sho... | [
0.007847535423934,
-0.010640034452080002,
0.030900944024324,
-0.013092814013361001,
0.003033700864762,
0.002294809557497,
-0.01153689622879,
-0.010938988998532,
-0.046582426875829,
-0.039788022637367006,
0.016904475167393,
0.026307927444577002,
-0.0065633929334580005,
0.004983694292604,
... |
Obtaining first-order regret bounds -- regret bounds scaling not as the
worst-case but with some measure of the performance of the optimal policy on a
given instance -- is a core question in sequential decision-making. While such
bounds exist in many settings, they have proven elusive in reinforcement
learning with l... | [
0.015090464614331,
-0.014365899376571001,
0.008896825835108,
-0.033525075763463,
0.0009762471891000001,
0.005197362508624,
0.003140363376587,
0.018727226182818,
-0.031769398599863004,
-0.019549328833818002,
0.016832208260893003,
0.019730469211935,
-0.004838563036173,
0.016010105609893,
-... |
Video processing and analysis have become an urgent task since a huge amount
of videos (e.g., Youtube, Hulu) are uploaded online every day. The extraction
of representative key frames from videos is very important in video processing
and analysis since it greatly reduces computing resources and time. Although
great p... | [
-0.004993135109543001,
0.008424021303653,
0.014073705300688001,
-0.046301815658807005,
0.012255570851266,
0.00789204891771,
-0.018073599785566,
0.005036904942244001,
-0.014006366953253002,
-0.029898205772042004,
0.006413973402231,
0.053601291030645,
-0.0013282480649650001,
0.01383128762245... |
Background: Federated learning methods offer the possibility of training
machine learning models on privacy-sensitive data sets, which cannot be easily
shared. Multiple regulations pose strict requirements on the storage and usage
of healthcare data, leading to data being in silos (i.e. locked-in at
healthcare facili... | [
-0.01973021030426,
0.01767554692924,
0.018179008737206,
-0.052387110888957006,
-0.014722819440066,
0.030969627201557003,
-0.010205280967056,
-0.008232260122895001,
-0.034697957336902,
-0.044821593910455,
0.010783581063151,
0.017389798536896,
0.004119531717151,
-0.017947688698768,
-0.0116... |
We study the problem of attacking video recognition models in the black-box
setting, where the model information is unknown and the adversary can only make
queries to detect the predicted top-1 class and its probability. Compared with
the black-box attack on images, attacking videos is more challenging as the
computa... | [
-0.020041983574628,
-0.012745938263833,
0.003469197778031,
-0.031009893864393002,
0.009564562700688001,
0.010858912952244,
-0.001141071435995,
-0.02109108865261,
-0.015995437279343,
-0.047223325818777,
0.023053050041198002,
0.009680373594164,
-0.009087697602808,
-0.0054941740818320005,
-... |
Computational Grids are a new trend in distributed computing systems. They
allow the sharing of geographically distributed resources in an efficient way,
extending the boundaries of what we perceive as distributed computing. Various
sciences can benefit from the use of grids to solve CPU-intensive problems,
creating ... | [
-0.009842676110565001,
-0.017091581597924,
-0.002696156036108,
-0.015849301591515,
0.007003179751336,
0.004293372388929,
-0.026374548673629,
0.0042660697363310005,
-0.034783825278282006,
-0.040954269468784006,
0.029487073421478,
0.006385453045368,
0.0010818752925840002,
0.01126242429018000... |
In several physical systems, important properties characterizing the system
itself are theoretically related with specific degrees of freedom. Although
standard Monte Carlo simulations provide an effective tool to accurately
reconstruct the physical configurations of the system, they are unable to
isolate the differe... | [
-0.016609471291303,
-0.004500697832554,
0.00951871741563,
-0.021699916571378,
-0.00963597651571,
0.016043867915868003,
-0.015064405277371,
0.002181372838094,
-0.02181027829647,
-0.041247773915529,
0.019975511357188003,
0.04847648367285701,
-0.011581106111407,
0.008104705251753,
0.0061975... |
Understanding theoretical properties of deep and locally connected nonlinear
network, such as deep convolutional neural network (DCNN), is still a hard
problem despite its empirical success. In this paper, we propose a novel
theoretical framework for such networks with ReLU nonlinearity. The framework
explicitly form... | [
-0.019874529913067002,
-0.0014689079253,
-0.001674968749284,
-0.013929384760558002,
0.020059902220964,
-0.012188211083412,
-0.025038465857505,
0.00816299021244,
-0.0034624848049130004,
-0.008891236968338,
0.016339220106601,
0.025515137240290003,
0.005624055396765,
0.014644390903413,
-0.0... |
In recent years we have seen fast progress on a number of benchmark problems
in AI, with modern methods achieving near or super human performance in Go,
Poker and Dota. One common aspect of all of these challenges is that they are
by design adversarial or, technically speaking, zero-sum. In contrast to these
settings... | [
-0.037323843687772,
-0.0013397851726040001,
0.020957691594958,
-0.016337985172867,
-0.009507017210125,
0.01149292755872,
-0.018774598836898002,
0.004936606623232,
-0.027197111397981002,
-0.030028089880943003,
0.020929522812366003,
0.016028126701712,
0.014971791766583002,
0.016985870897769,... |
Deep learning and other machine learning approaches are deployed to many
systems related to Internet of Things or IoT. However, it faces challenges that
adversaries can take loopholes to hack these systems through tampering history
data. This paper first presents overall points of adversarial machine learning.
Then, ... | [
-0.010607643984258001,
-0.0065036155283450005,
0.004632071591913,
-0.002790605882182,
0.0028557756450020002,
0.009177249856293,
-0.016322536394,
0.01343501266092,
-0.033153064548969005,
-0.014517834410071002,
0.028126632794737,
0.037831924855709,
-0.016777055338025003,
0.010968584567308001... |
Network data are ubiquitous in modern machine learning, with tasks of
interest including node classification, node clustering and link prediction. A
frequent approach begins by learning an Euclidean embedding of the network, to
which algorithms developed for vector-valued data are applied. For large
networks, embeddi... | [
-0.006099278572946,
-0.009245513007044001,
0.016214145347476002,
-0.022727401927113002,
0.005971635226160001,
0.017000705003738,
0.005516259465366001,
0.003946592099964,
-0.015993356704711,
-0.032897464931011006,
0.00162141455803,
0.004795247223228,
-0.016062354668974002,
0.010397751815617... |
Astronomical source deblending is the process of separating the contribution
of individual stars or galaxies (sources) to an image comprised of multiple,
possibly overlapping sources. Astronomical sources display a wide range of
sizes and brightnesses and may show substantial overlap in images. Astronomical
imaging d... | [
0.004094622097909,
0.013056112453341002,
-0.007104666903614,
-0.021897476166486,
-0.02752629481256,
0.036655962467193,
-0.0021828832104800002,
0.036244098097085,
-0.017037471756339,
-0.031384095549583005,
0.007187040057033,
0.025576800107955003,
-0.0007598046795460001,
0.007825430482625,
... |
Universal style transfer tries to explicitly minimize the losses in feature
space, thus it does not require training on any pre-defined styles. It usually
uses different layers of VGG network as the encoders and trains several
decoders to invert the features into images. Therefore, the effect of style
transfer is ach... | [
0.008442793041467,
-0.020023109391331003,
0.036224145442247,
-0.001047327066771,
0.028237719088792003,
-0.002246182179078,
-0.012336175888776,
0.006927511189132001,
-0.015188470482826,
-0.017199337482452,
0.017185077071189003,
0.024986103177070004,
0.006535320542752,
0.015801714733242,
-... |
Unsupervised person re-identification (ReID) aims to match a query image of a
pedestrian to the images in gallery set without supervision labels. The most
popular approaches to tackle unsupervised person ReID are usually performing a
clustering algorithm to yield pseudo labels at first and then exploit the
pseudo lab... | [
-0.009641200304031,
0.011586945503950001,
0.026257459074258003,
-0.033528756350278,
0.010449122637510001,
0.033663410693407,
0.011533084325492,
0.007062583230435001,
-0.024614686146378,
-0.034255884587764004,
0.0033074300736180002,
0.026230528950691,
-0.013620215468108002,
0.00232950807549... |
Graph neural networks that leverage coordinates via directional message
passing have recently set the state of the art on multiple molecular property
prediction tasks. However, they rely on atom position information that is often
unavailable, and obtaining it is usually prohibitively expensive or even
impossible. In ... | [
-0.025366181507706,
0.004345197696238001,
-0.014295525848865,
-0.0023331441916520004,
0.00306083401665,
0.04847076535224901,
-0.006941845640540001,
-0.00038740315358100005,
-0.032583747059106,
-0.025352220982313003,
0.02464023604989,
0.011189320124685001,
-0.007147762924432001,
0.017869407... |
The Listen, Attend and Spell (LAS) model and other attention-based automatic
speech recognition (ASR) models have known limitations when operated in a fully
online mode. In this paper, we analyze the online operation of LAS models to
demonstrate that these limitations stem from the handling of silence regions
and the... | [
-0.021932028234004003,
0.004449578467756001,
0.030460387468338002,
-0.017551116645336002,
0.0030041523277750002,
0.008995289914309,
-0.002770686754956,
0.002296888967975,
-0.019432572647929,
-0.030240654945373,
0.007230565417557001,
0.02246762625873,
-0.04043073952198,
0.012703272514045,
... |
Safety and decline of road traffic accidents remain important issues of
autonomous driving. Statistics show that unintended lane departure is a leading
cause of worldwide motor vehicle collisions, making lane detection the most
promising and challenge task for self-driving. Today, numerous groups are
combining deep l... | [
0.011689647100865001,
0.016751773655414002,
0.0011359287891530001,
0.0012841670541090002,
0.000717473274562,
0.009751537814736,
-0.025032786652445002,
0.024056956171989,
-0.012089467607438,
-0.019272670149803002,
-0.001373109989799,
0.04131019860506,
-0.014352854341268002,
0.00989384669810... |
We study the model of projective simulation (PS) which is a novel approach to
artificial intelligence (AI). Recently it was shown that the PS agent performs
well in a number of simple task environments, also when compared to standard
models of reinforcement learning (RL). In this paper we study the performance
of the... | [
-0.005434666760265001,
0.00511015811935,
-0.013308271765708,
-0.014934231527149,
-0.010753192938864,
0.025004249066114002,
-0.011607163585722,
0.014278382062911,
-0.023036701604723,
-0.048751451075077,
0.0009385133162140001,
0.006664383690804,
0.002597777405753,
0.002471389947459,
0.0064... |
In our previous work, we introduced the rule-based Bayesian Regression, a
methodology that leverages two concepts: (i) Bayesian inference, for the
general framework and uncertainty quantification and (ii) rule-based systems
for the incorporation of expert knowledge and intuition. The resulting method
creates a penalt... | [
-0.011861114762723,
-0.007745894603431,
-0.008592141792178001,
0.000193114188732,
-0.009602179750800001,
0.019409095868468,
-0.007063436787575,
0.005353880580514001,
-0.014563647098839002,
-0.027735080569982,
-0.017279827967286002,
0.0071248579770320005,
-0.007247700355947,
0.0101686194539... |
Complex multivariate time series arise in many fields, ranging from computer
vision to robotics or medicine. Often we are interested in the independent
underlying factors that give rise to the high-dimensional data we are
observing. While many models have been introduced to learn such disentangled
representations, on... | [
-0.023617584258317,
0.010364501737058001,
0.037083871662616,
-0.008933966979384,
0.005729017779231,
0.015158169902861,
0.007166430354118,
0.010199439711868001,
-0.044429119676351006,
-0.049903664737939,
0.017345238476991,
0.055213153362274,
-0.013204938732087002,
0.008988986723124,
0.013... |
In this paper, we present a new MTL framework that searches for structures
optimized for multiple tasks with diverse graph topologies and shares features
among tasks. We design a restricted DAG-based central network with
read-in/read-out layers to build topologically diverse task-adaptive structures
while limiting se... | [
-0.0427925922,
0.0122334333,
0.00408246368,
-0.0218708385,
0.008506877349999999,
0.0325480513,
-0.0107958484,
0.0124427909,
-0.0138943335,
-0.0239364952,
0.017390597600000002,
0.0312639959,
-0.0117658693,
0.00319618522,
-0.0034055423499999996,
0.009337326509999999,
0.0159250963,
0.... |
An analogy is an identification of structural similarities and
correspondences between two objects. Computational models of analogy making
have been studied extensively in the field of cognitive science to better
understand high-level human cognition. For instance, Melanie Mitchell and
Douglas Hofstadter sought to be... | [
-0.009040875360369,
0.000518988177645,
0.007465315517038,
-0.009446599520742002,
-0.025641735643148002,
0.010258046910166001,
-0.023572545498609,
-0.0018899961141860002,
0.011651030741631001,
-0.048822078853845007,
0.0030818092636760003,
0.0028468277305360003,
-0.00031126613612200005,
0.00... |
Electrocardiogram (ECG) is a widely used diagnostic tool for detecting heart
conditions. Rare cardiac diseases may be underdiagnosed using traditional ECG
analysis, considering that no training dataset can exhaust all possible cardiac
disorders. This paper proposes using anomaly detection to identify any
unhealthy st... | [
-0.0156742502,
0.00754736038,
0.0174532719,
-0.006465796849999999,
-0.00607158197,
0.0181001872,
-0.004430704749999999,
-0.006566877479999999,
-0.013551555600000001,
0.00351087051,
0.0183832143,
0.0227768552,
-0.0105460882,
0.000784639094,
-0.00991264917,
0.00253375666,
0.0318336897,... |
Exploration is a fundamental problem in robot autonomy. A major limitation,
however, is that during exploration robots oftentimes have to rely on on-board
systems alone for state estimation, accumulating significant drift over time in
large environments. Drift can be detrimental to robot safety and exploration
perfor... | [
0.011273599229753,
-0.000373512331862,
0.01976203918457,
-0.029083227738738,
-0.011168630793690001,
0.03375781700015,
-0.028943270444869003,
0.0028516398742790003,
-0.034653548151254,
-0.024534599855542003,
0.010321886278688,
0.024744536727666,
-0.004027285147458,
0.020125929266214003,
-... |
Natural language understanding (NLU) has two core tasks: intent
classification and slot filling. The success of pre-training language models
resulted in a significant breakthrough in the two tasks. One of the promising
solutions called BERT can jointly optimize the two tasks. We note that
BERT-based models convert ea... | [
-0.034061253070831,
-0.015425790101289001,
-0.0025110142305490002,
-0.004776461049914,
-0.022675219923257002,
0.013661854900419,
-0.004288784693926,
0.014222163707017002,
-0.026756484061479003,
-0.030574886128306004,
0.022052654996514,
0.034088920801877004,
-0.019396375864744003,
0.0183726... |
To improve patient survival and treatment outcomes, early diagnosis of brain
tumors is an essential task. It is a difficult task to evaluate the magnetic
resonance imaging (MRI) images manually. Thus, there is a need for digital
methods for tumor diagnosis with better accuracy. However, it is still a very
challenging... | [
-0.015574034303426002,
0.012498095631599001,
-0.004161564167588,
-0.028708761557936002,
-0.011090802960097,
0.006171981804072001,
-0.00363215431571,
-0.014300770126283,
-0.044899325817823,
-0.016337992623448,
0.002950287656858,
0.026483900845050003,
-0.011311949230730001,
0.01201559510082,... |
Unsupervised Domain Adaptation (UDA) is a key issue in visual recognition, as
it allows to bridge different visual domains enabling robust performances in
the real world. To date, all proposed approaches rely on human expertise to
manually adapt a given UDA method (e.g. DANN) to a specific backbone
architecture (e.g.... | [
-0.007466966751962001,
-0.009366886690258001,
0.017155162990093002,
-0.014305283315479,
0.008116572163999,
0.0119792772457,
-0.015576553530991001,
-0.0019348454661660003,
-0.01925066486001,
-0.023469604551792003,
0.019264634698629,
0.012552048079669,
0.004938396159559,
0.008137526921927,
... |
Given that language models are trained on vast datasets that may contain
inherent biases, there is a potential danger of inadvertently perpetuating
systemic discrimination. Consequently, it becomes essential to examine and
address biases in language models, integrating fairness into their development
to ensure these ... | [
-0.0183323771,
0.00974164438,
0.014016458800000001,
-0.038336318,
-0.020113550100000002,
0.0231963489,
-0.0181953646,
-0.00180515,
-0.0304169487,
-0.043734639900000004,
0.0052373325499999995,
0.001717804,
-0.0161538664,
-0.0157017224,
-0.000379141449,
0.0200998485,
0.0311568212,
-0... |
POI-level geo-information of social posts is critical to many location-based
applications and services. However, the multi-modality, complexity and diverse
nature of social media data and their platforms limit the performance of
inferring such fine-grained locations and their subsequent applications. To
address this ... | [
-0.010752851143479,
0.000669475004542,
0.0023891404271120004,
-0.023650772869586,
-0.013709197752177,
0.015510505996644,
-0.020900681614875002,
-0.014437971636652001,
0.0007335005211640001,
-0.04336891695857,
0.013344810344278,
0.025122070685029002,
-0.032396055757999004,
0.008463401347398... |
Deep transfer learning (DTL) has formed a long-term quest toward enabling
deep neural networks (DNNs) to reuse historical experiences as efficiently as
humans. This ability is named knowledge transferability. A commonly used
paradigm for DTL is firstly learning general knowledge (pre-training) and then
reusing (fine-... | [
-0.0038097635842850005,
-0.015294218435883002,
0.036132417619228,
-0.019914202392101,
0.010563905350863,
-0.0054612355306740005,
-0.006278352346271001,
0.030036795884370002,
-0.029567902907729003,
-0.042365949600934004,
0.017707642167806,
0.032739832997322,
-0.001600617892108,
-0.002949550... |
Biological muscles have always attracted robotics researchers due to their
efficient capabilities in compliance, force generation, and mechanical work.
Many groups are working on the development of artificial muscles, however,
state-of-the-art methods still fall short in performance when compared with
their biologica... | [
-0.025043535977602,
-0.002178733237087,
-0.026104010641574003,
-0.0037728454917660002,
0.017960103228688,
0.022120431065559002,
-0.018354382365942,
-0.006957670673727,
-0.022582689300179003,
-0.014846656471490001,
0.008640156127512,
0.014248439110815001,
0.0029553954955190004,
0.0005315123... |
A key assumption of top-down human pose estimation approaches is their
expectation of having a single person/instance present in the input bounding
box. This often leads to failures in crowded scenes with occlusions. We propose
a novel solution to overcome the limitations of this fundamental assumption.
Our Multi-Ins... | [
-0.008218182250857001,
-0.004471962805837001,
0.016685189679265,
-0.028808563947677,
-0.008688187226653,
0.017348727211356,
-0.010533649474382002,
0.004357917234301001,
-0.006510956678539,
-0.020085817202925002,
0.012068078853189002,
-0.000207463293918,
0.013194709084928001,
-0.00376004283... |
Reinforcement Learning (RL) algorithms have led to recent successes in
solving complex games, such as Atari or Starcraft, and to a huge impact in
real-world applications, such as cybersecurity or autonomous driving. In the
side of the drawbacks, recent works have shown how the performance of RL
algorithms decreases u... | [
-0.013791068457067,
0.007223229389637001,
0.024472523480653003,
-0.031291361898183004,
0.0033449267502870003,
0.00214221724309,
-0.010827871970832001,
0.011267121881246001,
-0.022687632590532,
-0.024347024038434,
0.027331138029694002,
0.02381713502109,
-0.004897990729659,
0.011790039017796... |
Effective models of social dialog must understand a broad range of rhetorical
and figurative devices. Rhetorical questions (RQs) are a type of figurative
language whose aim is to achieve a pragmatic goal, such as structuring an
argument, being persuasive, emphasizing a point, or being ironic. While there
are computat... | [
-0.0061990492977200004,
0.015457886271178,
0.009212476201355001,
-0.018756099045276,
-0.002597838873043,
0.0032601305283600003,
0.001332034007646,
-0.025511473417282,
-0.028372572734951,
-0.027895722538232002,
0.019881993532180002,
0.029670665040612002,
-0.012285509146749,
-0.0041591911576... |
There have been significant interests in designing Graph Neural Networks
(GNNs) for seeded graph matching, which aims to match two (unlabeled) graphs
using only topological information and a small set of seeds. However, most
previous GNNs for seeded graph matching employ a semi-supervised approach,
which requires a l... | [
-0.014665619470179001,
-0.01086876168847,
-0.00022442996851100003,
0.003450128016993,
0.01667046919465,
0.003086233977228,
-0.007387736812233,
0.004181349184364001,
-0.027738343924283003,
-0.030512178316712,
0.00795760937035,
0.038202013820409005,
-0.013807378709316,
-0.001912160543724,
... |
Inspired by the "Cognitive Hour-glass" model presented in
https://doi.org/10.1515/jagi-2016-0001, we propose a new framework for
developing cognitive architectures aimed at cognitive robotics. The purpose of
the proposed framework is foremost to ease the development of cognitive
architectures by encouraging and mitig... | [
-0.017433758825063,
-0.002529723802581,
0.027931943535804003,
-0.023732669651508,
0.011006160639226001,
0.0026753437705330004,
-0.009001346305012,
0.001208984409458,
-0.00191845849622,
-0.030532784759998002,
0.005513240117579,
0.012096617370843001,
0.0061261984519660004,
-0.000641320541035... |
Given two sources of evidence about a latent variable, one can combine the
information from both by multiplying the likelihoods of each piece of evidence.
However, when one or both of the observation models are misspecified, the
distributions will conflict. We study this problem in the setting with two
conflicting re... | [
-0.021317802369594,
0.0066574560478320005,
-0.014639432542026001,
-0.017748568207025,
-0.025207707658410003,
0.024371169507503003,
0.0020652057137340004,
-0.005806974601,
-0.019993280991911,
-0.043053872883319,
0.016173087060451,
0.023925013840198003,
0.001995494123548,
0.03393559902906400... |
Visualization techniques for the decision space of continuous multi-objective
optimization problems (MOPs) are rather scarce in research. For long, all
techniques focused on global optimality and even for the few available
landscape visualizations, e.g., cost landscapes, globality is the main
criterion. In contrast, ... | [
-0.0030072205699980003,
0.006843421142548001,
0.018785590305924003,
-0.027345936745405003,
-0.008622779510915,
0.033075958490371,
-0.011425356380641,
-0.002275359584018,
-0.035240322351455,
-0.034435622394084,
0.017009699717164,
0.0185774769634,
-0.004037375561892,
0.016121754422783,
0.0... |
The biomechanics of the human body gives subjects a high degree of freedom in
how they can execute movement. Nevertheless, subjects exhibit regularity in
their movement patterns. One way to account for this regularity is to suppose
that subjects select movement trajectories that are optimal in some sense. We
adopt th... | [
0.0052100494503970005,
0.000138072180561,
0.008266299031674001,
-0.011735191568732001,
0.027375405654311003,
0.016760725528001,
-0.00015746729332000002,
0.006978044286370001,
-0.002442315453663,
-0.036205314099788,
-0.016331307590007,
0.021538002416491002,
0.008796362206339,
0.026771536096... |
We study the capabilities of speech processing systems trained simply to
predict large amounts of transcripts of audio on the internet. When scaled to
680,000 hours of multilingual and multitask supervision, the resulting models
generalize well to standard benchmarks and are often competitive with prior
fully supervi... | [
-0.002818637061864,
-0.009200910106301,
0.024389278143644003,
-0.020557854324579003,
0.018031036481261,
0.028069643303751002,
0.0048991413787,
0.021519143134355,
-0.020969836041331003,
-0.031612679362297,
0.019280713051557003,
0.015600348822772002,
-0.030706321820616004,
-0.017509194090962... |
Finding local invariant patterns in handwrit-ten characters and/or digits for
optical character recognition is a difficult task. Variations in writing styles
from one person to another make this task challenging. We have proposed a
non-explicit feature extraction method using a multi-scale multi-column skip
convoluti... | [
-0.022403866052627,
0.019999409094452,
0.014610601589083002,
-0.019674101844429002,
-0.004674543626606,
0.028259420767426,
-0.022135131061077003,
-0.0077013284899290005,
-0.031399358063936005,
-0.022630166262388,
0.031455930322408,
0.022969618439674003,
-0.022517016157507,
0.01279311627149... |
This document contains a discussion of the F1 score evaluation used in the
article 'Relation Classification with Entity Type Restriction' by Shengfei Lyu,
Huanhuan Chen published on Findings of the Association for Computational
Linguistics: ACL-IJCNLP 2021. The authors created a system named RECENT and
claim it achie... | [
-0.0142921405,
0.006889386569999999,
0.0162634701,
-0.028584281000000003,
-0.00010882313699999999,
0.00682436,
-0.0154010132,
0.000109732224,
-0.0185770448,
-0.024449965,
0.0263254661,
0.029925881,
-0.0156611204,
0.005718909669999999,
-0.0228893291,
0.0020380674399999997,
0.021917354... |
Deep Convolutional Neural Networks (CNNs) are capable of learning
unprecedentedly effective features from images. Some researchers have struggled
to enhance the parameters' efficiency using grouped convolution. However, the
relation between the optimal number of convolutional groups and the recognition
performance re... | [
-0.032352369278669,
0.016349121928215003,
0.030383558943867003,
-0.006411941722035,
0.0023479412775480003,
-0.00016358267748700002,
0.01533810980618,
-0.002677185228094,
-0.014194070361554002,
-0.053450588136911004,
0.0015439543640240001,
0.046745982021093,
-0.008034881204366,
-0.003069617... |
Popular models such as Transformers and LSTMs use tokens as its unit of
information. That is, each token is encoded into a vector representation, and
those vectors are used directly in a computation. However, humans frequently
consider spans of tokens (i.e., phrases) instead of their constituent tokens.
In this paper... | [
-0.024451738223433002,
0.000314083503326,
-0.005497444886714001,
-0.00676339585334,
0.0033782008104020003,
0.005511433351784001,
-0.00042314938036700005,
0.009952752850949001,
-0.014310142025351,
-0.037041306495666004,
0.008190213702619001,
0.021052556112408003,
-0.027766991406679,
0.02053... |
Product-specific community question answering platforms can greatly help
address the concerns of potential customers. However, the user-provided answers
on such platforms often vary a lot in their qualities. Helpfulness votes from
the community can indicate the overall quality of the answer, but they are
often missin... | [
0.0033815749920900005,
0.016928287222981002,
0.020479960367083,
-0.028114018961787002,
0.011498715728521,
0.0008020183886400001,
0.004861439112573001,
-0.014329168945550001,
-0.033666063100099,
-0.049179121851921005,
-0.006048732437193001,
-0.000781181210186,
-0.026807656511664002,
-0.0136... |
Statistical significance testing plays an important role when drawing
conclusions from experimental results in NLP papers. Particularly, it is a
valuable tool when one would like to establish the superiority of one algorithm
over another. This appendix complements the guide for testing statistical
significance in NLP... | [
-0.008699613623321,
0.003921288065612,
0.030445247888565,
-0.025221398100256,
0.003035342320799,
-0.005873430054634,
-0.005543538369238,
0.037274342030286005,
-0.012597095221281001,
-0.026092041283845003,
0.011250321753323,
0.019208529964089,
-0.013474538922309001,
0.022310191765427003,
... |
We unify different broad-coverage semantic parsing tasks under a transduction
paradigm, and propose an attention-based neural framework that incrementally
builds a meaning representation via a sequence of semantic relations. By
leveraging multiple attention mechanisms, the transducer can be effectively
trained withou... | [
-0.012823205441236002,
-0.001415436971001,
0.052228420972824006,
0.002050061943009,
-0.008963860571384001,
0.035167504101991,
-0.014666885137557002,
0.0017628468340260002,
-0.023032238706946002,
-0.041221376508474,
0.027531366795301004,
0.045596677809953,
-0.013401075266301,
0.002454226603... |
Few Shot Instance Segmentation (FSIS) requires models to detect and segment
novel classes with limited several support examples. In this work, we explore a
simple yet unified solution for FSIS as well as its incremental variants, and
introduce a new framework named Reference Twice (RefT) to fully explore the
relation... | [
0.0036689222324630005,
0.022111557424068003,
0.000541323563084,
-0.023035790771245002,
-0.003959495108574,
0.011608918197453001,
-0.013751456514000001,
0.0025346369948230003,
-0.004379600752145,
-0.035961039364337005,
0.012953256256878001,
0.021453391760587002,
0.0018432133365420002,
-0.00... |
Fine-grained visual classification (FGVC) is becoming an important research
field, due to its wide applications and the rapid development of computer
vision technologies. The current state-of-the-art (SOTA) methods in the FGVC
usually employ attention mechanisms to first capture the semantic parts and
then discover t... | [
-0.014015812426805002,
0.020773803815245,
0.017446160316467,
-0.020308207720518,
0.000274094025371,
0.02870263159275,
-0.027237372472882004,
-0.012954527512192001,
-0.017596794292330003,
-0.036809481680393004,
0.026374651119112,
0.023074395954608,
-0.025991218164563002,
0.019650895148515,
... |
The theory of reinforcement learning currently suffers from a mismatch
between its empirical performance and the theoretical characterization of its
performance, with consequences for, e.g., the understanding of sample
efficiency, safety, and robustness. The linear quadratic regulator with unknown
dynamics is a funda... | [
0.0017848351271820002,
-0.004580732900649,
0.0045153922401360005,
-0.028392290696501003,
-0.0024967058561740003,
0.0013248703908170002,
0.0019137972267340001,
0.005406090524047001,
-0.037636291235685,
-0.011046031489968001,
0.016300806775689,
0.017002360895276,
-0.007792748510837001,
0.016... |
The identification of nonlinear dynamics from observations is essential for
the alignment of the theoretical ideas and experimental data. The last, in
turn, is often corrupted by the side effects and noise of different natures, so
probabilistic approaches could give a more general picture of the process. At
the same ... | [
-0.027718856930732002,
-0.021676862612366003,
-0.014231031760573,
-0.0038846314419060004,
0.001074380939826,
0.006117692217230001,
-0.0020231737289570003,
-0.00241370149888,
-0.004352576099336001,
-0.019984003156423003,
0.017093753442168,
0.037738386541604,
0.003024438396096,
0.03115963004... |
Size, weight, and power constrained platforms impose constraints on
computational resources that introduce unique challenges in implementing
localization algorithms. We present a framework to perform fast localization on
such platforms enabled by the compressive capabilities of Gaussian Mixture
Model representations ... | [
0.009676106274127001,
0.011495077051222002,
-0.005231251474469001,
-0.019201770424842002,
-0.0007957998896010001,
0.012288312427699,
-0.011823312379419,
0.009696620516479001,
-0.006482649128884001,
-0.028337655588984004,
0.025616036728024,
0.031237067654728,
-0.026874272152781,
0.011631841... |
Event cameras differ from conventional RGB cameras in that they produce
asynchronous data sequences. While RGB cameras capture every frame at a fixed
rate, event cameras only capture changes in the scene, resulting in sparse and
asynchronous data output. Despite the fact that event data carries useful
information tha... | [
-0.0212200936,
-0.00719692698,
-0.0123445839,
-0.0123096127,
-0.00809217151,
-0.0034480905199999997,
-0.00781940203,
0.00840690639,
-0.0151911816,
-0.0279344283,
0.0053819585599999996,
0.047867607300000004,
0.010169418500000001,
0.0181846563,
-0.0036054577199999996,
0.0115752323,
0.0... |
Flying drones can be used in a wide range of applications and services from
surveillance to package delivery. To ensure robust control and safety of drone
operations, cellular networks need to provide reliable wireless connectivity to
drone user equipments (UEs). To date, existing mobile networks have been
primarily ... | [
-0.019989229738712002,
-0.000524884962942,
0.006855366751551,
-0.006342220585793001,
0.019251372665166,
-0.00333209731616,
-0.010719057172536002,
0.00866647157818,
-0.024241972714662,
-0.041615162044763,
0.010544653981924001,
0.012040492147207002,
-0.011081277392804002,
0.01409978512674500... |
The primary aim of this project is to build a contextual Question-Answering
model for videos. The current methodologies provide a robust model for image
based Question-Answering, but we are aim to generalize this approach to be
videos. We propose a graphical representation of video which is able to handle
several typ... | [
-0.015020249411463002,
0.005217181518673001,
0.011454902589321001,
-0.034907687455415004,
-0.000435037713032,
0.013299724087119002,
-0.012396939098834001,
-0.004278415814042,
-0.018121119588613,
-0.02799941971898,
0.013162343762814001,
0.015739860013127,
-0.0014833804452790002,
-0.00239924... |
We propose a novel hardware-aware magnitude pruning technique for coherent
photonic neural networks. The proposed technique can prune 99.45% of network
parameters and reduce the static power consumption by 98.23% with a negligible
accuracy loss.
| [
-0.003206307068467,
0.006841516122221,
0.021326562389731,
0.011116592213511,
-0.00011844941764100001,
0.027561338618397,
0.006998431868851001,
-0.001242247759364,
-0.016751602292060002,
-0.040226161479949,
0.012455604970455001,
0.034507464617490005,
-0.021019704639911003,
0.006911256350576... |
Swarms are highly robust systems that offer unique benefits compared to their
alternatives. In this work, we propose a bio-inspired and artificial potential
field-driven robot swarm control method, where the swarm formation dynamics are
modeled on the basis of Markov Random Field (MRF) optimization. We integrate
the ... | [
-0.021884378045797,
-0.014684675261378,
-0.01836603321135,
0.005691839847713,
0.005501659121364,
0.011791210621595001,
-0.00874831713736,
-0.008870576508343001,
-0.039095740765333,
-0.024628415703773002,
-0.001121557434089,
0.017469465732574,
-0.012871165759861001,
0.0028747867327180003,
... |
Given an alphabet A and a binary relation $\tau$ $\subseteq$ A * x A * , a
language X $\subseteq$ A * is $\tau$-independent if $\tau$ (X) $\cap$ X =
$\emptyset$; X is $\tau$-closed if $\tau$ (X) $\subseteq$ X. The language X is
complete if any word over A is a factor of some concatenation of words in X.
Given a famil... | [
0.011927565559744,
0.01205460447818,
0.011638198979198001,
-0.00291660730727,
-0.032889027148485,
0.0007759093423370001,
-0.022500047460198003,
-0.015230583958327002,
-0.027087572962045003,
-0.041217148303985006,
0.028767311945557,
0.023911593481898002,
0.010854790918529,
-0.00463340058922... |
This paper presents an empirical study regarding training probabilistic
neural networks using training objectives derived from PAC-Bayes bounds. In the
context of probabilistic neural networks, the output of training is a
probability distribution over network weights. We present two training
objectives, used here for... | [
-0.020995553582906,
-0.025835255160927002,
0.020685136318206003,
-0.012289736419916,
0.004874975886195,
0.00035517301876000003,
0.005442899651825,
0.021221311762928,
-0.014095805585384001,
-0.02374698780477,
0.0138277169317,
0.022731073200702,
-0.021461181342601002,
0.014956509694457,
0.... |
Due to the complexity of modeling the elastic properties of materials, the
use of machine learning algorithms is continuously increasing for tactile
sensing applications. Recent advances in deep neural networks applied to
computer vision make vision-based tactile sensors very appealing for their
high-resolution and l... | [
-0.015501599758863002,
0.005134643055498001,
0.025240678340196002,
-0.016436439007520003,
0.020426949486136003,
0.004133527167141,
-0.011406442150473001,
0.011859909631311,
-0.028170773759484003,
-0.048220995813608,
0.001470279996283,
0.0242639798671,
-0.015069061890244002,
-0.004437001422... |
The mixed multinomial logit (MMNL) model assumes constant preference
parameters of a decision-maker throughout different choice situations, which
may be considered too strong for certain choice modelling applications. This
paper proposes an effective approach to model context-dependent
intra-respondent heterogeneity ... | [
-0.035038590431213004,
0.003238674486055,
0.012331942096352001,
-0.020119816064834,
-0.012195072136819,
0.015219888649880001,
-0.009423465467989,
-0.012756237760186001,
-0.036927390843629004,
-0.037365373224020004,
0.004366137087345,
0.026675865054130003,
-0.020516738295555,
-0.00549188861... |
Progress in natural language generation research has been shaped by the
ever-growing size of language models. While large language models pre-trained
on web data can generate human-sounding text, they also reproduce social biases
and contribute to the propagation of harmful stereotypes. This work utilises
the flaw of... | [
-0.00227014697,
0.00962843653,
0.0194623172,
-0.028132019600000002,
0.00506075,
0.0119157042,
-0.012401919800000001,
0.029529031400000003,
-0.0212702174,
-0.0437457,
0.008183486759999999,
0.016586111900000002,
-0.0340213887,
0.0050812945699999995,
0.019147303,
0.0162163153,
0.0327887... |
Learning to control robots directly based on images is a primary challenge in
robotics. However, many existing reinforcement learning approaches require
iteratively obtaining millions of robot samples to learn a policy, which can
take significant time. In this paper, we focus on learning a realistic world
model captu... | [
-0.014900429174304002,
-0.005849848501384001,
0.016957070678472002,
-0.029092611744999,
0.005008805077522,
0.008001830428838001,
0.0025588830467310002,
0.012319413945078002,
-0.014042360708117001,
-0.031816639006137,
-0.009050580672919,
0.024216603487730002,
0.011577116325497001,
0.0039089... |
We propose three regularization-based speaker adaptation approaches to adapt
the attention-based encoder-decoder (AED) model with very limited adaptation
data from target speakers for end-to-end automatic speech recognition. The
first method is Kullback-Leibler divergence (KLD) regularization, in which the
output dis... | [
-0.012996109202504,
-0.00029603598522900005,
0.028932640329003,
-0.012129239737987001,
0.010700638405978001,
0.035562459379434,
-0.014140377752482001,
-0.008634021505713001,
-0.010194387286901,
-0.026338966563344002,
0.027462430298328,
0.043052215129137004,
-0.00339639512822,
0.02109614014... |
Multi-parameter cognition in a cognitive radio network (CRN) provides a more
thorough understanding of the radio environments, and could potentially lead to
far more intelligent and efficient spectrum usage for a secondary user. In this
paper, we investigate the multi-parameter cognition problem for a CRN where the
p... | [
0.0031246787402770004,
-0.000314980803523,
0.030917508527636004,
-0.003694850252941,
-0.010432926006615,
0.027950538322329,
0.005836892873048001,
0.006800465751439001,
-0.037378299981355,
-0.032276216894388005,
-0.002168038394302,
0.029919276013970004,
-0.018619827926158003,
-0.00831861235... |
Conceptual graphs, which is a particular type of Knowledge Graphs, play an
essential role in semantic search. Prior conceptual graph construction
approaches typically extract high-frequent, coarse-grained, and time-invariant
concepts from formal texts. In real applications, however, it is necessary to
extract less-fr... | [
-0.007018054835498001,
0.002074918011203,
0.019806815311312002,
-0.021520206704735003,
-0.014282838441431002,
0.022767556831240002,
-0.036680303514003004,
-0.0022445439826690003,
-0.020588122308254003,
-0.04901672527194,
-0.00027607032097800004,
0.016352616250514002,
-0.006298430263996,
0.... |
In the absence of nonverbal cues during messaging communication, users
express part of their emotions using emojis. Thus, having emojis in the
vocabulary of text messaging language models can significantly improve many
natural language processing (NLP) applications such as online communication
analysis. On the other ... | [
-0.025741644203662,
0.00009733901970321314,
0.015126815997064,
-0.024329075589776,
-0.00687426701188,
-0.000752140767872,
-0.00041507027344700004,
-0.004601130262017,
-0.007775978650897001,
-0.012089109979569001,
-0.021874224767088002,
0.000368570414138,
-0.039305035024881,
0.0065588392317... |
Answering complex First-Order Logical (FOL) queries on large-scale incomplete
knowledge graphs (KGs) is an important yet challenging task. Recent advances
embed logical queries and KG entities in the same space and conduct query
answering via dense similarity search. However, most logical operators designed
in previo... | [
0.005579617340117001,
0.018832065165042003,
-0.0012310502352190001,
-0.033573783934116,
-0.022949865087866003,
0.020245842635631003,
-0.018557546660304,
-0.007082613650709,
-0.030856037512421,
-0.019586995244026,
0.007377722766250001,
0.023951862007379,
-0.012737723998725001,
0.02281260490... |
This paper revisits datasets and evaluation criteria for Symbolic Regression,
a task of expressing given data using mathematical equations, specifically
focused on its potential for scientific discovery. Focused on a set of formulas
used in the existing datasets based on Feynman Lectures on Physics, we recreate
120 d... | [
-0.004171883221715,
0.000858553801663,
0.009797925129532,
0.002246534451842,
-0.009261439554393,
0.0030389099847520002,
-0.007059024181216,
0.006307238247245,
-0.0029559663962570003,
-0.038203436881303,
-0.014838068746030001,
0.032895050942897006,
-0.0012882718583560001,
-0.005015436559915... |
In Byzantine robust distributed or federated learning, a central server wants
to train a machine learning model over data distributed across multiple
workers. However, a fraction of these workers may deviate from the prescribed
algorithm and send arbitrary messages. While this problem has received
significant attenti... | [
-0.027095280587673003,
-0.005856053903698,
0.011782705783843,
-0.024878522381186003,
-0.006890305783599,
0.026121037080883,
-0.006791469641029,
0.006727932021021001,
-0.019174253568053003,
-0.05438823625445301,
0.018496518954634,
0.011154389008879,
-0.019753152504563002,
-0.005203028209507... |
Construction robots are challenging the traditional paradigm of labor
intensive and repetitive construction tasks. Present concerns regarding
construction robots are focused on their abilities in performing complex tasks
consisting of several subtasks and their adaptability to work in unstructured
and dynamic constru... | [
-0.0239043161,
-0.0223932788,
-0.00711275917,
-0.00997828227,
-0.00285020843,
0.0153145529,
-0.004955108739999999,
0.0093657,
-0.00639127335,
-0.018091591100000002,
-0.006837097,
0.0063334186599999995,
-0.00850808527,
0.000643211242,
-0.0153417792,
-0.0030016524299999996,
0.020174371... |
We discuss a way to find a well behaved baseline for attribution methods that
work by feeding a neural network with a sequence of interpolated inputs between
two given inputs. Then, we test it with our novel Riemann-Stieltjes Integrated
Gradient-weighted Class Activation Mapping (RSI-Grad-CAM) attribution method.
| [
-0.008460226468741,
0.011088786646723001,
0.001046755583956,
-0.02242175489664,
0.008287861943244,
0.005206845700740001,
0.0009650619467720001,
-0.0064098066650330006,
-0.027966149151325004,
-0.04085040092468201,
0.023973036557435,
0.0178684592247,
-0.010499874129891,
0.017566820606589,
... |
Greybox fuzzing is one of the most useful and effective techniques for the
bug detection in large scale application programs. It uses minimal amount of
instrumentation. American Fuzzy Lop (AFL) is a popular coverage based
evolutionary greybox fuzzing tool. AFL performs extremely well in fuzz testing
large application... | [
-0.015933755785226,
-0.013187543489038,
0.005778489634394,
-0.009618896991014,
-0.018837304785847,
0.016205517575144,
-0.032782915979623004,
-0.014303192496299001,
-0.035901013761758,
-0.031381204724311,
0.008481793105602,
-0.002006022725254,
0.021225938573479,
0.016834856942296,
-0.0190... |
One primary technical challenge in photoacoustic microscopy (PAM) is the
necessary compromise between spatial resolution and imaging speed. In this
study, we propose a novel application of deep learning principles to
reconstruct undersampled PAM images and transcend the trade-off between spatial
resolution and imagin... | [
-0.013480611145496,
0.017388535663485,
0.028289224952459002,
-0.010810771957039,
-0.0036105073522770003,
0.018979372456669003,
-0.018439872190356,
0.0059760124422600005,
-0.012166441418230001,
-0.023018714040517002,
0.012111107818782002,
0.033698070794343005,
0.013203944079577002,
-0.00451... |
Data augmentation for minority classes is an effective strategy for
long-tailed recognition, thus developing a large number of methods. Although
these methods all ensure the balance in sample quantity, the quality of the
augmented samples is not always satisfactory for recognition, being prone to
such problems as ove... | [
-0.012614530511200001,
-0.016984919086098,
0.008357658982276,
-0.018730236217379,
-0.007697843480855001,
0.010166829451918,
-0.015154464170336002,
0.006470445543527,
-0.021993838250637002,
-0.023980379104614,
0.0054452489130190004,
0.005792893469333001,
-0.013891592621803001,
0.01392706669... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.