text
stringlengths
2.85k
2.55M
label
int64
0
10
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid Serguei A. Mokhov Joey Paquet Mourad Debbabi Faculty of Engineering and Computer Science Concordia University, Montréal, Québec, Canada, {mokhov,paquet,debbabi}@encs.concordia.ca arXiv:0906.0049v1 [cs.LO] 30 May 2009 Abstract This work-in-pr...
6
Logical Methods in Computer Science Vol. 6 (3:11) 2010, pp. 1–34 www.lmcs-online.org Submitted Published Oct. 20, 2008 Sep. 1, 2010 ACYCLIC SOLOS AND DIFFERENTIAL INTERACTION NETS THOMAS EHRHARD AND OLIVIER LAURENT Preuves Programmes Systèmes, CNRS – Université Paris 7, France e-mail address: Thomas.Ehrhard@pps.ju...
6
Quantum Algorithms for Graph Connectivity and Formula Evaluation Stacey Jeffery1 and Shelby Kimmel2 1 QuSoft and CWI, Amsterdam, the Netherlands 2 Middlebury College, Middlebury, VT, USA arXiv:1704.00765v2 [quant-ph] 16 Aug 2017 August 17, 2017 We give a new upper bound on the quantum query complexity of deciding...
8
arXiv:1510.03367v1 [cs.DS] 12 Oct 2015 Layered Heaps Beating Standard and Fibonacci Heaps in Practice P. Huggins March 28, 2018 Abstract We consider the classic problem of designing heaps. Standard binary heaps run faster in practice than Fibonacci heaps but have worse time guarantees. Here we present a new type of he...
8
arXiv:1510.08292v1 [math.AC] 28 Oct 2015 THE STRUCTURE OF THE SALLY MODULE OF INTEGRALLY CLOSED IDEALS KAZUHO OZEKI AND MARIA EVELINA ROSSI To Shiro Goto on the occasion of his seventieth birthday Abstract. The first two Hilbert coefficients of a primary ideal play an important role in commutative algebra and in alge...
0
Bernoulli Embeddings for Graphs Vinith Misraα and Sumit Bhatiaβ ∗ Netflix Inc., Los Gatos, CA, USA β IBM India Research Laboratory, New Delhi, India vmisra@netflix.com, sumitbhatia@in.ibm.com arXiv:1803.09211v1 [cs.LG] 25 Mar 2018 α March 25, 2018 Abstract Just as semantic hashing [Salakhutdinov and Hinton2009] can...
2
UPDATING THE SILENT SPEECH CHALLENGE BENCHMARK WITH DEEP LEARNING Yan Ji, Licheng Liu, Hongcui Wang, Zhilei Liu, Zhibin Niu, Bruce Denby Tianjin University, Tianjin, China ABSTRACT The 2010 Silent Speech Challenge benchmark is updated with new results obtained in a Deep Learning strategy, using the same input features ...
1
1 Amplify-and-Forward Two-Way Relaying System over Free-Space Optics Channels arXiv:1708.05083v1 [cs.IT] 16 Aug 2017 Jaedon Park Member, IEEE, Chan-Byoung Chae Senior Member, IEEE, and Giwan Yoon Member, IEEE Abstract—In this paper, we analyze the performance of a twoway subcarrier intensity-modulated (SIM) amplify...
7
Complexity Analysis in Presence of Control Operators and Higher-Order Functions arXiv:1310.1763v1 [cs.LO] 7 Oct 2013 Ugo Dal Lago Giulio Pellitta Abstract A polarized version of Girard, Scedrov and Scott’s Bounded Linear Logic is introduced and its normalization properties studied. Following Laurent [26], the logic...
6
1 A Discontinuous Galerkin Time Domain Framework for Periodic Structures Subject To Oblique Excitation arXiv:1311.0790v2 [cs.CE] 17 Feb 2014 Nicholas C. Miller, Andrew D. Baczewski, John D. Albrecht, and Balasubramaniam Shanker Abstract—A nodal Discontinuous Galerkin (DG) method is derived for the analysis of time-d...
5
ROCKET: Robust Confidence Intervals via Kendall’s Tau for Transelliptical Graphical Models arXiv:1502.07641v3 [math.ST] 1 Sep 2017 Rina Foygel Barber and Mladen Kolar September 1, 2017 Abstract Understanding complex relationships between random variables is of fundamental importance in high-dimensional statistics, wi...
10
A Game-Theoretic Model of Demand Response Aggregator Competition for Selling Stored Energy in Regulated and Unregulated Power Markets Mahdi Motalleb, Reza Ghorbani1 Abstract This work is concerned with the application of game-theoretic principles to model competition between demand response aggregators for selling exc...
3
Efficient Computation of the 8-point DCT via Summation by Parts D. F. G. Coelho∗ R. J. Cintra† V. S. Dimitrov‡ arXiv:1801.05832v2 [cs.DS] 28 Mar 2018 Abstract This paper introduces a new fast algorithm for the 8-point discrete cosine transform (DCT) based on the summation-by-parts formula. The proposed method convert...
8
The International Journal of Multimedia & Its Applications (IJMA) Vol.6, No.1, February 2014 REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS Omaima N. A. AL-Allaf Assistant Professor, Faculty of Sciences & IT, Al-Zaytoonah University of Jordan, P.O. Box130, Amman, (11733), Jordan ABSTRACT...
9
RHO-ESTIMATORS FOR SHAPE RESTRICTED DENSITY ESTIMATION arXiv:1503.04427v4 [math.ST] 25 Apr 2016 Y. BARAUD AND L. BIRGÉ Abstract. The purpose of this paper is to pursue our study of ρ-estimators built from i.i.d. observations that we defined in Baraud et al. (2014). For a ρ-estimator based on some model S (which mean...
10
Energy-efficient Delivery by Heterogeneous Mobile Agents∗ Andreas Bärtschi1 , Jérémie Chalopin2 , Shantanu Das2 , Yann Disser3 , Daniel Graf1 , Jan Hackfeld4 , and Paolo Penna1 1 ETH Zürich, Department of Computer Science, Switzerland { baertschi,daniel.graf,paolo.penna }@inf.ethz.ch LIF, CNRS and Aix-Marseille Univer...
8
Fundamental groups of a strongly controllable group system or group code (including group shift and linear block code) arXiv:1709.08265v4 [cs.IT] 25 Feb 2018 Kenneth M. Mackenthun Jr. (email: ken1212576@gmail.com) February 27, 2018 ABSTRACT A finite group G defines a signature group if and only if there is a normal ...
7
WAYLA - Generating Images from Eye Movements Bingqing Yu Centre for Intelligent Machines, McGill University arXiv:1711.07974v1 [cs.CV] 21 Nov 2017 bingqing.yu@mail.mcgill.ca James J. Clark Centre for Intelligent Machines, McGill University clark@cim.mcgill.ca Abstract [6, 12]. One of the shortcomings of the aforem...
1
Continuous Circadian Phase Estimation Using Adaptive Notch Filter ∗ Wei Qiao∗ , Kyle Altman∗ , Agung Julius∗ , Bernard Possidente† , John T. Wen∗ , Smart Lighting Engineering Research Center, Rensselaer Polytechnic Institute, Troy, NY † Biology Department, Skidmore College, Saratoga, NY arXiv:1804.00115v1 [cs.SY] 31 ...
3
THE MAGIC OF UNIVERSAL QUANTUM COMPUTING WITH PERMUTATIONS arXiv:1701.06443v2 [quant-ph] 6 Apr 2017 MICHEL PLANAT† AND RUKHSAN-UL-HAQ‡ Abstract. The role of permutation gates for universal quantum computing is investigated. The ‘magic’ of computation is clarified in the permutation gates, their eigenstates, the Woott...
4
Preprint submitted to Energy and Buildings, November 2013 Pseudo Dynamic Transitional Modeling of Building Heating Energy Demand Using Artificial Neural Network Subodh Paudel a,b,c b c , Mohamed Elmtiri , Wil L. Kling , Olivier Le Corre a* , Bruno Lacarrière a a Department of Energy System and Environment, E...
5
P IXEL D ECONVOLUTIONAL N ETWORKS Hongyang Gao Washington State University hongyang.gao@wsu.edu Hao Yuan Washington State University hao.yuan@wsu.edu Zhengyang Wang Washington State University zwang6@eecs.wsu.edu arXiv:1705.06820v4 [cs.LG] 27 Nov 2017 Shuiwang Ji Washington State University sji@eecs.wsu.edu A BSTR...
9
arXiv:1606.01633v1 [math.ST] 6 Jun 2016 Bernoulli 22(4), 2016, 1963–1978 DOI: 10.3150/15-BEJ716 Conditions for a Lévy process to stay positive near 0, in probability ROSS A. MALLER School of Finance, Actuarial Studies and Statistics, Australian National University, Canberra, ACT, Australia. E-mail: Ross.Maller@anu.e...
10
Extending Prolog with Incomplete Fuzzy Information arXiv:cs/0508091v1 [cs.PL] 22 Aug 2005 Susana Munoz-Hernandez1 and Claudio Vaucheret2 1 Departamento de Lenguajes, Sistemas de la Información e Ingenierı́a del Software Facultad de Informática - Universidad Politécnica de Madrid Campus de Montegancedo 28660 Madri...
6
arXiv:1504.01066v3 [math.AC] 20 Oct 2017 ON THE GROWTH OF DEVIATIONS ADAM BOOCHER, ALESSIO D’ALÌ, ELOÍSA GRIFO, JONATHAN MONTAÑO, AND ALESSIO SAMMARTANO Abstract. The deviations of a graded algebra are a sequence of integers that determine the Poincaré series of its residue field and arise as the number of generat...
0
Minimax signal detection under weak noise assumptions∗ arXiv:1611.09008v3 [math.ST] 1 Nov 2017 Clément Marteau, Univ Lyon, Université Claude Bernard Lyon 1, CNRS UMR 5208, Institut Camille Jordan, 43 blvd. du 11 novembre 1918, F-69622 Villeurbanne cedex, France Email: marteau@math.univ-lyon1.fr and Theofanis Sapati...
10
Efficient and Robust Pedestrian Detection using Deep Learning for Human-Aware Navigation André Mateus, David Ribeiro, Pedro Miraldo, and Jacinto C. Nascimento arXiv:1607.04441v2 [cs.RO] 28 Sep 2017 Instituto de Sistemas e Robótica (LARSyS), Instituto Superior Técnico, Lisboa, Torre Norte - 6 Piso Av.Rovisco Pais, ...
1
Under consideration for publication in Theory and Practice of Logic Programming 1 arXiv:1210.1653v1 [cs.LO] 5 Oct 2012 An Improved Proof-Theoretic Compilation of Logic Programs Iliano Cervesato Department of Computer Science Carnegie Mellon University E-mail: iliano@cmu.edu submitted 1 January 2003; revised 1 Januar...
6
1 Power-Traffic Coordinated Operation for Bi-Peak Shaving and Bi-Ramp Smoothing –A Hierarchical Data-Driven Approach Huaiguang Jiang, Member, IEEE, Yingchen Zhang, Senior Member, IEEE, Yuche Chen, Changhong Zhao, Member, IEEE, Jin Tan, Member, IEEE arXiv:1712.00211v1 [cs.SY] 1 Dec 2017 National Renewable Energy Labo...
3
arXiv:1802.00381v1 [math.ST] 1 Feb 2018 Signal-plus-noise matrix models: eigenvector deviations and fluctuations Joshua Cape and Minh Tang and Carey E. Priebe Department of Applied Mathematics and Statistics, Johns Hopkins University February 2, 2018 Abstract Estimating eigenvectors and low-dimensional subspaces is of...
10
WSEAS TRANSACTIONS on SYSTEMS P. Balasubramanian System Reliability, Fault Tolerance and Design Metrics Tradeoffs in the Distributed Minority and Majority Voting Based Redundancy Scheme P. BALASUBRAMANIAN* * School of Computer Engineering Nanyang Technological University 50 Nanyang Avenue SINGAPO...
3
arXiv:1802.09464v2 [cs.LG] 10 Mar 2018 Multi-Goal Reinforcement Learning: Challenging Robotics Environments and Request for Research Matthias Plappert, Marcin Andrychowicz, Alex Ray, Bob McGrew, Bowen Baker, Glenn Powell, Jonas Schneider, Josh Tobin, Maciek Chociej, Peter Welinder, Vikash Kumar, and Wojciech Zaremba ...
2
1 Storage, Communication, and Load Balancing Trade-off in Distributed Cache Networks arXiv:1706.10209v1 [cs.IT] 30 Jun 2017 Mahdi Jafari Siavoshani, Member, IEEE, Ali Pourmiri, Seyed Pooya Shariatpanahi Abstract—We consider load balancing in a network of caching servers delivering contents to end users. Randomized ...
8
Online Auctions and Multi-scale Online Learning ∗ Sébastien Bubeck† , Nikhil R. Devanur† , Zhiyi Huang‡ and Rad Niazadeh§ arXiv:1705.09700v1 [cs.GT] 26 May 2017 † ‡ Microsoft Research, Redmond, Department of Computer Science, The University of Hong Kong, § Department of Computer Science, Cornell University. May 3...
8
1 Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random arXiv:1708.04283v1 [cs.IT] 14 Aug 2017 Parameters Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai (Shitz), Paul Cuff and Pablo Piantanida Abstract We study the trade-off between secret message (SM) and secret key (SK) rate...
7
Datalog: Bag Semantics via Set Semantics ∗ Leopoldo Bertossi1 , Georg Gottlob2,3 and Reinhard Pichler3 arXiv:1803.06445v1 [cs.DB] 17 Mar 2018 1 Carleton University, Ottawa, bertossi@scs.carleton.ca 2 University of Oxford, georg.gottlob@cs.ox.ac.uk 3 TU Wien, firstname.surname@tuwien.ac.at ABSTRACT Duplicates in d...
2
HOROFUNCTIONS ON GRAPHS OF LINEAR GROWTH arXiv:1608.03727v2 [math.MG] 31 Oct 2016 MATTHEW C. H. TOINTON AND ARIEL YADIN Abstract. We prove that a linear growth graph has finitely many horofunctions. This provides a short and simple proof that any finitely generated infinite group of linear growth is virtually cyclic...
4
Trajectory-based Radical Analysis Network for Online Handwritten Chinese Character Recognition Jianshu Zhang, Yixing Zhu, Jun Du and Lirong Dai arXiv:1801.10109v1 [cs.CV] 22 Jan 2018 National Engineering Laboratory for Speech and Language Information Processing University of Science and Technology of China, Hefei, An...
1
The Bivariate Lack-of-Memory Distributions Gwo Dong Lin, Xiaoling Dou and Satoshi Kuriki Academia Sinica, Taiwan, Waseda University, Japan arXiv:1606.05097v5 [math.ST] 16 Dec 2017 and The Institute of Statistical Mathematics, Japan Abstract. We treat all the bivariate lack-of-memory (BLM) distributions in a unified ...
10
Generating Representative Executions Extended Abstract Hendrik Maarand Tarmo Uustalu Dept. of Software Science, Tallinn University of Technology Analyzing the behaviour of a concurrent program is made difficult by the number of possible executions. This problem can be alleviated by applying the theory of Mazurkiewic...
6
Dual Control for Approximate Bayesian Reinforcement Learning Dual Control for Approximate Bayesian Reinforcement Learning Edgar D. Klenske edgar.klenske@tuebingen.mpg.de arXiv:1510.03591v2 [stat.ML] 11 Aug 2016 Max-Planck-Institute for Intelligent Systems Spemannstraße 38 72076 Tübingen, Germany Philipp Hennig p...
3
Optimal Inference After Model Selection William Fithian∗1 , Dennis L. Sun2 , and Jonathan Taylor3 arXiv:1410.2597v4 [math.ST] 18 Apr 2017 1 2 Department of Statistics, University of California Berkeley Department of Statistics, California Polytechnic State University 3 Department of Statistics, Stanford University ...
10
Population Synthesis via k -Nearest Neighbor Crossover Kernel Fujitsu Laboratories Ltd. Kanagawa, Japan Email: {hamada-naoki, km.homma, h-higuchi, h.kikuchi}@jp.fujitsu.com Abstract—The recent development of multi-agent simulations brings about a need for population synthesis. It is a task of reconstructing the entire ...
9
Towards Reversible Sessions∗ Francesco Tiezzi Nobuko Yoshida IMT Institute for Advanced Studies, Lucca, Italy Imperial College, London, U.K. francesco.tiezzi@imtlucca.it n.yoshida@imperial.ac.uk In this work, we incorporate reversibility into structured communication-based programming, to allow parties of a sessi...
6
arXiv:1601.07131v1 [math.GR] 26 Jan 2016 ON THE YANG-BAXTER EQUATION AND LEFT NILPOTENT LEFT BRACES FERRAN CEDÓ, TATIANA GATEVA-IVANOVA AND AGATA SMOKTUNOWICZ Abstract. We study non-degenerate involutive set-theoretic solutions (X, r) of the Yang-Baxter equation, we call them simply solutions. We show that the struc...
4
Constructing Top-k Routes with Personalized Submodular Maximization of POI Features Hongwei Liang, Ke Wang School of Computing Science, Simon Fraser University, Canada Abstract—We consider a practical top-k route problem: given a collection of points of interest (POIs) with rated features and traveling costs between...
8
SWISH: SWI-Prolog for Sharing Jan Wielemaker1 and Torbjörn Lager2 and Fabrizio Riguzzi3 1 arXiv:1511.00915v1 [cs.PL] 3 Nov 2015 2 Web and Media group, VU University Amsterdam, The Netherlands, J.Wielemaker@vu.nl Department of Philosophy, Linguistics and Theory of Science, University of Gothenburg, Sweden Torbjorn.L...
6
Efficient Multi-Person Pose Estimation with Provable Guarantees arXiv:1711.07794v1 [cs.CV] 21 Nov 2017 Shaofei Wang Beijing A&E Technologies Beijing, China sfwang0928@gmail.com Konrad Paul Kording University of Pennsylvania Philadelphia, PA koerding@gmail.com Julian Yarkony Experian Data Labs San Diego, CA julian.e...
1
Optimal Longest Paths by Dynamic Programming∗ Tomáš Balyo1 , Kai Fieger1 , and Christian Schulz1,2 1 Karlsruhe Institute of Technology, Karlsruhe, Germany {tomas.balyo, christian.schulz}@kit.edu, fieger@ira.uka.de University of Vienna, Vienna, Austria christian.schulz@univie.ac.at 2 arXiv:1702.04170v1 [cs.DS] 14 Feb...
8
ANALYSIS OF BLOCK-PRECONDITIONERS FOR MODELS OF COUPLED MAGMA/MANTLE DYNAMICS arXiv:1311.6372v3 [math.NA] 29 May 2014 SANDER RHEBERGEN∗ , GARTH N. WELLS† , RICHARD F. KATZ‡ , AND ANDREW J. WATHEN§ Abstract. This article considers the iterative solution of a finite element discretisation of the magma dynamics equation...
5
Bounded Degree Cosystolic Expanders of Every Dimension Shai Evra ∗ Tali Kaufman † arXiv:1510.00839v3 [math.CO] 26 Jan 2017 January 27, 2017 Abstract In this work we present a new local to global criterion for proving a form of high dimensional expansion, which we term cosystolic expansion. Applying this criterion...
4
Condition number-free query and active learning of linear families arXiv:1711.10051v1 [cs.LG] 27 Nov 2017 Xue Chen∗ xchen@cs.utexas.edu The University of Texas at Austin Eric Price ecprice@cs.utexas.edu The University of Texas at Austin November 29, 2017 Abstract We consider the problem of learning a function from...
8
1 Joint Sum Rate And Error Probability Optimization: Finite Blocklength Analysis Mahdi Haghifam, Mohammad Robat Mili, Behrooz Makki, Masoumeh arXiv:1707.09735v2 [cs.IT] 1 Aug 2017 Nasiri-Kenari, Tommy Svensson. Abstract We study the tradeoff between the sum rate and the error probability in downlink of wireless net...
7
Using Table Valued Functions in SQL Server 2005 To Implement a Spatial Data Library Jim Gray Microsoft Research Alex Szalay, Gyorgy Fekete, The Johns Hopkins University August 2005 Technical Report MSR-TR-2005-122 Microsoft Research Advanced Technology Division Microsoft Corporation One Microsoft Way Redmond, WA 9805...
5
THE CONGRUENCE TOPOLOGY, GROTHENDIECK DUALITY AND THIN GROUPS arXiv:1709.06179v1 [math.GR] 18 Sep 2017 ALEXANDER LUBOTZKY AND T.N. VENKATARAMANA Abstract. This paper answers a question raised by Grothendieck in 1970 on the “Grothendieck closure” of an integral linear group and proves a conjecture of the first author...
4
A QUANTITATIVE GENERALIZATION OF PRODANOV-STOYANOV THEOREM ON MINIMAL ABELIAN TOPOLOGICAL GROUPS arXiv:1706.05411v2 [math.GN] 20 Jun 2017 TARAS BANAKH To the memory of Ivan Prodanov (1935–1985) Abstract. A topological group X is defined to have compact exponent if for some number n ∈ N the set {xn : x ∈ X} has compac...
4
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015 THE NEW HYBRID COAW METHOD FOR SOLVING MULTI-OBJECTIVE PROBLEMS Zeinab Borhanifar and Elham Shadkam* Department of Industrial Engineering, Faculty of Eng.; Khayyam University, Mashhad, Iran ABSTRACT In this artic...
9
TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. XX, NO. X, MONTH 2018 1 Contrast-Oriented Deep Neural Networks for Salient Object Detection arXiv:1803.11395v1 [cs.CV] 30 Mar 2018 Guanbin Li and Yizhou Yu Abstract—Deep convolutional neural networks have become a key element in the recent breakthrough of ...
9
Distributed estimation from relative measurements of heterogeneous and uncertain quality arXiv:1710.08632v1 [cs.SY] 24 Oct 2017 Chiara Ravazzi Nelson P. K. Chan Abstract— This paper studies the problem of estimation from relative measurements in a graph, where a vector indexed over the nodes has to be reconstructed...
3
23 COMPUTATIONAL TOPOLOGY OF GRAPHS ON SURFACES Éric Colin de Verdière arXiv:1702.05358v2 [cs.CG] 5 Sep 2017 INTRODUCTION This chapter surveys computational topology results in the special, low-dimensional case where the ambient space is a surface. Surface topology is very well-understood and comparably simpler tha...
8
Eye-Movement behavior identification for AD diagnosis Juan Biondi ∗1,2 , Gerardo Fernandez1 , Silvia Castro2,1 , and Osvaldo Agamennoni1,3 1 arXiv:1702.00837v3 [cs.NE] 15 Jan 2018 Laboratorio de Desarrollo en Neurociencia Cognitiva, Instituto de Investigaciones en Ingenierı́a Eléctrica (IIIE), Departamento de Ing...
9
THE MUTUAL INFORMATION OF LDGM CODES arXiv:1707.04413v2 [cs.IT] 26 Jul 2017 JAN VAN DEN BRAND AND NOR JAAFARI A BSTRACT. We provide matching upper and lower bounds on the mutual information in noisy reconstruction of parity check codes and thereby prove a long-standing conjecture by Montanari [IEEE Transactions on In...
7
arXiv:1508.03362v1 [math.AG] 9 Aug 2015 RAMIFICATION OF VALUATIONS AND LOCAL RINGS IN POSITIVE CHARACTERISTIC STEVEN DALE CUTKOSKY 1. Introduction In this paper we consider birational properties of ramification of excellent local rings. Suppose that K ∗ /K is a finite separable field extension, S is an excellent loca...
0
1 Channel Hardening and Favorable Propagation in Cell-Free Massive MIMO with Stochastic Geometry arXiv:1710.00395v1 [cs.IT] 1 Oct 2017 Zheng Chen and Emil Björnson Abstract—Cell-Free (CF) Massive MIMO is an alternative topology for Massive MIMO networks, where a large number of single-antenna access points (APs) ar...
7
A case for multiple and parallel RRAMs as synaptic model for training SNNs Aditya Shukla Dept. of Electrical Engineering Indian Institute of Technology Bombay Mumbai, India adityashukla@ee.iitb.ac.in Sidharth Prasad Dept. of Electrical Engineering Indian Institute of Technology Bombay Mumbai, India prasad.sidharth@col...
9
Classification for Dynamical Systems: Model-based Approach and Support Vector Machines arXiv:1803.10552v1 [cs.SY] 28 Mar 2018 Giorgio Battistelli and Pietro Tesi Abstract— We consider the problem of classifying trajectories generated by dynamical systems. We investigate a model-based approach, the common approach in ...
3
Sentence Object Notation: Multilingual sentence notation based on Wordnet Abdelkrime Aries Djamel eddine Zegour Walid Khaled Hidouci Ecole nationale Supérieure d’Informatique (ESI, ex. INI), Algiers, Algeria Emails: {ab aries, d zegour, w hidouci}@esi.dz arXiv:1801.00984v2 [cs.CL] 10 Jan 2018 Abstract The represe...
2
Continuous monitoring of ℓp norms in data streams Jaroslaw Blasiok∗ Jian Ding† Jelani Nelson‡ arXiv:1704.06710v3 [cs.DS] 9 Nov 2017 November 10, 2017 Abstract In insertion-only streaming, one sees a sequence of indices a1 , a2 , . . . , am ∈ [n]. The stream defines def a sequence of m frequency vectors x(1) , . . ...
8
arXiv:1705.10212v1 [math.GR] 29 May 2017 Effective Separability of Finitely Generated Nilpotent Groups 1 Effective Twisted Conjugacy Separability of Nilpotent Groups Jonas Deré∗ and Mark Pengitore† May 30, 2017 Abstract This paper initiates the study of effective twisted conjugacy separability for finitely generat...
4
Predicting Lane Keeping Behavior of Visually Distracted Drivers Using Inverse Suboptimal Control* arXiv:1604.03984v3 [cs.SY] 29 Apr 2016 Felix Schmitt1 , Hans-Joachim Bieg1 , Dietrich Manstetten1 , Michael Herman1 and Rainer Stiefelhagen2 Abstract— Driver distraction strongly contributes to crashrisk. Therefore, assi...
3
Type Classes for Lightweight Substructural Types Edward Gan Jesse A. Tov Greg Morrisett Facebook, Menlo Park Northeastern University, Boston Harvard University, Cambridge edgan8@gmail.com tov@ccs.neu.edu greg@eecs.harvard.edu Linear and substructural types are powerful tools, but adding them to standard functi...
6
SYMBOLIC MODELS FOR RETARDED JUMP-DIFFUSION SYSTEMS arXiv:1704.03690v3 [math.OC] 25 Jan 2018 PUSHPAK JAGTAP AND MAJID ZAMANI Abstract. In this paper, we provide for the first time an automated, correct-by-construction, controller synthesis scheme for a class of infinite dimensional stochastic systems, namely, retard...
3
On privacy amplification, lossy compression, and their duality to channel coding Joseph M. Renes arXiv:1708.05685v2 [cs.IT] 24 Aug 2017 Institute for Theoretical Physics, ETH Zürich, Switzerland We examine the task of privacy amplification from information-theoretic and coding-theoretic points of view. In the former,...
7
arXiv:1601.01894v1 [math.GR] 8 Jan 2016 On The UNRECOGNIZABILITY BY PRIME GRAPH FOR THE ALMOST SIMPLE GROUP PGL(2, 9) Ali Mahmoudifar Department of Mathematics, Tehran North Branch, Islamic Azad University, Tehran, Iran e-mail: alimahmoudifar@gmail.com Abstract The prime graph of a finite group G is denoted by Γ(G). ...
4
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2016 1 Deep convolutional neural networks for predominant instrument recognition in polyphonic music arXiv:1605.09507v3 [cs.SD] 26 Dec 2016 Yoonchang Han, Jaehun Kim, and Kyogu Lee, Senior Member, IEEE Abstract—Identifying musical instruments in polyphonic music re...
9
The Spin Group in Superspace Hennie De Schepper, Alí Guzmán Adán, Frank Sommen Clifford Research Group, Department of Mathematical Analysis, Faculty of Engineering and Architecture, Ghent University, Krijgslaan 281, 9000 Gent, Belgium. arXiv:1804.00963v1 [math.GR] 3 Apr 2018 Abstract There are two well-known ways of ...
4
Uniform Asymptotic Inference and the Bootstrap After Model Selection Ryan Tibshirani, Alessandro Rinaldo, Rob Tibshirani, and Larry Wasserman arXiv:1506.06266v3 [math.ST] 9 Aug 2017 Carnegie Mellon University and Stanford University Abstract Recently, Tibshirani et al. (2016) proposed a method for making inferences a...
10
39 Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement arXiv:1701.05650v1 [cs.PL] 20 Jan 2017 Yulei Sui, School of Computer Science and Engineering, UNSW Australia Jingling Xue, School of Computer Science and Engineering, UNSW Australia We present a new demand-driven flow- and context-sensit...
6
cuDNN: Efficient Primitives for Deep Learning arXiv:1410.0759v3 [cs.NE] 18 Dec 2014 Sharan Chetlur, Cliff Woolley, Philippe Vandermersch, Jonathan Cohen, John Tran NVIDIA Santa Clara, CA 95050 {schetlur, jwoolley, philippev, jocohen, johntran}@nvidia.com Bryan Catanzaro Baidu Research Sunnyvale, CA 94089 bcatanzaro@b...
9
Decentralised L1 Adaptive Primary Controllers & Distributed Consensus-Based Secondary Control for DC Microgrids with Constant-Power Loads Daniel O’Keeffe∗†1 , Stefano Riverso‡2 , Laura Albiol-Tendillo§2 , and Gordon Lightbody¶1,3 arXiv:1804.00251v2 [cs.SY] 3 Apr 2018 1 Control & Intelligent Systems Group, School of ...
3
Differentiable Learning of Logical Rules for Knowledge Base Reasoning arXiv:1702.08367v3 [cs.AI] 27 Nov 2017 Fan Yang Zhilin Yang William W. Cohen School of Computer Science Carnegie Mellon University {fanyang1,zhiliny,wcohen}@cs.cmu.edu Abstract We study the problem of learning probabilistic first-order logical ru...
2
A Restaurant Process Mixture Model for Connectivity Based Parcellation of the Cortex arXiv:1703.00981v1 [q-bio.NC] 2 Mar 2017 Daniel Moyer, Boris A. Gutman, Neda Jahanshad, and Paul M. Thompson Imaging Genetics Center, University of Southern California moyerd@usc.edu Abstract. One of the primary objectives of human ...
5
On the Limited Communication Analysis and Design for Decentralized Estimation arXiv:1801.05849v1 [cs.SY] 17 Jan 2018 Andreea B. Alexandru † Sérgio Pequito Abstract— This paper pertains to the analysis and design of decentralized estimation schemes that make use of limited communication. Briefly, these schemes equ...
3
INTERPLAY BETWEEN HOMOLOGICAL DIMENSIONS OF A COMPLEX AND ITS RIGHT DERIVED SECTION arXiv:1404.3982v2 [math.AC] 28 Jul 2016 CYRUS JALALI Abstract. Let (R, m) be a commutative Noetherian local ring, a be a proper ideal of R and M be an R-complex in D(R). We prove that if M ∈ Df❁ (R) (respectively, M ∈ Df❂ (R)), then i...
0
Flexible Design for α-Duplex Communications in Multi-Tier Cellular Networks arXiv:1511.07903v3 [cs.IT] 20 Apr 2016 Ahmad AlAmmouri, Hesham ElSawy, and Mohamed-Slim Alouini Abstract Backward compatibility is an essential ingredient for the success of new technologies. In the context of in-band full-duplex (FD) commun...
10
arXiv:1509.04612v2 [cs.NE] 16 Sep 2015 Adapting Resilient Propagation for Deep Learning Alan Mosca George D. Magoulas Department of Computer Science and Information Systems Birkbeck, University of London Malet Street, London WC1E 7HX - United Kingdom Email: a.mosca@dcs.bbk.ac.uk Department of Computer Science and I...
9
Fine-grained reductions from approximate counting to decision∗ Holger Dell1 and John Lapinskas2 arXiv:1707.04609v1 [cs.DS] 14 Jul 2017 1 Saarland University and Cluster of Excellence (MMCI), hdell@mmci.uni-saarland.de 2 Oxford University, John.Lapinskas@cs.ox.ac.uk July 18, 2017 Abstract The main problems in fine-...
8
arXiv:1801.08113v1 [cs.NE] 24 Jan 2018 Free Energy Minimization Using the 2-D Cluster Variation Method: Initial Code Verification and Validation THM TR2018-001(ajm) Alianna J. Maren Northwestern University School of Professional Studies Master of Science in Data Science Program Themasis Associates Date: 2018-01-23 Ver...
9
arXiv:1711.10789v1 [cs.LG] 29 Nov 2017 Efficient exploration with Double Uncertain Value Networks Thomas M. Moerland, Joost Broekens and Catholijn M. Jonker Department of Computer Science Delft University of Technology, The Netherlands {T.M.Moerland,D.J.Broekens,C.M.Jonker}@tudelft.nl Abstract This paper studies dire...
2
Structured low-rank matrix completion for forecasting in time series analysis Jonathan Gillarda , Konstantin Usevichb,c,˚ arXiv:1802.08242v1 [stat.ME] 22 Feb 2018 b a Cardiff School of Mathematics, Cardiff University, Senghennydd Road, Cardiff, UK, CF24 4AG. Université de Lorraine, CRAN, UMR 7039, Campus Sciences, ...
3
1 Block Markov Superposition Transmission of BCH Codes with Iterative Erasures-and-Errors arXiv:1708.06081v1 [cs.IT] 21 Aug 2017 Decoders Suihua Cai, Nina Lin, and Xiao Ma, Member, IEEE, Abstract In this paper, we present the block Markov superposition transmission of BCH (BMST-BCH) codes, which can be constructed ...
7
Elaborating Evaluation-Order Polymorphism Joshua Dunfield arXiv:1504.07680v3 [cs.PL] 11 Sep 2015 University of British Columbia Vancouver, Canada joshdunf@cs.ubc.ca Abstract We classify programming languages according to evaluation order: each language fixes one evaluation order as the default, making it transparent...
6
arXiv:1601.01103v1 [math.AC] 6 Jan 2016 WEAK DIMENSION OF FP-INJECTIVE MODULES OVER CHAIN RINGS FRANÇOIS COUCHOT Abstract. It is proven that the weak dimension of each FP-injective module over a chain ring which is either Archimedean or not semicoherent is less or equal to 2. This implies that the projective dimensio...
0
ON THE 2-LINEARITY OF THE FREE GROUP arXiv:1606.06444v1 [math.RT] 21 Jun 2016 ANTHONY M. LICATA 1. Introduction Let Γ be a group, and D a category. A weak action of Γ on D is a map ψ : Γ −→ Aut(D), g 7→ ψg , from Γ to the auto-equivalences of D, such that for all h, g ∈ Γ, ψg ψh ∼ = ψgh . In a genuine action of Γ, o...
4
Aerial Spectral Super-Resolution using Conditional Adversarial Networks Aneesh Rangnekar Nilay Mokashi Emmett Ientilucci Christopher Kanan Matthew Hoffman Rochester Institute of Technology arXiv:1712.08690v1 [cs.CV] 23 Dec 2017 {aneesh.rangnekar, nilaymokashi}@mail.rit.edu, emmett@cis.rit.edu, {kanan, mjhsma}@rit.edu...
1
A Magnus theorem for some amalgamated products arXiv:1701.04441v1 [math.GR] 16 Jan 2017 Carsten Feldkamp January 18, 2017 Abstract A group G possesses the Magnus property if for every two elements u, v ∈ G with the same normal closure, u is conjugate in G to v or v −1 . We prove the Magnus property for some amalgama...
4
Distributed Computing Made Secure: A New Cycle Cover Theorem∗ arXiv:1712.01139v2 [cs.DS] 23 Feb 2018 Merav Parter Eylon Yogev† Abstract In the area of distributed graph algorithms a number of network’s entities with local views solve some computational task by exchanging messages with their neighbors. Quite unfortu...
8
arXiv:1703.04410v2 [math.CO] 26 Feb 2018 REFLEXIVE POLYTOPES ARISING FROM PERFECT GRAPHS TAKAYUKI HIBI AND AKIYOSHI TSUCHIYA Abstract. Reflexive polytopes form one of the distinguished classes of lattice polytopes. Especially reflexive polytopes which possess the integer decomposition property are of interest. In the ...
0
Commutative algebraic groups up to isogeny arXiv:1602.00222v2 [math.AG] 27 Sep 2016 Michel Brion Abstract Consider the abelian category Ck of commutative group schemes of finite type over a field k. By results of Serre and Oort, Ck has homological dimension 1 (resp. 2) if k is algebraically closed of characteristic 0...
4
arXiv:1703.02600v2 [math.GR] 14 Mar 2018 Hopf Galois structures on symmetric and alternating extensions Teresa Crespo, Anna Rio and Montserrat Vela March 15, 2018 Abstract By using our previous results on induced Hopf Galois structures and a recent result by Koch, Kohl, Truman and Underwood on normality, we determine ...
4